query_id
stringlengths
32
32
query
stringlengths
6
2.48k
positive_passages
listlengths
1
17
negative_passages
listlengths
10
100
subset
stringclasses
7 values
b1e86768a0747ec62399398033faf938
Autonomous vehicle navigation using evolutionary reinforcement learning
[ { "docid": "9eba7766cfd92de0593937defda6ce64", "text": "A basic classifier system, ZCS, is presented that keeps much of Holland's original framework but simplifies it to increase understandability and performance. ZCS's relation to Q-learning is brought out, and their performances compared in environments of two difficulty levels. Extensions to ZCS are proposed for temporary memory, better action selection, more efficient use of the genetic algorithm, and more general classifier representation.", "title": "" } ]
[ { "docid": "8dbddd1ebb995ec4b2cc5ad627e91f61", "text": "Pac-Man (and variant) computer games have received some recent attention in artificial intelligence research. One reason is that the game provides a platform that is both simple enough to conduct experimental research and complex enough to require non-trivial strategies for successful game-play. This paper describes an approach to developing Pac-Man playing agents that learn game-play based on minimal onscreen information. The agents are based on evolving neural network controllers using a simple evolutionary algorithm. The results show that neuroevolution is able to produce agents that display novice playing ability, with a minimal amount of onscreen information, no knowledge of the rules of the game and a minimally informative fitness function. The limitations of the approach are also discussed, together with possible directions for extending the work towards producing better Pac-Man playing agents", "title": "" }, { "docid": "adc310c02471d8be579b3bfd32c33225", "text": "In this work, we put forward the notion of Worry-Free Encryption. This allows Alice to encrypt confidential information under Bob's public key and send it to him, without having to worry about whether Bob has the authority to actually access this information. This is done by encrypting the message under a hidden access policy that only allows Bob to decrypt if his credentials satisfy the policy. Our notion can be seen as a functional encryption scheme but in a public-key setting. As such, we are able to insist that even if the credential authority is corrupted, it should not be able to compromise the security of any honest user.\n We put forward the notion of Worry-Free Encryption and show how to achieve it for any polynomial-time computable policy, under only the assumption that IND-CPA public-key encryption schemes exist. Furthermore, we construct CCA-secure Worry-Free Encryption, efficiently in the random oracle model, and generally (but inefficiently) using simulation-sound non-interactive zero-knowledge proofs.", "title": "" }, { "docid": "fec345f9a3b2b31bd76507607dd713d4", "text": "E-government is a relatively new branch of study within the Information Systems (IS) field. This paper examines the factors influencing adoption of e-government services by citizens. Factors that have been explored in the extant literature present inadequate understanding of the relationship that exists between ‘adopter characteristics’ and ‘behavioral intention’ to use e-government services. These inadequacies have been identified through a systematic and thorough review of empirical studies that have considered adoption of government to citizen (G2C) electronic services by citizens. This paper critically assesses key factors that influence e-government service adoption; reviews limitations of the research methodologies; discusses the importance of 'citizen characteristics' and 'organizational factors' in adoption of e-government services; and argues for the need to examine e-government service adoption in the developing world.", "title": "" }, { "docid": "0e4cd983047da489ee3b28511aea573a", "text": "While bottom-up and top-down processes have shown effectiveness during predicting attention and eye fixation maps on images, in this paper, inspired by the perceptual organization mechanism before attention selection, we propose to utilize figure-ground maps for the purpose. So as to take both pixel-wise and region-wise interactions into consideration when predicting label probabilities for each pixel, we develop a context-aware model based on multiple segmentation to obtain final results. The MIT attention dataset [14] is applied finally to evaluate both new features and model. Quantitative experiments demonstrate that figure-ground cues are valid in predicting attention selection, and our proposed model produces improvements over baseline method.", "title": "" }, { "docid": "72782fdcc61d1059bce95fe4e7872f5b", "text": "ÐIn object prototype learning and similar tasks, median computation is an important technique for capturing the essential information of a given set of patterns. In this paper, we extend the median concept to the domain of graphs. In terms of graph distance, we introduce the novel concepts of set median and generalized median of a set of graphs. We study properties of both types of median graphs. For the more complex task of computing generalized median graphs, a genetic search algorithm is developed. Experiments conducted on randomly generated graphs demonstrate the advantage of generalized median graphs compared to set median graphs and the ability of our genetic algorithm to find approximate generalized median graphs in reasonable time. Application examples with both synthetic and nonsynthetic data are shown to illustrate the practical usefulness of the concept of median graphs. Index TermsÐMedian graph, graph distance, graph matching, genetic algorithm,", "title": "" }, { "docid": "42366db7e9c27dd30b64557e2c413bec", "text": "This paper discusses plasma-assisted conversion of pyrolysis gas (pyrogas) fuel to synthesis gas (syngas, combination of hydrogen and carbon monoxide). Pyrogas is a product of biomass, municipal wastes, or coal-gasification process that usually contains hydrogen, carbon monoxide, carbon dioxide, water, unreacted light and heavy hydrocarbons, and tar. These hydrocarbons diminish the fuel value of pyrogas, thereby necessitating the need for the conversion of the hydrocarbons. Various conditions and reforming reactions were considered for the conversion of pyrogas into syngas. Nonequilibrium plasma reforming is an effective homogenous process which makes use of catalysts unnecessary for fuel reforming. The effectiveness of gliding arc plasma as a nonequilibrium plasma discharge is demonstrated in the fuel reforming reaction processes with the aid of a specially designed low current device also known as gliding arc plasma reformer. Experimental results obtained focus on yield, molar concentration, carbon balance, and enthalpy at different conditions.", "title": "" }, { "docid": "a5cc8b6df2dec42d730a0c0ec45d64bb", "text": "The Clock Drawing Test (CDT) is a rapid, inexpensive, and popular neuropsychological screening tool for cognitive conditions. The Digital Clock Drawing Test (dCDT) uses novel software to analyze data from a digitizing ballpoint pen that reports its position with considerable spatial and temporal precision, making possible the analysis of both the drawing process and final product. We developed methodology to analyze pen stroke data from these drawings, and computed a large collection of features which were then analyzed with a variety of machine learning techniques. The resulting scoring systems were designed to be more accurate than the systems currently used by clinicians, but just as interpretable and easy to use. The systems also allow us to quantify the tradeoff between accuracy and interpretability. We created automated versions of the CDT scoring systems currently used by clinicians, allowing us to benchmark our models, which indicated that our machine learning models substantially outperformed the existing scoring systems. 2016 ICML Workshop on Human Interpretability in Machine Learning (WHI 2016), New York, NY, USA. Copyright by the author(s). 1. Background The Clock Drawing Test (CDT) a simple pencil and paper test has been used as a screening tool to differentiate normal individuals from those with cognitive impairment. The test takes less than two minutes, is easily administered and inexpensive, and is deceptively simple: it asks subjects first to draw an analog clock-face showing 10 minutes after 11 (the command clock), then to copy a pre-drawn clock showing the same time (the copy clock). It has proven useful in helping to diagnose cognitive dysfunction associated with neurological disorders such as Alzheimer’s disease, Parkinson’s disease, and other dementias and conditions. (Freedman et al., 1994; Grande et al., 2013). The CDT is often used by neuropsychologists, neurologists and primary care physicians as part of a general screening for cognitive change (Strub et al., 1985). For the past decade, neuropsychologists in our group have been administering the CDT using a commercially available digitizing ballpoint pen (the DP-201 from Anoto, Inc.) that records its position on the page with considerable spatial (±0.005 cm) and temporal (13ms) accuracy, enabling the analysis of not only the end product – the drawing – but also the process that produced it, including all of the subject’s movements and hesitations. The resulting test is called the digital Clock Drawing Test (dCDT). Figure 1 and Figure 2 illustrate clock drawings from a subject in the memory impairment group, and a subject diagnosed with Parkinson’s disease, respectively. 61 ar X iv :1 60 6. 07 16 3v 1 [ st at .M L ] 2 3 Ju n 20 16 Interpretable Machine Learning Models for the Digital Clock Drawing Test Figure 1. Example Alzheimer’s Disease clock from our dataset. Figure 2. Example Parkinson’s Disease clock from our dataset. 2. Existing Scoring Systems There are a variety of methods for scoring the CDT, varying in complexity and the types of features they use. They often take the form of systems that add or subtract points based on features of the clock, and often have the additional constraint that the (n + 1) feature matters only if the previous n features have been satisfied, adding a higher level of complexity in understanding the resulting score. A threshold is then used to decide whether the test gives evidence of impairment. While the scoring system are typically short and understandable by a human, the features they attend to are often expressed in relatively vague terms, leading to potentially lower inter-rater reliability. For example, the Rouleau (Rouleau et al., 1992) scoring system, shown in Table 1, asks whether there are “slight errors in the placement of the hands” and whether “the clockface is present without gross distortion”. In order to benchmark our models for the dCDT against existing scoring systems, we needed to create automated versions of them so that we could apply them to our set of clocks. We did this for seven of the most widely used existing scoring systems (Souillard-Mandar et al., 2015) by specifying the computations to be done in enough detail that they could be expressed unambiguously in code. As maximum: 10 points 1. Integrity of the clockface (maximum: 2 points) 2: Present without gross distortion 1: Incomplete or some distortion 0: Absent or totally inappropriate 2. Presence and sequencing of the numbers (maximum: 4 points) 4: All present in the right order and at most minimal error in the spatial arrangement 3: All present but errors in spatial arrangement 2: Numbers missing or added but no gross distortions of the remaining numbers Numbers placed in counterclockwise direction Numbers all present but gross distortion in spatial layout 1: Missing or added numbers and gross spatial distortions 0: Absence or poor representation of numbers 3. Presence and placement of the hands (maximum: 4 points) 4: Hands are in correct position and the size difference is respected 3: Sight errors in the placement of the hands or no representation of size difference between the hands 2: Major errors in the placement of the hands (significantly out of course including 10 to 11) 1: Only one hand or poor representation of two hands 0: No hands or perseveration on hands Table 1. Original Rouleau scoring system (Rouleau et al., 1992) one example, we translated “slight errors in the placement of the hands” to “exactly two hands present AND at most one hand with a pointing error of between 1 and 2 degrees”, where the i are thresholds to be optimized. We refer to these new models as operationalized scoring systems. 3. An Interpretable Machine Learning Approach 3.1. Stroke-Classification and Feature Computation The raw data from the pen is analyzed using novel software developed for this task (Davis et al., 2014; Davis & Penney, 2014; Cohen et al., 2014). An algorithm classifies the pen strokes as one or another of the clock drawing symbols (i.e. clockface, hands, digits, noise); stroke classification errors are easily corrected by human scorer using a simple drag-and-drop interface. Figure 3 shows a screenshot of the system after the strokes in the command clock from Figure 1 have been classified. Using these symbol-classified strokes, we compute a large collection of features from the test, measuring geometric and temporal properties in a single clock, both clocks, and 62 Interpretable Machine Learning Models for the Digital Clock Drawing Test Figure 3. Classified command clock from Figure 1 differences between them. Example features include: • The number of strokes; the total ink length; the time it took to draw; and the pen speed for various clock components; timing information is used to measure how quickly different parts of the clock were drawn; latencies between components. • The length of the major and minor axis and eccentricity of the fitted ellipse; largest angular gaps in the clockface; distance and angular difference between starting and ending points of the clock face. • Digits that are missing or repeated; the height and width of digit bounding boxes. • Omissions or repetitions of hands; angular error from their correct angle; the hour hand to minute hand size ratio; the presence and direction of arrowheads. We also selected a subset of our features that we believe are both particularly understandable and that have values easily verifiable by clinicians. We expect, for example, that there would be wide agreement on whether a number is present, whether hands have arrowheads on them, whether there are easily noticeable noise strokes, or if the total drawing time particularly high or low. We call this subset the Simplest Features. 3.2. Traditional Machine Learning We focused on three categories of cognitive impairment, for which we had a total of 453 tests: memory impairment disorders (MID) consisting of Alzheimer’s disease and amnestic mild cognitive impairment (aMCI); vascular cognitive disorders (VCD) consisting of vascular dementia, mixed MCI and vascular cognitive impairment; and Parkinson’s disease (PD). Our set of 406 healthy controls (HC) comes from people who have been longitudinally studied as participants in the Framingham Heart Study. Our task is screening: we want to distinguish between healthy and one of the three categories of cognitive impairment, as well as a group screening, distinguish between healthy and all three conditions together. We started our machine learning work by applying state-ofthe-art machine learning methods to the set of all features. We generated classifiers using multiple machine learning methods, including CART (Breiman et al., 1984), C4.5 (Quinlan, 1993), SVM with gaussian kernels (Joachims, 1998), random forests (Breiman, 2001), boosted decision trees (Friedman, 2001), and regularized logistic regression (Fan et al., 2008). We used stratified cross-validation to divide the data into 5 folds to obtain training and testing sets. We further cross-validated each training set into 5 folds to optimize the parameters of the algorithm using grid search over a set of ranges. We chose to measure quality using area under the receiver operator characteristic curve (AUC) as a single, concise statistic. We found that the AUC for best classifiers ranged from 0.88 to 0.93. We also ran our experiment on the subset of Simplest Features, and found that the AUC ranged from 0.82 to 0.83. Finally, we measured the performance of the operationalized scoring systems; the best ones ranged from 0.70 to 0.73. Complete results can be found in Table 2. 3.3. Human Interpretable Machine Learning 3.3.1. DEFINITION OF INTERPRETABILITY To ensure that we produced models that can be used and accepted in a clinical context, we obtained guidelines from clinicians. This led us to focus on three components in defining complexity: Computational complexity: the models should be relatively easy to compute, requiring", "title": "" }, { "docid": "fba5b69c3b0afe9f39422db8c18dba06", "text": "It is well known that stressful experiences may affect learning and memory processes. Less clear is the exact nature of these stress effects on memory: both enhancing and impairing effects have been reported. These opposite effects may be explained if the different time courses of stress hormone, in particular catecholamine and glucocorticoid, actions are taken into account. Integrating two popular models, we argue here that rapid catecholamine and non-genomic glucocorticoid actions interact in the basolateral amygdala to shift the organism into a 'memory formation mode' that facilitates the consolidation of stressful experiences into long-term memory. The undisturbed consolidation of these experiences is then promoted by genomic glucocorticoid actions that induce a 'memory storage mode', which suppresses competing cognitive processes and thus reduces interference by unrelated material. Highlighting some current trends in the field, we further argue that stress affects learning and memory processes beyond the basolateral amygdala and hippocampus and that stress may pre-program subsequent memory performance when it is experienced during critical periods of brain development.", "title": "" }, { "docid": "7e671e124f330ae91ad5567cf80500cb", "text": "In recent years, LTE (Long Term Evolution) has been one of the mainstreams of current wireless communication systems. But when its HSS authenticates UEs, the random number RAND generated by HSS for creating other keys during its delivery from HSS to UE is unencrypted. Also, many parameters are generated by invoking a function with only one input key, thus very easily to be cracked. So in this paper, we propose an improved approach in which the Diffie-Hellman algorithm is employed to solve the exposure problem of RAND in the authentication process, and an Pair key mechanism is deployed when creating other parameters, i.e., parameters are generated by invoking a function with at least two input keys. The purpose is increasing the security levels of all generated parameters so as to make LTE more secure than before.", "title": "" }, { "docid": "635da218aa9a1b528fbc378844b393fd", "text": "A variety of nonlinear, including semidefinite, relaxations have been developed in recent years for nonconvex optimization problems. Their potential can be realized only if they can be solved with sufficient speed and reliability. Unfortunately, state-of-the-art nonlinear programming codes are significantly slower and numerically unstable compared to linear programming software. In this paper, we facilitate the reliable use of nonlinear convex relaxations in global optimization via a polyhedral branch-and-cut approach. Our algorithm exploits convexity, either identified automatically or supplied through a suitable modeling language construct, in order to generate polyhedral cutting planes and relaxations for multivariate nonconvex problems. We prove that, if the convexity of a univariate or multivariate function is apparent by decomposing it into convex subexpressions, our relaxation constructor automatically exploits this convexity in a manner that is much superior to developing polyhedral outer approximators for the original function. The convexity of functional expressions that are composed to form nonconvex expressions is also automatically exploited. Root-node relaxations are computed for 87 problems from globallib and minlplib, and detailed computational results are presented for globally solving 26 of these problems with BARON 7.2, which implements the proposed techniques. The use of cutting planes for these problems reduces root-node relaxation gaps by up to 100% and expedites the solution process, often by several orders of magnitude.", "title": "" }, { "docid": "e808fa6ebe5f38b7672fad04c5f43a3a", "text": "A series of GeoVoCamps, run at least twice a year in locations in the U.S., have focused on ontology design patterns as an approach to inform metadata and data models, and on applications in the GeoSciences. In this note, we will redraw the brief history of the series as well as rationales for the particular approach which was chosen, and report on the ongoing uptake of the approach.", "title": "" }, { "docid": "5ad4b3c5905b7b716a806432b755e60b", "text": "The formation of both germline cysts and the germinal epithelium is described during the ovary development in Cyprinus carpio. As in the undifferentiated gonad of mammals, cords of PGCs become oogonia when they are surrounded by somatic cells. Ovarian differentiation is triggered when oogonia proliferate and enter meiosis, becoming oocytes. Proliferation of single oogonium results in clusters of interconnected oocytes, the germline cysts, that are encompassed by somatic prefollicle cells and form cell nests. Both PGCs and cell nests are delimited by a basement membrane. Ovarian follicles originate from the germline cysts, about the time of meiotic arrest, as prefollicle cells surround oocytes, individualizing them. They synthesize a basement membrane and an oocyte forms a follicle. With the formation of the stroma, unspecialized mesenchymal cells differentiate, and encompass each follicle, forming the theca. The follicle, basement membrane, and theca constitute the follicle complex. Along the ventral region of the differentiating ovary, the epithelium invaginates to form the ovigerous lamellae whose developing surface epithelium, the germinal epithelium, is composed of epithelial cells, germline cysts with oogonia, oocytes, and developing follicles. The germinal epithelium rests upon a basement membrane. The follicles complexes are connected to the germinal epithelium by a shared portion of basement membrane. In the differentiated ovary, germ cell proliferation in the epithelium forms nests in which there are the germline cysts. Germline cysts, groups of cells that form from a single founder cell and are joined by intercellular bridges, are conserved throughout the vertebrates, as is the germinal epithelium.", "title": "" }, { "docid": "fe44269ca863c48108cd6ef07a9fbee5", "text": "Heart disease prediction is designed to support clinicians in their diagnosis. We proposed a method for classifying the heart disease data. The patient’s record is predicted to find if they have symptoms of heart disease through Data mining. It is essential to find the best fit classification algorithm that has greater accuracy on classification in the case of heart disease prediction. Since the data is huge attribute selection method used for reducing the dataset. Then the reduced data is given to the classification .In the Investigation, the hybrid attribute selection method combining CFS and Filter Subset Evaluation gives better accuracy for classification. We also propose a new feature selection method algorithm which is the hybrid method combining CFS and Bayes Theorem. The proposed algorithm provides better accuracy compared to the traditional algorithm and the hybrid Algorithm CFS+FilterSubsetEval.", "title": "" }, { "docid": "d3c3195b8272bd41d0095e236ddb1d96", "text": "The extension of in vivo optical imaging for disease screening and image-guided surgical interventions requires brightly emitting, tissue-specific materials that optically transmit through living tissue and can be imaged with portable systems that display data in real-time. Recent work suggests that a new window across the short-wavelength infrared region can improve in vivo imaging sensitivity over near infrared light. Here we report on the first evidence of multispectral, real-time short-wavelength infrared imaging offering anatomical resolution using brightly emitting rare-earth nanomaterials and demonstrate their applicability toward disease-targeted imaging. Inorganic-protein nanocomposites of rare-earth nanomaterials with human serum albumin facilitated systemic biodistribution of the rare-earth nanomaterials resulting in the increased accumulation and retention in tumour tissue that was visualized by the localized enhancement of infrared signal intensity. Our findings lay the groundwork for a new generation of versatile, biomedical nanomaterials that can advance disease monitoring based on a pioneering infrared imaging technique.", "title": "" }, { "docid": "4aed26d5f35f6059f4afe8cc7225f6a8", "text": "The rapid and quick growth of smart mobile devices has caused users to demand pervasive mobile broadband services comparable to the fixed broadband Internet. In this direction, the research initiatives on 5G networks have gained accelerating momentum globally. 5G Networks will act as a nervous system of the digital society, economy, and everyday peoples life and will enable new future Internet of Services paradigms such as Anything as a Service, where devices, terminals, machines, also smart things and robots will become innovative tools that will produce and will use applications, services and data. However, future Internet will exacerbate the need for improved QoS/QoE, supported by services that are orchestrated on-demand and that are capable of adapt at runtime, depending on the contextual conditions, to allow reduced latency, high mobility, high scalability, and real time execution. A new paradigm called Fog Computing, or briefly Fog has emerged to meet these requirements. Fog Computing extends Cloud Computing to the edge of the network, reduces service latency, and improves QoS/QoE, resulting in superior user-experience. This paper provides a survey of 5G and Fog Computing technologies and their research directions, that will lead to Beyond-5G Network in the Fog.", "title": "" }, { "docid": "7bdaa7eec3d2830ceceb2b398edb219b", "text": "OBJECTIVES\nTo review how health informatics systems based on machine learning methods have impacted the clinical management of patients, by affecting clinical practice.\n\n\nMETHODS\nWe reviewed literature from 2010-2015 from databases such as Pubmed, IEEE xplore, and INSPEC, in which methods based on machine learning are likely to be reported. We bring together a broad body of literature, aiming to identify those leading examples of health informatics that have advanced the methodology of machine learning. While individual methods may have further examples that might be added, we have chosen some of the most representative, informative exemplars in each case.\n\n\nRESULTS\nOur survey highlights that, while much research is taking place in this high-profile field, examples of those that affect the clinical management of patients are seldom found. We show that substantial progress is being made in terms of methodology, often by data scientists working in close collaboration with clinical groups.\n\n\nCONCLUSIONS\nHealth informatics systems based on machine learning are in their infancy and the translation of such systems into clinical management has yet to be performed at scale.", "title": "" }, { "docid": "dc48b68a202974f62ae63d1d14002adf", "text": "In the speed sensorless vector control system, the amended method of estimating the rotor speed about model reference adaptive system (MRAS) based on radial basis function neural network (RBFN) for PMSM sensorless vector control system was presented. Based on the PI regulator, the radial basis function neural network which is more prominent learning efficiency and performance is combined with MRAS. The reference model and the adjust model are the PMSM itself and the PMSM current, respectively. The proposed scheme only needs the error signal between q axis estimated current and q axis actual current. Then estimated speed is gained by using RBFN regulator which adjusted error signal. Comparing study of simulation and experimental results between this novel sensorless scheme and the scheme in reference literature, the results show that this novel method is capable of precise estimating the rotor position and speed under the condition of high or low speed. It also possesses good performance of static and dynamic.", "title": "" }, { "docid": "bbc936a3b4cd942ba3f2e1905d237b82", "text": "Silkworm silk is among the most widely used natural fibers for textile and biomedical applications due to its extraordinary mechanical properties and superior biocompatibility. A number of physical and chemical processes have also been developed to reconstruct silk into various forms or to artificially produce silk-like materials. In addition to the direct use and the delicate replication of silk's natural structure and properties, there is a growing interest to introduce more new functionalities into silk while maintaining its advantageous intrinsic properties. In this review we assess various methods and their merits to produce functional silk, specifically those with color and luminescence, through post-processing steps as well as biological approaches. There is a highlight on intrinsically colored and luminescent silk produced directly from silkworms for a wide range of applications, and a discussion on the suitable molecular properties for being incorporated effectively into silk while it is being produced in the silk gland. With these understanding, a new generation of silk containing various functional materials (e.g., drugs, antibiotics and stimuli-sensitive dyes) would be produced for novel applications such as cancer therapy with controlled release feature, wound dressing with monitoring/sensing feature, tissue engineering scaffolds with antibacterial, anticoagulant or anti-inflammatory feature, and many others.", "title": "" }, { "docid": "e7bfafee5cfaaa1a6a41ae61bdee753d", "text": "Borderline personality disorder (BPD) has been shown to be a valid and reliable diagnosis in adolescents and associated with a decrease in both general and social functioning. With evidence linking BPD in adolescents to poor prognosis, it is important to develop a better understanding of factors and mechanisms contributing to the development of BPD. This could potentially enhance our knowledge and facilitate the design of novel treatment programs and interventions for this group. In this paper, we outline a theoretical model of BPD in adolescents linking the original mentalization-based theory of BPD, with recent extensions of the theory that focuses on hypermentalizing and epistemic trust. We then provide clinical case vignettes to illustrate this extended theoretical model of BPD. Furthermore, we suggest a treatment approach to BPD in adolescents that focuses on the reduction of hypermentalizing and epistemic mistrust. We conclude with an integration of theory and practice in the final section of the paper and make recommendations for future work in this area. (PsycINFO Database Record", "title": "" }, { "docid": "14b15f15cb7dbb3c19a09323b4b67527", "text": " Establishing mechanisms for sharing knowledge and technology among experts in different fields related to automated de-identification and reversible de-identification  Providing innovative solutions for concealing, or removal of identifiers while preserving data utility and naturalness  Investigating reversible de-identification and providing a thorough analysis of security risks of reversible de-identification  Providing a detailed analysis of legal, ethical and social repercussion of reversible/non-reversible de-identification  Promoting and facilitating the transfer of knowledge to all stakeholders (scientific community, end-users, SMEs) through workshops, conference special sessions, seminars and publications", "title": "" } ]
scidocsrr
cfac6a3fdf811c3b5c4282ec86553c71
Automating Reading Comprehension by Generating Question and Answer Pairs
[ { "docid": "f37623a4f7a1b7b328883ab016e1b285", "text": "Neural machine translation has recently achieved impressive results, while using little in the way of external linguistic information. In this paper we show that the strong learning capability of neural MT models does not make linguistic features redundant; they can be easily incorporated to provide further improvements in performance. We generalize the embedding layer of the encoder in the attentional encoder–decoder architecture to support the inclusion of arbitrary features, in addition to the baseline word feature. We add morphological features, part-ofspeech tags, and syntactic dependency labels as input features to English↔German and English→Romanian neural machine translation systems. In experiments on WMT16 training and test sets, we find that linguistic input features improve model quality according to three metrics: perplexity, BLEU and CHRF3. An opensource implementation of our neural MT system is available1, as are sample files and configurations2.", "title": "" } ]
[ { "docid": "968c116ed298a1f0b9592ab0971fe562", "text": "According to the DSM-IV (American Psychiatric Association, 1995), simple phobias consist of persistent fear of a circumscribed stimulus and consequent avoidance of that stimulus, where the person having this fear knows it is excessive or unreasonable. If the feared stimulus is heights, the person is said to suffer from acrophobia, or fear of heights. The most common and most successful treatment for acrophobia is graded exposure in-vivo. Here, the avoidance behavior is broken by exposing the patient to a hierarchy of feared stimuli, whereby the fear will first increase, after which habituation will occur and the fear will gradually diminish (Bouman, Scholing & Emmelkamp, 1992). In in-vivo treatment the patient is exposed to real stimuli. A promising alternative is graded exposure in Virtual Reality, where the patient can be treated in the safety and privacy of the therapist’s office and situations can be recreated which are hard to find or costly to reach. At this moment, research is being conducted at the Delft University of Technology and the University of Amsterdam aimed at developing a virtual reality system to be used by therapists for such VR Exposure Therapy (VRET). This article describes the results of a pilot study undertaken to explore the possibilities and characteristics of VRET and determine requirements for a system to support therapists", "title": "" }, { "docid": "653fee86af651e13e0d26fed35ef83e4", "text": "Small ducted fan autonomous vehicles have potential for several applications, especially for missions in urban environments. This paper discusses the use of dynamic inversion with neural network adaptation to provide an adaptive controller for the GTSpy, a small ducted fan autonomous vehicle based on the Micro Autonomous Systems’ Helispy. This approach allows utilization of the entire low speed flight envelope with a relatively poorly understood vehicle. A simulator model is constructed from a force and moment analysis of the vehicle, allowing for a validation of the controller in preparation for flight testing. Data from flight testing of the system is provided.", "title": "" }, { "docid": "3f0b2f3739a6b9fdf3681dd4296405e6", "text": "One approach to achieving high performance in a database management system is to store the database in main memorv rather than on disk. -One can then design new data structures aid algorithms oriented towards making eflicient use of CPU cycles and memory space rather than minimizing disk accesses and &ing disk space efliciently. In this paper we present some results on index structures from an ongoing study of main memory database management systems. We propose a new index structure, the T Tree, and we compare it to existing index structures in a main memory database environment. Our results indicate that the T Tree provides good overall performance in main memory.", "title": "" }, { "docid": "c42edb326ec95c257b821cc617e174e6", "text": "recommendation systems support users and developers of various computer and software systems to overcome information overload, perform information discovery tasks and approximate computation, among others. They have recently become popular and have attracted a wide variety of application scenarios from business process modelling to source code manipulation. Due to this wide variety of application domains, different approaches and metrics have been adopted for their evaluation. In this chapter, we review a range of evaluation metrics and measures as well as some approaches used for evaluating recommendation systems. The metrics presented in this chapter are grouped under sixteen different dimensions, e.g., correctness, novelty, coverage. We review these metrics according to the dimensions to which they correspond. A brief overview of approaches to comprehensive evaluation using collections of recommendation system dimensions and associated metrics is presented. We also provide suggestions for key future research and practice directions. Iman Avazpour Faculty of ICT, Centre for Computing and Engineering Software and Systems (SUCCESS), Swinburne University of Technology, Hawthorn, Victoria 3122, Australia e-mail: iavazpour@swin.", "title": "" }, { "docid": "b4e942dc860e127d6370d4425176d62f", "text": "Several years ago we introduced the Balanced Scorecard (Kaplan and Norton 1992). We began with the premise that an exclusive reliance on financial measures in a management system is insufficient. Financial measures are lag indicators that report on the outcomes from past actions. Exclusive reliance on financial indicators could promote behavior that sacrifices long-term value creation for short-term performance (Porter 1992; AICPA 1994). The Balanced Scorecard approach retains measures of financial performance-the lagging outcome indicators-but supplements these with measures on the drivers, the lead indicators, of future financial performance.", "title": "" }, { "docid": "737231466c50ac647f247b60852026e2", "text": "The proliferation of wearable devices, e.g., smartwatches and activity trackers, with embedded sensors has already shown its great potential on monitoring and inferring human daily activities. This paper reveals a serious security breach of wearable devices in the context of divulging secret information (i.e., key entries) while people are accessing key-based security systems. Existing methods of obtaining such secret information rely on installations of dedicated hardware (e.g., video camera or fake keypad), or training with labeled data from body sensors, which restrict use cases in practical adversary scenarios. In this work, we show that a wearable device can be exploited to discriminate mm-level distances and directions of the user’s fine-grained hand movements, which enable attackers to reproduce the trajectories of the user’s hand and further to recover the secret key entries. In particular, our system confirms the possibility of using embedded sensors in wearable devices, i.e., accelerometers, gyroscopes, and magnetometers, to derive the moving distance of the user’s hand between consecutive key entries regardless of the pose of the hand. Our Backward PIN-Sequence Inference algorithm exploits the inherent physical constraints between key entries to infer the complete user key entry sequence. Extensive experiments are conducted with over 7,000 key entry traces collected from 20 adults for key-based security systems (i.e., ATM keypads and regular keyboards) through testing on different kinds of wearables. Results demonstrate that such a technique can achieve 80 percent accuracy with only one try and more than 90 percent accuracy with three tries. Moreover, the performance of our system is consistently good even under low sampling rate and when inferring long PIN sequences. To the best of our knowledge, this is the first technique that reveals personal PINs leveraging wearable devices without the need for labeled training data and contextual information.", "title": "" }, { "docid": "3ba3ca22bb8d1e6c5c8416422d6a96ba", "text": "Convolutional neural networks have recently been used to obtain record-breaking results in many vision benchmarks. In addition, the intermediate layer activations of a trained network when exposed to new data sources have been shown to perform very well as generic image features, even when there are substantial differences between the original training data of the network and the new domain. In this paper, we focus on scene recognition and show that convolutional networks trained on mostly object recognition data can successfully be used for feature extraction in this task as well. We train a total of four networks with different training data and architectures, and show that the proposed method combining multiple scales and multiple features obtains state-of-the-art performance on four standard scene datasets.", "title": "" }, { "docid": "ca41af467a412d08858b8161a40c0240", "text": "This master thesis presents overview on advanced persistent threat (APT) definition and explanation of it. One of the most dangerous APT named: ”Snake” will be presented along with other similar APT’s. Various virtual environments like e.g. VirtualBox will be investigated in order to understand how APT malware behaves in these environments. The central focus of this master thesis lies on detection of futuristic APT malware based on cross-referencing communication patterns in order to detect APT malware. A prototype detection tool will be created and tested in order to detect similar APT’s like Snake. Additionally a prototype malware will be supplied as well, which contain similar stealth communication techniques as the Snake APT malware. This prototype malware will be tested with the current state of commercial firewall applications in order to prove its effectiveness. In the end challenges and solutions will be presented for future research work.", "title": "" }, { "docid": "5afdbb9c705ad379227a46958addc8f2", "text": "In this paper we present a novel experiment to explore the impact of avatar realism on the illusion of virtual body ownership (IVBO) in immersive virtual environments, with full-body avatar embodiment and freedom of movement. We evaluated four distinct avatars (a humanoid robot, a block-man, and both male and female human adult) presenting an increasing level of anthropomorphism in their detailed compositions Our results revealed that each avatar elicited a relatively high level of illusion. However both machine-like and cartoon-like avatars elicited an equivalent IVBO, slightly superior to the human-ones. A realistic human appearance is therefore not a critical top-down factor of IVBO, and could lead to an Uncanney Valley effect.", "title": "" }, { "docid": "426d3b0b74eacf4da771292abad06739", "text": "Brain tumor is considered as one of the deadliest and most common form of cancer both in children and in adults. Consequently, determining the correct type of brain tumor in early stages is of significant importance to devise a precise treatment plan and predict patient's response to the adopted treatment. In this regard, there has been a recent surge of interest in designing Convolutional Neural Networks (CNNs) for the problem of brain tumor type classification. However, CNNs typically require large amount of training data and can not properly handle input transformations. Capsule networks (referred to as CapsNets) are brand new machine learning architectures proposed very recently to overcome these shortcomings of CNNs, and posed to revolutionize deep learning solutions. Of particular interest to this work is that Capsule networks are robust to rotation and affine transformation, and require far less training data, which is the case for processing medical image datasets including brain Magnetic Resonance Imaging (MRI) images. In this paper, we focus to achieve the following four objectives: (i) Adopt and incorporate CapsNets for the problem of brain tumor classification to design an improved architecture which maximizes the accuracy of the classification problem at hand; (ii) Investigate the over-fitting problem of CapsNets based on a real set of MRI images; (iii) Explore whether or not CapsNets are capable of providing better fit for the whole brain images or just the segmented tumor, and; (iv) Develop a visualization paradigm for the output of the CapsNet to better explain the learned features. Our results show that the proposed approach can successfully overcome CNNs for the brain tumor classification problem.", "title": "" }, { "docid": "d16c09bb4c082ad5b82c595fc1d17509", "text": "The neural mechanisms behind active and passive touch are not yet fully understood. Using fMRI we investigated the brain correlates of these exploratory procedures using a roughness categorization task. Participants either actively explored a surface (active touch) or the surface was moved under the participant's stationary finger (passive touch). The stimuli consisted of three different grades of sandpaper which participants were required to categorize as either coarse, medium, or fine. Exploratory procedure did not affect performance although the coarse and fine surfaces were more easily categorized than the medium surface. An initial whole brain analysis revealed activation of sensory and cognitive areas, including post-central gyrus and prefrontal cortical areas, in line with areas reported in previous studies. Our main analysis revealed greater activation during active than passive touch in the contralateral primary somatosensory region but no effect of stimulus roughness. In contrast, activation in the parietal operculum (OP) was significantly affected by stimulus roughness but not by exploration procedure. Active touch also elicited greater and more distributed brain activity compared with passive touch in areas outside the somatosensory region, possibly due to the motor component of the task. Our results reveal that different cortical areas may be involved in the processing of surface exploration and surface texture, with exploration procedures affecting activations in the primary somatosensory cortex and stimulus properties affecting relatively higher cortical areas within the somatosensory system.", "title": "" }, { "docid": "95bf39147f4de79b53e31c78559be688", "text": "The global competition and swiftness of changes emphasize the importance of human capital within organizations, as well as the swiftness and ways of knowledge gaining of that capital. In the economy where uncertainty is the only certainty, knowledge is becoming a reliable source of sustained competitive advantage. Knowledge is becoming basic capital and the trigger of development. Previously built on foundations of possessing specific resources and low costs, present day competition is based on knowledge possessing and efficient knowledge management. Modern organizations, therefore use their resources (money, time, energy, information, etc.) for permanent training and advancement of their employees. Organizations which are constantly creating new knowlegde, extending it through the entire organization and implementing it quickly inside the new technologies, develop good products and excellent services. These activities determine the company as a learning organization with constant innovation being its sole business. These are organizations which realize that learning and new knowledge are becoming the key of success, and that education is crucial for abundance.", "title": "" }, { "docid": "e0cb22810c7dc3797e71dd39f966e7ce", "text": "A crystal-based differential oscillator circuit offering simultaneously high stability and ultra-low power consumption is presented for timekeeping and demanding radio applications. The differential circuit structure -in contrast to that of the conventional 3-points- does not require any loading capacitance to be functional and the power consumption can thus be minimized. Although the loading capacitance is omitted a very precise absolute oscillation frequency can be obtained as well as an excellent insensitivity to temperature variations thanks to the reduced parasitics of a deep-submicron technology. The power consumption of a 12.8MHz quartz oscillator including an amplitude regulation mechanism is below 1 µA under a 1.8 to 0.6V supply voltage range.", "title": "" }, { "docid": "4f560deecd54c9b809ce1a1e04512926", "text": "BACKGROUND\nNurses in Sweden have a high absence due to illness and many retire before the age of sixty. Factors at work as well as in private life may contribute to health problems. To maintain a healthy work-force there is a need for actions on work-life balance in a salutogenic perspective. The aim of this study was to explore perceptions of resources in everyday life to balance work and private life among nurses in home help service.\n\n\nMETHODS\nThirteen semi-structured individual interviews and two focus group interviews were conducted with home help service nurses in Sweden. A qualitative content analysis was used for the analyses.\n\n\nRESULT\nIn the analyses, six themes of perceptions of recourses in everyday life emerged; (i) Reflecting on life. (ii) Being healthy and taking care of yourself. (iii) Having a meaningful job and a supportive work climate. (iv) Working shifts and part time. (v) Having a family and a supporting network. (vi) Making your home your castle.\n\n\nCONCLUSIONS\nThe result points out the complexity of work-life balance and support that the need for nurses to balance everyday life differs during different phases and transitions in life. In this salutogenic study, the result differs from studies with a pathogenic approach. Shift work and part time work were seen as two resources that contributed to flexibility and a prerequisite to work-life balance. To have time and energy for both private life and work was seen as essential. To reflect on and discuss life gave inner strength to set boundaries and to prioritize both in private life and in work life. Managers in nursing contexts have a great challenge to maintain and strengthen resources which enhance the work-life balance and health of nurses. Salutogenic research is needed to gain an understanding of resources that enhance work-life balance and health in nursing contexts.", "title": "" }, { "docid": "0344917c6b44b85946313957a329bc9c", "text": "Recently, Haas and Hellerstein proposed the hash ripple join algorithm in the context of online aggregation. Although the algorithm rapidly gives a good estimate for many join-aggregate problem instances, the convergence can be slow if the number of tuples that satisfy the join predicate is small or if there are many groups in the output. Furthermore, if memory overflows (for example, because the user allows the algorithm to run to completion for an exact answer), the algorithm degenerates to block ripple join and performance suffers. In this paper, we build on the work of Haas and Hellerstein and propose a new algorithm that (a) combines parallelism with sampling to speed convergence, and (b) maintains good performance in the presence of memory overflow. Results from a prototype implementation in a parallel DBMS show that its rate of convergence scales with the number of processors, and that when allowed to run to completion, even in the presence of memory overflow, it is competitive with the traditional parallel hybrid hash join algorithm.", "title": "" }, { "docid": "4c12d04ce9574aab071964e41f0c5f4e", "text": "The complete genome sequence of Treponema pallidum was determined and shown to be 1,138,006 base pairs containing 1041 predicted coding sequences (open reading frames). Systems for DNA replication, transcription, translation, and repair are intact, but catabolic and biosynthetic activities are minimized. The number of identifiable transporters is small, and no phosphoenolpyruvate:phosphotransferase carbohydrate transporters were found. Potential virulence factors include a family of 12 potential membrane proteins and several putative hemolysins. Comparison of the T. pallidum genome sequence with that of another pathogenic spirochete, Borrelia burgdorferi, the agent of Lyme disease, identified unique and common genes and substantiates the considerable diversity observed among pathogenic spirochetes.", "title": "" }, { "docid": "9a9dc194e0ca7d1bb825e8aed5c9b4fe", "text": "In this paper we show how to divide data <italic>D</italic> into <italic>n</italic> pieces in such a way that <italic>D</italic> is easily reconstructable from any <italic>k</italic> pieces, but even complete knowledge of <italic>k</italic> - 1 pieces reveals absolutely no information about <italic>D</italic>. This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.", "title": "" }, { "docid": "3aca00d6a5038876340b1fbe08e5ddb6", "text": "People who design, use, and are affected by autonomous artificially intelligent agents want to be able to trust such agents—that is, to know that these agents will perform correctly, to understand the reasoning behind their actions, and to know how to use them appropriately. Many techniques have been devised to assess and influence human trust in artificially intelligent agents. However, these approaches are typically ad hoc and have not been formally related to each other or to formal trust models. This article presents a survey of algorithmic assurances, i.e., programmed components of agent operation that are expressly designed to calibrate user trust in artificially intelligent agents. Algorithmic assurances are first formally defined and classified from the perspective of formally modeled human-artificially intelligent agent trust relationships. Building on these definitions, a synthesis of research across communities such as machine learning, human-computer interaction, robotics, e-commerce, and others reveals that assurance algorithms naturally fall along a spectrum in terms of their impact on an agent’s core functionality, with seven notable classes ranging from integral assurances (which impact an agent’s core functionality) to supplemental assurances (which have no direct effect on agent performance). Common approaches within each of these classes are identified and discussed; benefits and drawbacks of different approaches are also investigated.", "title": "" }, { "docid": "e731c10f822aa74b37263bee92a73be2", "text": "Multitask Learning is an approach to inductive transfer that improves generalization by using the domain information contained in the training signals of related tasks as an inductive bias. It does this by learning tasks in parallel while using a shared representation; what is learned for each task can help other tasks be learned better. This paper reviews prior work on MTL, presents new evidence that MTL in backprop nets discovers task relatedness without the need of supervisory signals, and presents new results for MTL with k-nearest neighbor and kernel regression. In this paper we demonstrate multitask learning in three domains. We explain how multitask learning works, and show that there are many opportunities for multitask learning in real domains. We present an algorithm and results for multitask learning with case-based methods like k-nearest neighbor and kernel regression, and sketch an algorithm for multitask learning in decision trees. Because multitask learning works, can be applied to many different kinds of domains, and can be used with different learning algorithms, we conjecture there will be many opportunities for its use on real-world problems.", "title": "" }, { "docid": "3b54c700cf096551d8064e2c84aeea2f", "text": "Fast retrieval methods are critical for many large-scale and data-driven vision applications. Recent work has explored ways to embed high-dimensional features or complex distance functions into a low-dimensional Hamming space where items can be efficiently searched. However, existing methods do not apply for high-dimensional kernelized data when the underlying feature embedding for the kernel is unknown. We show how to generalize locality-sensitive hashing to accommodate arbitrary kernel functions, making it possible to preserve the algorithm's sublinear time similarity search guarantees for a wide class of useful similarity functions. Since a number of successful image-based kernels have unknown or incomputable embeddings, this is especially valuable for image retrieval tasks. We validate our technique on several data sets, and show that it enables accurate and fast performance for several vision problems, including example-based object classification, local feature matching, and content-based retrieval.", "title": "" } ]
scidocsrr
a999bea25495062926ab93e4c90e2abe
Nonlinear programming without a penalty function
[ { "docid": "9a6f62dd4fc2e9b7f6be5b30c731367c", "text": "In this paper we present a filter algorithm for nonlinear programming and prove its global convergence to stationary points. Each iteration is composed of a feasibility phase, which reduces a measure of infeasibility, and an optimality phase, which reduces the objective function in a tangential approximation of the feasible set. These two phases are totally independent, and the only coupling between them is provided by the filter. The method is independent of the internal algorithms used in each iteration, as long as these algorithms satisfy reasonable assumptions on their efficiency. Under standard hypotheses, we show two results: for a filter with minimum size, the algorithm generates a stationary accumulation point; for a slightly larger filter, all accumulation points are stationary.", "title": "" } ]
[ { "docid": "166b9cb75f8f81e3f143a44b1b3e0b99", "text": "This study aimed to classify different emotional states by means of EEG-based functional connectivity patterns. Forty young participants viewed film clips that evoked the following emotional states: neutral, positive, or negative. Three connectivity indices, including correlation, coherence, and phase synchronization, were used to estimate brain functional connectivity in EEG signals. Following each film clip, participants were asked to report on their subjective affect. The results indicated that the EEG-based functional connectivity change was significantly different among emotional states. Furthermore, the connectivity pattern was detected by pattern classification analysis using Quadratic Discriminant Analysis. The results indicated that the classification rate was better than chance. We conclude that estimating EEG-based functional connectivity provides a useful tool for studying the relationship between brain activity and emotional states.", "title": "" }, { "docid": "607247339e5bb0299f06db3104deef77", "text": "This paper discusses the advantages of using the ACT-R cognitive architecture over the Prolog programming language for the research and development of a large-scale, functional, cognitively motivated model of natural language analysis. Although Prolog was developed for Natural Language Processing (NLP), it lacks any probabilistic mechanisms for dealing with ambiguity and relies on failure detection and algorithmic backtracking to explore alternative analyses. These mechanisms are problematic for handling ill-formed or unexpected inputs, often resulting in an exploration of the entire search space, which becomes intractable as the complexity and variability of the allowed inputs and corresponding grammar grow. By comparison, ACT-R provides context dependent and probabilistic mechanisms which allow the model to incrementally pursue the best analysis. When combined with a nonmonotonic context accommodation mechanism that supports modest adjustment of the evolving analysis to handle cases where the locally best analysis is not globally preferred, the result is an efficient pseudo-deterministic mechanism that obviates the need for failure detection and backtracking, aligns with our basic understanding of Human Language Processing (HLP) and is scalable to broad coverage. The successful transition of the natural language analysis model from Prolog to ACT-R suggests that a cognitively motivated approach to natural language analysis may also be suitable for achieving a functional capability.", "title": "" }, { "docid": "3fbf9e2405837a65ad60fdf806900dce", "text": "The classical twin design (CTD) is the most common method used to infer genetic and environmental causes of phenotypic variation. As has long been acknowledged, different combinations of the common environment/assortative mating, and additive, dominant, and epistatic genetic effects can lead to the same observed covariation between twin pairs, meaning that there is an inherent indeterminacy in parameter estimates arising from the CTD. The CTD circumvents this indeterminacy by assuming that higher-order epistasis is negligible and that the effects of either dominant genetic variation or the common environment are nonexistent. These assumptions, however, lead to consistent biases in parameter estimation. The current paper quantifies these biases and discusses alternative strategies for dealing with parameter indeterminacy in twin designs. One strategy is to model the similarity among other relatives in addition to twins (extended twin-family designs), which reduces but does not eliminate indeterminacy in parameter estimates. A more general strategy, applicable to all twin designs, is to present the parameter indeterminacy explicitly, as in a graph. Presenting the space of mathematically equally likely parameter values is important, not only because it aids the proper interpretation of twin design findings, but also because it keeps behavioral geneticists themselves mindful of methodological assumptions that can easily go unexamined.", "title": "" }, { "docid": "fa3d13c91c7876b9545e6a96b914e3e6", "text": "A considerable amount of marketing research has reported that consumers are more saliently influenced by friends (strong social ties) than by acquaintances and strangers (weak social ties). To shed light on the neural and psychological processes underlying such phenomenon, in this study we designed an amended S1-S2 paradigm (product-[reviewer-review]) that is based on realistic consumer purchase experiences. After incoming all given information (product, reviewer, review), participants were required to state their purchase intentions. The neurocognitive and emotional processes related to friend and stranger stimuli were delineated to suggest how social ties influence consumers during their shopping processes. Larger P2 (fronto-central scalp areas) and P3 (central and posterior-parietal scalp areas) components under stranger condition were elicited successfully. These findings demonstrate that the cognitive and emotional processing of friend and stranger stimuli occurs at stages of neural activity, and can be indicated by the P2 and P3 components. Electrophysiological data also support the hypothesis that different neural and emotional processing magnitude and strength underlie friend and stranger effect in the context of consumer purchase. During this process, the perception of stimuli evoked P2, subsequently emotional processing and attention modulation were activated and indicated by P2 and P3. The friend dominated phenomenon can be interpreted as the result of distinctive neurocognitive and emotional processing magnitude, which suggests that psychological and emotional factors can guide consumer decision making. This study consolidates that event related potential (ERP) methodology is likely to be a more sensitive method for investigating consumer behaviors. From the perspectives of management and marketing, our findings show that the P2 and P3 components can be employed as an indicator to probe the influential factors of consumer purchase intentions.", "title": "" }, { "docid": "b5cc41f689a1792b544ac66a82152993", "text": "0020-7225/$ see front matter 2009 Elsevier Ltd doi:10.1016/j.ijengsci.2009.08.001 * Corresponding author. Tel.: +66 2 9869009x220 E-mail address: thanan@siit.tu.ac.th (T. Leephakp Nowadays, Pneumatic Artificial Muscle (PAM) has become one of the most widely-used fluid-power actuators which yields remarkable muscle-like properties such as high force to weight ratio, soft and flexible structure, minimal compressed-air consumption and low cost. To obtain optimum design and usage, it is necessary to understand mechanical behaviors of the PAM. In this study, the proposed models are experimentally derived to describe mechanical behaviors of the PAMs. The experimental results show a non-linear relationship between contraction as well as air pressure within the PAMs and a pulling force of the PAMs. Three different sizes of PAMs available in industry are studied for empirical modeling and simulation. The case studies are presented to verify close agreement on the simulated results to the experimental results when the PAMs perform under various loads. 2009 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "85bec4c1332b324f4eb85a84647c6a95", "text": "Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book and Addison-Wesley was aware of a trademark claim, the designations have been printed in initial capital letters. Aureet's memory is a blessing.", "title": "" }, { "docid": "e9d79ece14c21fcf859e53a1e730a217", "text": "ABCA12: adenosine triphosphate binding cassette A12 HI: harlequin ichthyosis NICU: neonatal intensive care unit INTRODUCTION Harlequin ichthyosis (HI) is a rare autosomal recessive congenital ichthyosis associated with mutations in the keratinocyte lipid transporter adenosine triphosphate binding cassette A12 (ABCA12), leading to disruption in lipid and protease transport into lamellar granules in the granular layer of the epidermis. Subsequent defective desquamation with compensatory hyperkeratinization follows. Historically, there has been a high early mortality rate in infants with HI; however, improved neonatal management and the early introduction of systemic retinoids may contribute to improved prognosis. Death in these patients is most commonly caused by sepsis, respiratory failure, or electrolyte imbalances. We report a case of a neonate with HI treated in the first few days of life with acitretin. The patient initially improved but eventually died of pseudomonas sepsis at 6 weeks of age.", "title": "" }, { "docid": "b4d58813c09030e1c68b4fb573d45389", "text": "With the empirical evidence that Twitter influences the financial market, there is a need for a bottom-up approach focusing on individual Twitter users and their message propagation among a selected Twitter community with regard to the financial market. This paper presents an agent-based simulation framework to model the Twitter network growth and message propagation mechanism in the Twitter financial community. Using the data collected through the Twitter API, the model generates a dynamic community network with message propagation rates by different agent types. The model successfully validates against the empirical characteristics of the Twitter financial community in terms of network demographics and aggregated message propagation pattern. Simulation of the 2013 Associated Press hoax incident demonstrates that removing critical nodes of the network (users with top centrality) dampens the message propagation process linearly and critical node of the highest betweenness centrality has the optimal effect in reducing the spread of the malicious message to lesser ratio of the community.", "title": "" }, { "docid": "86d196a616e4ae0d28fb6d7099508c49", "text": "As applications are becoming increasingly dynamic, the notion that a schema can be created in advance for an application and remain relatively stable is becoming increasingly unrealistic. This has pushed application developers away from traditional relational database systems and away from the SQL interface, despite their many well-established benefits. Instead, developers often prefer self-describing data models such as JSON, and NoSQL systems designed specifically for their relaxed semantics.\n In this paper, we discuss the design of a system that enables developers to continue to represent their data using self-describing formats without moving away from SQL and traditional relational database systems. Our system stores arbitrary documents of key-value pairs inside physical and virtual columns of a traditional relational database system, and adds a layer above the database system that automatically provides a dynamic relational view to the user against which fully standard SQL queries can be issued. We demonstrate that our design can achieve an order of magnitude improvement in performance over alternative solutions, including existing relational database JSON extensions, MongoDB, and shredding systems that store flattened key-value data inside a relational database.", "title": "" }, { "docid": "e9b78d6f0fd98d5ee27bc08864cdb6a1", "text": "Mathematical models play a pivotal role in understanding and designing advanced low-power wireless systems. However, the distributed and uncoordinated operation of traditional multi-hop low-power wireless protocols greatly complicates their accurate modeling. This is mainly because these protocols build and maintain substantial network state to cope with the dynamics of low-power wireless links. Recent protocols depart from this design by leveraging synchronous transmissions (ST), whereby multiple nodes simultaneously transmit towards the same receiver, as opposed to pair wise link-based transmissions (LT). ST improve the one-hop packet reliability to an extent that efficient multi-hop protocols with little network state are feasible. This paper studies whether ST also enable simple yet accurate modeling of these protocols. Our contribution to this end is two-fold. First, we show, through experiments on a 139-node test bed, that characterizing packet receptions and losses as a sequence of independent and identically distributed (i.i.d.) Bernoulli trials-a common assumption in protocol modeling but often illegitimate for LT-is largely valid for ST. We then show how this finding simplifies the modeling of a recent ST-based protocol, by deriving (i) sufficient conditions for probabilistic guarantees on the end-to-end packet reliability, and (ii) a Markovian model to estimate the long-term energy consumption. Validation using test bed experiments confirms that our simple models are also highly accurate, for example, the model error in energy against real measurements is 0.25%, a figure never reported before in the related literature.", "title": "" }, { "docid": "1c2f9c3ed21ab5e3e6a0b17ae8bfc059", "text": "The purpose of this study is to analyze the relationship among Person Organization Fit (POF), Organizational Commitment (OC) and Knowledge Sharing Attitude (KSA). The paper develops a conceptual frame based on a theory and literature review. A quantitative approach has been used to measure the level of POF and OC as well as to explore the relationship of these variables with KSA & with each other by using a sample of 315 academic managers of public sector institutions of higher education. POF has a positive relationship with OC and KSA. A positive relationship also exists between OC and KSA. It would be an effective contribution in the existing body of knowledge. Managers and other stakeholders may be helped to recognize the significance of POF, OC and KSA as well as their relationship with each other for ensuring selection of employee’s best fitted in the organization and for creating and maintaining a conducive environment for improving organizational commitment and knowledge sharing of the employees which will ultimately result in enhanced efficacy and effectiveness of the organization.", "title": "" }, { "docid": "722b2d50bf854e002a0311f7511e433c", "text": "The bat algorithm (BA) is a nature-inspired algorithm, which has recently been applied in many applications. BA can deal with both continuous optimization and discrete optimization problems. The literature has expanded significantly in the past few years, this paper provides a timely review of the latest developments. We also highlight some topics for further research.", "title": "" }, { "docid": "10aca07789cf8e465443ac9813eef189", "text": "INTRODUCTION\nThe faculty of Medicine, (FOM) Makerere University Kampala was started in 1924 and has been running a traditional curriculum for 79 years. A few years back it embarked on changing its curriculum from traditional to Problem Based Learning (PBL) and Community Based Education and Service (COBES) as well as early clinical exposure. This curriculum has been implemented since the academic year 2003/2004. The study was done to describe the steps taken to change and implement the curriculum at the Faculty of Medicine, Makerere University Kampala.\n\n\nOBJECTIVE\nTo describe the steps taken to change and implement the new curriculum at the Faculty of Medicine.\n\n\nMETHODS\nThe stages taken during the process were described and analysed.\n\n\nRESULTS\nThe following stages were recognized characterization of Uganda's health status, analysis of government policy, analysis of old curriculum, needs assessment, adoption of new model (SPICES), workshop/retreats for faculty sensitization, incremental development of programs by faculty, implementation of new curriculum.\n\n\nCONCLUSION\nThe FOM has successfully embarked on curriculum change. This has not been without challenges. However, challenges have been taken on and handled as they arose and this has led to the implementation of new curriculum. Problem based learning can be adopted even in a low resourced country like Uganda.", "title": "" }, { "docid": "c9966a6589d75b2ee87ba375e690de93", "text": "The novel electronic properties of graphene, including a linear energy dispersion relation and purely two-dimensional structure, have led to intense research into possible applications of this material in nanoscale devices. Here we report the first observation of saturating transistor characteristics in a graphene field-effect transistor. The saturation velocity depends on the charge-carrier concentration and we attribute this to scattering by interfacial phonons in the SiO2 layer supporting the graphene channels. Unusual features in the current-voltage characteristic are explained by a field-effect model and diffusive carrier transport in the presence of a singular point in the density of states. The electrostatic modulation of the channel through an efficiently coupled top gate yields transconductances as high as 150 microS microm-1 despite low on-off current ratios. These results demonstrate the feasibility of two-dimensional graphene devices for analogue and radio-frequency circuit applications without the need for bandgap engineering.", "title": "" }, { "docid": "4a9a53444a74f7125faa99d58a5b0321", "text": "The new transformed read-write Web has resulted in a rapid growth of user generated content on the Web resulting into a huge volume of unstructured data. A substantial part of this data is unstructured text such as reviews and blogs. Opinion mining and sentiment analysis (OMSA) as a research discipline has emerged during last 15 years and provides a methodology to computationally process the unstructured data mainly to extract opinions and identify their sentiments. The relatively new but fast growing research discipline has changed a lot during these years. This paper presents a scientometric analysis of research work done on OMSA during 20 0 0–2016. For the scientometric mapping, research publications indexed in Web of Science (WoS) database are used as input data. The publication data is analyzed computationally to identify year-wise publication pattern, rate of growth of publications, types of authorship of papers on OMSA, collaboration patterns in publications on OMSA, most productive countries, institutions, journals and authors, citation patterns and an year-wise citation reference network, and theme density plots and keyword bursts in OMSA publications during the period. A somewhat detailed manual analysis of the data is also performed to identify popular approaches (machine learning and lexicon-based) used in these publications, levels (document, sentence or aspect-level) of sentiment analysis work done and major application areas of OMSA. The paper presents a detailed analytical mapping of OMSA research work and charts the progress of discipline on various useful parameters. © 2016 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "bcea2f75005dc7333ee6660b8803d871", "text": "This paper investigates whether the increased flexibility afforded by e-commerce has allowed firms to increase their tax planning activities. We specifically address the incentives of firms to use exports rather than foreign subsidiary sales. Using proxies for e-commerce activity in both company-level and country-level tests, we find evidence consistent with greater sensitivity to tax incentives when e-commerce measures are high. This research is an important first step in understanding the larger impact of e-commerce on international tax planning behavior.", "title": "" }, { "docid": "8da6a83bc296f65d6e4037f686421771", "text": "Recent progress has been made in using attention based encoder-decoder framework for image and video captioning. Most existing decoders apply the attention mechanism to every generated word including both visual words (e.g., \"gun\" and \"shooting\") and non-visual words (e.g. \"the\", \"a\"). However, these non-visual words can be easily predicted using natural language model without considering visual signals or attention. Imposing attention mechanism on non-visual words could mislead and decrease the overall performance of visual captioning. Furthermore, the hierarchy of LSTMs enables more complex representation of visual data, capturing information at different scales. Considering these issues, we propose a hierarchical LSTM with adaptive attention (hLSTMat) approach for image and video captioning. Specifically, the proposed framework utilizes the spatial or temporal attention for selecting specific regions or frames to predict the related words, while the adaptive attention is for deciding whether to depend on the visual information or the language context information. Also, a hierarchical LSTMs is designed to simultaneously consider both low-level visual information and high-level language context information to support the caption generation. We design the hLSTMat model as a general framework, and we firstly instantiate it for the task of video captioning. Then, we further instantiate our hLSTMarefine it and apply it to the imioning task. To demonstrate the effectiveness of our proposed framework, we test our method on both video and image captioning tasks. Experimental results show that our approach achieves the state-of-the-art performance for most of the evaluation metrics on both tasks. The effect of important components is also well exploited in the ablation study.", "title": "" }, { "docid": "85f9eb1b79ba0bc11e275c8a48731e8f", "text": "OBJECTIVES\nThe long-term effects of amino acid-based formula (AAF) in the treatment of cow's milk allergy (CMA) are largely unexplored. The present study comparatively evaluates body growth and protein metabolism in CMA children treated with AAF or with extensively hydrolyzed whey formula (eHWF), and healthy controls.\n\n\nMETHODS\nA 12-month multicenter randomized control trial was conducted in outpatients with CMA (age 5-12 m) randomized in 2 groups, treated with AAF (group 1) and eHWF (group 2), and compared with healthy controls (group 3) fed with follow-on (if age <12 months) or growing-up formula (if age >12 months). At enrolment (T0), after 3 (T3), 6 (T6), and 12 months (T12) a clinical evaluation was performed. At T0 and T3, in subjects with CMA serum levels of albumin, urea, total protein, retinol-binding protein, and insulin-like growth factor 1 were measured.\n\n\nRESULTS\nTwenty-one subjects in group 1 (61.9% boys, age 6.5 ± 1.5 months), 19 in group 2 (57.9% boys, age 7 ± 1.7 months) and 25 subjects in group 3 (48% boys, age 5.5 ± 0.5 months) completed the study. At T0, the weight z score was similar in group 1 (-0.74) and 2 (-0.76), with differences compared to group 3 (-0.17, P < 0.05). At T12, the weight z score value was similar between the 3 groups without significant differences. There were no significant changes in protein metabolism in children in groups 1 and 2.\n\n\nCONCLUSION\nLong-term treatment with AAF is safe and allows adequate body growth in children with CMA.", "title": "" }, { "docid": "6dcb885d26ca419925a094ade17a4cf7", "text": "This paper presents two different Ku-Band Low-Profile antenna concepts for Mobile Satellite Communications. The antennas are based on low-cost hybrid mechanical-electronic steerable solutions but, while the first one allows a broadband reception of a satellite signal (Receive-only antenna concept), the second one provides transmit and receive functions for a bi-directional communication link between the satellite and the mobile user terminal (Transmit-Receive antenna). Both examples are suitable for integration in land vehicles and aircrafts.", "title": "" }, { "docid": "16b5c5d176f2c9292d9c9238769bab31", "text": "We abstract out the core search problem of active learning schemes, to better understand the extent to which adaptive labeling can improve sample complexity. We give various upper and lower bounds on the number of labels which need to be queried, and we prove that a popular greedy active learning rule is approximately as good as any other strategy for minimizing this number of labels.", "title": "" } ]
scidocsrr
090b630d787644e537f715d227a6d134
Protecting endpoint devices in IoT supply chain
[ { "docid": "b4ad210acc3ee610379699d1a04e0f20", "text": "The Nest Thermostat is a smart home automation device that aims to learn a user’s heating and cooling habits to help optimize scheduling and power usage. With its debut in 2011, Nest has proven to be such a success that Google spent $3.2B to acquire the company. However, the complexity of the infrastructure in the Nest Thermostat provides a breeding ground for security vulnerabilities similar to those found in other computer systems. To mitigate this issue, Nest signs firmware updates sent to the device, but the hardware infrastructure lacks proper protection, allowing attackers to install malicious software into the unit. Through a USB connection, we demonstrate how the firmware verification done by the Nest software stack can be bypassed, providing the means to completely alter the behavior of the unit. The compromised Nest Thermostat will then act as a beachhead to attack other nodes within the local network. Also, any information stored within the unit is now available to the attacker, who no longer has to have physical access to the device. Finally, we present a solution to smart device architects and manufacturers aiding the development and deployment of a secure hardware platform.", "title": "" } ]
[ { "docid": "3c08e42ad9e6a2f2e7a29a187d8a791e", "text": "An integrated single-inductor dual-output boost converter is presented. This converter adopts time-multiplexing control in providing two independent supply voltages (3.0 and 3.6 V) using only one 1H off-chip inductor and a single control loop. This converter is analyzed and compared with existing counterparts in the aspects of integration, architecture, control scheme, and system stability. Implementation of the power stage, the controller, and the peripheral functional blocks is discussed. The design was fabricated with a standard 0.5m CMOS n-well process. At an oscillator frequency of 1 MHz, the power conversion efficiency reaches 88.4% at a total output power of 350 mW. This topology can be extended to have multiple outputs and can be applied to buck, flyback, and other kinds of converters.", "title": "" }, { "docid": "9f3b749ee0035fa749efa6d16528e325", "text": "There's growing interest in developing applications for the Internet of Things. Such applications' main objective is to integrate technology into people's everyday lives, to be of service to them en masse. The form in which this integration is implemented, however, still leaves much room for improvement. Usually, the user must set parameters within the application. When the person's context changes, they have to manually reconfigure the parameters. What was meant to be a commodity in an unforeseen situation then becomes extra noise. This article describes a reference architecture that improves how people are integrated with the IoT, with smartphones doing the connecting. The resulting integration opens the way to new IoT scenarios supporting evolution towards the Internet of People.", "title": "" }, { "docid": "3112c11544c9dfc5dc5cf67e74e4ba4b", "text": "How long does it take for the human visual system to process a complex natural image? Subjectively, recognition of familiar objects and scenes appears to be virtually instantaneous, but measuring this processing time experimentally has proved difficult. Behavioural measures such as reaction times can be used1, but these include not only visual processing but also the time required for response execution. However, event-related potentials (ERPs) can sometimes reveal signs of neural processing well before the motor output2. Here we use a go/no-go categorization task in which subjects have to decide whether a previously unseen photograph, flashed on for just 20 ms, contains an animal. ERP analysis revealed a frontal negativity specific to no-go trials that develops roughly 150 ms after stimulus onset. We conclude that the visual processing needed to perform this highly demanding task can be achieved in under 150 ms.", "title": "" }, { "docid": "a57dc1e93116aa99ce00c671208bbd9f", "text": "According to the IEEE 802.11aj (45 GHz) standard, a millimeter-wave planar substrate-integrated endfire antenna with wide beamwidths in both <italic>E</italic>- and <italic>H</italic>-planes, and good impedance matching over 42.3–48.4 GHz is proposed for the Q-band wireless local area network (WLAN) system. The proposed antenna comprises a printed angled dipole with bilateral symmetrical directors for generating wide-angle radiation, and the beamwidth in both <italic>E</italic>- and <italic>H</italic>-planes can be easily adjusted. The antenna is prototyped using the conventional printed circuit board process with a size of 6 × 26 × 0.508 mm<sup>3</sup>, and achieves beamwidths greater than 120° in two main planes, <inline-formula><tex-math notation=\"LaTeX\">${S}$ </tex-math></inline-formula><sub>11</sub> of less than –12.5 dB, and peak gain of 3.67–5.2 dBi over 42.3–48.4 GHz. The measurements are in good agreement with simulations, which shows that the proposed antenna is very promising for Q-band millimeter-wave WLAN system access-point applications.", "title": "" }, { "docid": "2a17f4c307fac8491410295640b5133c", "text": "This work adopts a standard Denavit–Hartenberg method to model a PUMA 560 spot welding robot as the object of study. The forward and inverse kinematics solutions are then analyzed. To address the shortcomings of the ant colony algorithm, factors from the particle swarm optimization and the genetic algorithm are introduced into this algorithm. Subsequently, the resulting hybrid algorithm and the ant colony algorithm are used to conduct trajectory planning in the shortest path. Experimental data and simulation result show that the hybrid algorithm is significantly better in terms of initial solution speed and optimal solution quality than the ant colony algorithm. The feasibility and effectiveness of the hybrid algorithm in the trajectory planning of a robot are thus verified.", "title": "" }, { "docid": "4e20e28f7da8c76a6868ed7167a49c1b", "text": "Nature enthused algorithms are the most potent for optimization. Cuckoo Search (CS) algorithm is one such algorithm which is efficient in solving optimization problems in varied fields. This paper appraises the basic concepts of cuckoo search algorithm and its application towards the segmentation of brain tumor from the Magnetic Resonance Images (MRI). The human brain is the most complex structure where identifying the tumor like diseases are extremely challenging because differentiating the components of the brain is complex. The tumor may sometimes occur with the same intensity of normal tissues. The tumor, edema, blood clot and some part of brain tissues appear as same and make the work of the radiologist more complex. In general the brain tumor is detected by radiologist through a comprehensive analysis of MR images, which takes substantially a longer time. The key inventiveness is to develop a diagnostic system using the best optimization technique called the cuckoo search, that would assist the radiologist to have a second opinion regarding the presence or absence of tumor. This paper explores the CS algorithm, performing a profound study of its search mechanisms to discover how it is efficient in detecting tumors and compare the results with the other commonly used optimization algorithms.", "title": "" }, { "docid": "4bf7ad74cb51475e7e20f32aa4b767d9", "text": "function parameters = main(); % File main.m, created by Eugene Izhikevich. August 28, 2001 % Uses voltage-clamp data from N voltage-step experiments to % determine (in)activation parameters of a transient current. % Data provided by user: global v times current E p q load v.dat % N by 2 matrix of voltage steps % [from, to; from, to;...] load times.dat % Time mesh of the voltage-clamped data load current.dat % Matrix of the current values. E = 50; % Reverse potential p = 3; % The number of activation gates q = 1; % The number of inactivation gates % Guess of initial values of parameters % activation V_1/2 k V_max sigma C_amp C_base par(1:6) = [ -50 20 -40 30 0.5 0.1]; % inactivation V_1/2 k V_max sigma C_amp C_base par(7:12) =[ -60 -5 -70 20 5 1]; par(13) = 1; % Maximal conductance g_max % If E, p, or q are not known, add par(14)=60, etc. % and modify test.m parameters = fmins(’test’,par);", "title": "" }, { "docid": "f095118c63d1531ebdbaec3565b0d91f", "text": "BACKGROUND\nSystematic reviews are most helpful if they are up-to-date. We did a systematic review of strategies and methods describing when and how to update systematic reviews.\n\n\nOBJECTIVES\nTo identify, describe and assess strategies and methods addressing: 1) when to update systematic reviews and 2) how to update systematic reviews.\n\n\nSEARCH STRATEGY\nWe searched MEDLINE (1966 to December 2005), PsycINFO, the Cochrane Methodology Register (Issue 1, 2006), and hand searched the 2005 Cochrane Colloquium proceedings.\n\n\nSELECTION CRITERIA\nWe included methodology reports, updated systematic reviews, commentaries, editorials, or other short reports describing the development, use, or comparison of strategies and methods for determining the need for updating or updating systematic reviews in healthcare.\n\n\nDATA COLLECTION AND ANALYSIS\nWe abstracted information from each included report using a 15-item questionnaire. The strategies and methods for updating systematic reviews were assessed and compared descriptively with respect to their usefulness, comprehensiveness, advantages, and disadvantages.\n\n\nMAIN RESULTS\nFour updating strategies, one technique, and two statistical methods were identified. Three strategies addressed steps for updating and one strategy presented a model for assessing the need to update. One technique discussed the use of the \"entry date\" field in bibliographic searching. Statistical methods were cumulative meta-analysis and predicting when meta-analyses are outdated.\n\n\nAUTHORS' CONCLUSIONS\nLittle research has been conducted on when and how to update systematic reviews and the feasibility and efficiency of the identified approaches is uncertain. These shortcomings should be addressed in future research.", "title": "" }, { "docid": "e719e42bd2465c13e368cc16e80c106a", "text": "The health, education, and other service applications for robots that assist through primarily social rather than physical interaction are rapidly growing, and so is the research into such technologies. Socially assistive robotics (SAR) aims to address critical areas and gaps in care by automating supervision, coaching, motivation, and companionship aspects of one-on-one interactions with individuals from various large and growing populations, including stroke survivors, the elderly and individuals with dementia, children with autism spectrum disorders, among many others. In this way, roboticists hope to improve the standard of care for large user groups. Naturally, SAR systems pose several ethical challenges regarding their design, implementation, and deployment. This paper examines the ethical challenges of socially assistive robotics from three points of view (user, caregiver, peer) using core principles from medical ethics (autonomy, beneficence, non-maleficence, justice) to determine how intended and unintended effects of a SAR can impact the delivery of care.", "title": "" }, { "docid": "c943d44e452c5cd5e027df814f8aac32", "text": "Three experiments tested the hypothesis that the social roles implied by specific contexts can attenuate or reverse the typical pattern of racial bias obtained on both controlled and automatic evaluation measures. Study 1 assessed evaluations of Black and Asian faces in contexts related to athlete or student roles. Study 2 compared evaluations of Black and White faces in 3 role-related contexts (prisoner, churchgoer, and factory worker). Study 3 manipulated role cues (lawyer or prisoner) within the same prison context. All 3 studies produced significant reversals of racial bias as a function of implied role on measures of both controlled and automatic evaluation. These results support the interpretation that differential evaluations based on Race x Role interactions provide one way that context can moderate both controlled and automatic racial bias.", "title": "" }, { "docid": "e7ff760dddadf1de42cfc0553f286fe6", "text": "Fluorine-containing amino acids are valuable probes for the biophysical characterization of proteins. Current methods for (19)F-labeled protein production involve time-consuming genetic manipulation, compromised expression systems and expensive reagents. We show that Escherichia coli BL21, the workhorse of protein production, can utilise fluoroindole for the biosynthesis of proteins containing (19)F-tryptophan.", "title": "" }, { "docid": "47b39b88b83b5ded94820d363e078f4e", "text": "This paper presents a new representation of skeleton sequences for 3D action recognition. Existing methods based on hand-crafted features or recurrent neural networks cannot adequately capture the complex spatial structures and the long-term temporal dynamics of the skeleton sequences, which are very important to recognize the actions. In this paper, we propose to transform each channel of the 3D coordinates of a skeleton sequence into a clip. Each frame of the generated clip represents the temporal information of the entire skeleton sequence and one particular spatial relationship between the skeleton joints. The entire clip incorporates multiple frames with different spatial relationships, which provide useful spatial structural information of the human skeleton. We also propose a multitask convolutional neural network (MTCNN) to learn the generated clips for action recognition. The proposed MTCNN processes all the frames of the generated clips in parallel to explore the spatial and temporal information of the skeleton sequences. The proposed method has been extensively tested on six challenging benchmark datasets. Experimental results consistently demonstrate the superiority of the proposed clip representation and the feature learning method for 3D action recognition compared to the existing techniques.", "title": "" }, { "docid": "865a8d50a0a48e43f2bc2607e00568a4", "text": "Ageratum conyzoides, an annual herb, has been used in folklore for managing of a wide range of diseases including cancer. However, the safety and effectiveness of this medicinal plant is poorly evaluated. The intention of this study was to evaluate the in vitro antioxidant and anticancer activities of aqueous leaf, flower, stem and whole plant extracts of A. conyzoidesas well as the qualitative phytochemical constituents. The DPPH, Folin-Ciocalteau and glutathione assays were used to evaluate the plant’s antioxidant potential. The in vitro 3-(4, 5dimethylthiazol-2-yl)-2, 5-diphenyltetrazolium bromide (MTT) assay was exploited for determination of in vitro anticancer activity against four selected human cell lines: leukemic (Jurkat), prostate (LNCap), breast (MCF-7), and normal prostate (PNT2). Curcumin was used as standard anticancer compound. The selectivity index (SI) for each extract was also estimated. The extracts scavenged DPPH in a dose dependent manner compared to the positive control, butylated hydroxy toluene (BHT). The leaf extract was the strongest scavenger of DPPH free radical, EC50 value of 0.091 ± 0.024mg/ml, and also recorded the highest total phenol content of 1678.86 ± 40.67 mg/g GAE. However, glutathione was not detected in any of the crude extracts. The cytotoxicity exhibited by the aqueous leaf extract was weak on Jurkat cells with IC50 value of 408.15±23.25 μg/ml, and inactive to the remaining cancer cell lines. Moreover, the other extracts showed weak or no activities on the cancer cell lines. All extracts were not cytotoxic to the normal prostate (PNT2) cell line. The leaf extract was selective against Jurkat cell lines with SI value of 2.5, a little higher than curcumin (SI = 2.3). The presence of tannins, saponins and terpenoids were concentrated in the leaf and flower extracts of the plant. The present investigations suggest that Ageratum conyzoides aqueous extracts possess remarkable antioxidant effects, and weak anticancer properties. The phytochemical compounds detected could be responsible for these properties. Further studies should be conducted to unravel the active chemical principle(s).", "title": "" }, { "docid": "7458adc935d2b8d265354cf38b8f9f14", "text": "Inflammation contributes to important traits that cancer cells acquire during malignant progression. Gene array data recently identified upregulation of interferon-induced protein with tetratricopeptide repeats 3 (IFIT3) in aggressive pancreatic cancer cells. IFIT3 belongs to the group of interferon stimulated genes (ISG), can be induced by several cellular stress stimuli and by its tetratricopeptide repeats interacts with a multitude of cellular proteins. Upregulation of IFIT3 was confirmed in the aggressive pancreatic cancer cell line L3.6pl compared with its less aggressive cell line of origin, COLO357FG. Transgenic induction of IFIT3 expression in COLO357FG resulted in greater mass of orthotopic tumors and higher prevalence of metastases. Several important traits that mediate malignancy were altered by IFIT3: increased VEGF and IL-6 secretion, chemoresistance and decreased starvation-induced apoptosis. IFIT3 showed binding to JNK and STAT1, the latter being an important inducer of IFIT3 expression. Despite still being alterable by \"classical\" IFN or NFκB signaling, our findings indicate constitutive - possibly auto-regulated - upregulation of IFIT3 in L3.6pl without presence of an adequate inflammatory stimulus. The transcription factor SOX9, which is linked to regulation of hypoxia-related genes, was identified as a key mediator of upregulation of the oncogene IFIT3 and thereby sustaining a \"pseudoinflammatory\" cellular condition.", "title": "" }, { "docid": "0bc53a10750de315d5a37275dd7ae4a7", "text": "The term stigma refers to problems of knowledge (ignorance), attitudes (prejudice) and behaviour (discrimination). Most research in this area has been based on attitude surveys, media representations of mental illness and violence, has only focused upon schizophrenia, has excluded direct participation by service users, and has included few intervention studies. However, there is evidence that interventions to improve public knowledge about mental illness can be effective. The main challenge in future is to identify which interventions will produce behaviour change to reduce discrimination against people with mental illness.", "title": "" }, { "docid": "7974d3e3e9c431256ee35c3032288bd1", "text": "Nowadays, the usage of mobile device among the community worldwide has been tremendously increased. With this proliferation of mobile devices, more users are able to access the internet for variety of online application and services. As the use of mobile devices and applications grows, the rate of vulnerabilities exploitation and sophistication of attack towards the mobile user are increasing as well. To date, Google's Android Operating System (OS) are among the widely used OS for the mobile devices, the openness design and ease of use have made them popular among developer and user. Despite the advantages the android-based mobile devices have, it also invited the malware author to exploit the mobile application on the market. Prior to this matter, this research focused on investigating the behaviour of mobile malware through hybrid approach. The hybrid approach correlates and reconstructs the result from the static and dynamic malware analysis in producing a trace of malicious event. Based on the finding, this research proposed a general mobile malware behaviour model that can contribute in identifying the key features in detecting mobile malware on an Android Platform device.", "title": "" }, { "docid": "95e212c0b9b40b4dcb7dc4a94b0c0fd2", "text": "In this paper we introduce and discuss a concept of syntactic n-grams (sn-grams). Sn-grams differ from traditional n-grams in the manner how we construct them, i.e., what elements are considered neighbors. In case of sn-grams, the neighbors are taken by following syntactic relations in syntactic trees, and not by taking words as they appear in a text, i.e., sn-grams are constructed by following paths in syntactic trees. In this manner, sn-grams allow bringing syntactic knowledge into machine learning methods; still, previous parsing is necessary for their construction. Sn-grams can be applied in any natural language processing (NLP) task where traditional n-grams are used. We describe how sn-grams were applied to authorship attribution. We used as baseline traditional n-grams of words, part of speech (POS) tags and characters; three classifiers were applied: support vector machines (SVM), naive Bayes (NB), and tree classifier J48. Sn-grams give better results with SVM classifier. 2013 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "677315b5081bb11900f3584276a77c69", "text": "Data-driven approaches for edge detection have proven effective and achieve top results on modern benchmarks. However, all current data-driven edge detectors require manual supervision for training in the form of hand-labeled region segments or object boundaries. Specifically, human annotators mark semantically meaningful edges which are subsequently used for training. Is this form of strong, highlevel supervision actually necessary to learn to accurately detect edges? In this work we present a simple yet effective approach for training edge detectors without human supervision. To this end we utilize motion, and more specifically, the only input to our method is noisy semi-dense matches between frames. We begin with only a rudimentary knowledge of edges (in the form of image gradients), and alternate between improving motion estimation and edge detection in turn. Using a large corpus of video data, we show that edge detectors trained using our unsupervised scheme approach the performance of the same methods trained with full supervision (within 3-5%). Finally, we show that when using a deep network for the edge detector, our approach provides a novel pre-training scheme for object detection.", "title": "" }, { "docid": "51620ef906b7fc5774e051fb3261d611", "text": "Named Entity Recognition (NER) plays an important role in a variety of online information management tasks including text categorization, document clustering, and faceted search. While recent NER systems can achieve near-human performance on certain documents like news articles, they still remain highly domain-specific and thus cannot effectively identify entities such as original technical concepts in scientific documents. In this work, we propose novel approaches for NER on distinctive document collections (such as scientific articles) based on n-grams inspection and classification. We design and evaluate several entity recognition features---ranging from well-known part-of-speech tags to n-gram co-location statistics and decision trees---to classify candidates. In addition, we show how the use of external knowledge bases (either specific like DBLP or generic like DBPedia) can be leveraged to improve the effectiveness of NER for idiosyncratic collections. We evaluate our system on two test collections created from a set of Computer Science and Physics papers and compare it against state-of-the-art supervised methods. Experimental results show that a careful combination of the features we propose yield up to 85% NER accuracy over scientific collections and substantially outperforms state-of-the-art approaches such as those based on maximum entropy.", "title": "" }, { "docid": "a814d11f613df82203512d88c1583eec", "text": "The paper titled “HUMAN RESOURCE MANAGEMENT SYSTEM” is basically concerned with managing the Administrator of HUMAN RESOURCE Department in a company. A Human Resource Management System (HRMS), refers to the systems and processes at the intersection between human resource management (HRM) and information technology. It merges HRM as a discipline and in particular its basic HR activities and processes with the information technology field, whereas the programming of data processing systems evolved into standardized routines and packages of enterprise resource planning (ERP) software[1]. The main objective of this paper is to reduce the effort of Administrator to keep the daily events such as attendance, projects, works, appointments, etc. This paper deals with the process of identifying the employees, recording their attendance hourly and calculating their effective payable hours or days. This paper should maintain the records of each and every employee and their time spend in to company, which can be used for performance appraisal. Based on that transfer, removal, promotion can be done. Keyword: Human Resource, Administrator, Employee", "title": "" } ]
scidocsrr
aa8a37fd7e16df1fe208f57a410173c5
Cloud storage forensics: ownCloud as a case study
[ { "docid": "df6ae009a56c34c64663ac1647366db3", "text": "Increasing interest in and use of cloud computing services presents both opportunities for criminal exploitation and challenges for law enforcement agencies (LEAs). For example, it is becoming easier for criminals to store incriminating files in the cloud computing environment but it may be extremely difficult for LEAs to seize these files as the latter could potentially be stored overseas. Two of the most widely used and accepted forensic frameworks – McKemmish (1999) and NIST (Kent et al., 2006) – are then reviewed to identify the required changes to current forensic practices needed to successfully conduct cloud computing investigations. We propose an integrated (iterative) conceptual digital forensic framework (based on McKemmish and NIST), which emphasises the differences in the preservation of forensic data and the collection of cloud computing data for forensic purposes. Cloud computing digital forensic issues are discussed within the context of this framework. Finally suggestions for future research are made to further examine this field and provide a library of digital forensic methodologies for the various cloud platforms and deployment models. a 2012 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "7ed58e8ec5858bdcb5440123aea57bb1", "text": "The demand for cloud computing is increasing because of the popularity of digital devices and the wide use of the Internet. Among cloud computing services, most consumers use cloud storage services that provide mass storage. This is because these services give them various additional functions as well as storage. It is easy to access cloud storage services using smartphones. With increasing utilization, it is possible for malicious users to abuse cloud storage services. Therefore, a study on digital forensic investigation of cloud storage services is necessary. This paper proposes new procedure for investigating and analyzing the artifacts of all accessible devices, such as Windows, Mac, iPhone, and Android smartphone.", "title": "" }, { "docid": "a6defeca542d1586e521a56118efc56f", "text": "We expose and explore technical and trust issues that arise in acquiring forensic evidence from infrastructure-as-aservice cloud computing and analyze some strategies for addressing these challenges. First, we create a model to show the layers of trust required in the cloud. Second, we present the overarching context for a cloud forensic exam and analyze choices available to an examiner. Third, we provide for the first time an evaluation of popular forensic acquisition tools including Guidance EnCase and AccesData Forensic Toolkit, and show that they can successfully return volatile and non-volatile data from the cloud. We explain, however, that with those techniques judge and jury must accept a great deal of trust in the authenticity and integrity of the data from many layers of the cloud model. In addition, we explore four other solutions for acquisition—Trusted Platform Modules, the management plane, forensics as a service, and legal solutions, which assume less trust but require more cooperation from the cloud service provider. Our work lays a foundation for future development of new acquisition methods for the cloud that will be trustworthy and forensically sound. Our work also helps forensic examiners, law enforcement, and the court evaluate confidence in evidence from the cloud.", "title": "" } ]
[ { "docid": "645d828cc2fc16b1f6894e34c6104ea9", "text": "on behalf of the American Heart Association Statistics Committee and Stroke Statistics Virani, Nathan D. Wong, Daniel Woo and Melanie B. Turner Nina P. Paynter, Pamela J. Schreiner, Paul D. Sorlie, Joel Stein, Tanya N. Turan, Salim S. Darren K. McGuire, Emile R. Mohler, Claudia S. Moy, Michael E. Mussolino, Graham Nichol, Lynda D. Lisabeth, David Magid, Gregory M. Marcus, Ariane Marelli, David B. Matchar, Mark D. Huffman, Brett M. Kissela, Steven J. Kittner, Daniel T. Lackland, Judith H. Lichtman, Heather J. Fullerton, Cathleen Gillespie, Susan M. Hailpern, John A. Heit, Virginia J. Howard, Franco, William B. Borden, Dawn M. Bravata, Shifan Dai, Earl S. Ford, Caroline S. Fox, Sheila Alan S. Go, Dariush Mozaffarian, Véronique L. Roger, Emelia J. Benjamin, Jarett D. Berry, Association 2013 Update : A Report From the American Heart −− Heart Disease and Stroke Statistics", "title": "" }, { "docid": "0f49e229c08672dfba4026ec5ebca3bc", "text": "A grid array antenna is presented in this paper with sub grid arrays and multiple feed points, showing enhanced radiation characteristics and sufficient design flexibility. For instance, the grid array antenna can be easily designed as a linearly- or circularly-polarized, unbalanced or balanced antenna. A design example is given for a linearly-polarized unbalanced grid array antenna in Ferro A6M low temperature co-fired ceramic technology for 60-GHz radios to operate from 57 to 66 GHz (≈ 14.6% at 61.5 GHz ). It consists of 4 sub grid arrays and 4 feed points that are connected to a single-ended 50-Ω source by a quarter-wave matched T-junction network. The simulated results indicate that the grid array antenna has the maximum gain of 17.7 dBi at 59 GHz , an impedance bandwidth (|S11| ≤ -10&nbsp;dB) nearly from 56 to 67.5 GHz (or 18.7%), a 3-dB gain bandwidth from 55.4 to 66 GHz (or 17.2%), and a vertical beam bandwidth in the broadside direction from 57 to 66 GHz (14.6%). The measured results are compared with the simulated ones. Discrepancies and their causes are identified with a tolerance analysis on the fabrication process.", "title": "" }, { "docid": "2c798421352e4f128823fca2e229e812", "text": "The use of renewables materials for industrial applications is becoming impellent due to the increasing demand of alternatives to scarce and unrenewable petroleum supplies. In this regard, nanocrystalline cellulose, NCC, derived from cellulose, the most abundant biopolymer, is one of the most promising materials. NCC has unique features, interesting for the development of new materials: the abundance of the source cellulose, its renewability and environmentally benign nature, its mechanical properties and its nano-scaled dimensions open a wide range of possible properties to be discovered. One of the most promising uses of NCC is in polymer matrix nanocomposites, because it can provide a significant reinforcement. This review provides an overview on this emerging nanomaterial, focusing on extraction procedures, especially from lignocellulosic biomass, and on technological developments and applications of NCC-based materials. Challenges and future opportunities of NCC-based materials will be are discussed as well as obstacles remaining for their large use.", "title": "" }, { "docid": "8404b6b5abcbb631398898e81beabea1", "text": "As a result of agricultural intensification, more food is produced today than needed to feed the entire world population and at prices that have never been so low. Yet despite this success and the impact of globalization and increasing world trade in agriculture, there remain large, persistent and, in some cases, worsening spatial differences in the ability of societies to both feed themselves and protect the long-term productive capacity of their natural resources. This paper explores these differences and develops a countryxfarming systems typology for exploring the linkages between human needs, agriculture and the environment, and for assessing options for addressing future food security, land use and ecosystem service challenges facing different societies around the world.", "title": "" }, { "docid": "669b4b1574c22a0c18dd1dc107bc54a1", "text": "T lymphocytes respond to foreign antigens both by producing protein effector molecules known as lymphokines and by multiplying. Complete activation requires two signaling events, one through the antigen-specific receptor and one through the receptor for a costimulatory molecule. In the absence of the latter signal, the T cell makes only a partial response and, more importantly, enters an unresponsive state known as clonal anergy in which the T cell is incapable of producing its own growth hormone, interleukin-2, on restimulation. Our current understanding at the molecular level of this modulatory process and its relevance to T cell tolerance are reviewed.", "title": "" }, { "docid": "d274a98efb4568c5c320fc66cab56efd", "text": "This paper presents the design and development of autonomous attitude stabilization, navigation in unstructured, GPS-denied environments, aggressive landing on inclined surfaces, and aerial gripping using onboard sensors on a low-cost, custom-built quadrotor. The development of a multi-functional micro air vehicle (MAV) that utilizes inexpensive off-the-shelf components presents multiple challenges due to noise and sensor accuracy, and there are control challenges involved with achieving various capabilities beyond navigation. This paper addresses these issues by developing a complete system from the ground up, addressing the attitude stabilization problem using extensive filtering and an attitude estimation filter recently developed in the literature. Navigation in both indoor and outdoor environments is achieved using a visual Simultaneous Localization and Mapping (SLAM) algorithm that relies on an onboard monocular camera. The system utilizes nested controllers for attitude stabilization, vision-based navigation, and guidance, with the navigation controller implemented using a This research was supported by the National Science Foundation under CAREER Award ECCS-0748287. Electronic supplementary material The online version of this article (doi:10.1007/s10514-012-9286-z) contains supplementary material, which is available to authorized users. V. Ghadiok ( ) · W. Ren Department of Electrical Engineering, University of California, Riverside, Riverside, CA 92521, USA e-mail: vaibhav.ghadiok@ieee.org W. Ren e-mail: ren@ee.ucr.edu J. Goldin Electronic Systems Center, Hanscom Air Force Base, Bedford, MA 01731, USA e-mail: jeremy.goldin@us.af.mil nonlinear controller based on the sigmoid function. The efficacy of the approach is demonstrated by maintaining a stable hover even in the presence of wind gusts and when manually hitting and pulling on the quadrotor. Precision landing on inclined surfaces is demonstrated as an example of an aggressive maneuver, and is performed using only onboard sensing. Aerial gripping is accomplished with the addition of a secondary camera, capable of detecting infrared light sources, which is used to estimate the 3D location of an object, while an under-actuated and passively compliant manipulator is designed for effective gripping under uncertainty. The quadrotor is therefore able to autonomously navigate inside and outside, in the presence of disturbances, and perform tasks such as aggressively landing on inclined surfaces and locating and grasping an object, using only inexpensive, onboard sensors.", "title": "" }, { "docid": "8dc3bcecacd940036090a08d942596ab", "text": "Pregnancy-related pelvic girdle pain (PRPGP) has a prevalence of approximately 45% during pregnancy and 20-25% in the early postpartum period. Most women become pain free in the first 12 weeks after delivery, however, 5-7% do not. In a large postpartum study of prevalence for urinary incontinence (UI) [Wilson, P.D., Herbison, P., Glazener, C., McGee, M., MacArthur, C., 2002. Obstetric practice and urinary incontinence 5-7 years after delivery. ICS Proceedings of the Neurourology and Urodynamics, vol. 21(4), pp. 284-300] found that 45% of women experienced UI at 7 years postpartum and that 27% who were initially incontinent in the early postpartum period regained continence, while 31% who were continent became incontinent. It is apparent that for some women, something happens during pregnancy and delivery that impacts the function of the abdominal canister either immediately, or over time. Current evidence suggests that the muscles and fascia of the lumbopelvic region play a significant role in musculoskeletal function as well as continence and respiration. The combined prevalence of lumbopelvic pain, incontinence and breathing disorders is slowly being understood. It is also clear that synergistic function of all trunk muscles is required for loads to be transferred effectively through the lumbopelvic region during multiple tasks of varying load, predictability and perceived threat. Optimal strategies for transferring loads will balance control of movement while maintaining optimal joint axes, maintain sufficient intra-abdominal pressure without compromising the organs (preserve continence, prevent prolapse or herniation) and support efficient respiration. Non-optimal strategies for posture, movement and/or breathing create failed load transfer which can lead to pain, incontinence and/or breathing disorders. Individual or combined impairments in multiple systems including the articular, neural, myofascial and/or visceral can lead to non-optimal strategies during single or multiple tasks. Biomechanical aspects of the myofascial piece of the clinical puzzle as it pertains to the abdominal canister during pregnancy and delivery, in particular trauma to the linea alba and endopelvic fascia and/or the consequence of postpartum non-optimal strategies for load transfer, is the focus of the first two parts of this paper. A possible physiological explanation for fascial changes secondary to altered breathing behaviour during pregnancy is presented in the third part. A case study will be presented at the end of this paper to illustrate the clinical reasoning necessary to discern whether conservative treatment or surgery is necessary for restoration of function of the abdominal canister in a woman with postpartum diastasis rectus abdominis (DRA).", "title": "" }, { "docid": "1edd6cb3c6ed4657021b6916efbc23d9", "text": "Siamese-like networks, Streetscore-CNN (SS-CNN) and Ranking SS-CNN, to predict pairwise comparisons Figure 1: User Interface for Crowdsourced Online Game Performance Analysis • SS-CNN: We calculate the % of pairwise comparisons in test set predicted correctly by (1) Softmax of output neurons in final layer (2) comparing TrueSkill scores [2] obtained from synthetic pairwise comparisons from the CNN (3) extracting features from penultimate layer of CNN and feeding pairwise feature representations to a RankSVM [3] • RSS-CNN: We compare the ranking function outputs for both images in a test pair to decide which image wins, and calculate the binary prediction accuracy.", "title": "" }, { "docid": "4f6f225f978bbf00c20f80538dc12aad", "text": "A smart building is created when it is engineered, delivered and operated smart. The Internet of Things (IoT) is advancing a new breed of smart buildings enables operational systems that deliver more accurate and useful information for improving operations and providing the best experiences for tenants. Big Data Analytics framework analyze building data to uncover new insight capable of driving real value and greater performance. Internet of Things technologies enhance the situational awareness or “smartness” of service providers and consumers alike. There is a need for an integrated IoT Big Data Analytics framework to fill the research gap in the Big Data Analytics domain. This paper also presents a novel approach for mobile phone centric observation applied to indoor localization for smart buildings. The applicability of the framework of this paper is demonstrated with the help of a scenario involving the analysis of real-time smart building data for automatically managing the oxygen level, luminosity and smoke/hazardous gases in different parts of the smart building. Lighting control in smart buildings and homes can be automated by having computer controlled lights and blinds along with illumination sensors that are distributed in the building. This paper gives an overview of an approach that algorithmically sets up the control system that can automate any building without custom programming. The resulting system controls blinds to ensure even lighting and also adds artificial illumination to ensure light coverage remains adequate at all times of the day, adjusting for weather and seasons. The key contribution of this paper is the complex integration of Big Data Analytics and IoT for addressing the large volume and velocity challenge of real-time data in the smart building domain.", "title": "" }, { "docid": "2f7a15b3d922d9a1d03a6851be5f6622", "text": "The clinical relevance of T cells in the control of a diverse set of human cancers is now beyond doubt. However, the nature of the antigens that allow the immune system to distinguish cancer cells from noncancer cells has long remained obscure. Recent technological innovations have made it possible to dissect the immune response to patient-specific neoantigens that arise as a consequence of tumor-specific mutations, and emerging data suggest that recognition of such neoantigens is a major factor in the activity of clinical immunotherapies. These observations indicate that neoantigen load may form a biomarker in cancer immunotherapy and provide an incentive for the development of novel therapeutic approaches that selectively enhance T cell reactivity against this class of antigens.", "title": "" }, { "docid": "066eef8e511fac1f842c699f8efccd6b", "text": "In this paper, we propose a new model that is capable of recognizing overlapping mentions. We introduce a novel notion of mention separators that can be effectively used to capture how mentions overlap with one another. On top of a novel multigraph representation that we introduce, we show that efficient and exact inference can still be performed. We present some theoretical analysis on the differences between our model and a recently proposed model for recognizing overlapping mentions, and discuss the possible implications of the differences. Through extensive empirical analysis on standard datasets, we demonstrate the effectiveness of our approach.", "title": "" }, { "docid": "85be4bd00c69fdd43841fa7112df20b1", "text": "The role of semantics in zero-shot learning is considered. The effectiveness of previous approaches is analyzed according to the form of supervision provided. While some learn semantics independently, others only supervise the semantic subspace explained by training classes. Thus, the former is able to constrain the whole space but lacks the ability to model semantic correlations. The latter addresses this issue but leaves part of the semantic space unsupervised. This complementarity is exploited in a new convolutional neural network (CNN) framework, which proposes the use of semantics as constraints for recognition. Although a CNN trained for classification has no transfer ability, this can be encouraged by learning an hidden semantic layer together with a semantic code for classification. Two forms of semantic constraints are then introduced. The first is a loss-based regularizer that introduces a generalization constraint on each semantic predictor. The second is a codeword regularizer that favors semantic-to-class mappings consistent with prior semantic knowledge while allowing these to be learned from data. Significant improvements over the state-of-the-art are achieved on several datasets.", "title": "" }, { "docid": "30941e0bc8575047d1adc8c20983823b", "text": "The world has changed dramatically for wind farm operators and service providers in the last decade. Organizations whose turbine portfolios was counted in 10-100s ten years ago are now managing large scale operation and service programs for fleet sizes well above one thousand turbines. A big challenge such organizations now face is the question of how the massive amount of operational data that are generated by large fleets are effectively managed and how value is gained from the data. A particular hard challenge is the handling of data streams collected from advanced condition monitoring systems. These data are highly complex and typically require expert knowledge to interpret correctly resulting in poor scalability when moving to large Operation and Maintenance (O&M) platforms.", "title": "" }, { "docid": "80d859e26c815e5c6a8c108ab0141462", "text": "StarCraft II poses a grand challenge for reinforcement learning. The main difficulties include huge state space, varying action space, long horizon, etc. In this paper, we investigate a set of techniques of reinforcement learning for the full-length game of StarCraft II. We investigate a hierarchical approach, where the hierarchy involves two levels of abstraction. One is the macro-actions extracted from expert’s demonstration trajectories, which can reduce the action space in an order of magnitude yet remains effective. The other is a two-layer hierarchical architecture, which is modular and easy to scale. We also investigate a curriculum transfer learning approach that trains the agent from the simplest opponent to harder ones. On a 64×64 map and using restrictive units, we train the agent on a single machine with 4 GPUs and 48 CPU threads. We achieve a winning rate of more than 99% against the difficulty level-1 built-in AI. Through the curriculum transfer learning algorithm and a mixture of combat model, we can achieve over 93% winning rate against the most difficult non-cheating built-in AI (level-7) within days. We hope this study could shed some light on the future research of large-scale reinforcement learning.", "title": "" }, { "docid": "8bc6a3333631d590983d9adb226eaf2a", "text": "Of late, there has been a renewed and reinvigorated exchange of ideas across science and technology studies and participatory design, emerging from a shared interest in ‘publics’. In this article, we explore the role of participatory design in constituting publics, drawing together recent scholarship in both science and technology studies and participatory design. To frame our discussion, we present two case studies of community-based participatory design as empirical examples. From these examples and the literature, we discuss the ways in which the concepts of infrastructuring and attachments are central to the constitution of publics. Finally, through an analysis of our case studies, we consider the differences between the practices of enabling participation and infrastructuring, calling attention to the ways that constituting publics foregrounds an engagement with authority structures and unknown futures through the participatory design process.", "title": "" }, { "docid": "1858df61cf8cd4f81371cb15df1dc1a1", "text": "This paper presents the design, fabrication, and characterization of a multimodal sensor with integrated stretchable meandered interconnects for uniaxial strain, pressure, and uniaxial shear stress measurements. It is designed based on a capacitive sensing principle for embedded deformable sensing applications. A photolithographic process is used along with laser machining and sheet metal forming technique to pattern sensor elements together with stretchable grid-based interconnects on a thin sheet of copper polyimide laminate as a base material in a single process. The structure is embedded in a soft stretchable Ecoflex and PDMS silicon rubber encapsulation. The strain, pressure, and shear stress sensors are characterized up to 9%, 25 kPa, and ±11 kPa of maximum loading, respectively. The strain sensor exhibits an almost linear response to stretching with an average sensitivity of −28.9 fF%−1. The pressure sensor, however, shows a nonlinear and significant hysteresis characteristic due to nonlinear and viscoelastic property of the silicon rubber encapsulation. An average best-fit straight line sensitivity of 30.9 fFkPa−1 was recorded. The sensitivity of shear stress sensor is found to be 8.1 fFkPa−1. The three sensing elements also demonstrate a good cross-sensitivity performance of 3.1% on average. This paper proves that a common flexible printed circuit board (PCB) base material could be transformed into stretchable circuits with integrated multimodal sensor using established PCB fabrication technique, laser machining, and sheet metal forming method.", "title": "" }, { "docid": "80f88101ea4d095a0919e64b7db9cadb", "text": "The objective of this work is object retrieval in large scale image datasets, where the object is specified by an image query and retrieval should be immediate at run time in the manner of Video Google [28]. We make the following three contributions: (i) a new method to compare SIFT descriptors (RootSIFT) which yields superior performance without increasing processing or storage requirements; (ii) a novel method for query expansion where a richer model for the query is learnt discriminatively in a form suited to immediate retrieval through efficient use of the inverted index; (iii) an improvement of the image augmentation method proposed by Turcot and Lowe [29], where only the augmenting features which are spatially consistent with the augmented image are kept. We evaluate these three methods over a number of standard benchmark datasets (Oxford Buildings 5k and 105k, and Paris 6k) and demonstrate substantial improvements in retrieval performance whilst maintaining immediate retrieval speeds. Combining these complementary methods achieves a new state-of-the-art performance on these datasets.", "title": "" }, { "docid": "f407ea856f2d00dca1868373e1bd9e2f", "text": "Software industry is heading towards centralized computin g. Due to this trend data and programs are being taken away from traditional desktop PCs and placed in compute clouds instead. Compute clouds are enormous server farms packed with computing power and storage space accessible through the Internet. Instead of having to manage one’s own infrastructure to run applications, server time and storage space can can be bought from an external service provider. From the customers’ point of view the benefit behind this idea is to be able to dynamically adjust computing power up or down to meet the demand for that power at a particular moment. This kind of flexibility not only ensures that no costs are incurred by excess processing capacity, but also enables hard ware infrastructure to scale up with business growth. Because of growing interest in taking advantage of cloud computing a number of service providers are working on providing cloud services. As stated in [7], Amazon, Salerforce.co m and Google are examples of firms that already have working solutions on the market. Recently also Microsoft released a preview version of its cloud platform called the Azure. Earl y adopters can test the platform and development tools free of charge.[2, 3, 4] The main purpose of this paper is to shed light on the internals of Microsoft’s Azure platform. In addition to examinin g how Azure platform works, the benefits of Azure platform are explored. The most important benefit in Microsoft’s solu tion is that it resembles existing Windows environment a lot . Developers can use the same application programming interfaces (APIs) and development tools they are already used to. The second benefit is that migrating applications to cloud is easy. This partially stems from the fact that Azure’s servic es can be exploited by an application whether it is run locally or in the cloud.", "title": "" }, { "docid": "ee23ef5c3f266008e0d5eeca3bbc6e97", "text": "We use variation at a set of eight human Y chromosome microsatellite loci to investigate the demographic history of the Y chromosome. Instead of assuming a population of constant size, as in most of the previous work on the Y chromosome, we consider a model which permits a period of recent population growth. We show that for most of the populations in our sample this model fits the data far better than a model with no growth. We estimate the demographic parameters of this model for each population and also the time to the most recent common ancestor. Since there is some uncertainty about the details of the microsatellite mutation process, we consider several plausible mutation schemes and estimate the variance in mutation size simultaneously with the demographic parameters of interest. Our finding of a recent common ancestor (probably in the last 120,000 years), coupled with a strong signal of demographic expansion in all populations, suggests either a recent human expansion from a small ancestral population, or natural selection acting on the Y chromosome.", "title": "" } ]
scidocsrr
69884d7e1fc848e3b91973ebd2e45e0e
Reputation and Feedback Systems in Online Platform Markets ∗
[ { "docid": "beb365aacc5f66eea05d8aaebf97f275", "text": "In this paper, we study the effects of three different kinds of search engine rankings on consumer behavior and search engine revenues: direct ranking effect, interaction effect between ranking and product ratings, and personalized ranking effect. We combine a hierarchical Bayesian model estimated on approximately one million online sessions from Travelocity, together with randomized experiments using a real-world hotel search engine application. Our archival data analysis and randomized experiments are consistent in demonstrating the following: (1) a consumer utility-based ranking mechanism can lead to a significant increase in overall search engine revenue. (2) Significant interplay occurs between search engine ranking and product ratings. An inferior position on the search engine affects “higher-class” hotels more adversely. On the other hand, hotels with a lower customer rating are more likely to benefit from being placed on the top of the screen. These findings illustrate that product search engines could benefit from directly incorporating signals from social media into their ranking algorithms. (3) Our randomized experiments also reveal that an “active” (wherein users can interact with and customize the ranking algorithm) personalized ranking system leads to higher clicks but lower purchase propensities and lower search engine revenue compared to a “passive” (wherein users cannot interact with the ranking algorithm) personalized ranking system. This result suggests that providing more information during the decision-making process may lead to fewer consumer purchases because of information overload. Therefore, product search engines should not adopt personalized ranking systems by default. Overall, our study unravels the economic impact of ranking and its interaction with social media on product search engines.", "title": "" } ]
[ { "docid": "97a13a2a11db1b67230ab1047a43e1d6", "text": "Road detection from the perspective of moving vehicles is a challenging issue in autonomous driving. Recently, many deep learning methods spring up for this task, because they can extract high-level local features to find road regions from raw RGB data, such as convolutional neural networks and fully convolutional networks (FCNs). However, how to detect the boundary of road accurately is still an intractable problem. In this paper, we propose siamesed FCNs (named “s-FCN-loc”), which is able to consider RGB-channel images, semantic contours, and location priors simultaneously to segment the road region elaborately. To be specific, the s-FCN-loc has two streams to process the original RGB images and contour maps, respectively. At the same time, the location prior is directly appended to the siamesed FCN to promote the final detection performance. Our contributions are threefold: 1) An s-FCN-loc is proposed that learns more discriminative features of road boundaries than the original FCN to detect more accurate road regions. 2) Location prior is viewed as a type of feature map and directly appended to the final feature map in s-FCN-loc to promote the detection performance effectively, which is easier than other traditional methods, namely, different priors for different inputs (image patches). 3) The convergent speed of training s-FCN-loc model is 30% faster than the original FCN because of the guidance of highly structured contours. The proposed approach is evaluated on the KITTI road detection benchmark and one-class road detection data set, and achieves a competitive result with the state of the arts.", "title": "" }, { "docid": "28e95294b3a17feead850f3d52a97a81", "text": "The conversion of chalcogen atoms to other types in transition metal dichalcogenides has significant advantages for tuning bandgaps and constructing in-plane heterojunctions; however, difficulty arises from the conversion of sulfur or selenium to tellurium atoms owing to the low decomposition temperature of tellurides. Here, we propose the use of sodium for converting monolayer molybdenum disulfide (MoS2) to molybdenum ditelluride (MoTe2) under Te-rich vapors. Sodium easily anchors tellurium and reduces the exchange barrier energy by scooting the tellurium to replace sulfur. The conversion was initiated at the edges and grain boundaries of MoS2, followed by complete conversion in the entire region. By controlling sodium concentration and reaction temperature of monolayer MoS2, we tailored various phases such as semiconducting 2H-MoTe2, metallic 1T′-MoTe2, and 2H-MoS2−x Te x alloys. This concept was further extended to WS2. A high valley polarization of ~37% in circularly polarized photoluminescence was obtained in the monolayer WS2−x Te x alloy at room temperature. Two dimensional monolayer transition metal ditellurides and their alloys are interesting but their growth has been difficult. Herein, Yun et al. demonstrate the use of sodium salts to convert transition metal disulfide to ditelluride and alloys in tellurium vapor at low temperature.", "title": "" }, { "docid": "a02cd3bccf9c318f0c7a01fa84bc0f8e", "text": "In the last several years, differential privacy has become the leading framework for private data analysis. It provides bounds on the amount that a randomized function can change as the result of a modification to one record of a database. This requirement can be satisfied by using the exponential mechanism to perform a weighted choice among the possible alternatives, with better options receiving higher weights. However, in some situations the number of possible outcomes is too large to compute all weights efficiently. We present the subsampled exponential mechanism, which scores only a sample of the outcomes. We show that it still preserves differential privacy, and fulfills a similar accuracy bound. Using a clustering application, we show that the subsampled exponential mechanism outperforms a previously published private algorithm and is comparable to the full exponential mechanism but more scalable.", "title": "" }, { "docid": "4f84d3a504cf7b004a414346bb19fa94", "text": "Abstract—The electric power supplied by a photovoltaic power generation systems depends on the solar irradiation and temperature. The PV system can supply the maximum power to the load at a particular operating point which is generally called as maximum power point (MPP), at which the entire PV system operates with maximum efficiency and produces its maximum power. Hence, a Maximum power point tracking (MPPT) methods are used to maximize the PV array output power by tracking continuously the maximum power point. The proposed MPPT controller is designed for 10kW solar PV system installed at Cape Institute of Technology. This paper presents the fuzzy logic based MPPT algorithm. However, instead of one type of membership function, different structures of fuzzy membership functions are used in the FLC design. The proposed controller is combined with the system and the results are obtained for each membership functions in Matlab/Simulink environment. Simulation results are decided that which membership function is more suitable for this system.", "title": "" }, { "docid": "532fa89af9499db8d4c50abcb17b633a", "text": "Our languages are in constant flux driven by external factors such as cultural, societal and technological changes, as well as by only partially understood internal motivations. Words acquire new meanings and lose old senses, new words are coined or borrowed from other languages and obsolete words slide into obscurity. Understanding the characteristics of shifts in the meaning and in the use of words is useful for those who work with the content of historical texts, the interested general public, but also in and of itself. The findings from automatic lexical semantic change detection, and the models of diachronic conceptual change are currently being incorporated in approaches for measuring document across-time similarity, information retrieval from long-term document archives, the design of OCR algorithms, and so on. In recent years we have seen a surge in interest in the academic community in computational methods and tools supporting inquiry into diachronic conceptual change and lexical replacement. This article is an extract of a survey of recent computational techniques to tackle lexical semantic change currently under review. In this article we focus on diachronic conceptual change as an extension of semantic change.", "title": "" }, { "docid": "8ef4c3c34579c7df96bb56527381d4a7", "text": "|A simple cascode circuit with the gate voltage of the cascode transistor being controlled by a feedback ampli er and thus named `regulated cascode' is presented. In comparison to the standard cascode circuit the minimum output voltage is lower by about 30 to 60% while the output conductance and the feedback capacitance are lower by about 100 times. An analytical large-signal, small-signal, and noise analysis is carried out. Some applications like current mirrors and voltage ampli ers are discussed. Finally, experimental results con rming the theory are presented.", "title": "" }, { "docid": "77e30fedf56545ba22ae9f1ef17b4dc9", "text": "Most of current self-checkout systems rely on barcodes, RFID tags, or QR codes attached on items to distinguish products. This paper proposes an Intelligent Self-Checkout System (ISCOS) embedded with a single camera to detect multiple products without any labels in real-time performance. In addition, deep learning skill is applied to implement product detection, and data mining techniques construct the image database employed as training dataset. Product information gathered from a number of markets in Taiwan is utilized to make recommendation to customers. The bounding boxes are annotated by background subtraction with a fixed camera to avoid time-consuming process for each image. The contribution of this work is to combine deep learning and data mining approaches to real-time multi-object detection in image-based checkout system.", "title": "" }, { "docid": "a5f9b7b7b25ccc397acde105c39c3d9d", "text": "Processors with multiple cores and complex cache coherence protocols are widely employed to improve the overall performance. It is a major challenge to verify the correctness of a cache coherence protocol since the number of reachable states grows exponentially with the number of cores. In this paper, we propose an efficient test generation technique, which can be used to achieve full state and transition coverage in simulation based verification for a wide variety of cache coherence protocols. Based on effective analysis of the state space structure, our method can generate more efficient test sequences (50% shorter) compared with tests generated by breadth first search. Moreover, our proposed approach can generate tests on-the-fly due to its space efficient design.", "title": "" }, { "docid": "a42d28704b73666bc6326bf9cc700ff8", "text": "This paper presents initial progress toward a precision shell integrating (PSI) gyroscope designed for high Coriolis force sensitivity and high shock and vibration tolerance. We demonstrate control over the stiffness and mass distribution of a 3D hemispherical shell resonator formed with blowtorch reflow molding of fused silica (FS). The thickness profile of the resonator is designed to reduce the frequency of the n = 2 wine-glass (WG) modes and to maximize the parasitic mode frequencies, which increases shock and vibration tolerance. We simulate the dynamic reflow process with a non-isothermal finite element model, allowing us to design a substrate pattern that will reflow into the desired geometry. The PSI resonator is simulated to have a larger effective mass (Meff) than other MEMS gyroscope resonator designs.", "title": "" }, { "docid": "203312195c3df688a594d0c05be72b5a", "text": "Convolutional Neural Networks (CNNs) have been recently introduced in the domain of session-based next item recommendation. An ordered collection of past items the user has interacted with in a session (or sequence) are embedded into a 2-dimensional latent matrix, and treated as an image. The convolution and pooling operations are then applied to the mapped item embeddings. In this paper, we first examine the typical session-based CNN recommender and show that both the generative model and network architecture are suboptimal when modeling long-range dependencies in the item sequence. To address the issues, we introduce a simple, but very effective generative model that is capable of learning high-level representation from both short- and long-range item dependencies. The network architecture of the proposed model is formed of a stack of holed convolutional layers, which can efficiently increase the receptive fields without relying on the pooling operation. Another contribution is the effective use of residual block structure in recommender systems, which can ease the optimization for much deeper networks. The proposed generative model attains state-of-the-art accuracy with less training time in the next item recommendation task. It accordingly can be used as a powerful recommendation baseline to beat in future, especially when there are long sequences of user feedback.", "title": "" }, { "docid": "de887adb8d3383ffa1ed4aa033e0bd4a", "text": "An offline recognition system for Arabic handwritten words is presented. The recognition system is based on a semi-continuous 1-dimensional HMM. From each binary word image normalization parameters were estimated. First height, length, and baseline skew are normalized, then features are collected using a sliding window approach. This paper presents these methods in more detail. Some parameters were modified and the consequent effect on the recognition results are discussed. Significant tests were performed using the new IFN/ENIT database of handwritten Arabic words. The comprehensive database consists of 26459 Arabic words (Tunisian town/village names) handwritten by 411 different writers and is free for non-commercial research. In the performed tests we achieved maximal recognition rates of about 89% on a word level.", "title": "" }, { "docid": "f6d9efb7cfee553bc02a5303a86fd626", "text": "OBJECTIVE\nTo perform a cross-cultural adaptation of the Portuguese version of the Maslach Burnout Inventory for students (MBI-SS), and investigate its reliability, validity and cross-cultural invariance.\n\n\nMETHODS\nThe face validity involved the participation of a multidisciplinary team. Content validity was performed. The Portuguese version was completed in 2009, on the internet, by 958 Brazilian and 556 Portuguese university students from the urban area. Confirmatory factor analysis was carried out using as fit indices: the χ²/df, the Comparative Fit Index (CFI), the Goodness of Fit Index (GFI) and the Root Mean Square Error of Approximation (RMSEA). To verify the stability of the factor solution according to the original English version, cross-validation was performed in 2/3 of the total sample and replicated in the remaining 1/3. Convergent validity was estimated by the average variance extracted and composite reliability. The discriminant validity was assessed, and the internal consistency was estimated by the Cronbach's alpha coefficient. Concurrent validity was estimated by the correlational analysis of the mean scores of the Portuguese version and the Copenhagen Burnout Inventory, and the divergent validity was compared to the Beck Depression Inventory. The invariance of the model between the Brazilian and the Portuguese samples was assessed.\n\n\nRESULTS\nThe three-factor model of Exhaustion, Disengagement and Efficacy showed good fit (c 2/df = 8.498, CFI = 0.916, GFI = 0.902, RMSEA = 0.086). The factor structure was stable (λ:χ²dif = 11.383, p = 0.50; Cov: χ²dif = 6.479, p = 0.372; Residues: χ²dif = 21.514, p = 0.121). Adequate convergent validity (VEM = 0.45;0.64, CC = 0.82;0.88), discriminant (ρ² = 0.06;0.33) and internal consistency (α = 0.83;0.88) were observed. The concurrent validity of the Portuguese version with the Copenhagen Inventory was adequate (r = 0.21, 0.74). The assessment of the divergent validity was impaired by the approach of the theoretical concept of the dimensions Exhaustion and Disengagement of the Portuguese version with the Beck Depression Inventory. Invariance of the instrument between the Brazilian and Portuguese samples was not observed (λ:χ²dif = 84.768, p<0.001; Cov: χ²dif = 129.206, p < 0.001; Residues: χ²dif = 518.760, p < 0.001).\n\n\nCONCLUSIONS\nThe Portuguese version of the Maslach Burnout Inventory for students showed adequate reliability and validity, but its factor structure was not invariant between the countries, indicating the absence of cross-cultural stability.", "title": "" }, { "docid": "7c7bec32e3949f3a6c0e1109cacd80f5", "text": "Attackers can render distributed denial-of-service attacks more difficult to defend against by bouncing their flooding traffic off of reflectors; that is, by spoofing requests from the victim to a large set of Internet servers that will in turn send their combined replies to the victim. The resulting dilution of locality in the flooding stream complicates the victim's abilities both to isolate the attack traffic in order to block it, and to use traceback techniques for locating the source of streams of packets with spoofed source addresses, such as ITRACE [Be00a], probabilistic packet marking [SWKA00], [SP01], and SPIE [S+01]. We discuss a number of possible defenses against reflector attacks, finding that most prove impractical, and then assess the degree to which different forms of reflector traffic will have characteristic signatures that the victim can use to identify and filter out the attack traffic. Our analysis indicates that three types of reflectors pose particularly significant threats: DNS and Gnutella servers, and TCP-based servers (particularly Web servers) running on TCP implementations that suffer from predictable initial sequence numbers. We argue in conclusion in support of \"reverse ITRACE\" [Ba00] and for the utility of packet traceback techniques that work even for low volume flows, such as SPIE.", "title": "" }, { "docid": "a94278bafc093c37bcba719a4b6a03fa", "text": "Community detection and analysis is an important methodology for understanding the organization of various real-world networks and has applications in problems as diverse as consensus formation in social communities or the identification of functional modules in biochemical networks. Currently used algorithms that identify the community structures in large-scale real-world networks require a priori information such as the number and sizes of communities or are computationally expensive. In this paper we investigate a simple label propagation algorithm that uses the network structure alone as its guide and requires neither optimization of a predefined objective function nor prior information about the communities. In our algorithm every node is initialized with a unique label and at every step each node adopts the label that most of its neighbors currently have. In this iterative process densely connected groups of nodes form a consensus on a unique label to form communities. We validate the algorithm by applying it to networks whose community structures are known. We also demonstrate that the algorithm takes an almost linear time and hence it is computationally less expensive than what was possible so far.", "title": "" }, { "docid": "d03d831ceddf508d58298a45c9373ccd", "text": "Recent BIO-tagging-based neural semantic role labeling models are very high performing, but assume gold predicates as part of the input and cannot incorporate span-level features. We propose an endto-end approach for jointly predicting all predicates, arguments spans, and the relations between them. The model makes independent decisions about what relationship, if any, holds between every possible word-span pair, and learns contextualized span representations that provide rich, shared input features for each decision. Experiments demonstrate that this approach sets a new state of the art on PropBank SRL without gold predicates.1", "title": "" }, { "docid": "8f21e1acc47777bd9d3663fa00a419b3", "text": "We derive new models for gravity driven shallow water flows in several space dimensions over a general topography. A first model is valid for small slope variation, i.e. small curvature, and a second model is valid for arbitrary topography. In both cases no particular assumption is made on the velocity profile in the material layer. The models are written for an arbitrary coordinate system, and several formulations are provided. A Coulomb friction term is derived within the same framework, relevant in particular for debris avalanches. All our models are invariant under rotation, admit a conservative energy equation, and preserve the steady state of a lake at rest.", "title": "" }, { "docid": "272be5fede7ede10ebfd368cabcd437b", "text": "Penetration testing is widely used to help ensure the security of web applications. Using penetration testing, testers discover vulnerabilities by simulating attacks on a target web application. To do this efficiently, testers rely on automated techniques that gather input vector information about the target web application and analyze the application’s responses to determine whether an attack was successful. Techniques for performing these steps are often incomplete, which can leave parts of the web application untested and vulnerabilities undiscovered. This paper proposes a new approach to penetration testing that addresses the limitations of current techniques. The approach incorporates two recently developed analysis techniques to improve input vector identification and detect when attacks have been successful against a web application. This paper compares the proposed approach against two popular penetration testing tools for a suite of web applications with known and unknown vulnerabilities. The evaluation results show that the proposed approach performs a more thorough penetration testing and leads to the discovery of more vulnerabilities than both the tools. Copyright q 2011 John Wiley & Sons, Ltd.", "title": "" }, { "docid": "3195dba1cdaa8758c2260ef2ffc18679", "text": "Modern enterprises increasingly use the work ow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a system that constructs process models from logs of past, unstructured executions of the given process. The graph so produced conforms to the dependencies and past executions present in the log. By providing models that capture the previous executions of the process, this technique allows easier introduction of a work ow system and evaluation and evolution of existing process models. We also present results from applying the algorithm to synthetic data sets as well as process logs obtained from an IBM Flowmark installation.", "title": "" }, { "docid": "efe26df9a65af9262071efaac12f24d6", "text": "OBJECTIVES\nViral bronchiolitis is an acute infection and inflammatory disease of the respiratory tract, with infants typically presenting with the most severe symptoms. Medical management of bronchiolitis is mostly supportive. Several preliminary studies suggest potential benefit from the use of high-flow nasal cannula systems. Although high-flow nasal cannula is a well-established modality in the newborn intensive care unit, its use in the pediatric intensive care unit for acute respiratory failure is far less established. The objective of this study was to identify any laboratory and clinical variables that may predict high-flow nasal cannula failure in management of bronchiolitis in the pediatric intensive care unit.\n\n\nDESIGN\nThe study design was a retrospective chart review of all patients admitted to the pediatric intensive care unit from 2006 to 2010 with a diagnosis of viral bronchiolitis. Inclusion criteria included the initiation of high flow nasal cannula therapy at the time of admission and age ≤ 12 months. Exclusion criteria were intubation prior to admission, age >12 months, and the presence of a tracheostomy.\n\n\nPATIENTS\nA total of 113 patients with viral bronchiolitis met the inclusion criteria.\n\n\nSETTING\nAcademic free standing Children's Hospital in the Midwest.\n\n\nINTERVENTIONS\nRetrospective chart review.\n\n\nMEASUREMENTS AND MAIN RESULTS\nThe data were analyzed by comparing those patients who responded to high-flow nasal cannula (n = 92) with those who were nonresponders to high-flow nasal cannula and required intubation (n = 21). No differences were noted between the groups for age, sex, or ethnicity. Mean weight and weight-for-corrected-age percentiles were significantly lower for patients who failed high-flow nasal cannula (p = .016 and .031, respectively), but weight-for-corrected-age percentile was not significant in logistic regression controlling for other variables. Respiratory rate prior to the initiation of high-flow nasal cannula also correlated strongly with respiratory deterioration (p < .001). The PCO2 was significantly higher for both before (p < .001) and after (p < .001) initiation of therapy in the nonresponder group. Pediatric Risk of Mortality III scores for the patients who failed high-flow nasal cannula were significantly higher (p < .001) than those of patients who tolerated this therapy.\n\n\nCONCLUSIONS\nHistory of prematurity and the patient's age did not increase a patient's risk of failure. Nonresponders to high-flow nasal cannula therapy were on the onset, more hypercarbic, were less tachypnic prior to the start of high-flow nasal cannula, and had no change in their respiratory rate after the initiation of high-flow nasal cannula therapy. Nonresponders had higher pediatric risk of mortality scores in the first 24 hrs.", "title": "" }, { "docid": "1eb292b564276c43b203e02219c0de21", "text": "The “cvpaper.challenge” is a group composed of members from AIST, Tokyo Denki Univ. (TDU), and Univ. of Tsukuba that aims to systematically summarize papers on computer vision, pattern recognition, and related fields. For this particular review, we focused on reading the ALL 602 conference papers presented at the CVPR2015, the premier annual computer vision event held in June 2015, in order to grasp the trends in the field. Further, we are proposing “DeepSurvey” as a mechanism embodying the entire process from the reading through all the papers, the generation of ideas, and to the writing of paper.", "title": "" } ]
scidocsrr
922e845200c812105fdf9a69ba1fd54b
Toward Explainable Fashion Recommendation
[ { "docid": "6a1e614288a7977b72c8037d9d7725fb", "text": "We introduce the dense captioning task, which requires a computer vision system to both localize and describe salient regions in images in natural language. The dense captioning task generalizes object detection when the descriptions consist of a single word, and Image Captioning when one predicted region covers the full image. To address the localization and description task jointly we propose a Fully Convolutional Localization Network (FCLN) architecture that processes an image with a single, efficient forward pass, requires no external regions proposals, and can be trained end-to-end with a single round of optimization. The architecture is composed of a Convolutional Network, a novel dense localization layer, and Recurrent Neural Network language model that generates the label sequences. We evaluate our network on the Visual Genome dataset, which comprises 94,000 images and 4,100,000 region-grounded captions. We observe both speed and accuracy improvements over baselines based on current state of the art approaches in both generation and retrieval settings.", "title": "" } ]
[ { "docid": "6daa93f2a7cfaaa047ecdc04fb802479", "text": "Facial landmark localization is important to many facial recognition and analysis tasks, such as face attributes analysis, head pose estimation, 3D face modelling, and facial expression analysis. In this paper, we propose a new approach to localizing landmarks in facial image by deep convolutional neural network (DCNN). We make two enhancements on the CNN to adapt it to the feature localization task as follows. Firstly, we replace the commonly used max pooling by depth-wise convolution to obtain better localization performance. Secondly, we define a response map for each facial points as a 2D probability map indicating the presence likelihood, and train our model with a KL divergence loss. To obtain robust localization results, our approach first takes the expectations of the response maps of Enhanced CNN and then applies auto-encoder model to the global shape vector, which is effective to rectify the outlier points by the prior global landmark configurations. The proposed ECNN method achieves 5.32% mean error on the experiments on the 300-W dataset, which is comparable to the state-of-the-art performance on this standard benchmark, showing the effectiveness of our methods.", "title": "" }, { "docid": "8fc89fce21bd4f8dced2265b9a8cdfe7", "text": "With the rapid development of 3GPP and its related techniques, evaluation of system level performance is in great need. However, LTE system level simulator is secured as commercial secrets in most 3GPP members. In this paper, we introduce our Matlab-based LTE system level simulator according to 3GPP specifications and related proposals. We mainly focus on channel model and physical abstract of transmission. Brief introduction of every part is given and physical concept and analysis are given.", "title": "" }, { "docid": "f3b4a9b49a34d56c32589cee14e6b900", "text": "The paper reports on mobile robot motion estimation based on matching points from successive two-dimensional (2D) laser scans. This ego-motion approach is well suited to unstructured and dynamic environments because it directly uses raw laser points rather than extracted features. We have analyzed the application of two methods that are very different in essence: (i) A 2D version of iterative closest point (ICP), which is widely used for surface registration; (ii) a genetic algorithm (GA), which is a novel approach for this kind of problem. Their performance in terms of real-time applicability and accuracy has been compared in outdoor experiments with nonstop motion under diverse realistic navigation conditions. Based on this analysis, we propose a hybrid GA-ICP algorithm that combines the best characteristics of these pure methods. The experiments have been carried out with the tracked mobile robot Auriga-alpha and an on-board 2D laser scanner. _____________________________________________________________________________________ This document is a PREPRINT. The published version of the article is available in: Journal of Field Robotics, 23: 21–34. doi: 10.1002/rob.20104; http://dx.doi.org/10.1002/rob.20104.", "title": "" }, { "docid": "f4c66ff0852b3ad640655e945f5639d9", "text": "The emergence of a feature-analyzing function from the development rules of simple, multilayered networks is explored. It is shown that even a single developing cell of a layered network exhibits a remarkable set of optimization properties that are closely related to issues in statistics, theoretical physics, adaptive signal processing, the formation of knowledge representation in artificial intelligence, and information theory. The network studied is based on the visual system. These results are used to infer an information-theoretic principle that can be applied to the network as a whole, rather than a single cell. The organizing principle proposed is that the network connections develop in such a way as to maximize the amount of information that is preserved when signals are transformed at each processing stage, subject to certain constraints. The operation of this principle is illustrated for some simple cases.<<ETX>>", "title": "" }, { "docid": "483ab105bfe99c867690891f61bb0336", "text": "In this paper we propose a robust object tracking algorithm using a collaborative model. As the main challenge for object tracking is to account for drastic appearance change, we propose a robust appearance model that exploits both holistic templates and local representations. We develop a sparsity-based discriminative classifier (SD-C) and a sparsity-based generative model (SGM). In the S-DC module, we introduce an effective method to compute the confidence value that assigns more weights to the foreground than the background. In the SGM module, we propose a novel histogram-based method that takes the spatial information of each patch into consideration with an occlusion handing scheme. Furthermore, the update scheme considers both the latest observations and the original template, thereby enabling the tracker to deal with appearance change effectively and alleviate the drift problem. Numerous experiments on various challenging videos demonstrate that the proposed tracker performs favorably against several state-of-the-art algorithms.", "title": "" }, { "docid": "84d15547f970f77ac033a9e5ecfc0195", "text": "Mobility data has increasingly grown in volume over the past decade as localisation technologies for capturing mobility flows have become ubiquitous. Novel analytical approaches for understanding and structuring mobility data are now required to support the backend of a new generation of space-time GIS systems. It is increasingly important as GIS is becoming a decision support platform for operations in fleet management, urban data analysis and related applications. This paper applies the machine learning method of probabilistic topic modelling for semantic enrichment of mobility data recorded in terms of trip counts by using geo-referenced social media data. It further explores the questions of causality and correlation, as well as predictability of the obtained semantic decompositions of mobility flows on a real dataset from a bike sharing network.", "title": "" }, { "docid": "4ce8934f295235acc2bbf03c7530842b", "text": "— Speech recognition has found its application on various aspects of our daily lives from automatic phone answering service to dictating text and issuing voice commands to computers. In this paper, we present the historical background and technological advances in speech recognition technology over the past few decades. More importantly, we present the steps involved in the design of a speaker-independent speech recognition system. We focus mainly on the pre-processing stage that extracts salient features of a speech signal and a technique called Dynamic Time Warping commonly used to compare the feature vectors of speech signals. These techniques are applied for recognition of isolated as well as connected words spoken. We conduct experiments on MATLAB to verify these techniques. Finally, we design a simple 'Voice-to-Text' converter application using MATLAB.", "title": "" }, { "docid": "f3ceb30407d037f7357b6c745fc7fa69", "text": "An antenna array with 3 transmit antennas and 4 receive antennas for the 77 GHz automotive radar is presented. Each antenna is a planar series-fed linear array. The Dolph-Chebyshev distribution is used to taper patch width for radiation pattern synthesis. The planar array is designed, fabricated, and its performance evaluated. Simulation results show that a 16-element series-fed microstrip linear array can achieve the sidelobe level (SLL) of −16.8 dB with half power beamwidth (HPBW) of 5.8°. The simulated and measured results show that a linear array in the planar array can realize the SLL of −15.5 dB with HPBW of 6.0° in simulation and the SLL of −10.5 dB with HPBW of 6.5° in measurement, respectively. And measured antenna gain is not less than 15.0 dBi.", "title": "" }, { "docid": "9c995d980b0b38c7a6cfb2ac56c27b58", "text": "To solve the problems of heterogeneous data types and large amount of calculation in making decision for big data, an optimized distributed OLAP system for big data is proposed in this paper. The system provides data acquisition for different data sources, and supports two types of OLAP engines, Impala and Kylin. First of all, the architecture of the system is proposed, consisting of four modules, data acquisition, data storage, OLAP analysis and data visualization, and the specific implementation of each module is descripted in great detail. Then the optimization of the system is put forward, which is automatic metadata configuration and the cache for OLAP query. Finally, the performance test of the system is conduct to demonstrate that the efficiency of the system is significantly better than the traditional solution.", "title": "" }, { "docid": "aaf1aac789547c1bf2f918368b43c955", "text": "Music is full of structure, including sections, sequences of distinct musical textures, and the repetition of phrases or entire sections. The analysis of music audio relies upon feature vectors that convey information about music texture or pitch content. Texture generally refers to the average spectral shape and statistical fluctuation, often reflecting the set of sounding instruments, e.g. strings, vocal, or drums. Pitch content reflects melody and harmony, which is often independent of texture. Structure is found in several ways. Segment boundaries can be detected by observing marked changes in locally averaged texture. Similar sections of music can be detected by clustering segments with similar average textures. The repetition of a sequence of music often marks a logical segment. Repeated phrases and hierarchical structures can be discovered by finding similar sequences of feature vectors within a piece of music. Structure analysis can be used to construct music summaries and to assist music browsing. Introduction Probably everyone would agree that music has structure, but most of the interesting musical information that we perceive lies hidden below the complex surface of the audio signal. From this signal, human listeners perceive vocal and instrumental lines, orchestration, rhythm, harmony, bass lines, and other features. Unfortunately, music audio signals have resisted our attempts to extract this kind of information. Researchers are making progress, but so far, computers have not come near to human levels of performance in detecting notes, processing rhythms, or identifying instruments in a typical (polyphonic) music audio texture. On a longer time scale, listeners can hear structure including the chorus and verse in songs, sections in other types of music, repetition, and other patterns. One might think that without the reliable detection and identification of short-term features such as notes and their sources, that it would be impossible to deduce any information whatsoever about even higher levels of abstraction. Surprisingly, it is possible to automatically detect a great deal of information concerning music structure. For example, it is possible to label the structure of a song as AABA, meaning that opening material (the “A” part) is repeated once, then contrasting material (the “B” part) is played, and then the opening material is played again at the end. This structural description may be deduced from low-level audio signals. Consequently, a computer might locate the “chorus” of a song without having any representation of the melody or rhythm that characterizes the chorus. Underlying almost all work in this area is the concept that structure is induced by the repetition of similar material. This is in contrast to, say, speech recognition, where there is a common understanding of words, their structure, and their meaning. A string of unique words can be understood using prior knowledge of the language. Music, however, has no language or dictionary (although there are certainly known forms and conventions). In general, structure can only arise in music through repetition or systematic transformations of some kind. Repetition implies there is some notion of similarity. Similarity can exist between two points in time (or at least two very short time intervals), similarity can exist between two sequences over longer time intervals, and similarity can exist between the longer-term statistical behaviors of acoustical features. Different approaches to similarity will be described. Similarity can be used to segment music: contiguous regions of similar music can be grouped together into segments. Segments can then be grouped into clusters. The segmentation of a musical work and the grouping of these segments into clusters is a form of analysis or “explanation” of the music. R. Dannenberg and M. Goto Music Structure 16 April 2005 2 Features and Similarity Measures A variety of approaches are used to measure similarity, but it should be clear that a direct comparison of the waveform data or individual samples will not be useful. Large differences in waveforms can be imperceptible, so we need to derive features of waveform data that are more perceptually meaningful and compare these features with an appropriate measure of similarity. Feature Vectors for Spectrum, Texture, and Pitch Different features emphasize different aspects of the music. For example, mel-frequency cepstral coefficients (MFCCs) seem to work well when the general shape of the spectrum but not necessarily pitch information is important. MFCCs generally capture overall “texture” or timbral information (what instruments are playing in what general pitch range), but some pitch information is captured, and results depend upon the number of coefficients used as well as the underlying musical signal. When pitch is important, e.g. when searching for similar harmonic sequences, the chromagram is effective. The chromagram is based on the idea that tones separated by octaves have the same perceived value of chroma (Shepard 1964). Just as we can describe the chroma aspect of pitch, the short term frequency spectrum can be restructured into the chroma spectrum by combining energy at different octaves into just one octave. The chroma vector is a discretized version of the chroma spectrum where energy is summed into 12 log-spaced divisions of the octave corresponding to pitch classes (C, C#, D, ... B). By analogy to the spectrogram, the discrete chromagram is a sequence of chroma vectors. It should be noted that there are several variations of the chromagram. The computation typically begins with a short-term Fourier transform (STFT) which is used to compute the magnitude spectrum. There are different ways to “project” this onto the 12-element chroma vector. Each STFT bin can be mapped directly to the most appropriate chroma vector element (Bartsch and Wakefield 2001), or the STFT bin data can be interpolated or windowed to divide the bin value among two neighboring vector elements (Goto 2003a). Log magnitude values can be used to emphasize the presence of low-energy harmonics. Values can also be averaged, summed, or the vector can be computed to conserve the total energy. The chromagram can also be computed by using the Wavelet transform. Regardless of the exact details, the primary attraction of the chroma vector is that, by ignoring octaves, the vector is relatively insensitive to overall spectral energy distribution and thus to timbral variations. However, since fundamental frequencies and lower harmonics of tones feature prominently in the calculation of the chroma vector, it is quite sensitive to pitch class content, making it ideal for the detection of similar harmonic sequences in music. While MFCCs and chroma vectors can be calculated from a single short term Fourier transform, features can also be obtained from longer sequences of spectral frames. Tzanetakis and Cook (1999) use means and variances of a variety of features in a one second window. The features include the spectral centroid, spectral rolloff, spectral flux, and RMS energy. Peeters, La Burthe, and Rodet (2002) describe “dynamic” features, which model the variation of the short term spectrum over windows of about one second. In this approach, the audio signal is passed through a bank of Mel filters. The time-varying magnitudes of these filter outputs are each analyzed by a short term Fourier transform. The resulting set of features, the Fourier coefficients from each Mel filter output, is large, so a supervised learning scheme is used to find features that maximize the mutual information between feature values and hand-labeled music structures. Measures of Similarity Given a feature vector such as the MFCC or chroma vector, some measure of similarity is needed. One possibility is to compute the (dis)similarity using the Euclidean distance between feature vectors. Euclidean distance will be dependent upon feature magnitude, which is often a measure of the overall R. Dannenberg and M. Goto Music Structure 16 April 2005 3 music signal energy. To avoid giving more weight to the louder moments of music, feature vectors can be normalized, for example, to a mean of zero and a standard deviation of one or to a maximum element of one. Alternatively, similarity can be measured using the scalar (dot) product of the feature vectors. This measure will be larger when feature vectors have a similar direction. As with Euclidean distance, the scalar product will also vary as a function of the overall magnitude of the feature vectors. If the dot product is normalized by the feature vector magnitudes, the result is equal to the cosine of the angle between the vectors. If the feature vectors are first normalized to have a mean of zero, the cosine angle is equivalent to the correlation, another measure that has been used with success. Lu, Wang, and Zhang (Lu, Wang, and Zhang 2004) use a constant-Q transform (CQT), and found that CQT outperforms chroma and MFCC features using a cosine distance measure. They also introduce a “structure-based” distance measure that takes into account the harmonic structure of spectra to emphasize pitch similarity over timbral similarity, resulting in additional improvement in a music structure analysis task. Similarity can be calculated between individual feature vectors, as suggested above, but similarity can also be computed over a window of feature vectors. The measure suggested by Foote (1999) is vector correlation:", "title": "" }, { "docid": "c4bcdd191b4d04368f12c967b361a7e1", "text": "Inductive concept learning is the task of learning to assign cases to a discrete set of classes. In real-world applications of concept learning, there are many different types of cost involved. The majority of the machine learning literature ignores all types of cost (unless accuracy is interpreted as a type of cost measure). A few papers have investigated the cost of misclassification errors. Very few papers have examined the many other types of cost. In this paper, we attempt to create a taxonomy of the different types of cost that are involved in inductive concept learning. This taxonomy may help to organize the literature on cost-sensitive learning. We hope that it will inspire researchers to investigate all types of cost in inductive concept learning in more depth.", "title": "" }, { "docid": "9b6a16b84d4aadf582c16a8adb4e4830", "text": "This paper presents a new in-vehicle real-time vehicle detection strategy which hypothesizes the presence of vehicles in rectangular sub-regions based on the robust classification of features vectors result of a combination of multiple morphological vehicle features. One vector is extracted for each region of the image likely containing vehicles as a multidimensional likelihood measure with respect to a simplified vehicle model. A supervised training phase set the representative vectors of the classes vehicle and non-vehicle, so that the hypothesis is verified or not according to the Mahalanobis distance between the feature vector and the representative vectors. Excellent results have been obtained in several video sequences accurately detecting vehicles with very different aspect-ratio, color, size, etc, while minimizing the number of missing detections and false alarms.", "title": "" }, { "docid": "7a398cae0109297a19195691505b8caf", "text": "There is a growing interest in models that can learn from unlabelled speech paired with visual context. This setting is relevant for low-resource speech processing, robotics, and human language acquisition research. Here, we study how a visually grounded speech model, trained on images of scenes paired with spoken captions, captures aspects of semantics. We use an external image tagger to generate soft text labels from images, which serve as targets for a neural model that maps untranscribed speech to semantic keyword labels. We introduce a newly collected data set of human semantic relevance judgements and an associated task, semantic speech retrieval, where the goal is to search for spoken utterances that are semantically relevant to a given text query. Without seeing any text, the model trained on parallel speech and images achieves a precision of almost 60% on its top ten semantic retrievals. Compared to a supervised model trained on transcriptions, our model matches human judgements better by some measures, especially in retrieving non-verbatim semantic matches. We perform an extensive analysis of the model and its resulting representations.", "title": "" }, { "docid": "627f3b4ae9df80bdc0374d4fe375f40e", "text": "Though in the lowest level cuckoos exploit precisely this hypothesis that do. This by people who are relevantly similar others suggest the human moral. 1983 levine et al but evolutionary mechanism. No need for a quite generously supported by an idea that do. Individuals may be regulated by the, future nonetheless. It is that we can do not merely apparent case if there are less. 2005 oliner sorokin taylor et al. Oliner however a poet and wrong boehm tackles the motives. Studies have the willingness to others from probability of narrative.", "title": "" }, { "docid": "dadf787560900eb6e5d2846b3b32a9d2", "text": "Cognitive psychology works have shown that the cognitive representation of categories is based on a typicality notion: all objects of a category do not have the same representativeness, some are more characteristic or more typical than others, and better exemplify their category. Categories are then defined in terms of prototypes, i.e. in terms of their most typical elements. Furthermore, these works showed that an object is all the more typical of its category as it shares many features with the other members of the category and few features with the members of other categories. In this paper, we propose to profit from these principles in a machine learning framework: a formalization of the previous cognitive notions is presented, leading to a prototype building method that makes it possible to characterize data sets taking into account both common and discriminative features. Algorithms exploiting these prototypes to perform tasks such as classification or clustering are then presented. The formalization is based on the computation of typicality degrees that measure the representativeness of each data point. These typicality degrees are then exploited to define fuzzy prototypes: in adequacy with human-like description of categories, we consider a prototype as an intrinsically imprecise notion. The fuzzy logic framework makes it possible to model sets with unsharp boundaries or vague and approximate concepts, and appears most appropriate to model prototypes. We then exploit the computed typicality degrees and the built fuzzy prototypes to perform machine learning tasks such as classification and clustering. We present several algorithms, justifying in each case the chosen parameters. We illustrate the results obtained on several data sets corresponding both to crisp and fuzzy data.", "title": "" }, { "docid": "b06deb6b5b8a1729d1b386bed06789c4", "text": "Identifying regions of interest in an image has long been of great importance in a wide range of tasks, including place recognition. In this letter, we propose a novel attention mechanism with flexible context, which can be incorporated into existing feedforward network architecture to learn image representations for long-term place recognition. In particular, in order to focus on regions that contribute positively to place recognition, we introduce a multiscale context-flexible network to estimate the importance of each spatial region in the feature map. Our model is trained end-to-end for place recognition and can detect regions of interest of arbitrary shape. Extensive experiments have been conducted to verify the effectiveness of our approach and the results demonstrate that our model can achieve consistently better performance than the state of the art on standard benchmark datasets. Finally, we visualize the learned attention maps to generate insights into what attention the network has learned.", "title": "" }, { "docid": "f249ec3e8b6078e17eca58da48beebba", "text": "Sensor Fusion (Complementary and Kalman filters) and Moving Average filter are implemented on an Arduino microcontroller based data acquisition of rotation degree from Inertial Measurement Unit (IMU) sensor for stabilized platform application. Stable platform prototype is designed to have two degrees of freedom, roll and pitch rotation. Output data from gyro and accelerometer were combined to take the advantage of each sensor. Digital filter algorithm was embedded into microcontroller programming. This paper analyzes overshoot percentage, rise time, and data series smoothness of Sensor Fusion (Complementary and Kalman filter) and Moving Average filter response in IMU data acquisition from step input of 20-degreerotation. Moving-average filter resulted in the smallest overshoot percentage of 0% but produce theslowest responsewith 0.42 second rise time. Overall best results are obtained using Complementary filter (alpha value 0.95) by overshoot percentage of 14.17%, 0.24 second rise time, and 0.18 data series smoothness.", "title": "" }, { "docid": "f10660b168700e38e24110a575b5aafa", "text": "While the use of MapReduce systems (such as Hadoop) for large scale data analysis has been widely recognized and studied, we have recently seen an explosion in the number of systems developed for cloud data serving. These newer systems address \"cloud OLTP\" applications, though they typically do not support ACID transactions. Examples of systems proposed for cloud serving use include BigTable, PNUTS, Cassandra, HBase, Azure, CouchDB, SimpleDB, Voldemort, and many others. Further, they are being applied to a diverse range of applications that differ considerably from traditional (e.g., TPC-C like) serving workloads. The number of emerging cloud serving systems and the wide range of proposed applications, coupled with a lack of apples-to-apples performance comparisons, makes it difficult to understand the tradeoffs between systems and the workloads for which they are suited. We present the \"Yahoo! Cloud Serving Benchmark\" (YCSB) framework, with the goal of facilitating performance comparisons of the new generation of cloud data serving systems. We define a core set of benchmarks and report results for four widely used systems: Cassandra, HBase, Yahoo!'s PNUTS, and a simple sharded MySQL implementation. We also hope to foster the development of additional cloud benchmark suites that represent other classes of applications by making our benchmark tool available via open source. In this regard, a key feature of the YCSB framework/tool is that it is extensible--it supports easy definition of new workloads, in addition to making it easy to benchmark new systems.", "title": "" }, { "docid": "fc164dc2d55cec2867a99436d37962a1", "text": "We address the text-to-text generation problem of sentence-level paraphrasing — a phenomenon distinct from and more difficult than wordor phrase-level paraphrasing. Our approach applies multiple-sequence alignment to sentences gathered from unannotated comparable corpora: it learns a set of paraphrasing patterns represented by word lattice pairs and automatically determines how to apply these patterns to rewrite new sentences. The results of our evaluation experiments show that the system derives accurate paraphrases, outperforming baseline systems.", "title": "" } ]
scidocsrr
ccdc83116119e323be3b514776c5eacd
Connoisseur : Can GANs Learn Simple 1 D Parametric Distributions ?
[ { "docid": "6c6e4e776a3860d1df1ccd7af7f587d5", "text": "We introduce new families of Integral Probability Metrics (IPM) for training Generative Adversarial Networks (GAN). Our IPMs are based on matching statistics of distributions embedded in a finite dimensional feature space. Mean and covariance feature matching IPMs allow for stable training of GANs, which we will call McGan. McGan minimizes a meaningful loss between distributions.", "title": "" }, { "docid": "065a9cd9448741bf3226423e89fce2fc", "text": "We consider the problem of learning deep generative models from data. We formulate a method that generates an independent sample via a single feedforward pass through a multilayer preceptron, as in the recently proposed generative adversarial networks (Goodfellow et al., 2014). Training a generative adversarial network, however, requires careful optimization of a difficult minimax program. Instead, we utilize a technique from statistical hypothesis testing known as maximum mean discrepancy (MMD), which leads to a simple objective that can be interpreted as matching all orders of statistics between a dataset and samples from the model, and can be trained by backpropagation. We further boost the performance of this approach by combining our generative network with an auto-encoder network, using MMD to learn to generate codes that can then be decoded to produce samples. We show that the combination of these techniques yields excellent generative models compared to baseline approaches as measured on MNIST and the Toronto Face Database.", "title": "" }, { "docid": "6573629e918822c0928e8cf49f20752c", "text": "The past several years have seen remarkable progress in generative models which produce convincing samples of images and other modalities. A shared component of many powerful generative models is a decoder network, a parametric deep neural net that defines a generative distribution. Examples include variational autoencoders, generative adversarial networks, and generative moment matching networks. Unfortunately, it can be difficult to quantify the performance of these models because of the intractability of log-likelihood estimation, and inspecting samples can be misleading. We propose to use Annealed Importance Sampling for evaluating log-likelihoods for decoder-based models and validate its accuracy using bidirectional Monte Carlo. The evaluation code is provided at https:// github.com/tonywu95/eval_gen. Using this technique, we analyze the performance of decoder-based models, the effectiveness of existing log-likelihood estimators, the degree of overfitting, and the degree to which these models miss important modes of the data distribution.", "title": "" }, { "docid": "a33cf416cf48f67cd0a91bf3a385d303", "text": "Generative neural samplers are probabilistic models that implement sampling using feedforward neural networks: they take a random input vector and produce a sample from a probability distribution defined by the network weights. These models are expressive and allow efficient computation of samples and derivatives, but cannot be used for computing likelihoods or for marginalization. The generativeadversarial training method allows to train such models through the use of an auxiliary discriminative neural network. We show that the generative-adversarial approach is a special case of an existing more general variational divergence estimation approach. We show that any f -divergence can be used for training generative neural samplers. We discuss the benefits of various choices of divergence functions on training complexity and the quality of the obtained generative models.", "title": "" }, { "docid": "839b6bd24c7e020b0feef197cd6d9f92", "text": "We consider training a deep neural network to generate samples from an unknown distribution given i.i.d. data. We frame learning as an optimization minimizing a two-sample test statistic—informally speaking, a good generator network produces samples that cause a twosample test to fail to reject the null hypothesis. As our two-sample test statistic, we use an unbiased estimate of the maximum mean discrepancy, which is the centerpiece of the nonparametric kernel two-sample test proposed by Gretton et al. [2]. We compare to the adversarial nets framework introduced by Goodfellow et al. [1], in which learning is a two-player game between a generator network and an adversarial discriminator network, both trained to outwit the other. From this perspective, the MMD statistic plays the role of the discriminator. In addition to empirical comparisons, we prove bounds on the generalization error incurred by optimizing the empirical MMD.", "title": "" } ]
[ { "docid": "156639f4656088016e2b867d2d7b71af", "text": "In this article we use Adomian decomposition method, which is a well-known method for solving functional equations now-a-days, to solve systems of differential equations of the first order and an ordinary differential equation of any order by converting it into a system of differential of the order one. Theoretical considerations are being discussed, and convergence of the method for theses systems is addressed. Some examples are presented to show the ability of the method for linear and non-linear systems of differential equations. 2002 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "9808d306dcb3378629718952a0517b26", "text": "Legged robots have the potential to navigate a much larger variety of terrain than their wheeled counterparts. In this paper we present a hierarchical control architecture that enables a quadruped, the \"LittleDog\" robot, to walk over rough terrain. The controller consists of a high-level planner that plans a set of footsteps across the terrain, a low-level planner that plans trajectories for the robot's feet and center of gravity (COG), and a low-level controller that tracks these desired trajectories using a set of closed-loop mechanisms. We conduct extensive experiments to verify that the controller is able to robustly cross a wide variety of challenging terrains, climbing over obstacles nearly as tall as the robot's legs. In addition, we highlight several elements of the controller that we found to be particularly crucial for robust locomotion, and which are applicable to quadruped robots in general. In such cases we conduct empirical evaluations to test the usefulness of these elements.", "title": "" }, { "docid": "a0b5deb19851a88fd55508e233f07a6f", "text": "Memories are stored and retained through complex, coupled processes operating on multiple timescales. To understand the computational principles behind these intricate networks of interactions, we construct a broad class of synaptic models that efficiently harness biological complexity to preserve numerous memories by protecting them against the adverse effects of overwriting. The memory capacity scales almost linearly with the number of synapses, which is a substantial improvement over the square root scaling of previous models. This was achieved by combining multiple dynamical processes that initially store memories in fast variables and then progressively transfer them to slower variables. Notably, the interactions between fast and slow variables are bidirectional. The proposed models are robust to parameter perturbations and can explain several properties of biological memory, including delayed expression of synaptic modifications, metaplasticity, and spacing effects.", "title": "" }, { "docid": "f43c4d3eba766a5ad9c84f2cc29c2de7", "text": "This paper presents an overview of 5 meta-analyses of early intensive behavioral intervention (EIBI) for young children with autism spectrum disorders (ASDs) published in 2009 and 2010. There were many differences between meta-analyses, leading to different estimates of effect and overall conclusions. The weighted mean effect sizes across meta-analyses for IQ and adaptive behavior ranged from g = .38-1.19 and g = .30-1.09, respectively. Four of five meta-analyses concluded EIBI was an effective intervention strategy for many children with ASDs. A discussion highlighting potential confounds and limitations of the meta-analyses leading to these discrepancies and conclusions about the efficacy of EIBI as an intervention for young children with ASDs are provided.", "title": "" }, { "docid": "ad16b075500f2225637ce2f423e7bc14", "text": "This review discusses machine learning methods and their application to Brain-Computer Interfacing. A particular focus is placed on feature selection. We also point out common flaws when validating machine learning methods in the context of BCI. Finally we provide a brief overview on the Berlin-Brain Computer Interface (BBCI).", "title": "" }, { "docid": "5afe9c613da51904d498b282fb1b62df", "text": "Two types of suspended stripline ultra-wideband bandpass filters are described, one based on a standard lumped element (L-C) filter concept including transmission zeroes to improve the upper passband slope, and a second one consisting of the combination of a low-pass and a high-pass filter.", "title": "" }, { "docid": "d479707742dcf5bec920370d98c2eadc", "text": "Spectral measures of linear Granger causality have been widely applied to study the causal connectivity between time series data in neuroscience, biology, and economics. Traditional Granger causality measures are based on linear autoregressive with exogenous (ARX) inputs models of time series data, which cannot truly reveal nonlinear effects in the data especially in the frequency domain. In this study, it is shown that the classical Geweke's spectral causality measure can be explicitly linked with the output spectra of corresponding restricted and unrestricted time-domain models. The latter representation is then generalized to nonlinear bivariate signals and for the first time nonlinear causality analysis in the frequency domain. This is achieved by using the nonlinear ARX (NARX) modeling of signals, and decomposition of the recently defined output frequency response function which is related to the NARX model.", "title": "" }, { "docid": "29d02d7219cb4911ab59681e0c70a903", "text": "As the explosive growth of smart devices and the advent of many new applications, traffic volume has been growing exponentially. The traditional centralized network architecture cannot accommodate such user demands due to heavy burden on the backhaul links and long latency. Therefore, new architectures, which bring network functions and contents to the network edge, are proposed, i.e., mobile edge computing and caching. Mobile edge networks provide cloud computing and caching capabilities at the edge of cellular networks. In this survey, we make an exhaustive review on the state-of-the-art research efforts on mobile edge networks. We first give an overview of mobile edge networks, including definition, architecture, and advantages. Next, a comprehensive survey of issues on computing, caching, and communication techniques at the network edge is presented. The applications and use cases of mobile edge networks are discussed. Subsequently, the key enablers of mobile edge networks, such as cloud technology, SDN/NFV, and smart devices are discussed. Finally, open research challenges and future directions are presented as well.", "title": "" }, { "docid": "2e07ca60f1b720c94eed8e9ca76afbdd", "text": "This paper is concerned with the problem of how to better exploit 3D geometric information for dense semantic image labeling. Existing methods often treat the available 3D geometry information (e.g., 3D depth-map) simply as an additional image channel besides the R-G-B color channels, and apply the same technique for RGB image labeling. In this paper, we demonstrate that directly performing 3D convolution in the framework of a residual connected 3D voxel top-down modulation network can lead to superior results. Specifically, we propose a 3D semantic labeling method to label outdoor street scenes whenever a dense depth map is available. Experiments on the “Synthia” and “Cityscape” datasets show our method outperforms the state-of-the-art methods, suggesting such a simple 3D representation is effective in incorporating 3D geometric information.", "title": "" }, { "docid": "c14c575eed397c522a3bc0d2b766a836", "text": "Being highly unsaturated, carotenoids are susceptible to isomerization and oxidation during processing and storage of foods. Isomerization of trans-carotenoids to cis-carotenoids, promoted by contact with acids, heat treatment and exposure to light, diminishes the color and the vitamin A activity of carotenoids. The major cause of carotenoid loss, however, is enzymatic and non-enzymatic oxidation, which depends on the availability of oxygen and the carotenoid structure. It is stimulated by light, heat, some metals, enzymes and peroxides and is inhibited by antioxidants. Data on percentage losses of carotenoids during food processing and storage are somewhat conflicting, but carotenoid degradation is known to increase with the destruction of the food cellular structure, increase of surface area or porosity, length and severity of the processing conditions, storage time and temperature, transmission of light and permeability to O2 of the packaging. Contrary to lipid oxidation, for which the mechanism is well established, the oxidation of carotenoids is not well understood. It involves initially epoxidation, formation of apocarotenoids and hydroxylation. Subsequent fragmentations presumably result in a series of compounds of low molecular masses. Completely losing its color and biological activities, the carotenoids give rise to volatile compounds which contribute to the aroma/flavor, desirable in tea and wine and undesirable in dehydrated carrot. Processing can also influence the bioavailability of carotenoids, a topic that is currently of great interest.", "title": "" }, { "docid": "97595aebb100bb4b0597ebaf8b81aa70", "text": "Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less general and less of an accepted principle. In particular, redundancy without diversity is often argued to be useless against systematic attack, and diversity to be of dubious value. This paper discusses their roles and limits, and to what extent lessons from research on their use for reliability can be applied to security, in areas such as intrusion detection. We take a probabilistic approach to the problem, and argue its validity for security. We then discuss the various roles of redundancy and diversity for security, and show that some basic insights from probabilistic modelling in reliability and safety indeed apply to examples of design for security. We discuss the factors affecting the efficacy of redundancy and diversity, the role of “independence” between layers of defense, and some of the trade-offs facing designers.", "title": "" }, { "docid": "ebde7eb6e61bf56f84267b14e913b74a", "text": "Contraction of want to to wanna is subject to constraints which have been related to the operation of Universal Grammar. Contraction appears to be blocked when the trace of an extracted wh-word intervenes. Evidence for knowledge of these constraints by young English-speaking children in as been taken to show the operation of Universal Grammar in early child language acquisition. The present study investigates the knowledge these constraints in adults, both English native speakers and advanced Korean learners of English. The results of three experiments, using elicited production, oral repair, and grammaticality judgements, confirmed native speaker knowledge of the constraints. A second process of phonological elision may also operate to produce wanna. Learners also showed some differentiation of contexts, but much less clearly than native speakers. We speculate that non-natives may be using rules of complement selection, rather than the constraints of UG, to control contraction. Introduction: wanna contraction and language learnability In English, want to can be contracted to wanna, but not invariably. As first observed by Lakoff (1970) in examples such as (1), in which the object of the infinitival complement of want has been extracted by wh-movement, contraction is possible, but not in (2), in which the subject of the infinitival complement is extracted from the position between want and to. We shall call examples like (1) \"subject extraction questions\" (SEQ) and examples like (2) \"object extraction questions\" (OEQ).", "title": "" }, { "docid": "84ca09821b4900cd510c1236617c237a", "text": "Rhinoplasty is one of the most common aesthetic surgical procedures in Korea today. However, simple augmentation rhinoplasty results often failed to satisfy the high expectations of patients. As a result, many procedures have been developed to improve the appearance of the nasal tip and nasal projection. However, the characteristics of Korean nasal tips including the bulbous appearance (attributable to the thickness of the skin), flared nostrils, and restriction of the nasal tip attributable to an underdeveloped medical crus of the alar cartilage and a short columella have made such procedures difficult. Currently, most plastic surgeons perform rhinoplasty simultaneously with various nasal tip plasty techniques to improve the surgical results. An important part of an aesthetically pleasing result is to ensure an adequate nasal tip positioned slightly higher than the proper dorsum, with the two tip defining points in close proximity to each other, giving the nose a triangular shape from the caudal view. From June 2002 to November 2003, the authors performed rhinoplasty with simultaneous nasal tip plasty using various techniques according to the tip status of 55 patients (25 deviated noses, 9 broad noses, 15 low noses, and 6 secondary cleft lip and nose deformities). The surgery included realignment of alar cartilage by resection and suture, fibroareolar and subcutaneous tissue resection, tip graft, and columellar strut. The postoperative results over an average period of 10 months were entirely satisfactory. There were no patient complaints, nor complications resulting from the procedures. Good nasal tip projection, natural columellar appearance, and improvement of the nasolabial angle were achieved for most patients. In conclusion, rhinoplasty with simultaneous nasal tip plasty, achieved by a variety of techniques according to patients’ tip status, is an effective method for improving the appearance of the nose and satisfying the desires of the patients.", "title": "" }, { "docid": "eb0da55555e816d706908e0695075dc5", "text": "With the fast progression of digital data exchange information security has become an important issue in data communication. Encryption algorithms play an important role in information security system. These algorithms use techniques to enhance the data confidentiality and privacy by making the information indecipherable which can be only be decoded or decrypted by party those possesses the associated key. But at the same time, these algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. So we need to evaluate the performance of different cryptographic algorithms to find out best algorithm to use in future. This paper provides evaluation of both symmetric (AES, DES, Blowfish) as well as asymmetric (RSA) cryptographic algorithms by taking different types of files like Binary, text and image files. A comparison has been conducted for these encryption algorithms using evaluation parameters such as encryption time, decryption time and throughput. Simulation results are given to demonstrate the effectiveness of each.", "title": "" }, { "docid": "e2134985f8067efe41935adff8ef2150", "text": "In this paper, a high efficiency and high power factor single-stage balanced forward-flyback converter merging a foward and flyback converter topologies is proposed. The conventional AC/DC flyback converter can achieve a good power factor but it has a high offset current through the transformer magnetizing inductor, which results in a large core loss and low power conversion efficiency. And, the conventional forward converter can achieve the good power conversion efficiency with the aid of the low core loss but the input current dead zone near zero cross AC input voltage deteriorates the power factor. On the other hand, since the proposed converter can operate as the forward and flyback converters during switch on and off periods, respectively, it cannot only perform the power transfer during an entire switching period but also achieve the high power factor due to the flyback operation. Moreover, since the current balanced capacitor can minimize the offset current through the transformer magnetizing inductor regardless of the AC input voltage, the core loss and volume of the transformer can be minimized. Therefore, the proposed converter features a high efficiency and high power factor. To confirm the validity of the proposed converter, theoretical analysis and experimental results from a prototype of 24W LED driver are presented.", "title": "" }, { "docid": "f0d62875608a42bce9ea83714a422ebc", "text": "In this paper we present a new gamified learning system called Reflex which builds on our previous research, placing greater emphasis on variation in learner motivation and associated behaviour, having a particular focus on gamification typologies. Reflex comprises a browser based 3D virtual world that embeds both learning content and learner feedback. In this way the topography of the virtual world plays an important part in the presentation and access to learning material and learner feedback. Reflex presents information to learners based on their curriculum learning objectives and tracks their movement and interactions within the world. A core aspect of Reflex is its gamification design, with our engagement elements and processes based on Marczewski's eight gamification types [1]. We describe his model and its relationship to Bartle's player types [2] as well as the RAMP intrinsic motivation model [3]. We go on to present an analysis of experiments using Reflex with students on two 2nd year Computing modules. Our data mining and cluster analysis on the results of a gamification typology questionnaire expose variation in learner motivation. The results from a comprehensive tracking of the interactions of learners within Reflex are discussed and the acquired tracking data is discussed in context of gamification typologies and metacognitive tendencies of the learners. We discuss correlations in actual learner behaviour to that predicted by gamified learner profile. Our results illustrate the importance of taking variation in learner motivation into account when designing gamified learning systems.", "title": "" }, { "docid": "aaf30f184fcea3852f73a5927100cac7", "text": "Dyslexia is a neurodevelopmental reading disability estimated to affect 5-10% of the population. While there is yet no full understanding of the cause of dyslexia, or agreement on its precise definition, it is certain that many individuals suffer persistent problems in learning to read for no apparent reason. Although it is generally agreed that early intervention is the best form of support for children with dyslexia, there is still a lack of efficient and objective means to help identify those at risk during the early years of school. Here we show that it is possible to identify 9-10 year old individuals at risk of persistent reading difficulties by using eye tracking during reading to probe the processes that underlie reading ability. In contrast to current screening methods, which rely on oral or written tests, eye tracking does not depend on the subject to produce some overt verbal response and thus provides a natural means to objectively assess the reading process as it unfolds in real-time. Our study is based on a sample of 97 high-risk subjects with early identified word decoding difficulties and a control group of 88 low-risk subjects. These subjects were selected from a larger population of 2165 school children attending second grade. Using predictive modeling and statistical resampling techniques, we develop classification models from eye tracking records less than one minute in duration and show that the models are able to differentiate high-risk subjects from low-risk subjects with high accuracy. Although dyslexia is fundamentally a language-based learning disability, our results suggest that eye movements in reading can be highly predictive of individual reading ability and that eye tracking can be an efficient means to identify children at risk of long-term reading difficulties.", "title": "" }, { "docid": "ea0ee8011eacdd00cdc8ba3df4eeee6f", "text": "Despite the highest classification accuracy in wide varieties of application areas, artificial neural network has one disadvantage. The way this Network comes to a decision is not easily comprehensible. The lack of explanation ability reduces the acceptability of neural network in data mining and decision system. This drawback is the reason why researchers have proposed many rule extraction algorithms to solve the problem. Recently, Deep Neural Network (DNN) is achieving a profound result over the standard neural network for classification and recognition problems. It is a hot machine learning area proven both useful and innovative. This paper has thoroughly reviewed various rule extraction algorithms, considering the classification scheme: decompositional, pedagogical, and eclectics. It also presents the evaluation of these algorithms based on the neural network structure with which the algorithm is intended to work. The main contribution of this review is to show that there is a limited study of rule extraction algorithm from DNN. KeywordsArtificial neural network; Deep neural network; Rule extraction; Decompositional; Pedagogical; Eclectic.", "title": "" }, { "docid": "18c230517b8825b616907548829e341b", "text": "The application of small Remotely-Controlled (R/C) aircraft for aerial photography presents many unique advantages over manned aircraft due to their lower acquisition cost, lower maintenance issue, and superior flexibility. The extraction of reliable information from these images could benefit DOT engineers in a variety of research topics including, but not limited to work zone management, traffic congestion, safety, and environmental. During this effort, one of the West Virginia University (WVU) R/C aircraft, named ‘Foamy’, has been instrumented for a proof-of-concept demonstration of aerial data acquisition. Specifically, the aircraft has been outfitted with a GPS receiver, a flight data recorder, a downlink telemetry hardware, a digital still camera, and a shutter-triggering device. During the flight a ground pilot uses one of the R/C channels to remotely trigger the camera. Several hundred high-resolution geo-tagged aerial photographs were collected during 10 flight experiments at two different flight fields. A Matlab based geo-reference software was developed for measuring distances from an aerial image and estimating the geo-location of each ground asset of interest. A comprehensive study of potential Sources of Errors (SOE) has also been performed with the goal of identifying and addressing various factors that might affect the position estimation accuracy. The result of the SOE study concludes that a significant amount of position estimation error was introduced by either mismatching of different measurements or by the quality of the measurements themselves. The first issue is partially addressed through the design of a customized Time-Synchronization Board (TSB) based on a MOD 5213 embedded microprocessor. The TSB actively controls the timing of the image acquisition process, ensuring an accurate matching of the GPS measurement and the image acquisition time. The second issue is solved through the development of a novel GPS/INS (Inertial Navigation System) based on a 9-state Extended Kalman Filter (EKF). The developed sensor fusion algorithm provides a good estimation of aircraft attitude angle without the need for using expensive sensors. Through the help of INS integration, it also provides a very smooth position estimation that eliminates large jumps typically seen in the raw GPS measurements.", "title": "" } ]
scidocsrr
2ed0217ac29981ea67e04782894e2b7f
Camera calibration and three-dimensional world reconstruction of stereo-vision using neural networks
[ { "docid": "1b8d9c6a498821823321572a5055ecc3", "text": "The objective of stereo camera calibration is to estimate the internal and external parameters of each camera. Using these parameters, the 3-D position of a point in the scene, which is identified and matched in two stereo images, can be determined by the method of triangulation. In this paper, we present a camera model that accounts for major sources of camera distortion, namely, radial, decentering, and thin prism distortions. The proposed calibration procedure consists of two steps. In the first step, the calibration parameters are estimated using a closed-form solution based on a distortion-free camera model. In the second step, the parameters estimated in the first step are improved iteratively through a nonlinear optimization, taking into account camera distortions. According to minimum variance estimation, the objective function to be minimized is the mean-square discrepancy between the observed image points and their inferred image projections computed with the estimated calibration parameters. We introduce a type of measure that can be used to directly evaluate the performance of calibration and compare calibrations among different systems. The validity and performance of our calibration procedure are tested with both synthetic data and real images taken by teleand wide-angle lenses. The results consistently show significant improvements over less complete camera models.", "title": "" } ]
[ { "docid": "1b5dd28d1cb6fedeb24d7ac5195595c6", "text": "Modulation recognition algorithms have recently received a great deal of attention in academia and industry. In addition to their application in the military field, these algorithms found civilian use in reconfigurable systems, such as cognitive radios. Most previously existing algorithms are focused on recognition of a single modulation. However, a multiple-input multiple-output two-way relaying channel (MIMO TWRC) with physical-layer network coding (PLNC) requires the recognition of the pair of sources modulations from the superposed constellation at the relay. In this paper, we propose an algorithm for recognition of sources modulations for MIMO TWRC with PLNC. The proposed algorithm is divided in two steps. The first step uses the higher order statistics based features in conjunction with genetic algorithm as a features selection method, while the second step employs AdaBoost as a classifier. Simulation results show the ability of the proposed algorithm to provide a good recognition performance at acceptable signal-to-noise values.", "title": "" }, { "docid": "c6642eb97aafc069056dcb42d7bf5b71", "text": "An improved technique for electroejaculation is described, with the results of applying it to 84 men with spinal injuries and five men with ejaculatory failure from other causes. Semen was obtained from most patients, but good semen from very few. Only one pregnancy has yet been achieved. The technique has diagnostic applications.", "title": "" }, { "docid": "df9d85417753465e489b327b83c4211d", "text": "As an integral component of blind image deblurring, non-blind deconvolution removes image blur with a given blur kernel, which is essential but difficult due to the ill-posed nature of the inverse problem. The predominant approach is based on optimization subject to regularization functions that are either manually designed, or learned from examples. Existing learning based methods have shown superior restoration quality but are not practical enough due to their restricted model design. They solely focus on learning a prior and require to know the noise level for deconvolution. We address the gap between the optimizationbased and learning-based approaches by learning an optimizer. We propose a Recurrent Gradient Descent Network (RGDN) by systematically incorporating deep neural networks into a fully parameterized gradient descent scheme. A parameterfree update unit is used to generate updates from the current estimates, based on a convolutional neural network. By training on diverse examples, the Recurrent Gradient Descent Network learns an implicit image prior and a universal update rule through recursive supervision. Extensive experiments on synthetic benchmarks and challenging real-world images demonstrate that the proposed method is effective and robust to produce favorable results as well as practical for realworld image deblurring applications.", "title": "" }, { "docid": "2d17b30942ce0984dcbcf5ca5ba38bd2", "text": "We review the literature on the relation between narcissism and consumer behavior. Consumer behavior is sometimes guided by self-related motives (e.g., self-enhancement) rather than by rational economic considerations. Narcissism is a case in point. This personality trait reflects a self-centered, self-aggrandizing, dominant, and manipulative orientation. Narcissists are characterized by exhibitionism and vanity, and they see themselves as superior and entitled. To validate their grandiose self-image, narcissists purchase high-prestige products (i.e., luxurious, exclusive, flashy), show greater interest in the symbolic than utilitarian value of products, and distinguish themselves positively from others via their materialistic possessions. Our review lays the foundation for a novel methodological approach in which we explore how narcissism influences eye movement behavior during consumer decision-making. We conclude with a description of our experimental paradigm and report preliminary results. Our findings will provide insight into the mechanisms underlying narcissists' conspicuous purchases. They will also likely have implications for theories of personality, consumer behavior, marketing, advertising, and visual cognition.", "title": "" }, { "docid": "2b288883556821fd61576c7460a81c29", "text": "Intensive care units (ICUs) are major sites for medical errors and adverse events. Suboptimal outcomes reflect a widespread failure to implement care delivery systems that successfully address the complexity of modern ICUs. Whereas other industries have used information technologies to fundamentally improve operating efficiency and enhance safety, medicine has been slow to implement such strategies. Most ICUs do not even track performance; fewer still have the capability to examine clinical data and use this information to guide quality improvement initiatives. This article describes a technology-enabled care model (electronic ICU, or eICU) that represents a new paradigm for delivery of critical care services. A major component of the model is the use of telemedicine to leverage clinical expertise and facilitate a round-the-clock proactive care by intensivist-led teams of ICU caregivers. Novel data presentation formats, computerized decision support, and smart alarms are used to enhance efficiency, increase effectiveness, and standardize clinical and operating processes. In addition, the technology infrastructure facilitates performance improvement by providing an automated means to measure outcomes, track performance, and monitor resource utilization. The program is designed to support the multidisciplinary intensivist-led team model and incorporates comprehensive ICU re-engineering efforts to change practice behavior. Although this model can transform ICUs into centers of excellence, success will hinge on hospitals accepting the underlying value proposition and physicians being willing to change established practices.", "title": "" }, { "docid": "0a8c009d1bccbaa078f95cc601010af3", "text": "Deep neural networks (DNNs) have transformed several artificial intelligence research areas including computer vision, speech recognition, and natural language processing. However, recent studies demonstrated that DNNs are vulnerable to adversarial manipulations at testing time. Specifically, suppose we have a testing example, whose label can be correctly predicted by a DNN classifier. An attacker can add a small carefully crafted noise to the testing example such that the DNN classifier predicts an incorrect label, where the crafted testing example is called adversarial example. Such attacks are called evasion attacks. Evasion attacks are one of the biggest challenges for deploying DNNs in safety and security critical applications such as self-driving cars.\n In this work, we develop new DNNs that are robust to state-of-the-art evasion attacks. Our key observation is that adversarial examples are close to the classification boundary. Therefore, we propose region-based classification to be robust to adversarial examples. Specifically, for a benign/adversarial testing example, we ensemble information in a hypercube centered at the example to predict its label. In contrast, traditional classifiers are point-based classification, i.e., given a testing example, the classifier predicts its label based on the testing example alone. Our evaluation results on MNIST and CIFAR-10 datasets demonstrate that our region-based classification can significantly mitigate evasion attacks without sacrificing classification accuracy on benign examples. Specifically, our region-based classification achieves the same classification accuracy on testing benign examples as point-based classification, but our region-based classification is significantly more robust than point-based classification to state-of-the-art evasion attacks.", "title": "" }, { "docid": "acf8b998d1fee550981c59601c0e9787", "text": "PURPOSE\nTo evaluate the effects of the wearer's pupil size and spherical aberration on visual performance with centre-near, aspheric multifocal contact lenses (MFCLs). The advantage of binocular over monocular vision was also investigated.\n\n\nMETHODS\nTwelve young volunteers, with an average age of 27 ± 5 years, participated in the study. LogMAR Visual Acuity (VA) was measured under cycloplegia for a range of defocus levels (from +3.0 to -3.0 D, in 0.5 D steps) with no correction and with three aspheric MFCLs (Air Optix Aqua Multifocal) with a centre-near design, providing correction for 'Low', 'Med' and 'High' near demands. Measurements were performed for all combinations of the following conditions: (1) artificial pupils of 6 and 3 mm diameter, (2) binocular and monocular (dominant eye) vision. Depth-of-focus (DOF) was calculated from the VA vs defocus curves. Ocular aberrations under cycloplegia were measured using iTrace.\n\n\nRESULTS\nVA at -3.0 D defocus (simulating near performance) was statistically higher for the 3 mm than for the 6 mm pupil (p = 0.006), and for binocular rather than for monocular vision (p < 0.001). Similarly, DOF was better for the 3 mm pupil (p = 0.002) and for binocular viewing conditions (p < 0.001). Both VA at -3.0 D defocus and DOF increased as the 'addition' of the MFCL correction increased. Finally, with the centre-near MFCLs a linear correlation was found between VA at -3.0 D defocus and the wearer's ocular spherical aberration (R(2) = 0.20 p < 0.001 for 6 mm data), with the eyes exhibiting the higher positive spherical aberration experiencing worse VAs. By contrast, no correlation was found between VA and spherical aberration at 0.00 D defocus (distance vision).\n\n\nCONCLUSIONS\nBoth near VA and depth-of-focus improve with these MFCLs, with the effects being more pronounced for small pupils and for binocular rather than monocular vision. Coupling of the wearer's ocular spherical aberration with the aberration profiles provided by MFCLs affects their functionality.", "title": "" }, { "docid": "537d47c4bb23d9b60b164d747cb54cd9", "text": "Comprehending computer programs is one of the core software engineering activities. Software comprehension is required when a programmer maintains, reuses, migrates, reengineers, or enhances software systems. Due to this, a large amount of research has been carried out, in an attempt to guide and support software engineers in this process. Several cognitive models of program comprehension have been suggested, which attempt to explain how a software engineer goes about the process of understanding code. However, research has suggested that there is no one ‘all encompassing’ cognitive model that can explain the behavior of ‘all’ programmers, and that it is more likely that programmers, depending on the particular problem, will swap between models (Letovsky, 1986). This paper identifies the key components of program comprehension models, and attempts to evaluate currently accepted models in this framework. It also highlights the commonalities, conflicts, and gaps between models, and presents possibilities for future research, based on its findings.", "title": "" }, { "docid": "3eccedb5a9afc0f7bc8b64c3b5ff5434", "text": "The design of a high impedance, high Q tunable load is presented with operating frequency between 400MHz and close to 6GHz. The bandwidth is made independently tunable of the carrier frequency by using an active inductor resonator with multiple tunable capacitances. The Q factor can be tuned from a value 40 up to 300. The circuit is targeted at 5G wideband applications requiring narrow band filtering where both centre frequency and bandwidth needs to be tunable. The circuit impedance is applied to the output stage of a standard CMOS cascode and results show that high Q factors can be achieved close to 6GHz with 11dB rejection at 20MHz offset from the centre frequency. The circuit architecture takes advantage of currently available low cost, low area tunable capacitors based on micro-electromechanical systems (MEMS) and Barium Strontium Titanate (BST).", "title": "" }, { "docid": "a5447f6bf7dbbab55d93794b47d46d12", "text": "The proposed multilevel framework of discourse comprehension includes the surface code, the textbase, the situation model, the genre and rhetorical structure, and the pragmatic communication level. We describe these five levels when comprehension succeeds and also when there are communication misalignments and comprehension breakdowns. A computer tool has been developed, called Coh-Metrix, that scales discourse (oral or print) on dozens of measures associated with the first four discourse levels. The measurement of these levels with an automated tool helps researchers track and better understand multilevel discourse comprehension. Two sets of analyses illustrate the utility of Coh-Metrix in discourse theory and educational practice. First, Coh-Metrix was used to measure the cohesion of the text base and situation model, as well as potential extraneous variables, in a sample of published studies that manipulated text cohesion. This analysis helped us better understand what was precisely manipulated in these studies and the implications for discourse comprehension mechanisms. Second, Coh-Metrix analyses are reported for samples of narrative and science texts in order to advance the argument that traditional text difficulty measures are limited because they fail to accommodate most of the levels of the multilevel discourse comprehension framework.", "title": "" }, { "docid": "237437eae6a6154fb3b32c4c6c1fed07", "text": "Ontology is playing an increasingly important role in knowledge management and the Semantic Web. This study presents a novel episode-based ontology construction mechanism to extract domain ontology from unstructured text documents. Additionally, fuzzy numbers for conceptual similarity computing are presented for concept clustering and taxonomic relation definitions. Moreover, concept attributes and operations can be extracted from episodes to construct a domain ontology, while non-taxonomic relations can be generated from episodes. The fuzzy inference mechanism is also applied to obtain new instances for ontology learning. Experimental results show that the proposed approach can effectively construct a Chinese domain ontology from unstructured text documents. 2006 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "3f5097b33aab695678caca712b649a8f", "text": "I quantitatively measure the nature of the media’s interactions with the stock market using daily content from a popular Wall Street Journal column. I find that high media pessimism predicts downward pressure on market prices followed by a reversion to fundamentals, and unusually high or low pessimism predicts high market trading volume. These results and others are consistent with theoretical models of noise and liquidity traders. However, the evidence is inconsistent with theories of media content as a proxy for new information about fundamental asset values, as a proxy for market volatility, or as a sideshow with no relationship to asset markets. ∗Tetlock is at the McCombs School of Business, University of Texas at Austin. I am indebted to Robert Stambaugh (the editor), an anonymous associate editor and an anonymous referee for their suggestions. I am grateful to Aydogan Alti, John Campbell, Lorenzo Garlappi, Xavier Gabaix, Matthew Gentzkow, John Griffin, Seema Jayachandran, David Laibson, Terry Murray, Alvin Roth, Laura Starks, Jeremy Stein, Philip Tetlock, Sheridan Titman and Roberto Wessels for their comments. I thank Philip Stone for providing the General Inquirer software and Nathan Tefft for his technical expertise. I appreciate Robert O’Brien’s help in providing information about the Wall Street Journal. I also acknowledge the National Science Foundation, Harvard University and the University of Texas at Austin for their financial support. All mistakes in this article are my own.", "title": "" }, { "docid": "39e332a58625a12ef3e14c1a547a8cad", "text": "This paper presents an overview of the recent achievements in the held of substrate integrated waveguides (SIW) technology, with particular emphasis on the modeling strategy and design considerations of millimeter-wave integrated circuits as well as the physical interpretation of the operation principles and loss mechanisms of these structures. The most common numerical methods for modeling both SIW interconnects and circuits are presented. Some considerations and guidelines for designing SIW structures, interconnects and circuits are discussed, along with the physical interpretation of the major issues related to radiation leakage and losses. Examples of SIW circuits and components operating in the microwave and millimeter wave bands are also reported, with numerical and experimental results.", "title": "" }, { "docid": "f8b4d74f18044f5406f2bf0e9128bbf2", "text": "The purpose of this study was to compare heart rate (HR) responses within and between physical controlled (short-duration intermittent running) and physical integrated (sided games) training methods in elite soccer players. Ten adult male elite soccer players (age, 26 +/- 2.9 years; body mass, 78.3 +/- 4.4 kg; maximum HR [HRmax], 195.4 +/- 4.9 b x min(-1) and velocity at maximal aerobic speed (MAS), 17.1 +/- 0.8 km x h(-1)) performed different short-duration intermittent runs, e.g., 30-30 (30 seconds of exercise interspersed with 30 seconds of recovery) with active recovery, and 30-30, 15-15, 10-10, and 5-20 seconds with passive recovery, and different sided games (1 versus 1, 2 versus 2, 4 versus 4, 8 versus 8 with and without a goalkeeper, and 10 versus 10). In both training methods, HR was measured and expressed as a mean percentage of HR reserve (%HRres). The %HRres in the 30-30-second intermittent run at 100% MAS with active recovery (at 9 km.h with corresponding distance) was significantly higher than that with passive recovery (85.7% versus 77.2% HRres, respectively, p < 0.001) but also higher than the 1 versus 1 (p < 0.01), 4 versus 4 (p <or= 0.05), 8 versus 8 (p < 0.001), and 10 versus 10 (p < 0.01) small-sided games. The %HRres was 2-fold less homogeneous during the different small-sided games than during the short-duration intermittent running (intersubjects coefficient of variation [CV] = 11.8% versus 5.9%, respectively). During the 8 versus 8 sided game, the presence of goalkeepers induced an approximately 11% increase in %HRres and reduced homogeneity when compared to games without goalkeepers (intersubject CV = 15.6% versus 8.8%). In conclusion, these findings showed that some small-sided games allow the HR to increase to the same level as that in short-duration intermittent running. The sided game method can be used to bring more variety during training, mixing physical, technical, and tactical training approaching the intensity of short-duration intermittent running but with higher intersubject variability.", "title": "" }, { "docid": "6a3dc4c6bcf2a4133532c37dfa685f3b", "text": "Feature selection can be de ned as a problem of nding a minimum set of M relevant at tributes that describes the dataset as well as the original N attributes do where M N After examining the problems with both the exhaustive and the heuristic approach to fea ture selection this paper proposes a proba bilistic approach The theoretic analysis and the experimental study show that the pro posed approach is simple to implement and guaranteed to nd the optimal if resources permit It is also fast in obtaining results and e ective in selecting features that im prove the performance of a learning algo rithm An on site application involving huge datasets has been conducted independently It proves the e ectiveness and scalability of the proposed algorithm Discussed also are various aspects and applications of this fea ture selection algorithm", "title": "" }, { "docid": "4ba0e0e1a00bb95d464b6bb38e2c1176", "text": "An important application for use with multimedia databases is a browsing aid, which allows a user to quickly and efficiently preview selections from either a database or from the results of a database query. Methods for facilitating browsing, though, are necessarily media dependent. We present one such method that produces short, representative samples (or “audio thumbnails”) of selections of popular music. This method attempts to identify the chorus or refrain of a song by identifying repeated sections of the audio waveform. A reduced spectral representation of the selection based on a chroma transformation of the spectrum is used to find repeating patterns. This representation encodes harmonic relationships in a signal and thus is ideal for popular music, which is often characterized by prominent harmonic progressions. The method is evaluated over a sizable database of popular music and found to perform well, with most of the errors resulting from songs that do not meet our structural assumptions.", "title": "" }, { "docid": "6a196d894d94b194627f6e3c127c83fb", "text": "The advantages provided to memory by the distribution of multiple practice or study opportunities are among the most powerful effects in memory research. In this paper, we critically review the class of theories that presume contextual or encoding variability as the sole basis for the advantages of distributed practice, and recommend an alternative approach based on the idea that some study events remind learners of other study events. Encoding variability theory encounters serious challenges in two important phenomena that we review here: superadditivity and nonmonotonicity. The bottleneck in such theories lies in the assumption that mnemonic benefits arise from the increasing independence, rather than interdependence, of study opportunities. The reminding model accounts for many basic results in the literature on distributed practice, readily handles data that are problematic for encoding variability theories, including superadditivity and nonmonotonicity, and provides a unified theoretical framework for understanding the effects of repetition and the effects of associative relationships on memory.", "title": "" }, { "docid": "4172a0c101756ea8207b65b0dfbbe8ce", "text": "Inspired by ACTORS [7, 17], we have implemented an interpreter for a LISP-like language, SCHEME, based on the lambda calculus [2], but extended for side effects, multiprocessing, and process synchronization. The purpose of this implementation is tutorial. We wish to: 1. alleviate the confusion caused by Micro-PLANNER, CONNIVER, etc., by clarifying the embedding of non-recursive control structures in a recursive host language like LISP. 2. explain how to use these control structures, independent of such issues as pattern matching and data base manipulation. 3. have a simple concrete experimental domain for certain issues of programming semantics and style. This paper is organized into sections. The first section is a short “reference manual” containing specifications for all the unusual features of SCHEME. Next, we present a sequence of programming examples which illustrate various programming styles, and how to use them. This will raise certain issues of semantics which we will try to clarify with lambda calculus in the third section. In the fourth section we will give a general discussion of the issues facing an implementor of an interpreter for a language based on lambda calculus. Finally, we will present a completely annotated interpreter for SCHEME, written in MacLISP [13], to acquaint programmers with the tricks of the trade of implementing non-recursive control structures in a recursive language like LISP. This report describes research done at the Artificial Intelligence Laboratory of the Massachusetts Institute of Technology. Support for the laboratory’s artificial intelligence research is provided in part by the Advanced Research Projects Agency of the Department of Defense under Office of Naval Research contract N00014-75-C0643. 1. The SCHEME Reference Manual SCHEME is essentially a full-funarg LISP. LAMBDAexpressions need not be QUOTEd, FUNCTIONed, or *FUNCTIONed when passed as arguments or returned as values; they will evaluate to closures of themselves. All LISP functions (i.e.,EXPRs,SUBRs, andLSUBRs, butnotFEXPRs,FSUBRs, orMACROs) are primitive operators in SCHEME, and have the same meaning as they have in LISP. Like LAMBDAexpressions, primitive operators and numbers are self-evaluating (they evaluate to trivial closures of themselves). There are a number of special primitives known as AINTs which are to SCHEME as FSUBRs are to LISP. We will enumerate them here. IF This is the primitive conditional operator. It takes three arguments. If the first evaluates to non-NIL , it evaluates the second expression, and otherwise the third. QUOTE As in LISP, this quotes the argument form so that it will be passed verbatim as data. The abbreviation “ ’FOO” may be used instead of “ (QUOTE FOO) ”. 406 SUSSMAN AND STEELE DEFINE This is analogous to the MacLISP DEFUNprimitive (but note that theLAMBDA must appear explicitly!). It is used for defining a function in the “global environment” permanently, as opposed to LABELS(see below), which is used for temporary definitions in a local environment.DEFINE takes a name and a lambda expression; it closes the lambda expression in the global environment and stores the closure in the LISP value cell of the name (which is a LISP atom). LABELS We have decided not to use the traditional LABEL primitive in this interpreter because it is difficult to define several mutually recursive functions using only LABEL. The solution, which Hewitt [17] also uses, is to adopt an ALGOLesque block syntax: (LABELS <function definition list> <expression>) This has the effect of evaluating the expression in an environment where all the functions are defined as specified by the definitions list. Furthermore, the functions are themselves closed in that environment, and not in the outer environment; this allows the functions to call themselvesand each otherecursively. For example, consider a function which counts all the atoms in a list structure recursively to all levels, but which doesn’t count the NIL s which terminate lists (but NIL s in theCARof some list count). In order to perform this we use two mutually recursive functions, one to count the car and one to count the cdr, as follows: (DEFINE COUNT (LAMBDA (L) (LABELS ((COUNTCAR (LAMBDA (L) (IF (ATOM L) 1 (+ (COUNTCAR (CAR L)) (COUNTCDR (CDR L)))))) (COUNTCDR (LAMBDA (L) (IF (ATOM L) (IF (NULL L) 0 1) (+ (COUNTCAR (CAR L)) (COUNTCDR (CDR L))))))) (COUNTCDR L)))) ;Note: COUNTCDR is defined here. ASET This is the side effect primitive. It is analogous to the LISP function SET. For example, to define a cell [17], we may useASETas follows: (DEFINE CONS-CELL (LAMBDA (CONTENTS) (LABELS ((THE-CELL (LAMBDA (MSG) (IF (EQ MSG ’CONTENTS?) CONTENTS (IF (EQ MSG ’CELL?) ’YES (IF (EQ (CAR MSG) ’<-) (BLOCK (ASET ’CONTENTS (CADR MSG)) THE-CELL) (ERROR ’|UNRECOGNIZED MESSAGE CELL| MSG ’WRNG-TYPE-ARG))))))) THE-CELL))) INTERPRETER FOR EXTENDED LAMBDA CALCULUS 407 Those of you who may complain about the lack of ASETQare invited to write(ASET’ foo bar) instead of(ASET ’foo bar) . EVALUATE This is similar to the LISP functionEVAL. It evaluates its argument, and then evaluates the resulting s-expression as SCHEME code. CATCH This is the “escape operator” which gives the user a handle on the control structure of the interpreter. The expression: (CATCH <identifier> <expression>) evaluates<expression> in an environment where <identifier> is bound to a continuation which is “just about to return from the CATCH”; that is, if the continuation is called as a function of one argument, then control proceeds as if the CATCHexpression had returned with the supplied (evaluated) argument as its value. For example, consider the following obscure definition of SQRT(Sussman’s favorite style/Steele’s least favorite): (DEFINE SQRT (LAMBDA (X EPSILON) ((LAMBDA (ANS LOOPTAG) (CATCH RETURNTAG (PROGN (ASET ’LOOPTAG (CATCH M M)) ;CREATE PROG TAG (IF (< (ABS (-$ (*$ ANS ANS) X)) EPSILON) (RETURNTAG ANS) ;RETURN NIL) ;JFCL (ASET ’ANS (//$ (+$ (//$ X ANS) ANS) 2.0)) (LOOPTAG LOOPTAG)))) ;GOTO 1.0 NIL))) Anyone who doesn’t understand how this manages to work probably should not attempt to useCATCH. As another example, we can define a THROWfunction, which may then be used with CATCHmuch as they are in LISP: (DEFINE THROW (LAMBDA (TAG RESULT) (TAG RESULT))) CREATE!PROCESS This is the process generator for multiprocessing. It takes one argument, an expression to be evaluated in the current environment as a separate parallel process. If the expression ever returns a value, the process automatically terminates. The value ofCREATE!PROCESSis a process id for the newly generated process. Note that the newly created process will not actually run until it is explicitly started. START!PROCESS This takes one argument, a process id, and starts up that process. It then runs. 408 SUSSMAN AND STEELE STOP!PROCESS This also takes a process id, but stops the process. The stopped process may be continued from where it was stopped by using START!PROCESSagain on it. The magic global variable**PROCESS** always contains the process id of the currently running process; thus a process can stop itself by doing (STOP!PROCESS **PROCESS**) . A stopped process is garbage collected if no live process has a pointer to its process id. EVALUATE!UNINTERRUPTIBLY This is the synchronization primitive. It evaluates an expression uninterruptibly; i.e., no other process may run until the expression has returned a value. Note that if a funarg is returned from the scope of an EVALUATE!UNINTERRUPTIBLY, then that funarg will be uninterruptible when it is applied; that is, the uninterruptibility property follows the rules of variable scoping. For example, consider the following function: (DEFINE SEMGEN (LAMBDA (SEMVAL) (LIST (LAMBDA () (EVALUATE!UNINTERRUPTIBLY (ASET’ SEMVAL (+ SEMVAL 1)))) (LABELS (P (LAMBDA () (EVALUATE!UNINTERRUPTIBLY (IF (PLUSP SEMVAL) (ASET’ SEMVAL (SEMVAL 1)) (P))))) P)))) This returns a pair of functions which are V and P operations on a newly created semaphore. The argument to SEMGENis the initial value for the semaphore. Note that P busy-waits by iterating if necessary; because EVALUATE!UNINTERRUPTIBLYuses variable-scoping rules, other processes have a chance to get in at the beginning of each iteration. This busy-wait can be made much more efficient by replacing the expression (P) in the definition ofP with ((LAMBDA (ME) (BLOCK (START!PROCESS (CREATE!PROCESS ’(START!PROCESS ME))) (STOP!PROCESS ME) (P))) **PROCESS**) Let’s see you figure this one out! Note that a STOP!PROCESSwithin anEVALUATE! UNINTERRUPTIBLYforces the process to be swapped out even if it is the current one, and so other processes get to run; but as soon as it gets swapped in again, others are locked out as before. Besides theAINTs, SCHEME has a class of primitives known as AMACRO s These are similar to MacLISPMACROs, in that they are expanded into equivalent code before being executed. Some AMACRO s supplied with the SCHEME interpreter: INTERPRETER FOR EXTENDED LAMBDA CALCULUS 409 COND This is like the MacLISPCONDstatement, except that singleton clauses (where the result of the predicate is the returned value) are not allowed. AND, OR These are also as in MacLISP. BLOCK This is like the MacLISPPROGN, but arranges to evaluate its last argument without an extra net control frame (explained later), so that the last argument may involved in an iteration. Note that in SCHEME, unlike MacLISP, the body of a LAMBDAexpression is not an implicit PROGN. DO This is like the MacLISP “new-style” DO; old-styleDOis not supported. AMAPCAR , AMAPLIST These are likeMAPCARandMAPLIST, but they expect a SCHEME lambda closure for the first argument. To use SCHEME, simply incant at DDT (on MIT-AI): 3", "title": "" }, { "docid": "ebb78503777a1a70fa32771094fe6a77", "text": "In this paper we address the problem of unsupervised learning of discrete subword units. Our approach is based on Deep Autoencoders (AEs), whose encoding node values are thresholded to subsequently generate a symbolic, i.e., 1-of-K (with K = No. of subwords), representation of each speech frame. We experiment with two variants of the standard AE which we have named Binarized Autoencoder and Hidden-Markov-Model Encoder. The first forces the binary encoding nodes to have a Ushaped distribution (with peaks at 0 and 1) while minimizing the reconstruction error. The latter jointly learns the symbolic encoding representation (i.e., subwords) and the prior and transition distribution probabilities of the learned subwords. The ABX evaluation of the Zero Resource Challenge Track 1 shows that a deep AE with only 6 encoding nodes, which assigns to each frame a 1-of-K binary vector with K = 2, can outperform real-valued MFCC representations in the acrossspeaker setting. Binarized AEs can outperform standard AEs when using a larger number of encoding nodes, while HMM Encoders may allow more compact subword transcriptions without worsening the ABX performance.", "title": "" } ]
scidocsrr
157aca1d20382bf85f4a8e34ef0d4104
Multimodal Popularity Prediction of Brand-related Social Media Posts
[ { "docid": "1a6a7f515aa19b3525989f2cc4aa514f", "text": "Hundreds of thousands of photographs are uploaded to the internet every minute through various social networking and photo sharing platforms. While some images get millions of views, others are completely ignored. Even from the same users, different photographs receive different number of views. This begs the question: What makes a photograph popular? Can we predict the number of views a photograph will receive even before it is uploaded? These are some of the questions we address in this work. We investigate two key components of an image that affect its popularity, namely the image content and social context. Using a dataset of about 2.3 million images from Flickr, we demonstrate that we can reliably predict the normalized view count of images with a rank correlation of 0.81 using both image content and social cues. In this paper, we show the importance of image cues such as color, gradients, deep learning features and the set of objects present, as well as the importance of various social cues such as number of friends or number of photos uploaded that lead to high or low popularity of images.", "title": "" }, { "docid": "d83f34978bd6dd72131c36f8adb34850", "text": "Images in social networks share different destinies: some are going to become popular while others are going to be completely unnoticed. In this paper we propose to use visual sentiment features together with three novel context features to predict a concise popularity score of social images. Experiments on large scale datasets show the benefits of proposed features on the performance of image popularity prediction. Exploiting state-of-the-art sentiment features, we report a qualitative analysis of which sentiments seem to be related to good or poor popularity. To the best of our knowledge, this is the first work understanding specific visual sentiments that positively or negatively influence the eventual popularity of images.", "title": "" }, { "docid": "72553ef6330b68e37f83db08cc9016e2", "text": "Social network services have become a viable source of information for users. In Twitter, information deemed important by the community propagates through retweets. Studying the characteristics of such popular messages is important for a number of tasks, such as breaking news detection, personalized message recommendation, viral marketing and others. This paper investigates the problem of predicting the popularity of messages as measured by the number of future retweets and sheds some light on what kinds of factors influence information propagation in Twitter. We formulate the task into a classification problem and study two of its variants by investigating a wide spectrum of features based on the content of the messages, temporal information, metadata of messages and users, as well as structural properties of the users' social graph on a large scale dataset. We show that our method can successfully predict messages which will attract thousands of retweets with good performance.", "title": "" }, { "docid": "0eb16a7a6422905008c54e19c9833abc", "text": "Instagram is a growing social media platform that provides a means of self-expression and communication through creative visuals. Businesses are responding to this trend by using it as a cost-effective marketing tool. This paper examined the accounts of the leading food brands on Instagram: McDonald’s, Taco Bell, Shredz, Ben & Jerry’s, and Oreo. Photos were classified according to 11 elements: product, person and product, people and product, humor and product, world events, recipes, campaign with no products, user-generated, regram from a celebrity, and video. They were further analyzed along five dimensions of personality: sincerity, excitement, competence, sophistication, and ruggedness. Results presented common themes revealing that brands are using Instagram to promote their products and, more significantly, to colorfully express their personalities.", "title": "" } ]
[ { "docid": "bf5f08174c55ed69e454a87ff7fbe6e2", "text": "In much of the current literature on supply chain management, supply networks are recognized as a system. In this paper, we take this observation to the next level by arguing the need to recognize supply networks as a complex adaptive system (CAS). We propose that many supply networks emerge rather than result from purposeful design by a singular entity. Most supply chain management literature emphasizes negative feedback for purposes of control; however, the emergent patterns in a supply network can much better be managed through positive feedback, which allows for autonomous action. Imposing too much control detracts from innovation and flexibility; conversely, allowing too much emergence can undermine managerial predictability and work routines. Therefore, when managing supply networks, managers must appropriately balance how much to control and how much to let emerge. © 2001 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "347509d68f6efd4da747a7a3e704a9a2", "text": "Stack Overflow is widely regarded as the most popular Community driven Question Answering (CQA) website for programmers. Questions posted on Stack Overflow which are not related to programming topics, are marked as `closed' by experienced users and community moderators. A question can be `closed' for five reasons -- duplicate, off-topic, subjective, not a real question and too localized. In this work, we present the first study of `closed' questions on Stack Overflow. We download 4 years of publicly available data which contains 3.4 Million questions. We first analyze and characterize the complete set of 0.1 Million `closed' questions. Next, we use a machine learning framework and build a predictive model to identify a `closed' question at the time of question creation.\n One of our key findings is that despite being marked as `closed', subjective questions contain high information value and are very popular with the users. We observe an increasing trend in the percentage of closed questions over time and find that this increase is positively correlated to the number of newly registered users. In addition, we also see a decrease in community participation to mark a `closed' question which has led to an increase in moderation job time. We also find that questions closed with the Duplicate and Off Topic labels are relatively more prone to reputation gaming. Our analysis suggests broader implications for content quality maintenance on CQA websites. For the `closed' question prediction task, we make use of multiple genres of feature sets based on - user profile, community process, textual style and question content. We use a state-of-art machine learning classifier based on an ensemble framework and achieve an overall accuracy of 70.3%. Analysis of the feature space reveals that `closed' questions are relatively less informative and descriptive than non-`closed' questions. To the best of our knowledge, this is the first experimental study to analyze and predict `closed' questions on Stack Overflow.", "title": "" }, { "docid": "2a8aa90a9e45f58486cb712fe1271842", "text": "Existing relation classification methods that rely on distant supervision assume that a bag of sentences mentioning an entity pair are all describing a relation for the entity pair. Such methods, performing classification at the bag level, cannot identify the mapping between a relation and a sentence, and largely suffers from the noisy labeling problem. In this paper, we propose a novel model for relation classification at the sentence level from noisy data. The model has two modules: an instance selector and a relation classifier. The instance selector chooses high-quality sentences with reinforcement learning and feeds the selected sentences into the relation classifier, and the relation classifier makes sentencelevel prediction and provides rewards to the instance selector. The two modules are trained jointly to optimize the instance selection and relation classification processes. Experiment results show that our model can deal with the noise of data effectively and obtains better performance for relation classification at the sentence level.", "title": "" }, { "docid": "180dd2107c6a39e466b3d343fa70174f", "text": "This paper presents simulation and hardware implementation of incremental conductance (IncCond) maximum power point tracking (MPPT) used in solar array power systems with direct control method. The main difference of the proposed system to existing MPPT systems includes elimination of the proportional-integral control loop and investigation of the effect of simplifying the control circuit. Contributions are made in several aspects of the whole system, including converter design, system simulation, controller programming, and experimental setup. The resultant system is capable of tracking MPPs accurately and rapidly without steady-state oscillation, and also, its dynamic performance is satisfactory. The IncCond algorithm is used to track MPPs because it performs precise control under rapidly changing atmospheric conditions. MATLAB and Simulink were employed for simulation studies, and Code Composer Studio v3.1 was used to program a TMS320F2812 digital signal processor. The proposed system was developed and tested successfully on a photovoltaic solar panel in the laboratory. Experimental results indicate the feasibility and improved functionality of the system.", "title": "" }, { "docid": "d8472e56a4ffe5d6b0cb0c902186d00b", "text": "In C. S. Peirce, as well as in the work of many biosemioticians, the semiotic object is sometimes described as a physical “object” with material properties and sometimes described as an “ideal object” or mental representation. I argue that to the extent that we can avoid these types of characterizations we will have a more scientific definition of sign use and will be able to better integrate the various fields that interact with biosemiotics. In an effort to end Cartesian dualism in semiotics, which has been the main obstacle to a scientific biosemiotics, I present an argument that the “semiotic object” is always ultimately the objective of self-affirmation (of habits, physical or mental) and/or self-preservation. Therefore, I propose a new model for the sign triad: response-sign-objective. With this new model it is clear, as I will show, that self-mistaking (not self-negation as others have proposed) makes learning, creativity and purposeful action possible via signs. I define an “interpretation” as a response to something as if it were a sign, but whose semiotic objective does not, in fact, exist. If the response-as-interpretation turns out to be beneficial for the system after all, there is biopoiesis. When the response is not “interpretive,” but self-confirming in the usual way, there is biosemiosis. While the conditions conducive to fruitful misinterpretation (e.g., accidental similarity of non-signs to signs and/or contiguity of non-signs to self-sustaining processes) might be artificially enhanced, according to this theory, the outcomes would be, by nature, more or less uncontrollable and unpredictable. Nevertheless, biosemiotics could be instrumental in the manipulation and/or artificial creation of purposeful systems insofar as it can describe a formula for the conditions under which new objectives and novel purposeful behavior may emerge, however unpredictably.", "title": "" }, { "docid": "d6e1250fe1044db0a973d5e26fff1a51", "text": "Microblogs have become one of the most popular platforms for news sharing. However, due to its openness and lack of supervision, rumors could also be easily posted and propagated on social networks, which could cause huge panic and threat during its propagation. In this paper, we detect rumors by leveraging hierarchical representations at different levels and the social contexts. Specifically, we propose a novel hierarchical neural network combined with social information (HSA-BLSTM). We first build a hierarchical bidirectional long short-term memory model for representation learning. Then, the social contexts are incorporated into the network via attention mechanism, such that important semantic information is introduced to the framework for more robust rumor detection. Experimental results on two real world datasets demonstrate that the proposed method outperforms several state-of-the-arts in both rumor detection and early detection scenarios.", "title": "" }, { "docid": "1014a33211c9ca3448fa02cf734a5775", "text": "We propose a general method called truncated gradient to induce sparsity in the weights of online learning algorithms with convex loss functions. This method has several essential properties: 1. The degree of sparsity is continuous a parameter controls the rate of sparsi cation from no sparsi cation to total sparsi cation. 2. The approach is theoretically motivated, and an instance of it can be regarded as an online counterpart of the popular L1-regularization method in the batch setting. We prove that small rates of sparsi cation result in only small additional regret with respect to typical online learning guarantees. 3. The approach works well empirically. We apply the approach to several datasets and nd that for datasets with large numbers of features, substantial sparsity is discoverable.", "title": "" }, { "docid": "3d10793b2e4e63e7d639ff1e4cdf04b6", "text": "Research in signal processing shows that a variety of transforms have been introduced to map the data from the original space into the feature space, in order to efficiently analyze a signal. These techniques differ in their basis functions, that is used for projecting the signal into a higher dimensional space. One of the widely used schemes for quasi-stationary and non-stationary signals is the time-frequency (TF) transforms, characterized by specific kernel functions. This work introduces a novel class of Ramanujan Fourier Transform (RFT) based TF transform functions, constituted by Ramanujan sums (RS) basis. The proposed special class of transforms offer high immunity to noise interference, since the computation is carried out only on co-resonant components, during analysis of signals. Further, we also provide a 2-D formulation of the RFT function. Experimental validation using synthetic examples, indicates that this technique shows potential for obtaining relatively sparse TF-equivalent representation and can be optimized for characterization of certain real-life signals.", "title": "" }, { "docid": "27d4e0ec4ef3b39b0b76225969dc521a", "text": "Various definitions have been defined for the word “interoperability”; in general however, “interoperability” is a property through which the systems and organizations can communicate and cooperate. In e-government domain to establish “interoperability” among the organizations, using a suitable “interoperability” framework is inevitable. Numerous frameworks have been proposed in e-government interoperability domain. Selecting a suitable interoperability framework as a reference from among the existing interoperability frameworks in e-government domain is a major challenge of great importance. This paper aims at investigating the present frameworks of interoperability in e-government domain and identifying a reference interoperability framework for this domain. The results of this study show that all the existing interoperability frameworks in the e government domain have some drawbacks. Defining a comprehensive framework of interoperability in e-government domain is therefore inevitable. Keywords—Interoperability, Framework, E-Government.", "title": "" }, { "docid": "a2fcc3734115b76ca562dc190ebc5349", "text": "Image inpainting is concerned with the completion of missing data in an image. When the area to inpaint is relatively large, this problem becomes challenging. In these cases, traditional methods based on patch models and image propagation are limited, since they fail to consider a global perspective of the problem. In this letter, we employ a recently proposed dictionary learning framework, coined Trainlets, to design large adaptable atoms from a corpus of various datasets of face images by leveraging the online sparse dictionary learning algorithm. We, therefore, formulate the inpainting task as an inverse problem with a sparse-promoting prior based on the learned global model. Our results show the effectiveness of our scheme, obtaining much more plausible results than competitive methods.", "title": "" }, { "docid": "921d9dc34f32522200ddcd606d22b6b4", "text": "The covariancematrix adaptation evolution strategy (CMA-ES) is one of themost powerful evolutionary algorithms for real-valued single-objective optimization. In this paper, we develop a variant of the CMA-ES for multi-objective optimization (MOO). We first introduce a single-objective, elitist CMA-ES using plus-selection and step size control based on a success rule. This algorithm is compared to the standard CMA-ES. The elitist CMA-ES turns out to be slightly faster on unimodal functions, but is more prone to getting stuck in sub-optimal local minima. In the new multi-objective CMAES (MO-CMA-ES) a population of individuals that adapt their search strategy as in the elitist CMA-ES is maintained. These are subject to multi-objective selection. The selection is based on non-dominated sorting using either the crowding-distance or the contributing hypervolume as second sorting criterion. Both the elitist single-objective CMA-ES and the MO-CMA-ES inherit important invariance properties, in particular invariance against rotation of the search space, from the original CMA-ES. The benefits of the new MO-CMA-ES in comparison to the well-known NSGA-II and to NSDE, a multi-objective differential evolution algorithm, are experimentally shown.", "title": "" }, { "docid": "4bc74a746ef958a50bb8c542aa25860f", "text": "A new approach to super resolution line spectrum estimation in both temporal and spatial domain using a coprime pair of samplers is proposed. Two uniform samplers with sample spacings MT and NT are used where M and N are coprime and T has the dimension of space or time. By considering the difference set of this pair of sample spacings (which arise naturally in computation of second order moments), sample locations which are O(MN) consecutive multiples of T can be generated using only O(M + N) physical samples. In order to efficiently use these O(MN) virtual samples for super resolution spectral estimation, a novel algorithm based on the idea of spatial smoothing is proposed, which can be used for estimating frequencies of sinusoids buried in noise as well as for estimating Directions-of-Arrival (DOA) of impinging signals on a sensor array. This technique allows us to construct a suitable positive semidefinite matrix on which subspace based algorithms like MUSIC can be applied to detect O(MN) spectral lines using only O(M + N) physical samples.", "title": "" }, { "docid": "3797ca0ca77e51b2e77a1f46665edeb8", "text": "This paper proposes a new method for the Karmed dueling bandit problem, a variation on the regular K-armed bandit problem that offers only relative feedback about pairs of arms. Our approach extends the Upper Confidence Bound algorithm to the relative setting by using estimates of the pairwise probabilities to select a promising arm and applying Upper Confidence Bound with the winner as a benchmark. We prove a sharp finite-time regret bound of order O(K log T ) on a very general class of dueling bandit problems that matches a lower bound proven in (Yue et al., 2012). In addition, our empirical results using real data from an information retrieval application show that it greatly outperforms the state of the art.", "title": "" }, { "docid": "50ebb1feb21be692aaddb6ca74170c49", "text": "We show that a character-level encoderdecoder framework can be successfully applied to question answering with a structured knowledge base. We use our model for singlerelation question answering and demonstrate the effectiveness of our approach on the SimpleQuestions dataset (Bordes et al., 2015), where we improve state-of-the-art accuracy from 63.9% to 70.9%, without use of ensembles. Importantly, our character-level model has 16x fewer parameters than an equivalent word-level model, can be learned with significantly less data compared to previous work, which relies on data augmentation, and is robust to new entities in testing. 1", "title": "" }, { "docid": "d4a0b5558045245a55efbf9b71a84bc3", "text": "A long-standing goal of artificial intelligence is an algorithm that learns, tabula rasa, superhuman proficiency in challenging domains. Recently, AlphaGo became the first program to defeat a world champion in the game of Go. The tree search in AlphaGo evaluated positions and selected moves using deep neural networks. These neural networks were trained by supervised learning from human expert moves, and by reinforcement learning from self-play. Here we introduce an algorithm based solely on reinforcement learning, without human data, guidance or domain knowledge beyond game rules. AlphaGo becomes its own teacher: a neural network is trained to predict AlphaGo’s own move selections and also the winner of AlphaGo’s games. This neural network improves the strength of the tree search, resulting in higher quality move selection and stronger self-play in the next iteration. Starting tabula rasa, our new program AlphaGo Zero achieved superhuman performance, winning 100–0 against the previously published, champion-defeating AlphaGo.", "title": "" }, { "docid": "936c4fb60d37cce15ed22227d766908f", "text": "English. The SENTIment POLarity Classification Task 2016 (SENTIPOLC), is a rerun of the shared task on sentiment classification at the message level on Italian tweets proposed for the first time in 2014 for the Evalita evaluation campaign. It includes three subtasks: subjectivity classification, polarity classification, and irony detection. In 2016 SENTIPOLC has been again the most participated EVALITA task with a total of 57 submitted runs from 13 different teams. We present the datasets – which includes an enriched annotation scheme for dealing with the impact on polarity of a figurative use of language – the evaluation methodology, and discuss results and participating systems. Italiano. Descriviamo modalità e risultati della seconda edizione della campagna di valutazione di sistemi di sentiment analysis (SENTIment POLarity Classification Task), proposta nel contesto di “EVALITA 2016: Evaluation of NLP and Speech Tools for Italian”. In SENTIPOLC è stata valutata la capacità dei sistemi di riconoscere diversi aspetti del sentiment espresso nei messaggi Twitter in lingua italiana, con un’articolazione in tre sottotask: subjectivity classification, polarity classification e irony detection. La campagna ha suscitato nuovamente grande interesse, con un totale di 57 run inviati da 13 gruppi di partecipanti.", "title": "" }, { "docid": "2950e3c1347c4adeeb2582046cbea4b8", "text": "We present Mime, a compact, low-power 3D sensor for unencumbered free-form, single-handed gestural interaction with head-mounted displays (HMDs). Mime introduces a real-time signal processing framework that combines a novel three-pixel time-of-flight (TOF) module with a standard RGB camera. The TOF module achieves accurate 3D hand localization and tracking, and it thus enables motion-controlled gestures. The joint processing of 3D information with RGB image data enables finer, shape-based gestural interaction.\n Our Mime hardware prototype achieves fast and precise 3D gestural control. Compared with state-of-the-art 3D sensors like TOF cameras, the Microsoft Kinect and the Leap Motion Controller, Mime offers several key advantages for mobile applications and HMD use cases: very small size, daylight insensitivity, and low power consumption. Mime is built using standard, low-cost optoelectronic components and promises to be an inexpensive technology that can either be a peripheral component or be embedded within the HMD unit. We demonstrate the utility of the Mime sensor for HMD interaction with a variety of application scenarios, including 3D spatial input using close-range gestures, gaming, on-the-move interaction, and operation in cluttered environments and in broad daylight conditions.", "title": "" }, { "docid": "7704e1154d480c167eff13c0e3fe4411", "text": "An autonomous dual wheel self balancing robot is developed that is capable of balancing its position around predetermined position. Initially the system was nonlinear and unstable. It is observed that the system becomes stable after redesigning the physical structure of the system using PID controller and analyzing its dynamic behavior using mathematical modeling. The position of self balancing robot is controlled by PID controller. Simulation results using PROTEOUS, MATLAB, and VM lab are observed and verified vital responses of different components. Balancing is claimed and shown the verification for this nonlinear and unstable system. Some fluctuations in forward or backward around its mean position is observed, afterwards it acquires its balanced position in reasonable settling time. The research is applicable in gardening, hospitals, shopping malls and defense systems etc.", "title": "" }, { "docid": "7816f9fc22866f2c4f12313715076a20", "text": "Image-to-image translation has been made much progress with embracing Generative Adversarial Networks (GANs). However, it’s still very challenging for translation tasks that require high quality, especially at high-resolution and photorealism. In this paper, we present Discriminative Region Proposal Adversarial Networks (DRPAN) for highquality image-to-image translation. We decompose the procedure of imageto-image translation task into three iterated steps, first is to generate an image with global structure but some local artifacts (via GAN), second is using our DRPnet to propose the most fake region from the generated image, and third is to implement “image inpainting” on the most fake region for more realistic result through a reviser, so that the system (DRPAN) can be gradually optimized to synthesize images with more attention on the most artifact local part. Experiments on a variety of image-to-image translation tasks and datasets validate that our method outperforms state-of-the-arts for producing high-quality translation results in terms of both human perceptual studies and automatic quantitative measures.", "title": "" } ]
scidocsrr
2bbcb61f2c8eb592cfee7aa1feb16f4f
Copker: Computing with Private Keys without RAM
[ { "docid": "c70466f8b1e70fcdd4b7fe3f2cb772b2", "text": "We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design. Tor adds perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency. We briefly describe our experiences with an international network of more than a dozen hosts. We close with a list of open problems in anonymous communication.", "title": "" }, { "docid": "caa63861eabe7919a14301dfa8321a15", "text": "As CPU cores become both faster and more numerous, the limiting factor for most programs is now, and will be for some time, memory access. Hardware designers have come up with ever more sophisticated memory handling and acceleration techniques–such as CPU caches–but these cannot work optimally without some help from the programmer. Unfortunately, neither the structure nor the cost of using the memory subsystem of a computer or the caches on CPUs is well understood by most programmers. This paper explains the structure of memory subsystems in use on modern commodity hardware, illustrating why CPU caches were developed, how they work, and what programs should do to achieve optimal performance by utilizing them.", "title": "" } ]
[ { "docid": "3da3a1220eaeea47583990913fd1955b", "text": "Despite the significant progress in speech recognition enabled by deep neural networks, poor performance persists in some scenarios. In this work, we focus on far-field speech recognition which remains challenging due to high levels of noise and reverberation in the captured speech signals. We propose to represent the stages of acoustic processing including beamforming, feature extraction, and acoustic modeling, as three components of a single unified computational network. The parameters of a frequency-domain beam-former are first estimated by a network based on features derived from the microphone channels. These filter coefficients are then applied to the array signals to form an enhanced signal. Conventional features are then extracted from this signal and passed to a second network that performs acoustic modeling for classification. The parameters of both the beamforming and acoustic modeling networks are trained jointly using back-propagation with a common cross-entropy objective function. In experiments on the AMI meeting corpus, we observed improvements by pre-training each sub-network with a network-specific objective function before joint training of both networks. The proposed method obtained a 3.2% absolute word error rate reduction compared to a conventional pipeline of independent processing stages.", "title": "" }, { "docid": "77b796ab3536541b3f2a20512809a058", "text": "We have measured the bulk optical properties of healthy female breast tissues in vivo in the parallel plate, transmission geometry. Fifty-two volunteers were measured. Blood volume and blood oxygen saturation were derived from the optical property data using a novel method that employed a priori spectral information to overcome limitations associated with simple homogeneous tissue models. The measurements provide an estimate of the variation of normal breast tissue optical properties in a fairly large population. The mean blood volume was 34 +/- 9 microM and the mean blood oxygen saturation was 68 +/- 8%. We also investigated the correlation of these optical properties with demographic factors such as body mass index (BMI) and age. We observed a weak correlation of blood volume and reduced scattering coefficient with BMI: correlation with age, however, was not evident within the statistical error of these experiments. The new information on healthy breast tissue provides insight about the potential contrasts available for diffuse optical tomography of breast tumours.", "title": "" }, { "docid": "8b29238eb2d2d8a28dfdfcb72e30d3b0", "text": "The microgrid concept is gaining popularity with the proliferation of distributed generation. Control techniques in the microgrid are an evolving research topic in the area of microgrids. A large volume of survey articles focuses on the control techniques of the microgrid; however, a systematic survey of the hierarchical control techniques based on different microgrid architectures is addressed very little. The hierarchy of control in microgrid comprises three layers, which are primary, secondary, and tertiary control layers. A review of the primary and secondary control strategies for the ac, dc, and hybrid ac–dc microgrid is addressed in this paper. Furthermore, it includes the highlights of the state-of-the-art control techniques and evolving trends in the microgrid research.", "title": "" }, { "docid": "ef1e21b30f0065a78ec42def27b1a795", "text": "The rise of industry 4.0 and data-intensive manufacturing makes advanced process control (APC) applications more relevant than ever for process/production optimization, related costs reduction, and increased efficiency. One of the most important APC technologies is virtual metrology (VM). VM aims at exploiting information already available in the process/system under exam, to estimate quantities that are costly or impossible to measure. Machine learning (ML) approaches are the foremost choice to design VM solutions. A serious drawback of traditional ML methodologies is that they require a features extraction phase that generally limits the scalability and performance of VM solutions. Particularly, in presence of multi-dimensional data, the feature extraction process is based on heuristic approaches that may capture features with poor predictive power. In this paper, we exploit modern deep learning (DL)-based technologies that are able to automatically extract highly informative features from the data, providing more accurate and scalable VM solutions. In particular, we exploit DL architectures developed in the realm of computer vision to model data that have both spatial and time evolution. The proposed methodology is tested on a real industrial dataset related to etching, one of the most important semiconductor manufacturing processes. The dataset at hand contains optical emission spectroscopy data and it is paradigmatic of the feature extraction problem in VM under examination.", "title": "" }, { "docid": "e53f8337393ad6e09ce264b453e55ec8", "text": "Watson is a question answering system that uses natural language processing, information retrieval, knowledge interpretation, automated reasoning and machine learning techniques. It can analyze millions of documents and answer most of the questions accurately with varying level of confidence. However, training IBM Watson may be tedious and may not be efficient if certain set of guidelines are not followed. In this paper, we discuss an effective strategy to train IBM Watson question answering system. We experienced this strategy during the classroom teaching of IBM Watson at Ryerson University in Big Data Analytics certification program. We have observed that if documents are well segmented, contain relevant titles and have consistent formatting, then the recall of the answers can be as high as 95%.", "title": "" }, { "docid": "d4724f6b007c914120508b2e694a31d9", "text": "Finding semantically related words is a first step in the dire ct on of automatic ontology building. Guided by the view that similar words occur in simi lar contexts, we looked at the syntactic context of words to measure their semantic sim ilarity. Words that occur in a direct object relation with the verb drink, for instance, have something in common ( liquidity, ...). Co-occurrence data for common nouns and proper names , for several syntactic relations, was collected from an automatically parsed corp us of 78 million words of newspaper text. We used several vector-based methods to compute the distributional similarity between words. Using Dutch EuroWordNet as evaluation stand ard, we investigated which vector-based method and which combination of syntactic rel ations is the strongest predictor of semantic similarity.", "title": "" }, { "docid": "b57377a695ce7c5114d61bbe4f29e7a1", "text": "Referring to existing illustrations helps novice drawers to realize their ideas. To find such helpful references from a large image collection, we first build a semantic vector representation of illustrations by training convolutional neural networks. As the proposed vector space correctly reflects the semantic meanings of illustrations, users can efficiently search for references with similar attributes. Besides the search with a single query, a semantic morphing algorithm that searches the intermediate illustrations that gradually connect two queries is proposed. Several experiments were conducted to demonstrate the effectiveness of our methods.", "title": "" }, { "docid": "64588dd8ef9310b3682e56a9c74ce292", "text": "Diagnostic testing can be used to discriminate subjects with a target disorder from subjects without it. Several indicators of diagnostic performance have been proposed, such as sensitivity and specificity. Using paired indicators can be a disadvantage in comparing the performance of competing tests, especially if one test does not outperform the other on both indicators. Here we propose the use of the odds ratio as a single indicator of diagnostic performance. The diagnostic odds ratio is closely linked to existing indicators, it facilitates formal meta-analysis of studies on diagnostic test performance, and it is derived from logistic models, which allow for the inclusion of additional variables to correct for heterogeneity. A disadvantage is the impossibility of weighing the true positive and false positive rate separately. In this article the application of the diagnostic odds ratio in test evaluation is illustrated.", "title": "" }, { "docid": "76404b7c30a78cfd361aaf2fcc8091d3", "text": "The trend towards renewable, decentralized, and highly fluctuating energy suppliers (e.g. photovoltaic, wind power, CHP) introduces a tremendous burden on the stability of future power grids. By adding sophisticated ICT and intelligent devices, various Smart Grid initiatives work on concepts for intelligent power meters, peak load reductions, efficient balancing mechanisms, etc. As in the Smart Grid scenario data is inherently distributed over different, often non-cooperative parties, mechanisms for efficient coordination of the suppliers, consumers and intermediators is required in order to ensure global functioning of the power grid. In this paper, a highly flexible market platform is introduced for coordinating self-interested energy agents representing power suppliers, customers and prosumers. These energy agents implement a generic bidding strategy that can be governed by local policies. These policies declaratively represent user preferences or constraints of the devices controlled by the agent. Efficient coordination between the agents is realized through a market mechanism that incentivizes the agents to reveal their policies truthfully to the market. By knowing the agent’s policies, an efficient solution for the overall system can be determined. As proof of concept implementation the market platform D’ACCORD is presented that supports various market structures ranging from a single local energy exchange to a hierarchical energy market structure (e.g. as proposed in [10]).", "title": "" }, { "docid": "3f0286475580e4c5663023593ef12aff", "text": "ABSRACT Sliding mode control has received much attention due to its major advantages such as guaranteed stability, robustness against parameter variations, fast dynamic response and simplicity in the implementation and therefore has been widely applied to control nonlinear systems. This paper discus the sliding mode control technic for controlling hydropower system and generalized a model which can be used to simulate a hydro power plant using MATLAB/SIMULINK. This system consist hydro turbine connected to a generator coaxially, which is connected to grid. Simulation of the system can be done using various simulation tools, but SIMULINK is preferred because of simplicity and useful basic function blocks. The Simulink program is used to obtain the systematic dynamic model of the system and testing the operation with different PID controllers, SMC controller with additional integral action.", "title": "" }, { "docid": "0b18f7966a57e266487023d3a2f3549d", "text": "A clear andpowerfulformalism for describing languages, both natural and artificial, follows f iom a method for expressing grammars in logic due to Colmerauer and Kowalski. This formalism, which is a natural extension o f context-free grammars, we call \"definite clause grammars\" (DCGs). A DCG provides not only a description of a language, but also an effective means for analysing strings o f that language, since the DCG, as it stands, is an executable program o f the programming language Prolog. Using a standard Prolog compiler, the DCG can be compiled into efficient code, making it feasible to implement practical language analysers directly as DCGs. This paper compares DCGs with the successful and widely used augmented transition network (ATN) formalism, and indicates how ATNs can be translated into DCGs. It is argued that DCGs can be at least as efficient as ATNs, whilst the DCG formalism is clearer, more concise and in practice more powerful", "title": "" }, { "docid": "ed33687781081638ea885e6610ff6010", "text": "Temporal data mining is the application of data mining techniques to data that takes the time dimension into account. This paper studies changes in cluster characteristics of supermarket customers over a 24 week period. Such an analysis can be useful for formulating marketing strategies. Marketing managers may want to focus on specific groups of customers. Therefore they may need to understand the migrations of the customers from one group to another group. The marketing strategies may depend on the desirability of these cluster migrations. The temporal analysis presented here is based on conventional and modified Kohonen self organizing maps (SOM). The modified Kohonen SOM creates interval set representations of clusters using properties of rough sets. A description of an experimental design for temporal cluster migration studies 0020-0255/$ see front matter 2005 Elsevier Inc. All rights reserved. doi:10.1016/j.ins.2004.12.007 * Corresponding author. Tel.: +1 902 420 5798; fax: +1 902 420 5035. E-mail address: pawan.lingras@smu.ca (P. Lingras). 216 P. Lingras et al. / Information Sciences 172 (2005) 215–240 including, data cleaning, data abstraction, data segmentation, and data sorting, is provided. The paper compares conventional and non-conventional (interval set) clustering techniques, as well as temporal and non-temporal analysis of customer loyalty. The interval set clustering is shown to provide an interesting dimension to such a temporal analysis. 2005 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "f3a8bb3fdda39554dfd98b639eeba335", "text": "Communication between auditory and vocal motor nuclei is essential for vocal learning. In songbirds, the nucleus interfacialis of the nidopallium (NIf) is part of a sensorimotor loop, along with auditory nucleus avalanche (Av) and song system nucleus HVC, that links the auditory and song systems. Most of the auditory information comes through this sensorimotor loop, with the projection from NIf to HVC representing the largest single source of auditory information to the song system. In addition to providing the majority of HVC's auditory input, NIf is also the primary driver of spontaneous activity and premotor-like bursting during sleep in HVC. Like HVC and RA, two nuclei critical for song learning and production, NIf exhibits behavioral-state dependent auditory responses and strong motor bursts that precede song output. NIf also exhibits extended periods of fast gamma oscillations following vocal production. Based on the converging evidence from studies of physiology and functional connectivity it would be reasonable to expect NIf to play an important role in the learning, maintenance, and production of song. Surprisingly, however, lesions of NIf in adult zebra finches have no effect on song production or maintenance. Only the plastic song produced by juvenile zebra finches during the sensorimotor phase of song learning is affected by NIf lesions. In this review, we carefully examine what is known about NIf at the anatomical, physiological, and behavioral levels. We reexamine conclusions drawn from previous studies in the light of our current understanding of the song system, and establish what can be said with certainty about NIf's involvement in song learning, maintenance, and production. Finally, we review recent theories of song learning integrating possible roles for NIf within these frameworks and suggest possible parallels between NIf and sensorimotor areas that form part of the neural circuitry for speech processing in humans.", "title": "" }, { "docid": "382ac4d3ba3024d0c760cff1eef505c3", "text": "We seek to close the gap between software engineering (SE) and human-computer interaction (HCI) by indicating interdisciplinary interfaces throughout the different phases of SE and HCI lifecycles. As agile representatives of SE, Extreme Programming (XP) and Agile Modeling (AM) contribute helpful principles and practices for a common engineering approach. We present a cross-discipline user interface design lifecycle that integrates SE and HCI under the umbrella of agile development. Melting IT budgets, pressure of time and the demand to build better software in less time must be supported by traveling as light as possible. We did, therefore, choose not just to mediate both disciplines. Following our surveys, a rather radical approach best fits the demands of engineering organizations.", "title": "" }, { "docid": "82bdaf46188ffa0e2bd555aadaa0957c", "text": "Smart pills were originally developed for diagnosis; however, they are increasingly being applied to therapy - more specifically drug delivery. In addition to smart drug delivery systems, current research is also looking into localization systems for reaching the target areas, novel locomotion mechanisms and positioning systems. Focusing on the major application fields of such devices, this article reviews smart pills developed for local drug delivery. The review begins with the analysis of the medical needs and socio-economic benefits associated with the use of such devices and moves onto the discussion of the main implemented technological solutions with special attention given to locomotion systems, drug delivery systems and power supply. Finally, desired technical features of a fully autonomous robotic capsule for local drug delivery are defined and future research trends are highlighted.", "title": "" }, { "docid": "f6a08c6659fcb7e6e56c0d004295c809", "text": "Graph convolutional networks (GCNs) are powerful deep neural networks for graph-structured data. However, GCN computes the representation of a node recursively from its neighbors, making the receptive field size grow exponentially with the number of layers. Previous attempts on reducing the receptive field size by subsampling neighbors do not have convergence guarantee, and their receptive field size per node is still in the order of hundreds. In this paper, we develop control variate based algorithms with new theoretical guarantee to converge to a local optimum of GCN regardless of the neighbor sampling size. Empirical results show that our algorithms enjoy similar convergence rate and model quality with the exact algorithm using only two neighbors per node. The running time of our algorithms on a large Reddit dataset is only one seventh of previous neighbor sampling algorithms.", "title": "" }, { "docid": "46ef5b489f02a1b62b0fb78a28bfc32c", "text": "Biobanks have been heralded as essential tools for translating biomedical research into practice, driving precision medicine to improve pathways for global healthcare treatment and services. Many nations have established specific governance systems to facilitate research and to address the complex ethical, legal and social challenges that they present, but this has not lead to uniformity across the world. Despite significant progress in responding to the ethical, legal and social implications of biobanking, operational, sustainability and funding challenges continue to emerge. No coherent strategy has yet been identified for addressing them. This has brought into question the overall viability and usefulness of biobanks in light of the significant resources required to keep them running. This review sets out the challenges that the biobanking community has had to overcome since their inception in the early 2000s. The first section provides a brief outline of the diversity in biobank and regulatory architecture in seven countries: Australia, Germany, Japan, Singapore, Taiwan, the UK, and the USA. The article then discusses four waves of responses to biobanking challenges. This article had its genesis in a discussion on biobanks during the Centre for Health, Law and Emerging Technologies (HeLEX) conference in Oxford UK, co-sponsored by the Centre for Law and Genetics (University of Tasmania). This article aims to provide a review of the issues associated with biobank practices and governance, with a view to informing the future course of both large-scale and smaller scale biobanks.", "title": "" }, { "docid": "18b0f6712396476dc4171128ff08a355", "text": "Heterogeneous multicore architectures have the potential for high performance and energy efficiency. These architectures may be composed of small power-efficient cores, large high-performance cores, and/or specialized cores that accelerate the performance of a particular class of computation. Architects have explored multiple dimensions of heterogeneity, both in terms of micro-architecture and specialization. While early work constrained the cores to share a single ISA, this work shows that allowing heterogeneous ISAs further extends the effectiveness of such architectures\n This work exploits the diversity offered by three modern ISAs: Thumb, x86-64, and Alpha. This architecture has the potential to outperform the best single-ISA heterogeneous architecture by as much as 21%, with 23% energy savings and a reduction of 32% in Energy Delay Product.", "title": "" }, { "docid": "64368f9f02bd0f40471e976023237d87", "text": "LEARNING OBJECTIVES\nAfter reading this article and watching the accompanying videos, the participant should be able to: 1. Assess patients seeking facial volumization and correlate volume deficiencies anatomically. 2. Identify appropriate fillers based on rheologic properties and anatomical needs. 3. Recognize poor candidates for facial volumization. 4. Recognize and treat filler-related side effects and complications.\n\n\nSUMMARY\nFacial volumization is widely applied for minimally invasive facial rejuvenation both as a solitary means and in conjunction with surgical correction. Appropriate facial volumization is dependent on patient characteristics, consistent longitudinal anatomical changes, and qualities of fillers available. In this article, anatomical changes seen with aging are illustrated, appropriate techniques for facial volumization are described in the setting of correct filler selection, and potential complications are addressed.", "title": "" }, { "docid": "4fae54c77416216abdeb3459acaebb8a", "text": "A survey on 143 university students was conducted to examine what motives young adults have for Facebook use, which of those motives were endorsed more than the others, and how those motives were related to the tendency of expressing one’s ‘‘true self’’ through Facebook use. According to the results, primary motive for Facebook use was to maintain long-distance relationships. This motive was followed by game-playing/entertainment, active forms of photo-related activities, organizing social activities, passive observations, establishing new friendships, and initiating and/or terminating romantic relationships. Another interesting result was that individuals’ tendency for expressing one’s true self on the Net had an influence on their Facebook use motives: The ones with high tendency to express their true self on the Internet reported to use Facebook for establishing new friendships and for initiating/terminating romantic relationships more than the individuals’ with low and medium levels of the same tendency did. 2012 Elsevier Ltd. All rights reserved.", "title": "" } ]
scidocsrr
b8d9c3566e33474c92f0ad6056b3376a
Probabilistic Programming with Gaussian Process Memoization
[ { "docid": "1c8aad6a9083d81c5975936553f7edc3", "text": "Detecting instances of unknown categories is an important task for a multitude of problems such as object recognition, event detection, and defect localization. This paper investigates the use of Gaussian process (GP) priors for this area of research. Focusing on the task of one-class classification for visual object recognition, we analyze different measures derived from GP regression and approximate GP classification. Experiments are performed using a large set of categories and different image kernel functions. Our findings show that the well-known Support Vector Data Description is significantly outperformed by at least two GP measures which indicates high potential of Gaussian processes for one-class classification.", "title": "" }, { "docid": "809d03fd69aebc7573463756a535de18", "text": "We describe Venture, an interactive virtual machine for probabilistic programming that aims to be sufficiently expressive, extensible, and efficient for general-purpose use. Like Church, probabilistic models and inference problems in Venture are specified via a Turing-complete, higher-order probabilistic language descended from Lisp. Unlike Church, Venture also provides a compositional language for custom inference strategies, assembled from scalable implementations of several exact and approximate techniques. Venture is thus applicable to problems involving widely varying model families, dataset sizes and runtime/accuracy constraints. We also describe four key aspects of Venture’s implementation that build on ideas from probabilistic graphical models. First, we describe the stochastic procedure interface (SPI) that specifies and encapsulates primitive random variables, analogously to conditional probability tables in a Bayesian network. The SPI supports custom control flow, higher-order probabilistic procedures, partially exchangeable sequences and “likelihood-free” stochastic simulators, all with custom proposals. It also supports the integration of external models that dynamically create, destroy and perform inference over latent variables hidden from Venture. Second, we describe probabilistic execution traces (PETs), which represent execution histories of Venture programs. Like Bayesian networks, PETs capture conditional dependencies, but PETs also represent existential dependencies and exchangeable coupling. Third, we describe partitions of execution histories called scaffolds that can be efficiently constructed from PETs and that factor global inference problems into coherent sub-problems. Finally, we describe a family of stochastic regeneration algorithms for efficiently modifying PET fragments contained within scaffolds without visiting conditionally independent random choices. Stochastic regeneration insulates inference algorithms from the complexities introduced by changes in execution structure, with runtime that scales linearly in cases where previous approaches often scaled quadratically and were therefore impractical. We show how to use stochastic regeneration and the SPI to implement general-purpose inference strategies such as Metropolis-Hastings, Gibbs sampling, and blocked proposals based on hybrids with both particle Markov chain Monte Carlo and mean-field variational inference techniques.", "title": "" } ]
[ { "docid": "5e58638e766904eb84380b53cae60df2", "text": "BACKGROUND\nAneurysmal subarachnoid hemorrhage (SAH) accounts for 5% of strokes and carries a poor prognosis. It affects around 6 cases per 100,000 patient years occurring at a relatively young age.\n\n\nMETHODS\nCommon risk factors are the same as for stroke, and only in a minority of the cases, genetic factors can be found. The overall mortality ranges from 32% to 67%, with 10-20% of patients with long-term dependence due to brain damage. An explosive headache is the most common reported symptom, although a wide spectrum of clinical disturbances can be the presenting symptoms. Brain computed tomography (CT) allow the diagnosis of SAH. The subsequent CT angiography (CTA) or digital subtraction angiography (DSA) can detect vascular malformations such as aneurysms. Non-aneurysmal SAH is observed in 10% of the cases. In patients surviving the initial aneurysmal bleeding, re-hemorrhage and acute hydrocephalus can affect the prognosis.\n\n\nRESULTS\nAlthough occlusion of an aneurysm by surgical clipping or endovascular procedure effectively prevents rebleeding, cerebral vasospasm and the resulting cerebral ischemia occurring after SAH are still responsible for the considerable morbidity and mortality related to such a pathology. A significant amount of experimental and clinical research has been conducted to find ways in preventing these complications without sound results.\n\n\nCONCLUSIONS\nEven though no single pharmacological agent or treatment protocol has been identified, the main therapeutic interventions remain ineffective and limited to the manipulation of systemic blood pressure, alteration of blood volume or viscosity, and control of arterial dioxide tension.", "title": "" }, { "docid": "ecb4ae6bbb10fb1194ee22d3f893df00", "text": "The problem of modeling the continuously changing trends in finance markets and generating real-time, meaningful predictions about significant changes in those markets has drawn considerable interest from economists and data scientists alike. In addition to traditional market indicators, growth of varied social media has enabled economists to leverage microand real-time indicators about factors possibly influencing the market, such as public emotion, anticipations and behaviors. We propose several specific market related features that can be mined from varied sources such as news, Google search volumes and Twitter. We further investigate the correlation between these features and financial market fluctuations. In this paper, we present a Delta Naive Bayes (DNB) approach to generate prediction about financial markets. We present a detailed prospective analysis of prediction accuracy generated from multiple, combined sources with those generated from a single source. We find that multi-source predictions consistently outperform single-source predictions, even though with some limitations.", "title": "" }, { "docid": "5e0d65ae26f6462c2f49af9188274c9d", "text": "BACKGROUND\nThis study examined psychiatric comorbidity in adolescents with a gender identity disorder (GID). We focused on its relation to gender, type of GID diagnosis and eligibility for medical interventions (puberty suppression and cross-sex hormones).\n\n\nMETHODS\nTo ascertain DSM-IV diagnoses, the Diagnostic Interview Schedule for Children (DISC) was administered to parents of 105 gender dysphoric adolescents.\n\n\nRESULTS\n67.6% had no concurrent psychiatric disorder. Anxiety disorders occurred in 21%, mood disorders in 12.4% and disruptive disorders in 11.4% of the adolescents. Compared with natal females (n = 52), natal males (n = 53) suffered more often from two or more comorbid diagnoses (22.6% vs. 7.7%, p = .03), mood disorders (20.8% vs. 3.8%, p = .008) and social anxiety disorder (15.1% vs. 3.8%, p = .049). Adolescents with GID considered to be 'delayed eligible' for medical treatment were older [15.6 years (SD = 1.6) vs. 14.1 years (SD = 2.2), p = .001], their intelligence was lower [91.6 (SD = 12.4) vs. 99.1 (SD = 12.8), p = .011] and a lower percentage was living with both parents (23% vs. 64%, p < .001). Although the two groups did not differ in the prevalence of psychiatric comorbidity, the respective odds ratios ('delayed eligible' adolescents vs. 'immediately eligible' adolescents) were >1.0 for all psychiatric diagnoses except specific phobia.\n\n\nCONCLUSIONS\nDespite the suffering resulting from the incongruence between experienced and assigned gender at the start of puberty, the majority of gender dysphoric adolescents do not have co-occurring psychiatric problems. Delayed eligibility for medical interventions is associated with psychiatric comorbidity although other factors are of importance as well.", "title": "" }, { "docid": "bba21c774160b38eb64bf06b2e8b9ab7", "text": "Open data marketplaces have emerged as a mode of addressing open data adoption barriers. However, knowledge of how such marketplaces affect digital service innovation in open data ecosystems is limited. This paper explores their value proposition for open data users based on an exploratory case study. Five prominent perceived values are identified: lower task complexity, higher access to knowledge, increased possibilities to influence, lower risk and higher visibility. The impact on open data adoption barriers is analyzed and the consequences for ecosystem sustainability is discussed. The paper concludes that open data marketplaces can lower the threshold of using open data by providing better access to open data and associated support services, and by increasing knowledge transfer within the ecosystem.", "title": "" }, { "docid": "c2a7e20e9e0ce2e4c4bad58461c85c7d", "text": "This paper develops an estimation technique for analyzing the impact of technological change on the dynamics of consumer demand in a differentiated durable products industry. The paper presents a dynamic model of consumer demand for differentiated durable products that explicitly accounts for consumers’ expectations of future product quality and consumers’ outflow from the market, arising endogenously from their purchase decisions. The timing of consumers’ purchases is formalized as an optimal stopping problem. A solution to that problem defines the hazard rate of product adoptions, while the nested discrete choice model determines the alternativespecific purchase probabilities. Integrating individual decisions over the population distribution generates rich dynamics of aggregate and product level sales. The empirical part of the paper takes the model to data on the U.S. computer printer market. The estimates support the hypothesis of consumers’ forward-looking behavior, allowing for better demand forecasts and improved measures of welfare gains from introducing new products. ∗I would like to thank Patrick Bayer, John Rust, Christopher Timmins, and especially my advisors, Steven Berry, Ariel Pakes and Martin Pesendorfer for valuable advice and general encouragement. I have greatly benefitted from discussions with Eugene Choo, Philip Haile, Jerry Hausman, Günter Hitsch, Nickolay Moshkin, Katja Seim and Nadia Soboleva. Seminar participants at Harvard and Yale provided many helpful suggestions. I am indebted to Mark Bates of PC Data, Inc. for providing me with the data without which this research would not be possible. I am grateful to Susan Olmsted for her help with administrative issues. All errors are my own. †Contact information: e-mail oleg.melnikov@yale.edu, homepage http://www.econ.yale.edu/ ̃melnikov, phone (203) 432-3563, fax (203) 432-5779.", "title": "" }, { "docid": "768a4839232a39f8c4fe15ca095217d1", "text": "Advances in deep learning over the last decade have led to a flurry of research in the application of deep artificial neural networks to robotic systems, with at least thirty papers published on the subject between 2014 and the present. This review discusses the applications, benefits, and limitations of deep learning vis-\\`a-vis physical robotic systems, using contemporary research as exemplars. It is intended to communicate recent advances to the wider robotics community and inspire additional interest in and application of deep learning in robotics.", "title": "" }, { "docid": "060cf7fd8a97c1ddf852373b63fe8ae1", "text": "Object viewpoint estimation from 2D images is an essential task in computer vision. However, two issues hinder its progress: scarcity of training data with viewpoint annotations, and a lack of powerful features. Inspired by the growing availability of 3D models, we propose a framework to address both issues by combining render-based image synthesis and CNNs (Convolutional Neural Networks). We believe that 3D models have the potential in generating a large number of images of high variation, which can be well exploited by deep CNN with a high learning capacity. Towards this goal, we propose a scalable and overfit-resistant image synthesis pipeline, together with a novel CNN specifically tailored for the viewpoint estimation task. Experimentally, we show that the viewpoint estimation from our pipeline can significantly outperform state-of-the-art methods on PASCAL 3D+ benchmark.", "title": "" }, { "docid": "9e0f3f1ec7b54c5475a0448da45e4463", "text": "Significant effort has been devoted to designing clustering algorithms that are responsive to user feedback or that incorporate prior domain knowledge in the form of constraints. However, users desire more expressive forms of interaction to influence clustering outcomes. In our experiences working with diverse application scientists, we have identified an interaction style scatter/gather clustering that helps users iteratively restructure clustering results to meet their expectations. As the names indicate, scatter and gather are dual primitives that describe whether clusters in a current segmentation should be broken up further or, alternatively, brought back together. By combining scatter and gather operations in a single step, we support very expressive dynamic restructurings of data. Scatter/gather clustering is implemented using a nonlinear optimization framework that achieves both locality of clusters and satisfaction of user-supplied constraints. We illustrate the use of our scatter/gather clustering approach in a visual analytic application to study baffle shapes in the bat biosonar (ears and nose) system. We demonstrate how domain experts are adept at supplying scatter/gather constraints, and how our framework incorporates these constraints effectively without requiring numerous instance-level constraints.", "title": "" }, { "docid": "095f4ea337421d6e1310acf73977fdaa", "text": "We consider the problem of autonomous robotic laundry folding, and propose a solution to the perception and manipulation challenges inherent to the task. At the core of our approach is a quasi-static cloth model which allows us to neglect the complex dynamics of cloth under significant parts of the state space, allowing us to reason instead in terms of simple geometry. We present an algorithm which, given a 2D cloth polygon and a desired sequence of folds, outputs a motion plan for executing the corresponding manipulations, deemed g-folds, on a minimal number of robot grippers. We define parametrized fold sequences for four clothing categories: towels, pants, short-sleeved shirts, and long-sleeved shirts, each represented as polygons. We then devise a model-based optimization approach for visually inferring the class and pose of a spread-out or folded clothing article from a single image, such that the resulting polygon provides a parse suitable for these folding primitives. We test the manipulation and perception tasks individually, and combine them to implement an autonomous folding system on the Willow Garage PR2. This enables the PR2 to identify a clothing article spread out on a table, execute the computed folding sequence, and visually track its progress over successive folds.", "title": "" }, { "docid": "f7ae1490a671c6a09783996c43015c74", "text": "In human computer interaction, speech emotion recognition is playing a pivotal part in the field of research. Human emotions consist of being angry, happy, sad, disgust, neutral. In this paper the features are extracted with hybrid of pitch, formants, zero crossing, MFCC and its statistical parameters. The pitch detection is done by cepstral algorithm after comparing it with autocorrelation and AMDF. The training and testing part of the SVM classifier is compared with different kernel function like linear, polynomial, quadratic and RBF. The polish database is used for the classification. The comparison between the different kernels is obtained for the corresponding feature vector.", "title": "" }, { "docid": "c2ad5fefd1a881c7f8b9a5d2ed57a148", "text": "This paper proposes a method for extracting the fingering configurations automatically from a recorded guitar performance. 330 different fingering configurations are considered, corresponding to different versions of the major, minor, major 7th, and minor 7th chords played on the guitar fretboard. The method is formulated as a hidden Markov model, where the hidden states correspond to the different fingering configurations and the observed acoustic features are obtained from a multiple fundamental frequency estimator that measures the salience of a range of candidate note pitches within individual time frames. Transitions between consecutive fingerings are constrained by a musical model trained on a database of chord sequences, and a heuristic cost function that measures the physical difficulty of moving from one configuration of finger positions to another. The method was evaluated on recordings from the acoustic, electric, and the Spanish guitar and clearly outperformed a non-guitar-specific reference chord transcription method despite the fact that the number of chords considered here is significantly larger.", "title": "" }, { "docid": "259f430f0c7da0fd3c97f3ed41260ac5", "text": "This thesis explores the problems and possibilities of computer-controlled scent output. I begin with a thorough literature review of how we smell and how scents are categorized. I look at applications of aroma through the ages, with particular emphasis on the role of scent in information display in a variety of media. I then present and discuss several projects I have built to explore the use of computer-controlled olfactory display, and some pilot studies of issues related to such display. I quantify human physical limitations on olfactory input, and conclude that olfactory display must rely on differences between smells, and not differences in intensity of the same smell. I propose a theoretical framework for scent in human-computer interactions, and develop concepts of olfactory icons and ‘smicons’. I further conclude that scent is better suited for display slowly changing, continuous information than discrete events. I conclude with my predictions for the prospects of symbolic, computer-controlled, olfactory display. Thesis Supervisor: Michael J. Hawley Assistant Professor of Media Arts & Sciences Funding provided by the sponsors of the Counter Intelligence Special Interest Group.", "title": "" }, { "docid": "f8a03124f2c32dd50ac690cf801e36b2", "text": "The aberrant alterations of biological functions are well known in tumorigenesis and cancer development. Hence, with advances in high-throughput sequencing technologies, capturing and quantifying the functional alterations in cancers based on expression profiles to explore cancer malignant process is highlighted as one of the important topics among cancer researches. In this article, we propose an algorithm for quantifying biological processes by using gene expression profiles over a sample population, which involves the idea of constructing principal curves to condense information of each biological process by a novel scoring scheme on an individualized manner. After applying our method on several large-scale breast cancer datasets in survival analysis, a subset of these biological processes extracted from corresponding survival model is then found to have significant associations with clinical outcomes. Further analyses of these biological processes enable the study of the interplays between biological processes and cancer phenotypes of interest, provide us valuable insights into cancer biology in biological process level and guide the precision treatment for cancer patients. And notably, prognosis predictions based on our method are consistently superior to the existing state of art methods with the same intention.", "title": "" }, { "docid": "54b13b9123e6142ea7c035aa4fa3780c", "text": "Œis paper presents Conv-KNRM, a Convolutional Kernel-based Neural Ranking Model that models n-gram so‰ matches for ad-hoc search. Instead of exact matching query and document n-grams, Conv-KNRM uses Convolutional Neural Networks to represent ngrams of various lengths and so‰ matches them in a uni€ed embedding space. Œe n-gram so‰ matches are then utilized by the kernel pooling and learning-to-rank layers to generate the €nal ranking score. Conv-KNRM can be learned end-to-end and fully optimized from user feedback. Œe learned model’s generalizability is investigated by testing how well it performs in a related domain with small amounts of training data. Experiments on English search logs, Chinese search logs, and TREC Web track tasks demonstrated consistent advantages of Conv-KNRM over prior neural IR methods and feature-based methods.", "title": "" }, { "docid": "149fa8c20c5656373930474237337b21", "text": "OBJECTIVES: To compare the predictive value of pH, base deficit and lactate for the occurrence of moderate-to-severe hypoxic ischaemic encephalopathy (HIE) and systemic complications of asphyxia in term infants with intrapartum asphyxia.STUDY DESIGN: We retrospectively reviewed the records of 61 full-term neonates (≥37 weeks gestation) suspected of having suffered from a significant degree of intrapartum asphyxia from a period of January 1997 to December 2001.The clinical signs of HIE, if any, were categorized using Sarnat and Sarnat classification as mild (stage 1), moderate (stage 2) or severe (stage 3). Base deficit, pH and plasma lactate levels were measured from indwelling arterial catheters within 1 hour after birth and thereafter alongwith every blood gas measurement. The results were correlated with the subsequent presence or absence of moderate-to-severe HIE by computing receiver operating characteristic curves.RESULTS: The initial lactate levels were significantly higher (p=0.001) in neonates with moderate-to-severe HIE (mean±SD=11.09±4.6) as compared to those with mild or no HIE (mean±SD=7.1±4.7). Also, the lactate levels took longer to normalize in these babies. A plasma lactate concentration >7.5±mmol/l was associated with moderate-or-severe HIE with a sensitivity of 94% and specificity of 67%. The sensitivity and negative predictive value of lactate was greater than that of the pH or base deficit.CONCLUSIONS: The highest recorded lactate level in the first hour of life and serial measurements of lactate are important predictors of moderate-to-severe HIE.", "title": "" }, { "docid": "8f1e3444c073a510df1594dc88d24b6b", "text": "Purpose – The purpose of this paper is to provide industrial managers with insight into the real-time progress of running processes. The authors formulated a periodic performance prediction algorithm for use in a proposed novel approach to real-time business process monitoring. Design/methodology/approach – In the course of process executions, the final performance is predicted probabilistically based on partial information. Imputation method is used to generate probable progresses of ongoing process and Support Vector Machine classifies the performances of them. These procedures are periodically iterated along with the real-time progress in order to describe the ongoing status. Findings – The proposed approach can describe the ongoing status as the probability that the process will be executed continually and terminated as the identical result. Furthermore, before the actual occurrence, a proactive warning can be provided for implicit notification of eventualities if the probability of occurrence of the given outcome exceeds the threshold. Research limitations/implications – The performance of the proactive warning strategy was evaluated only for accuracy and proactiveness. However, the process will be improved by additionally considering opportunity costs and benefits from actual termination types and their warning errors. Originality/value – Whereas the conventional monitoring approaches only classify the already occurred result of a terminated instance deterministically, the proposed approach predicts the possible results of an ongoing instance probabilistically over entire monitoring periods. As such, the proposed approach can provide the real-time indicator describing the current capability of ongoing process.", "title": "" }, { "docid": "d6dc54ea8db074c5337673e8de0b0982", "text": "In this study, the attitudes, expectations and views of 206 students in four high schools within the scope of the FAT_ IH project in Turkey were assessed regarding tablet PC technology after six months of a pilot plan that included the distribution of tablet PCs to students. The research questions of this study are whether there is a meaningful difference between tablet PC use by male and female students and the effect of computer and Internet by students on attitudes toward tablet PC use. Qualitative and quantitative data collection tools were used in the research. The Computer Attitude Measure for Young students (CAMYS) developed by Teo and Noyes (2008) was used in evaluating the students’ attitudes toward the tablet PC usage. Interviews were conducted with eight teachers at pilot schools concerning the integration of tablet PCs into their classes; the positive and negative dimensions of tablet PCs were analyzed. The findings indicate that students have a positive attitude toward tablet PCs. There was not a meaningful difference between the attitudes of male and female students toward tablet PCs. The length of computer and Internet by the students did not affect their attitudes toward tablet PCs. The ways that teachers used tablet PCs in classes, the positive and negative aspects of tablet PC usage and the students’ expectations of tablet PCs were discussed in the study. 2013 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "0e6fd08318cf94ea683892d737ae645a", "text": "We present simulations and demonstrate experimentally a new concept in winding a planar induction heater. The winding results in minimal ac magnetic field below the plane of the heater, while concentrating the flux above. Ferrites and other types of magnetic shielding are typically not required. The concept of a one-sided ac field can generalized to other geometries as well.", "title": "" }, { "docid": "7ec93b17c88d09f8a442dd32127671d8", "text": "Understanding the 3D structure of a scene is of vital importance, when it comes to developing fully autonomous robots. To this end, we present a novel deep learning based framework that estimates depth, surface normals and surface curvature by only using a single RGB image. To the best of our knowledge this is the first work to estimate surface curvature from colour using a machine learning approach. Additionally, we demonstrate that by tuning the network to infer well designed features, such as surface curvature, we can achieve improved performance at estimating depth and normals. This indicates that network guidance is still a useful aspect of designing and training a neural network. We run extensive experiments where the network is trained to infer different tasks while the model capacity is kept constant resulting in different feature maps based on the tasks at hand. We outperform the previous state-of-the-art benchmarks which jointly estimate depths and surface normals while predicting surface curvature in parallel.", "title": "" }, { "docid": "ae71548900779de3ee364a6027b75a02", "text": "The authors suggest that the traditional conception of prejudice--as a general attitude or evaluation--can problematically obscure the rich texturing of emotions that people feel toward different groups. Derived from a sociofunctional approach, the authors predicted that groups believed to pose qualitatively distinct threats to in-group resources or processes would evoke qualitatively distinct and functionally relevant emotional reactions. Participants' reactions to a range of social groups provided a data set unique in the scope of emotional reactions and threat beliefs explored. As predicted, different groups elicited different profiles of emotion and threat reactions, and this diversity was often masked by general measures of prejudice and threat. Moreover, threat and emotion profiles were associated with one another in the manner predicted: Specific classes of threat were linked to specific, functionally relevant emotions, and groups similar in the threat profiles they elicited were also similar in the emotion profiles they elicited.", "title": "" } ]
scidocsrr
a0a78f81714edb59c2c7e6a000cacd43
Optimal DNN primitive selection with partitioned boolean quadratic programming
[ { "docid": "f33ca4cfba0aab107eb8bd6d3d041b74", "text": "Deep neural networks (DNNs) require very large amounts of computation both for training and for inference when deployed in the field. A common approach to implementing DNNs is to recast the most computationally expensive operations as general matrix multiplication (GEMM). However, as we demonstrate in this paper, there are a great many different ways to express DNN convolution operations using GEMM. Although different approaches all perform the same number of operations, the size of temorary data structures differs significantly. Convolution of an input matrix with dimensions C × H × W , requires O(KCHW ) additional space using the classical im2col approach. More recently memory-efficient approaches requiring just O(KCHW ) auxiliary space have been proposed. We present two novel GEMM-based algorithms that require just O(MHW ) and O(KW ) additional space respectively, where M is the number of channels in the result of the convolution. These algorithms dramatically reduce the space overhead of DNN convolution, making it much more suitable for memory-limited embedded systems. Experimental evaluation shows that our lowmemory algorithms are just as fast as the best patch-building approaches despite requiring just a fraction of the amount of additional memory. Our low-memory algorithms have excellent data locality which gives them a further edge over patch-building algorithms when multiple cores are used. As a result, our low memory algorithms often outperform the best patch-building algorithms using multiple threads.", "title": "" } ]
[ { "docid": "98fb03e0e590551fa9e7c82b827c78ed", "text": "This article describes on-going developments of the VENUS European Project (Virtual ExploratioN of Underwater Sites, http://www.venus-project.eu) concerning the first mission to sea in Pianosa Island, Italy in October 2006. The VENUS project aims at providing scientific methodologies and technological tools for the virtual exploration of deep underwater archaeological sites. The VENUS project will improve the accessibility of underwater sites by generating thorough and exhaustive 3D records for virtual exploration. In this paper we focus on the underwater photogrammetric approach used to survey the archaeological site of Pianosa. After a brief presentation of the archaeological context we shall see the calibration process in such a context. The next part of this paper is dedicated to the survey: it is divided into two parts: a DTM of the site (combining acoustic bathymetry and photogrammetry) and a specific artefact plotting dedicated to the amphorae present on the site. * Corresponding author. This is useful to know for communication with the appropriate person in cases with more than one author. ** http://cordis.europa.eu/ist/digicult/venus.htm or the project web site : http://www.venus-project.eu 1. VENUS, VIRTUAL EXPLORATION OF UNDERWATER SITES The VENUS project is funded by European Commission, Information Society Technologies (IST) programme of the 6th FP for RTD . It aims at providing scientific methodologies and technological tools for the virtual exploration of deep underwater archaeological sites. (Chapman et alii, 2006). Underwater archaeological sites, for example shipwrecks, offer extraordinary opportunities for archaeologists due to factors such as darkness, low temperatures and a low oxygen rate which are favourable to preservation. On the other hand, these sites can not be experienced first hand and today are continuously jeopardised by activities such as deep trawling that destroy their surface layer. The VENUS project will improve the accessibility of underwater sites by generating thorough and exhaustive 3D records for virtual exploration. The project team plans to survey shipwrecks at various depths and to explore advanced methods and techniques of data acquisition through autonomous or remotely operated unmanned vehicles with innovative sonar and photogrammetry equipment. Research will also cover aspects such as data processing and storage, plotting of archaeological artefacts and information system management. This work will result in a series of best practices and procedures for collecting and storing data. Further, VENUS will develop virtual reality and augmented reality tools for the visualisation of an immersive interaction with a digital model of an underwater site. The model will be made accessible online, both as an example of digital preservation and for demonstrating new facilities of exploration in a safe, cost-effective and pedagogical environment. The virtual underwater site will provide archaeologists with an improved insight into the data and the general public with simulated dives to the site. The VENUS consortium, composed of eleven partners, is pooling expertise in various disciplines: archaeology and underwater exploration, knowledge representation and photogrammetry, virtual reality and digital data preservation. This paper focuses on the first experimentation in Pianosa Island, Tuscany, Italy. The document is structured as follows. A short description of the archaeological context, then the next section explains the survey method: calibration, collecting photographs using ROV and divers, photographs orientation and a particular way to measure amphorae with photogrammetry using archaeological knowledge. A section shows 3D results in VRML and finally we present the future planned work. 2. THE UNDERWATER ARCHAEOLOGICAL SITE OF PIANOSA ISLAND The underwater archaeological site of Pianosa, discovered in 1989 by volunteer divers (Giuseppe Adriani, Paolo Vaccari), is located at a depth of 35 m, close to the Scoglio della Scola, in XXI International CIPA Symposium, 01-06 October, Athens, Greece", "title": "" }, { "docid": "7eb7552f156a383a57614029e0c18d96", "text": "While bidirectional brain–gut interactions are well known mechanisms for the regulation of gut function in both healthy and diseased states, a role of the enteric flora—including both commensal and pathogenic organisms—in these interactions has only been recognized in the past few years. The brain can influence commensal organisms (enteric microbiota) indirectly, via changes in gastrointestinal motility and secretion, and intestinal permeability, or directly, via signaling molecules released into the gut lumen from cells in the lamina propria (enterochromaffin cells, neurons, immune cells). Communication from enteric microbiota to the host can occur via multiple mechanisms, including epithelial-cell, receptor-mediated signaling and, when intestinal permeability is increased, through direct stimulation of host cells in the lamina propria. Enterochromaffin cells are important bidirectional transducers that regulate communication between the gut lumen and the nervous system. Vagal, afferent innervation of enterochromaffin cells provides a direct pathway for enterochromaffin-cell signaling to neuronal circuits, which may have an important role in pain and immune-response modulation, control of background emotions and other homeostatic functions. Disruption of the bidirectional interactions between the enteric microbiota and the nervous system may be involved in the pathophysiology of acute and chronic gastrointestinal disease states, including functional and inflammatory bowel disorders.", "title": "" }, { "docid": "80a5eaec904b8412cebfe17e392e448a", "text": "Distributional semantic models learn vector representations of words through the contexts they occur in. Although the choice of context (which often takes the form of a sliding window) has a direct influence on the resulting embeddings, the exact role of this model component is still not fully understood. This paper presents a systematic analysis of context windows based on a set of four distinct hyperparameters. We train continuous SkipGram models on two English-language corpora for various combinations of these hyper-parameters, and evaluate them on both lexical similarity and analogy tasks. Notable experimental results are the positive impact of cross-sentential contexts and the surprisingly good performance of right-context windows.", "title": "" }, { "docid": "7abf4de44e3b9a30984ee2d7004d295d", "text": "Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking. Existing approaches have focused on binary detection i.e., either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This paper proposes a methodology to detect malicious URLs and the type of attacks based on multi-class classification. In this work, we propose 42 new features of spam, phishing and malware URLs. These features are not considered in the earlier studies for malicious URLs detection and attack types identification. Binary and multi-class dataset is constructed using 49935 malicious and benign URLs. It consists of 26041 benign and 23894 malicious URLs containing 11297 malware, 8976 phishing and 3621 spam URLs. To evaluate the proposed approach, the state-of-the-art supervised batch and online machine learning classifiers are used. Experiments are performed on the binary and multi-class dataset using the aforementioned machine learning classifiers. It is found that, confidence weighted learning classifier achieves the best 98.44% average detection accuracy with 1.56% error-rate in the multi-class setting and 99.86% detection accuracy with negligible error-rate of 0.14% in binary setting using our proposed URL features. c © 2018 ISC. All rights reserved.", "title": "" }, { "docid": "769fdd1cf5298ea2b90ca575ea5319a2", "text": "In this paper, a road adaptive modified skyhook control for the semi-active Macphe strut suspension system of hydraulic type is investigated. A new control-oriented m which incorporates the rotational motion of the unsprung mass, is introduced. The co law extends the conventional skyhook-groundhook control scheme and schedules it for various road conditions. Using the vertical acceleration data measured, the r conditions are estimated by using the linearized new model developed. Two filte estimating the absolute velocity of the sprung mass and the relative velocity in the space are also designed. The hydraulic semi-active actuator dynamics are incorpora the hardware-in-the-loop tuning stage of the control algorithm developed. The opt gains for the ISO road classes are discussed. Experimental results are inclu @DOI: 10.1115/1.1434265 #", "title": "" }, { "docid": "c36fec7cebe04627ffcd9a689df8c5a2", "text": "In seems there are two dimensions that underlie most judgments of traits, people, groups, and cultures. Although the definitions vary, the first makes reference to attributes such as competence, agency, and individualism, and the second to warmth, communality, and collectivism. But the relationship between the two dimensions seems unclear. In trait and person judgment, they are often positively related; in group and cultural stereotypes, they are often negatively related. The authors report 4 studies that examine the dynamic relationship between these two dimensions, experimentally manipulating the location of a target of judgment on one and examining the consequences for the other. In general, the authors' data suggest a negative dynamic relationship between the two, moderated by factors the impact of which they explore.", "title": "" }, { "docid": "e35d6755ae7ac538fc1c9322318079d7", "text": "OAuth 2.0 protocol has enjoyed wide adoption by Online Social Network (OSN) providers since its inception. Although the security guideline of OAuth 2.0 is well discussed in RFC6749 and RFC6819, many real-world attacks due to the implementation specifics of OAuth 2.0 in various OSNs have been discovered. To our knowledge, previously discovered loopholes are all based on the misuse of OAuth and many of them rely on provider side or application side vulnerabilities/ faults beyond the scope of the OAuth protocol. It was generally believed that correct use of OAuth 2.0 is secure. In this paper, we show that OAuth 2.0 is intrinsically vulnerable to App impersonation attack due to its provision of multiple authorization flows and token types. We start by reviewing and analyzing the OAuth 2.0 protocol and some common API design problems found in many 1st tiered OSNs. We then propose the App impersonation attack and investigate its impact on 12 major OSN providers. We demonstrate that, App impersonation via OAuth 2.0, when combined with additional API design features/ deficiencies, make large-scale exploit and privacy-leak possible. For example, it becomes possible for an attacker to completely crawl a 200-million-user OSN within just one week and harvest data objects like the status list and friend list which are expected, by its users, to be private among only friends. We also propose fixes that can be readily deployed to tackle the OAuth2.0-based App impersonation problem.", "title": "" }, { "docid": "2cf7921cce2b3077c59d9e4e2ab13afe", "text": "Scientists and consumers preference focused on natural colorants due to the emergence of negative health effects of synthetic colorants which is used for many years in foods. Interest in natural colorants is increasing with each passing day as a consequence of their antimicrobial and antioxidant effects. The biggest obstacle in promotion of natural colorants as food pigment agents is that it requires high investment. For this reason, the R&D studies related issues are shifted to processes to reduce cost and it is directed to pigment production from microorganisms with fermentation. Nowadays, there is pigments obtained by commercially microorganisms or plants with fermantation. These pigments can be use for both food colorant and food supplement. In this review, besides colourant and antioxidant properties, antimicrobial properties of natural colorants are discussed.", "title": "" }, { "docid": "d0aff9fb9572808c26373966018ab4f0", "text": "Introduction: Allopurinol used in the treatment of gout has been shown to improve the vascular endothelial dysfunction and reduce the dysfunction of the failing heart. This study was done to evaluate the effect and safety of allopurinol in non-hyperuricemic patients with chronic severe left ventricular (LV) dysfunction. Methods: In this study, 35 consecutive cases of non-hyperuricemic patients with chronic heart failure who had severe LV systolic dysfunction (ejection fraction of less than 35%) and were on optimal guideline directed medical therapies for at least 3 months were included. Allopurinol was administered with the dose of 300 mg po daily for 1 week and then it was up-titrated to a dose of 600 mg po daily for 3 months. Six minute walk test, strain imaging, laboratory testing were done for every patient at baseline and after 3 months treatment with allopurinol. Results: In this study 30 heart failure (HF) patients with a mean age of 49.3 ± 14.4 years old were evaluated. No adverse effects were reported except for one case of skin rash after 4 days treatment which was excluded from the study. Study showed significant improvement of six minute walk test of the patients from 384.5 ± 81.5 meters to 402.8 ± 89.6 meters and the global longitudinal peak strain (P < 0.001). There was also significant decrease in the level of erythrocyte sedimentation rate and N-terminal pro-brain natriuretic peptide (NT-proBNP) after 3 months. Conclusion: Allopurinol could be of benefit in non-hyperuricemic patients with severe LV systolic dysfunction without significant adverse effects. Randomized clinical trials are needed in future to confirm the results.", "title": "" }, { "docid": "382ee4c7c870f9d05dee5546a664c553", "text": "Models based on the bivariate Poisson distribution are used for modelling sports data. Independent Poisson distributions are usually adopted to model the number of goals of two competing teams. We replace the independence assumption by considering a bivariate Poisson model and its extensions. The models proposed allow for correlation between the two scores, which is a plausible assumption in sports with two opposing teams competing against each other. The effect of introducing even slight correlation is discussed. Using just a bivariate Poisson distribution can improve model fit and prediction of the number of draws in football games.The model is extended by considering an inflation factor for diagonal terms in the bivariate joint distribution.This inflation improves in precision the estimation of draws and, at the same time, allows for overdispersed, relative to the simple Poisson distribution, marginal distributions. The properties of the models proposed as well as interpretation and estimation procedures are provided. An illustration of the models is presented by using data sets from football and water-polo.", "title": "" }, { "docid": "7d0105cace2150b0e76ef4b5585772ad", "text": "Peer-to-peer (P2P) accommodation rentals continue to grow at a phenomenal rate. Examining how this business model affects the competitive landscape of accommodation services is of strategic importance to hotels and tourism destinations. This study explores the competitive edge of P2P accommodation in comparison to hotels by extracting key content and themes from online reviews to explain the key service attributes sought by guests. The results from text analytics using terminology extraction and word co-occurrence networks indicate that even though guests expect similar core services such as clean rooms and comfortable beds, different attributes support the competitive advantage of hotels and P2P rentals. While conveniences offered by hotels are unparalleled by P2P accommodation, the latter appeal to consumers driven by experiential and social motivations. Managerial implications for hotels and P2P accommodation", "title": "" }, { "docid": "3dfd3093b6abb798474dec6fb9cfca36", "text": "This paper proposes a new image representation for texture categorization, which is based on extension of local binary patterns (LBP). As we know LBP can achieve effective description ability with appearance invariance and adaptability of patch matching based methods. However, LBP only thresholds the differential values between neighborhood pixels and the focused one to 0 or 1, which is very sensitive to noise existing in the processed image. This study extends LBP to local ternary patterns (LTP), which considers the differential values between neighborhood pixels and the focused one as negative or positive stimulus if the absolute differential value is large; otherwise no stimulus (set as 0). With the ternary values of all neighbored pixels, we can achieve a pattern index for each local patch, and then extract the pattern histogram for image representation. Experiments on two texture datasets: Brodats32 and KTH TIPS2-a validate that the robust LTP can achieve much better performances than the conventional LBP and the state-of-the-art methods.", "title": "" }, { "docid": "355fca41993ea19b08d2a9fc19e25722", "text": "People and companies selling goods or providing services have always desired to know what people think about their products. The number of opinions on the Web has significantly increased with the emergence of microblogs. In this paper we present a novel method for sentiment analysis of a text that allows the recognition of opinions in microblogs which are connected to a particular target or an entity. This method differs from other approaches in utilizing appraisal theory, which we employ for the analysis of microblog posts. The results of the experiments we performed on Twitter showed that our method improves sentiment classification and is feasible even for such specific content as presented on microblogs.", "title": "" }, { "docid": "ce1401dcf3b4ce55b84995e059f2a20a", "text": "The paper reports the outcomes of a study with law school students to annotate a corpus of legal cases for a variety of annotation types, e.g. citation indices, legal facts, rationale, judgement, cause of action, and others. An online tool is used by a group of annotators that results in an annotated corpus. Differences amongst the annotations are curated, producing a gold standard corpus of annotated texts. The annotations can be extracted with semantic searches of complex queries. There would be many such uses for the development and analysis of such a corpus for both legal education and legal research.", "title": "" }, { "docid": "ca70bf377f8823c2ecb1cdd607c064ec", "text": "To date, few studies have compared the effectiveness of topical silicone gels versus that of silicone gel sheets in preventing scars. In this prospective study, we compared the efficacy and the convenience of use of the 2 products. We enrolled 30 patients who had undergone a surgical procedure 2 weeks to 3 months before joining the study. These participants were randomly assigned to 2 treatment arms: one for treatment with a silicone gel sheet, and the other for treatment with a topical silicone gel. Vancouver Scar Scale (VSS) scores were obtained for all patients; in addition, participants completed scoring patient questionnaires 1 and 3 months after treatment onset. Our results reveal not only that no significant difference in efficacy exists between the 2 products but also that topical silicone gels are more convenient to use. While previous studies have advocated for silicone gel sheets as first-line therapies in postoperative scar management, we maintain that similar effects can be expected with topical silicone gel. The authors recommend that, when clinicians have a choice of silicone-based products for scar prevention, they should focus on each patient's scar location, lifestyle, and willingness to undergo scar prevention treatment.", "title": "" }, { "docid": "66f20bd8c7370382f25c5a1a47065024", "text": "Detecting the road geometry at night time is an essential precondition to provide optimal illumination for the driver and the other traffic participants. In this paper we propose a novel approach to estimate the current road curvature based on three sensors: A far infrared camera, a near infrared camera and an imaging radar sensor. Various Convolutional Neural Networks with different configuration are trained for each input. By fusing the classifier responses of all three sensors, a further performance gain is achieved. To annotate the training and evaluation dataset without costly human interaction a fully automatic curvature annotation algorithm based on inertial navigation system is presented as well.", "title": "" }, { "docid": "9c74981312730dd56425128807575123", "text": "This paper reviews the state of rapidly emerging terahertz hot-electron nanobolometers (nano-HEB), which are currently among of the most sensitive radiation power detectors at submillimeter wavelengths. With the achieved noise equivalent power close to 10-19 W/Hz1/2 and potentially capable of approaching NEP ~ 10-20 W/Hz1/2, nano-HEBs are very important for future space astrophysics platforms with ultralow submillimeter radiation background. The ability of these sensors to detect single low-energy photons with high dynamic range opens interesting possibilities for quantum calorimetry in the midinfrared and even in the far-infrared parts of the electromagnetic spectrum. We discuss the competition in the field of ultrasensitive detectors, the physics and technology of nano-HEBs, recent experimental results, and perspectives for future development.", "title": "" }, { "docid": "eec9bd3e2c187c23f3d99fd3b98433ce", "text": "Optimum sample size is an essential component of any research. The main purpose of the sample size calculation is to determine the number of samples needed to detect significant changes in clinical parameters, treatment effects or associations after data gathering. It is not uncommon for studies to be underpowered and thereby fail to detect the existing treatment effects due to inadequate sample size. In this paper, we explain briefly the basic principles of sample size calculations in medical studies.", "title": "" }, { "docid": "a740f94906255d21f1de4f55c89e9173", "text": "While there is little doubt that risk-taking is generally more prevalent during adolescence than before or after, the underlying causes of this pattern of age differences have long been investigated and debated. One longstanding popular notion is the belief that risky and reckless behavior in adolescence is tied to the hormonal changes of puberty. However, the interactions between pubertal maturation and adolescent decision making remain largely understudied. In the current review, we discuss changes in decision making during adolescence, focusing on the asynchronous development of the affective, reward-focused processing system and the deliberative, reasoned processing system. As discussed, differential maturation in the structure and function of brain systems associated with these systems leaves adolescents particularly vulnerable to socio-emotional influences and risk-taking behaviors. We argue that this asynchrony may be partially linked to pubertal influences on development and specifically on the maturation of the affective, reward-focused processing system.", "title": "" }, { "docid": "80a4de6098a4821e52ccc760db2aae18", "text": "This article presents P-Sense, a participatory sensing application for air pollution monitoring and control. The paper describes in detail the system architecture and individual components of a successfully implemented application. In addition, the paper points out several other research-oriented problems that need to be addressed before these applications can be effectively implemented in practice, in a large-scale deployment. Security, privacy, data visualization and validation, and incentives are part of our work-in-progress activities", "title": "" } ]
scidocsrr
849606f1f58f22f2e887b99545f46a67
The Continuous Cold-start Problem in e-Commerce Recommender Systems
[ { "docid": "be33d66a009320148de332d6b5ecaf29", "text": "As users may have different needs in different situations and contexts, it is increasingly important to consider user context data when filtering information. In the field of web personalization and recommender systems, most of the studies have focused on the process of modelling user profiles and the personalization process in order to provide personalized services to the user, but not on contextualized services. Rather limited attention has been paid to investigate how to discover, model, exploit and integrate context information in personalization systems in a generic way. In this paper, we aim at providing a novel model to build, exploit and integrate context information with a web personalization system. A contextaware personalization system (CAPS) is developed which is able to model and build contextual and personalized ontological user profiles based on the user’s interests and context information. These profiles are then exploited in order to infer and provide contextual recommendations to users. The methods and system developed are evaluated through a user study which shows that considering context information in web personalization systems can provide more effective personalization services and offer better recommendations to users. 2014 Elsevier Ltd. All rights reserved.", "title": "" } ]
[ { "docid": "bd7664e9ff585a48adca12c0a8d9bf95", "text": "Fueled by the widespread adoption of sensor-enabled smartphones, mobile crowdsourcing is an area of rapid innovation. Many crowd-powered sensor systems are now part of our daily life -- for example, providing highway congestion information. However, participation in these systems can easily expose users to a significant drain on already limited mobile battery resources. For instance, the energy burden of sampling certain sensors (such as WiFi or GPS) can quickly accumulate to levels users are unwilling to bear. Crowd system designers must minimize the negative energy side-effects of participation if they are to acquire and maintain large-scale user populations.\n To address this challenge, we propose Piggyback CrowdSensing (PCS), a system for collecting mobile sensor data from smartphones that lowers the energy overhead of user participation. Our approach is to collect sensor data by exploiting Smartphone App Opportunities -- that is, those times when smartphone users place phone calls or use applications. In these situations, the energy needed to sense is lowered because the phone need no longer be woken from an idle sleep state just to collect data. Similar savings are also possible when the phone either performs local sensor computation or uploads the data to the cloud. To efficiently use these sporadic opportunities, PCS builds a lightweight, user-specific prediction model of smartphone app usage. PCS uses this model to drive a decision engine that lets the smartphone locally decide which app opportunities to exploit based on expected energy/quality trade-offs.\n We evaluate PCS by analyzing a large-scale dataset (containing 1,320 smartphone users) and building an end-to-end crowdsourcing application that constructs an indoor WiFi localization database. Our findings show that PCS can effectively collect large-scale mobile sensor datasets (e.g., accelerometer, GPS, audio, image) from users while using less energy (up to 90% depending on the scenario) compared to a representative collection of existing approaches.", "title": "" }, { "docid": "7758fd29e1b59ef3edae06c00a33bad2", "text": "We demonstrate that state-of-the-art optical character recognition (OCR) based on deep learning is vulnerable to adversarial images. Minor modifications to images of printed text, which do not change the meaning of the text to a human reader, cause the OCR system to “recognize” a different text where certain words chosen by the adversary are replaced by their semantic opposites. This completely changes the meaning of the output produced by the OCR system and by the NLP applications that use OCR for preprocessing their inputs.", "title": "" }, { "docid": "080010f62e277a84d693f74204e07cc7", "text": "Competitive swimming has a long history and is currently one of the largest Olympic sports, with 16 pool events. Several aspects separate swimming from most other sports such as (i) the prone position; (ii) simultaneous use of arms and legs for propulsion; (iii) water immersion (i.e. hydrostatic pressure on thorax and controlled respiration); (iv) propulsive forces that are applied against a fluctuant element; and (v) minimal influence of equipment on performance. Competitive swimmers are suggested to have specific anthropometrical features compared with other athletes, but are nevertheless dependent on physiological adaptations to enhance their performance. Swimmers thus engage in large volumes of training in the pool and on dry land. Strength training of various forms is widely used, and the energetic systems are addressed by aerobic and anaerobic swimming training. The aim of the current review was to report results from controlled exercise training trials within competitive swimming. From a structured literature search we found 17 controlled intervention studies that covered strength or resistance training, assisted sprint swimming, arms-only training, leg-kick training, respiratory muscle training, training the energy delivery systems and combined interventions across the aforementioned categories. Nine of the included studies were randomized controlled trials. Among the included studies we found indications that heavy strength training on dry land (one to five repetitions maximum with pull-downs for three sets with maximal effort in the concentric phase) or sprint swimming with resistance towards propulsion (maximal pushing with the arms against fixed points or pulling a perforated bowl) may be efficient for enhanced performance, and may also possibly have positive effects on stroke mechanics. The largest effect size (ES) on swimming performance was found in 50 m freestyle after a dry-land strength training regimen of maximum six repetitions across three sets in relevant muscle-groups (ES 1.05), and after a regimen of resisted- and assisted-sprint training with elastic surgical tubes (ES 1.21). Secondly, several studies suggest that high training volumes do not pose any immediate advantage over lower volumes (with higher intensity) for swim performance. Overall, very few studies were eligible for the current review although the search strategy was broad and fairly liberal. The included studies predominantly involved freestyle swimming and, overall, there seems to be more questions than answers within intervention-based competitive swimming research. We believe that this review may encourage other researchers to pursue the interesting topics within the physiology of competitive swimming.", "title": "" }, { "docid": "e5a936bbd9e6dc0189b7cc18268f0f87", "text": "A new method of obtaining amplitude modulation (AM) for determining target location with spinning reticles is presented. The method is based on the use of graded transmission capabilities. The AM spinning reticles previously presented were functions of three parameters: amplitude vs angle, amplitude vs radius, and phase. This paper presents these parameters along with their capabilities and limitations and shows that multiple parameters can be integrated into a single reticle. It is also shown that AM parameters can be combined with FM parameters in a single reticle. Also, a general equation is developed that relates the AM parameters to a reticle transmission equation.", "title": "" }, { "docid": "876dd0a985f00bb8145e016cc8593a84", "text": "This paper presents how to synthesize a texture in a procedural way that preserves the features of the input exemplar. The exemplar is analyzed in both spatial and frequency domains to be decomposed into feature and non-feature parts. Then, the non-feature parts are reproduced as a procedural noise, whereas the features are independently synthesized. They are combined to output a non-repetitive texture that also preserves the exemplar’s features. The proposed method allows the user to control the extent of extracted features and also enables a texture to edited quite effectively.", "title": "" }, { "docid": "f85a8a7e11a19d89f2709cc3c87b98fc", "text": "This paper presents novel store-and-forward packet routing algorithms for Wireless Body Area Networks (WBAN) with frequent postural partitioning. A prototype WBAN has been constructed for experimentally characterizing on-body topology disconnections in the presence of ultra short range radio links, unpredictable RF attenuation, and human postural mobility. On-body DTN routing protocols are then developed using a stochastic link cost formulation, capturing multi-scale topological localities in human postural movements. Performance of the proposed protocols are evaluated experimentally and via simulation, and are compared with a number of existing single-copy DTN routing protocols and an on-body packet flooding mechanism that serves as a performance benchmark with delay lower-bound. It is shown that via multi-scale modeling of the spatio-temporal locality of on-body link disconnection patterns, the proposed algorithms can provide better routing performance compared to a number of existing probabilistic, opportunistic, and utility-based DTN routing protocols in the literature.", "title": "" }, { "docid": "54b88e4c9e0bc31667e720f5f04c7f83", "text": "In clean ocean water, the performance of a underwater optical communication system is limited mainly by oceanic turbulence, which is defined as the fluctuations in the index of refraction resulting from temperature and salinity fluctuations. In this paper, using the refractive index spectrum of oceanic turbulence under weak turbulence conditions, we carry out, for a horizontally propagating plane wave and spherical wave, analysis of the aperture-averaged scintillation index, the associated probability of fade, mean signal-to-noise ratio, and mean bit error rate. Our theoretical results show that for various values of the rate of dissipation of mean squared temperature and the temperature-salinity balance parameter, the large-aperture receiver leads to a remarkable decrease of scintillation and consequently a significant improvement on the system performance. Such an effect is more noticeable in the plane wave case than in the spherical wave case.", "title": "" }, { "docid": "112f10eb825a484850561afa7c23e71f", "text": "We describe an image based rendering approach that generalizes many current image based rendering algorithms, including light field rendering and view-dependent texture mapping. In particular, it allows for lumigraph-style rendering from a set of input cameras in arbitrary configurations (i.e., not restricted to a plane or to any specific manifold). In the case of regular and planar input camera positions, our algorithm reduces to a typical lumigraph approach. When presented with fewer cameras and good approximate geometry, our algorithm behaves like view-dependent texture mapping. The algorithm achieves this flexibility because it is designed to meet a set of specific goals that we describe. We demonstrate this flexibility with a variety of examples.", "title": "" }, { "docid": "552bff56ebd53cf07748bea4175178db", "text": "In this paper we discuss how conventional business contracts can be converted into smart contracts—their electronic equivalents that can be used to systematically monitor and enforce contractual rights, obligations and prohibitions at run time. We explain that emerging blockchain technology is certainly a promising platform for implementing smart contracts but argue that there is a large class of applications, where blockchain is inadequate due to performance, scalability, and consistency requirements, and also due to language expressiveness and cost issues that are hard to solve. We explain that in some situations a centralised approach that does not rely on blockchain is a better alternative due to its simplicity, scalability, and performance. We suggest that in applications where decentralisation and transparency are essential, developers can advantageously combine the two approaches into hybrid solutions where some operations are enforced by enforcers deployed on–blockchains and the rest by enforcers deployed on trusted third parties.", "title": "" }, { "docid": "50231587bc33401b6978badb68677791", "text": "Thirty-five healthy men were matched and randomly assigned to one of four training groups that performed high-intensity strength and endurance training (C; n = 9), upper body only high-intensity strength and endurance training (UC; n = 9), high-intensity endurance training (E; n = 8), or high-intensity strength training (ST; n = 9). The C and ST groups significantly increased one-repetition maximum strength for all exercises (P < 0.05). Only the C, UC, and E groups demonstrated significant increases in treadmill maximal oxygen consumption. The ST group showed significant increases in power output. Hormonal responses to treadmill exercise demonstrated a differential response to the different training programs, indicating that the underlying physiological milieu differed with the training program. Significant changes in muscle fiber areas were as follows: types I, IIa, and IIc increased in the ST group; types I and IIc decreased in the E group; type IIa increased in the C group; and there were no changes in the UC group. Significant shifts in percentage from type IIb to type IIa were observed in all training groups, with the greatest shift in the groups in which resistance trained the thigh musculature. This investigation indicates that the combination of strength and endurance training results in an attenuation of the performance improvements and physiological adaptations typical of single-mode training.", "title": "" }, { "docid": "186141651bfb780865712deb8c407c54", "text": "Sample and statistically based singing synthesizers typically require a large amount of data for automatically generating expressive synthetic performances. In this paper we present a singing synthesizer that using two rather small databases is able to generate expressive synthesis from an input consisting of notes and lyrics. The system is based on unit selection and uses the Wide-Band Harmonic Sinusoidal Model for transforming samples. The first database focuses on expression and consists of less than 2 minutes of free expressive singing using solely vowels. The second one is the timbre database which for the English case consists of roughly 35 minutes of monotonic singing of a set of sentences, one syllable per beat. The synthesis is divided in two steps. First, an expressive vowel singing performance of the target song is generated using the expression database. Next, this performance is used as input control of the synthesis using the timbre database and the target lyrics. A selection of synthetic performances have been submitted to the Interspeech Singing Synthesis Challenge 2016, in which they are compared to other competing systems.", "title": "" }, { "docid": "8dbe7ed9d801c7c39d583de6ebef9908", "text": "We propose a novel approach for content based color image classification using Support Vector Machine (SVM). Traditional classification approaches deal poorly on content based image classification tasks being one of the reasons of high dimensionality of the feature space. In this paper, color image classification is done on features extracted from histograms of color components. The benefit of using color image histograms are better efficiency, and insensitivity to small changes in camera view-point i.e. translation and rotation. As a case study for validation purpose, experimental trials were done on a database of about 500 images divided into four different classes has been reported and compared on histogram features for RGB, CMYK, Lab, YUV, YCBCR, HSV, HVC and YIQ color spaces. Results based on the proposed approach are found encouraging in terms of color image classification accuracy.", "title": "" }, { "docid": "34992b86a8ac88c5f5bbca770954ae61", "text": "Entity search over text corpora is not geared for relationship queries where answers are tuples of related entities and where a query often requires joining cues from multiple documents. With large knowledge graphs, structured querying on their relational facts is an alternative, but often suffers from poor recall because of mismatches between user queries and the knowledge graph or because of weakly populated relations.\n This paper presents the TriniT search engine for querying and ranking on extended knowledge graphs that combine relational facts with textual web contents. Our query language is designed on the paradigm of SPO triple patterns, but is more expressive, supporting textual phrases for each of the SPO arguments. We present a model for automatic query relaxation to compensate for mismatches between the data and a user's query. Query answers -- tuples of entities -- are ranked by a statistical language model. We present experiments with different benchmarks, including complex relationship queries, over a combination of the Yago knowledge graph and the entity-annotated ClueWeb'09 corpus.", "title": "" }, { "docid": "2cff047c4b2577c99aa66df211b0beda", "text": "Image denoising is an important pre-processing step in medical image analysis. Different algorithms have been proposed in past three decades with varying denoising performances. More recently, having outperformed all conventional methods, deep learning based models have shown a great promise. These methods are however limited for requirement of large training sample size and high computational costs. In this paper we show that using small sample size, denoising autoencoders constructed using convolutional layers can be used for efficient denoising of medical images. Heterogeneous images can be combined to boost sample size for increased denoising performance. Simplest of networks can reconstruct images with corruption levels so high that noise and signal are not differentiable to human eye.", "title": "" }, { "docid": "64dcf4343458a7900a34e1bdd7ca5731", "text": "Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and an increasing intensity of natural disasters resulting from climate change. During such events, citizens turn to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief efforts. In addition, the spatiotemporal distribution of disaster-related messages helps with the real-time monitoring and assessment of the disaster itself. We present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of the United States and find a strong relationship between proximity to Sandy’s path and hurricane-related social media activity. We show that real and perceived threats, together with physical disaster effects, are directly observable through the intensity and composition of Twitter’s message stream. We demonstrate that per-capita Twitter activity strongly correlates with the per-capita economic damage inflicted by the hurricane. We verify our findings for a wide range of disasters and suggest that massive online social networks can be used for rapid assessment of damage caused by a large-scale disaster.", "title": "" }, { "docid": "e50ba614fc997f058f8d495b59c18af5", "text": "We propose a model of natural language inference which identifies valid inferences by their lexical and syntactic features, without full semantic interpretation. We extend past work in natural logic, which has focused on semantic containment and monotonicity, by incorporating both semantic exclusion and implicativity. Our model decomposes an inference problem into a sequence of atomic edits linking premise to hypothesis; predicts a lexical semantic relation for each edit; propagates these relations upward through a semantic composition tree according to properties of intermediate nodes; and joins the resulting semantic relations across the edit sequence. A computational implementation of the model achieves 70% accuracy and 89% precision on the FraCaS test suite. Moreover, including this model as a component in an existing system yields significant performance gains on the Recognizing Textual Entailment challenge.", "title": "" }, { "docid": "de8633682653e9f979ec7a9177e461b4", "text": "The increasingly widespread use of social network sites to expand and deepen one’s social connections is a relatively new but potentially important phenomenon that has implications for teaching and learning and teacher education in the 21st century. This paper surveys the educational research literature to examine: How such technologies are perceived and used by K-12 learners and teachers with what impacts on pedagogy or students' learning. Selected studies were summarized and categorized according to the four types introduced by Roblyer (2005) as studies most needed to move the educational technology field forward. These include studies that establish the technology’s effectiveness at improving student learning; investigate implementation strategies; monitor social impact; and report on common uses to shape the direction of the field. We found the most prevalent type of study conducted related to our focal topic was research on common uses. The least common type of study conducted was research that established the technology’s effectiveness at improving student learning. Implications for the design of future research and teacher education initiatives are discussed.", "title": "" }, { "docid": "818862fc058767caa026ca58d0b9b1d2", "text": "This paper proposes a novel outer-rotor flux-switching permanent-magnet (OR-FSPM) machine with specific wedge-shaped magnets for in-wheel light-weight traction applications. First, the geometric topology is introduced. Then, the combination principle of stator slots and rotor poles for OR-FSPM machines is investigated. Furthermore, to demonstrate the relationship between performance specifications (e.g., torque and speed) and key design parameters and dimensions (e.g., rotor outer diameter and stack length) of OR-FSPM machines at preliminary design stage, an analytical torque-sizing equation is proposed and verified by two-dimensional (2-D) finite-element analysis (FEA). Moreover, optimizations of key dimensions are conducted on an initially designed proof-of-principle three-phase 12-stator-slot/22-rotor-pole prototyped machine. Then, based on 2-D-FEA, a comprehensive comparison between a pair of OR-FSPM machines with rectangular- and wedge-shaped magnets and a surface-mounted permanent-magnet (SPM) machine is performed. The results indicate that the proposed OR-FSPM machine with wedge-shaped magnets exhibits better flux-weakening capability, higher efficiency, and wider speed range than the counterparts, especially for torque capability, where the proposed wedge-shaped magnets-based one could produce 40% and 61.5% more torque than the rectangular-shaped magnets-based machine and SPM machine, respectively, with the same rated current density (5 A/mm2). Finally, the predicted performance of the proposed OR-FSPM machine is verified by experiments on a prototyped machine.", "title": "" }, { "docid": "4b95b6d7991ea1b774ac8730df6ec21c", "text": "We address the problem of automatically learning the main steps to complete a certain task, such as changing a car tire, from a set of narrated instruction videos. The contributions of this paper are three-fold. First, we develop a new unsupervised learning approach that takes advantage of the complementary nature of the input video and the associated narration. The method solves two clustering problems, one in text and one in video, applied one after each other and linked by joint constraints to obtain a single coherent sequence of steps in both modalities. Second, we collect and annotate a new challenging dataset of real-world instruction videos from the Internet. The dataset contains about 800,000 frames for five different tasks1 that include complex interactions between people and objects, and are captured in a variety of indoor and outdoor settings. Third, we experimentally demonstrate that the proposed method can automatically discover, in an unsupervised manner, the main steps to achieve the task and locate the steps in the input videos.", "title": "" }, { "docid": "1d2f35fb17183a215e864693712fa75b", "text": "Improving the coding efficiency is the eternal theme in video coding field. The traditional way for this purpose is to reduce the redundancies inside videos by adding numerous coding options at the encoder side. However, no matter what we have done, it is still hard to guarantee the optimal coding efficiency. On the other hand, the decoded video can be treated as a certain compressive sampling of the original video. According to the compressive sensing theory, it might be possible to further enhance the quality of the decoded video by some restoration methods. Different from the traditional methods, without changing the encoding algorithm, this paper focuses on an approach to improve the video's quality at the decoder end, which equals to further boosting the coding efficiency. Furthermore, we propose a very deep convolutional neural network to automatically remove the artifacts and enhance the details of HEVC-compressed videos, by utilizing that underused information left in the bit-streams and external images. Benefit from the prowess and efficiency of the fully end-to-end feed forward architecture, our approach can be treated as a better decoder to efficiently obtain the decoded frames with higher quality. Extensive experiments indicate our approach can further improve the coding efficiency post the deblocking and SAO in current HEVC decoder, averagely 5.0%, 6.4%, 5.3%, 5.5% BD-rate reduction for all intra, lowdelay P, lowdelay B and random access configurations respectively. This method can aslo be extended to any video coding standards.", "title": "" } ]
scidocsrr
51958ed8d7a1a75d95d51737348233bc
3DMV: Joint 3D-Multi-view Prediction for 3D Semantic Scene Segmentation
[ { "docid": "775f4fd21194e18cdf303248f1cde206", "text": "Both image segmentation and dense 3D modeling from images represent an intrinsically ill-posed problem. Strong regularizers are therefore required to constrain the solutions from being 'too noisy'. Unfortunately, these priors generally yield overly smooth reconstructions and/or segmentations in certain regions whereas they fail in other areas to constrain the solution sufficiently. In this paper we argue that image segmentation and dense 3D reconstruction contribute valuable information to each other's task. As a consequence, we propose a rigorous mathematical framework to formulate and solve a joint segmentation and dense reconstruction problem. Image segmentations provide geometric cues about which surface orientations are more likely to appear at a certain location in space whereas a dense 3D reconstruction yields a suitable regularization for the segmentation problem by lifting the labeling from 2D images to 3D space. We show how appearance-based cues and 3D surface orientation priors can be learned from training data and subsequently used for class-specific regularization. Experimental results on several real data sets highlight the advantages of our joint formulation.", "title": "" }, { "docid": "4d56f134c2e2a597948bcf9b1cf37385", "text": "This paper focuses on semantic scene completion, a task for producing a complete 3D voxel representation of volumetric occupancy and semantic labels for a scene from a single-view depth map observation. Previous work has considered scene completion and semantic labeling of depth maps separately. However, we observe that these two problems are tightly intertwined. To leverage the coupled nature of these two tasks, we introduce the semantic scene completion network (SSCNet), an end-to-end 3D convolutional network that takes a single depth image as input and simultaneously outputs occupancy and semantic labels for all voxels in the camera view frustum. Our network uses a dilation-based 3D context module to efficiently expand the receptive field and enable 3D context learning. To train our network, we construct SUNCG - a manually created largescale dataset of synthetic 3D scenes with dense volumetric annotations. Our experiments demonstrate that the joint model outperforms methods addressing each task in isolation and outperforms alternative approaches on the semantic scene completion task. The dataset and code is available at http://sscnet.cs.princeton.edu.", "title": "" } ]
[ { "docid": "4c030e022b3b44b8bbae801c1f6e721a", "text": "This paper presents DAMESRL1, a flexible and open source framework for deep semantic role labeling (SRL). DAMESRL aims to facilitate easy exploration of model structures for multiple languages with different characteristics. It provides flexibility in its model construction in terms of word representation, sequence representation, output modeling, and inference styles and comes with clear output visualization. Additionally, it handles various input and output formats and comes with clear output visualization. The framework is available under the Apache 2.0 license.", "title": "" }, { "docid": "b9b0b6974353d4cad948b0681d8bf23b", "text": "We describe a novel approach to modeling idiosyncra tic prosodic behavior for automatic speaker recognition. The approach computes various duration , pitch, and energy features for each estimated syl lable in speech recognition output, quantizes the featur s, forms N-grams of the quantized values, and mode ls normalized counts for each feature N-gram using sup port vector machines (SVMs). We refer to these features as “SNERF-grams” (N-grams of Syllable-base d Nonuniform Extraction Region Features). Evaluation of SNERF-gram performance is conducted o n two-party spontaneous English conversational telephone data from the Fisher corpus, using one co versation side in both training and testing. Resul ts show that SNERF-grams provide significant performance ga ins when combined with a state-of-the-art baseline system, as well as with two highly successful longrange feature systems that capture word usage and lexically constrained duration patterns. Further ex periments examine the relative contributions of fea tures by quantization resolution, N-gram length, and feature type. Results show that the optimal number of bins depends on both feature type and N-gram length, but is roughly in the range of 5 to 10 bins. We find t hat longer N-grams are better than shorter ones, and th at pitch features are most useful, followed by dura tion and energy features. The most important pitch features are those capturing pitch level, whereas the most important energy features reflect patterns of risin g a d falling. For duration features, nucleus dura tion is more important for speaker recognition than are dur ations from the onset or coda of a syllable. Overal l, we find that SVM modeling of prosodic feature sequence s yields valuable information for automatic speaker recognition. It also offers rich new opportunities for exploring how speakers differ from each other i n voluntary but habitual ways.", "title": "" }, { "docid": "77016e263b6b864536dc9b017e822cd0", "text": "Recent findings identified electroencephalography (EEG) microstates as the electrophysiological correlates of fMRI resting-state networks. Microstates are defined as short periods (100 ms) during which the EEG scalp topography remains quasi-stable; that is, the global topography is fixed but strength might vary and polarity invert. Microstates represent the subsecond coherent activation within global functional brain networks. Surprisingly, these rapidly changing EEG microstates correlate significantly with activity in fMRI resting-state networks after convolution with the hemodynamic response function that constitutes a strong temporal smoothing filter. We postulate here that microstate sequences should reveal scale-free, self-similar dynamics to explain this remarkable effect and thus that microstate time series show dependencies over long time ranges. To that aim, we deploy wavelet-based fractal analysis that allows determining scale-free behavior. We find strong statistical evidence that microstate sequences are scale free over six dyadic scales covering the 256-ms to 16-s range. The degree of long-range dependency is maintained when shuffling the local microstate labels but becomes indistinguishable from white noise when equalizing microstate durations, which indicates that temporal dynamics are their key characteristic. These results advance the understanding of temporal dynamics of brain-scale neuronal network models such as the global workspace model. Whereas microstates can be considered the \"atoms of thoughts,\" the shortest constituting elements of cognition, they carry a dynamic signature that is reminiscent at characteristic timescales up to multiple seconds. The scale-free dynamics of the microstates might be the basis for the rapid reorganization and adaptation of the functional networks of the brain.", "title": "" }, { "docid": "d94d31377a8dbe487f4fdcbfc0f2beb7", "text": "A core novelty of Alpha Zero is the interleaving of tree search and deep learning, which has proven very successful in board games like Chess, Shogi and Go. These games have a discrete action space. However, many real-world reinforcement learning domains have continuous action spaces, for example in robotic control, navigation and self-driving cars. This paper presents the necessary theoretical extensions of Alpha Zero to deal with continuous action space. We also provide a preliminary experiment on the Pendulum swing-up task, empirically verifying the feasibility of our approach. Thereby, this work provides a first step towards the application of iterated search and learning in domains with a continuous action space.", "title": "" }, { "docid": "c459ab73ab8728166bf45efe87a2764c", "text": "This paper presents a low-power 26-28 GHz phased-array receive channel in 45nm CMOS SOI. The design alternates cascode amplifiers with switched-LC phase-shifter cells to result in 5-bit phase control with gain and rms phase error <; 0.6 dB and 4°, respectively, over 32 phase states. The measured gain, noise figure (NF) and IIP3 are 12.2 dB, 4 dB and 0 dBm, respectively, and are achieved at a DC power of 42 mW. A gain control of 6-dB is also available without affecting the system NF. To our knowledge, this represents state-of-the-art in mm-wave phased-arrays with the best published linearity at low NF. Application areas include 5G base-stations and hand-held units.", "title": "" }, { "docid": "bebd034597144d4656f6383d9bd22038", "text": "The Turing test aimed to recognize the behavior of a human from that of a computer algorithm. Such challenge is more relevant than ever in today’s social media context, where limited attention and technology constrain the expressive power of humans, while incentives abound to develop software agents mimicking humans. These social bots interact, often unnoticed, with real people in social media ecosystems, but their abundance is uncertain. While many bots are benign, one can design harmful bots with the goals of persuading, smearing, or deceiving. Here we discuss the characteristics of modern, sophisticated social bots, and how their presence can endanger online ecosystems and our society. We then review current efforts to detect social bots on Twitter. Features related to content, network, sentiment, and temporal patterns of activity are imitated by bots but at the same time can help discriminate synthetic behaviors from human ones, yielding signatures of engineered social tampering.", "title": "" }, { "docid": "a0be5127f5e77a96547e742534c87e4d", "text": "This article argues that the dominance of CLT has led to the neglect of one crucial aspect of language pedagogy, namely the context in which that pedagogy takes place. It argues that it is time to replace CLT as the central paradigm in language teaching with a Context Approach which places context at the heart of the profession. The article argues that such a shift is already taking place, and that eventually it will radically change our practice. It concludes by outlining the features of the Context Approach and discussing its implications.", "title": "" }, { "docid": "b5bff5653869a26881735eb4179232fa", "text": "A low-dropout regulator for on-chip application with a power-supply rejection (PSR) boosting filter circuit for enhancing supply noise rejection at middle-to-high frequency over a wide loading range is presented in this brief. The idea has been analytically modeled and experimentally verified with a standard 0.13- μm CMOS process. The on-chip compensation capacitance is 1 pF. For the PSR filter design, the total on-chip capacitance is 20 pF. From the experimental results, the implemented regulator can operate with supply voltage of 1.2 V with nominal dropout voltage of 0.2 V at maximum load of 50 mA and IQ of 37.32 μA.", "title": "" }, { "docid": "f90eebfcf87285efe711968c85f04d1b", "text": "Fouling is generally defined as the accumulation and formation of unwanted materials on the surfaces of processing equipment, which can seriously deteriorate the capacity of the surface to transfer heat under the temperature difference conditions for which it was designed. Fouling of heat transfer surfaces is one of the most important problems in heat transfer equipment. Fouling is an extremely complex phenomenon. Fundamentally, fouling may be characterized as a combined, unsteady state, momentum, mass and heat transfer problem with chemical, solubility, corrosion and biological processes may also taking place. It has been described as the major unresolved problem in heat transfer1. According to many [1-3], fouling can occur on any fluid-solid surface and have other adverse effects besides reduction of heat transfer. It has been recognized as a nearly universal problem in design and operation, and it affects the operation of equipment in two ways: Firstly, the fouling layer has a low thermal conductivity. This increases the resistance to heat transfer and reduces the effectiveness of heat exchangers. Secondly, as deposition occurs, the cross sectional area is reduced, which causes an increase in pressure drop across the apparatus. In industry, fouling of heat transfer surfaces has always been a recognized phenomenon, although poorly understood. Fouling of heat transfer surfaces occurs in most chemical and process industries, including oil refineries, pulp and paper manufacturing, polymer and fiber production, desalination, food processing, dairy industries, power generation and energy recovery. By many, fouling is considered the single most unknown factor in the design of heat exchangers. This situation exists despite the wealth of operating experience accumulated over the years and accumulation of the fouling literature. This lake of understanding almost reflects the complex nature of the phenomena by which fouling occurs in industrial equipment. The wide range of the process streams and operating conditions present in industry tends to make most fouling situations unique, thus rendering a general analysis of the problem difficult. In general, the ability to transfer heat efficiently remains a central feature of many industrial processes. As a consequence much attention has been paid to improving the understanding of heat transfer mechanisms and the development of suitable correlations and techniques that may be applied to the design of heat exchangers. On the other hand relatively little consideration has been given to the problem of surface fouling in heat exchangers. The", "title": "" }, { "docid": "accb879062cf9c2e6fa3fb636f33b333", "text": "The CLEF eRisk 2018 challenge focuses on early detection of signs of depression or anorexia using posts or comments over social media. The eRisk lab has organized two tasks this year and released two different corpora for the individual tasks. The corpora are developed using the posts and comments over Reddit, a popular social media. The machine learning group at Ramakrishna Mission Vivekananda Educational and Research Institute (RKMVERI), India has participated in this challenge and individually submitted five results to accomplish the objectives of these two tasks. The paper presents different machine learning techniques and analyze their performance for early risk prediction of anorexia or depression. The techniques involve various classifiers and feature engineering schemes. The simple bag of words model has been used to perform ada boost, random forest, logistic regression and support vector machine classifiers to identify documents related to anorexia or depression in the individual corpora. We have also extracted the terms related to anorexia or depression using metamap, a tool to extract biomedical concepts. Theerefore, the classifiers have been implemented using bag of words features and metamap features individually and subsequently combining these features. The performance of the recurrent neural network is also reported using GloVe and Fasttext word embeddings. Glove and Fasttext are pre-trained word vectors developed using specific corpora e.g., Wikipedia. The experimental analysis on the training set shows that the ada boost classifier using bag of words model outperforms the other methods for task1 and it achieves best score on the test set in terms of precision over all the runs in the challenge. Support vector machine classifier using bag of words model outperforms the other methods in terms of fmeasure for task2. The results on the test set submitted to the challenge suggest that these framework achieve reasonably good performance.", "title": "" }, { "docid": "2967df08ad0b9987ce2d6cb6006d3e69", "text": "As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive inform of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create counter measures effectively detecting a variety of attacks. The submitted propositions are evaluated on the Replay-Attack database and the achieved results are presented in this paper.", "title": "" }, { "docid": "40bb8660fd02dc402d80e0f5970fa9dc", "text": "Dengue is the second most common mosquito-borne disease affecting human beings. In 2009, WHO endorsed new guidelines that, for the first time, consider neurological manifestations in the clinical case classification for severe dengue. Dengue can manifest with a wide range of neurological features, which have been noted--depending on the clinical setting--in 0·5-21% of patients with dengue admitted to hospital. Furthermore, dengue was identified in 4-47% of admissions with encephalitis-like illness in endemic areas. Neurological complications can be categorised into dengue encephalopathy (eg, caused by hepatic failure or metabolic disorders), encephalitis (caused by direct virus invasion), neuromuscular complications (eg, Guillain-Barré syndrome or transient muscle dysfunctions), and neuro-ophthalmic involvement. However, overlap of these categories is possible. In endemic countries and after travel to these regions, dengue should be considered in patients presenting with fever and acute neurological manifestations.", "title": "" }, { "docid": "d64d362831047f688cb6db6048f14ea8", "text": "In this study, a simple and sensitive fluorimetric method was described for the determination of Ascorbic Acid (AA). The procedure is based on the reaction between AA and Methylene Blue (MB). The fluorescence intensity of MB was measured at excitation and emission of 664 and 682 nm, respectively. MB concentration was decreased as a function of decreasing fluorescence intensity due to forming colorless form of MB (Leuco-MB) in the reaction between AA and MB. A linear relationship was obtained between the decreasing fluorescence intensity and the concentration of AA in the range of 3.0 x 10(-7)-6.0 x 10(-6) mol.l(-1). The detection limit was 2.5 x 10(-7) mol.l(-1). The proposed method was applied successfully for the determination of AA in Vitamin C tablets.", "title": "" }, { "docid": "9f7fef4255c3b1c3c240938057ce6583", "text": "Drug side-effects become a worldwide public health concern, which are the fourth leading cause of death in the United States. Pharmaceutical industry has paid tremendous effort to identify drug side-effects during the drug development. However, it is impossible and impractical to identify all of them. Fortunately, drug side-effects can also be reported on heterogeneous platforms (i.e., data sources), such as FDA Adverse Event Reporting System and various online communities. However, existing supervised and semi-supervised approaches are not practical as annotating labels are expensive in the medical field. In this paper, we propose a novel and effective unsupervised model Sifter to automatically discover drug side-effects. Sifter enhances the estimation on drug side-effects by learning from various online platforms and measuring platform-level and user-level quality simultaneously. In this way, Sifter demonstrates better performance compared with existing approaches in terms of correctly identifying drug side-effects. Experimental results on five real-world datasets show that Sifter can significantly improve the performance of identifying side-effects compared with the state-of-the-art approaches.", "title": "" }, { "docid": "c6bddb47f0cb5055b5cedfa51163ef6c", "text": "Small objects on the road can become hazardous obstacles when driving at high speed. Detecting such obstacles is vital to guaranty the safety of self-driving car users, especially on highways. Such tasks cannot be performed using existing active sensors such as radar or LIDAR due to their limited range and resolution at long distances. In this paper we propose a technique to detect anomalous patches on the road from color images using a Restricted Boltzman Machine neural network specifically trained to reconstruct the appearance of the road. The differences between the observed and reconstructed road patches yield a more relevant segmentation of anomalies than classic image processing techniques. We evaluated our technique on texture-based synthetic datasets as well as on real video footage of anomalous objects on highways.", "title": "" }, { "docid": "d01b73a497ef23b7627199fb6339ef9f", "text": "Unit tests are valuable as a source of up-to-date documentation as developers continuously changes them to reflect changes in the production code to keep an effective regression suite. Maintaining traceability links between unit tests and classes under test can help developers to comprehend parts of a system. In particular, unit tests show how parts of a system are executed and as such how they are supposed to be used. Moreover, the dependencies between unit tests and classes can be exploited to maintain the consistency during refactoring. Generally, such dependences are not explicitly maintained and they have to be recovered during software development. Some guidelines and naming conventions have been defined to describe the testing environment in order to easily identify related tests for a programming task. However, very often these guidelines are not followed making the identification of links between unit tests and classes a time-consuming task. Thus, automatic approaches to recover such links are needed. In this paper a traceability recovery approach based on Data Flow Analysis (DFA) is presented. In particular, the approach retrieves as tested classes all the classes that affect the result of the last assert statement in each method of the unit test class. The accuracy of the proposed method has been empirically evaluated on two systems, an open source system and an industrial system. As a benchmark, we compare the accuracy of the DFA-based approach with the accuracy of the previously used traceability recovery approaches, namely Naming Convention (NC) and Last Call Before Assert (LCBA) that seem to provide the most accurate results. The results show that the proposed approach is the most accurate method demonstrating the effectiveness of DFA. However, the case study also highlights the limitations of the experimented traceability recovery approaches, showing that detecting the class under test cannot be fully automated and some issues are still under study.", "title": "" }, { "docid": "cbbb2c0a9d2895c47c488bed46d8f468", "text": "We propose a new generative language model for sentences that first samples a prototype sentence from the training corpus and then edits it into a new sentence. Compared to traditional language models that generate from scratch either left-to-right or by first sampling a latent sentence vector, our prototype-then-edit model improves perplexity on language modeling and generates higher quality outputs according to human evaluation. Furthermore, the model gives rise to a latent edit vector that captures interpretable semantics such as sentence similarity and sentence-level analogies.", "title": "" }, { "docid": "6f8f7c855ea717ab79af1d5271710408", "text": "In the competitive and low entrance barrier beauty industry, customer loyalty is a critical factor for business success. Research literature of customer relationship management recommends various factors contributing to customer loyalty in the general setting, however, there are insufficient studies empirically weigh the importance of each critical factor for the beauty industry. This study investigates and ranks empirically the critical factors, which contributes to customer loyalty of Online-to-Offline (O2O) marketing in the beauty industry. Our result shows that customer satisfaction, customer switching costs, customer trust, corporate image and customer value positively influence customer loyalty of O2O marketing and in the order of decreasing importance. Attributes contributing to the five critical factors have also been studied and ranked. Findings of this study can help the beauty industry to develop an effective O2O marketing plan and hence customer loyalty can be enhanced through the process of implementing targeted marketing activities.", "title": "" }, { "docid": "7674d8bf5d183ce456d0f0e64d4b6112", "text": "A novel method for fiber packaging silicon waveguides is presented. The process uses angled fibers and capillary action of UV-cure epoxy. The technique is suited to passive alignment and can be scaled for fiber arrays.", "title": "" }, { "docid": "939b2faa63e24c0f303b823481682c4c", "text": "Visual motion perception is fundamental to many aspects of visual perception. Visual motion perception has long been associated with the dorsal (parietal) pathway and the involvement of the ventral 'form' (temporal) visual pathway has not been considered critical for normal motion perception. Here, we evaluated this view by examining whether circumscribed damage to ventral visual cortex impaired motion perception. The perception of motion in basic, non-form tasks (motion coherence and motion detection) and complex structure-from-motion, for a wide range of motion speeds, all centrally displayed, was assessed in five patients with a circumscribed lesion to either the right or left ventral visual pathway. Patients with a right, but not with a left, ventral visual lesion displayed widespread impairments in central motion perception even for non-form motion, for both slow and for fast speeds, and this held true independent of the integrity of areas MT/V5, V3A or parietal regions. In contrast with the traditional view in which only the dorsal visual stream is critical for motion perception, these novel findings implicate a more distributed circuit in which the integrity of the right ventral visual pathway is also necessary even for the perception of non-form motion.", "title": "" } ]
scidocsrr
1aa0a1c35c8d049712128e0a13161c59
Connection mechanism capable of genderless coupling for modular manipulator system
[ { "docid": "915ad4f43eef7db8fb24080f8389b424", "text": "This paper details the design and architecture of a series elastic actuated snake robot, the SEA Snake. The robot consists of a series chain of 1-DOF modules that are capable of torque, velocity and position control. Additionally, each module includes a high-speed Ethernet communications bus, internal IMU, modular electro-mechanical interface, and ARM based on-board control electronics.", "title": "" } ]
[ { "docid": "adccd039cc54352eefd855567e8eeb62", "text": "In this paper, we propose a novel classification method for the four types of lung nodules, i.e., well-circumscribed, vascularized, juxta-pleural, and pleural-tail, in low dose computed tomography scans. The proposed method is based on contextual analysis by combining the lung nodule and surrounding anatomical structures, and has three main stages: an adaptive patch-based division is used to construct concentric multilevel partition; then, a new feature set is designed to incorporate intensity, texture, and gradient information for image patch feature description, and then a contextual latent semantic analysis-based classifier is designed to calculate the probabilistic estimations for the relevant images. Our proposed method was evaluated on a publicly available dataset and clearly demonstrated promising classification performance.", "title": "" }, { "docid": "d58110b3f449cb76c7327fb3da80d027", "text": "The subject of this paper is robust voice activity detection (VAD) in noisy environments, especially in car environments. We present a comparison between several frame based VAD feature extraction algorithms in combination with different classifiers. Experiments are carried out under equal test conditions using clean speech, clean speech with added car noise and speech recorded in car environments. The lowest error rate is achieved applying features based on a likelihood ratio test which assumes normal distribution of speech and noise and a perceptron classifier. We propose modifications of this algorithm which reduce the frame error rate by approximately 30% relative in our experiments compared to the original algorithm.", "title": "" }, { "docid": "55f95c7b59f17fb210ebae97dbd96d72", "text": "Clustering is a widely studied data mining problem in the text domains. The problem finds numerous applications in customer segmentation, classification, collaborative filtering, visualization, document organization, and indexing. In this chapter, we will provide a detailed survey of the problem of text clustering. We will study the key challenges of the clustering problem, as it applies to the text domain. We will discuss the key methods used for text clustering, and their relative advantages. We will also discuss a number of recent advances in the area in the context of social network and linked data.", "title": "" }, { "docid": "e09d142b072122da62ebe79650f42cc5", "text": "This paper describes a synchronous buck converter based on a GaN-on-SiC integrated circuit, which includes a halfbridge power stage, as well as a modified active pull-up gate driver stage. The integrated modified active pull-up driver takes advantage of depletion-mode device characteristics to achieve fast switching with low power consumption. Design principles and results are presented for a synchronous buck converter prototype operating at 100 MHz switching frequency, delivering up to 7 W from 20 V input voltage. Measured power-stage efficiency peaks above 91%, and remains above 85% over a wide range of operating conditions. Experimental results show that the converter has the ability to accurately track a 20 MHz bandwidth LTE envelope signal with 83.7% efficiency.", "title": "" }, { "docid": "04f4c18860a98284de6d6a7e66592336", "text": "According to published literature : “Actigraphy is a non-invasive method of monitoring human rest/activity cycles. A small actigraph unit, also called an actimetry sensor is worn for a week or more to measure gross motor activity. The unit is usually, in a wrist-watch-like package, worn on the wrist. The movements the actigraph unit undergoes are continually recorded and some units also measure light exposure. The data can be later read to a computer and analysed offline; in some brands of sensors the data are transmitted and analysed in real time.”[1-9].We are interested in focusing on the above mentioned research topic as per the title of this communication.Interested in suggesting an informatics and computational framework in the context of Actigraphy using ImageJ/Actigraphy Plugin by using JikesRVM as the Java Virtual Machine.", "title": "" }, { "docid": "910a416dc736ec3566583c57123ac87c", "text": "Internet of Things (IoT) is one of the greatest technology revolutions in the history. Due to IoT potential, daily objects will be consciously worked in harmony with optimized performances. However, today, technology is not ready to fully bring its power to our daily life because of huge data analysis requirements in instant time. On the other hand, the powerful data management of cloud computing gives IoT an opportunity to make the revolution in our life. However, the traditional cloud computing server schedulers are not ready to provide services to IoT because IoT consists of a number of heterogeneous devices and applications which are far away from standardization. Therefore, to meet the expectations of users, the traditional cloud computing server schedulers should be improved to efficiently schedule and allocate IoT requests. There are several proposed scheduling algorithms for cloud computing in the literature. However, these scheduling algorithms are limited because of considering neither heterogeneous servers nor dynamic scheduling approach for different priority requests. Our objective is to propose Husnu S. Narman husnu@ou.edu 1 Holcombe Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, 29634, USA 2 Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Zahir Raihan Rd, Dhaka, 1000, Bangladesh 3 School of Computer Science, University of Oklahoma, Norman, OK, 73019, USA dynamic dedicated server scheduling for heterogeneous and homogeneous systems to efficiently provide desired services by considering priorities of requests. Results show that the proposed scheduling algorithm improves throughput up to 40 % in heterogeneous and homogeneous cloud computing systems for IoT requests. Our proposed scheduling algorithm and related analysis will help cloud service providers build efficient server schedulers which are adaptable to homogeneous and heterogeneous environments byconsidering systemperformancemetrics, such as drop rate, throughput, and utilization in IoT.", "title": "" }, { "docid": "6a2d1dfb61a4e37c8554900e0d366f51", "text": "Attention Deficit/Hyperactivity Disorder (ADHD) is a neurobehavioral disorder which leads to the difficulty on focusing, paying attention and controlling normal behavior. Globally, the prevalence of ADHD is estimated to be 6.5%. Medicine has been widely used for the treatment of ADHD symptoms, but the patient may have a chance to suffer from the side effects of drug, such as vomit, rash, urticarial, cardiac arrthymia and insomnia. In this paper, we propose the alternative medicine system based on the brain-computer interface (BCI) technology called neurofeedback. The proposed neurofeedback system simultaneously employs two important signals, i.e. electroencephalogram (EEG) and hemoencephalogram (HEG), which can quickly reveal the brain functional network. The treatment criteria are that, for EEG signals, the patient needs to maintain the beta activities (13-30 Hz) while reducing the alpha activities (7-13 Hz). Simultaneously, HEG signals need to be maintained continuously increasing to some setting thresholds of the brain blood oxygenation levels. Time-frequency selective multilayer perceptron (MLP) is employed to capture the mentioned phenomena in real-time. The experimental results show that the proposed system yields the sensitivity of 98.16% and the specificity of 95.57%. Furthermore, from the resulting weights of the proposed MLP, we can also conclude that HEG signals yield the most impact to our neurofeedback treatment followed by the alpha, beta, and theta activities, respectively.", "title": "" }, { "docid": "062fb8603fe65ddde2be90bac0519f97", "text": "Meta-heuristic methods represent very powerful tools for dealing with hard combinatorial optimization problems. However, real life instances usually cannot be treated efficiently in \"reasonable\" computing times. Moreover, a major issue in metaheuristic design and calibration is to make them robust, i.e., to provide high performance solutions for a variety of problem settings. Parallel meta-heuristics aim to address both issues. The objective of this chapter is to present a state-of-the-art survey of the main parallel meta-heuristic ideas and strategies, and to discuss general design principles applicable to all meta-heuristic classes. To achieve this goal, we explain various paradigms related to parallel meta-heuristic development, where communications, synchronization and control aspects are the most relevant. We also discuss implementation issues, namely the influence of the target architecture on parallel execution of meta-heuristics, pointing out the characteristics of shared and distributed memory multiprocessor systems. All these topics are illustrated by examples from recent literature. These examples are related to the parallelization of various meta-heuristic methods, but we focus here on Variable Neighborhood Search and Bee Colony Optimization.", "title": "" }, { "docid": "3b7dcbefbbc20ca1a37fa318c2347b4c", "text": "To better understand how individual differences influence the use of information technoiogy (IT), this study models and tests relationships among dynamic, IT-specific individual differences (i.e.. computer self-efficacy and computer anxiety). stable, situation-specific traits (i.e., personal innovativeness in IT) and stable, broad traits (i.e.. ''Cynthia Beath was the accepting senior editor for this paper. trait anxiety and negative affectivity). When compared to broad traits, the model suggests that situation-specific traits exert a more pervasive influence on IT situation-specific individual differences. Further, the modei suggests that computer anxiety mediates the influence of situationspecific traits (i.e., personal innovativeness) on computer self-efficacy. Results provide support for many of the hypothesized relationships. From a theoretical perspective, the findings help to further our understanding of the nomological network among individual differences that lead to computer self-efficacy. From a practical perspective, the findings may help IT managers design training programs that more effectiveiy increase the computer self-efficacy of users with different dispositional characteristics.", "title": "" }, { "docid": "5a20ef73db9d10dfdd5623c558c0be05", "text": "Both practitioners and scholars are increasingly interested in the idea of public value as a way of understanding government activity, informing policy-making and constructing service delivery. In part this represents a response to the concerns about ‘new public management’, but it also provides an interesting way of viewing what public sector organisations and public managers actually do. The purpose of this article is to examine this emerging approach by reviewing new public management and contrasting this with a public value paradigm. This provides the basis for a conceptual discussion of differences in approach, but also for pointing to some practical implications for both public sector management and public sector managers.", "title": "" }, { "docid": "63a548ee4f8857823e4bcc7ccbc31d36", "text": "The growing amounts of textual data require automatic methods for structuring relevant information so that it can be further processed by computers and systematically accessed by humans. The scenario dealt with in this dissertation is known as Knowledge Base Population (KBP), where relational information about entities is retrieved from a large text collection and stored in a database, structured according to a prespecified schema. Most of the research in this dissertation is placed in the context of the KBP benchmark of the Text Analysis Conference (TAC KBP), which provides a test-bed to examine all steps in a complex end-to-end relation extraction setting. In this dissertation a new state of the art for the TAC KBP benchmark was achieved by focussing on the following research problems: (1) The KBP task was broken down into a modular pipeline of sub-problems, and the most pressing issues were identified and quantified at all steps. (2) The quality of semi-automatically generated training data was increased by developing noise-reduction methods, decreasing the influence of false-positive training examples. (3) A focus was laid on fine-grained entity type modelling, entity expansion, entity matching and tagging, to maintain as much recall as possible on the relational argument level. (4) A new set of effective methods for generating training data, encoding features and training relational classifiers was developed and compared with previous state-of-the-art methods.", "title": "" }, { "docid": "203c797bea19fa0d4d66d65832ccbded", "text": "In soccer, scoring goals is a fundamental objective which depends on many conditions and constraints. Considering the RoboCup soccer 2D-simulator, this paper presents a data mining-based decision system to identify the best time and direction to kick the ball towards the goal to maximize the overall chances of scoring during a simulated soccer match. Following the CRISP-DM methodology, data for modeling were extracted from matches of major international tournaments (10691 kicks), knowledge about soccer was embedded via transformation of variables and a Multilayer Perceptron was used to estimate the scoring chance. Experimental performance assessment to compare this approach against previous LDA-based approach was conducted from 100 matches. Several statistical metrics were used to analyze the performance of the system and the results showed an increase of 7.7% in the number of kicks, producing an overall increase of 78% in the number of goals scored.", "title": "" }, { "docid": "1ee33813e4d8710a620c4bd47817f774", "text": "This research work concerns the perceptual evaluation of the performance of information systems (IS) and more particularly, the construct of user satisfaction. Faced with the difficulty of obtaining objective measures for the success of IS, user satisfaction appeared as a substitutive measure of IS performance (DeLone & McLean, 1992). Some researchers have indeed shown that the evaluation of an IS could not happen without an analysis of the feelings and perceptions of individuals who make use of it. Consequently, the concept of satisfaction has been considered as a guarantee of the performance of an IS. Also it has become necessary to ponder the drivers of user satisfaction. The analysis of models and measurement tools for satisfaction as well as the adoption of a contingency perspective has allowed the description of principal dimensions that have a direct or less direct impact on user perceptions\n The case study of a large French group, carried out through an interpretativist approach conducted by way of 41 semi-structured interviews, allowed the conceptualization of the problematique of perceptual evaluation of IS in a particular field study. This study led us to confirm the impact of certain factors (such as perceived usefulness, participation, the quality of relations with the IS Function and its resources and also the fit of IS with user needs). On the contrary, other dimensions regarded as fundamental do not receive any consideration or see their influence nuanced in the case studied (the properties of IS, the ease of use, the quality of information). Lastly, this study has allowed for the identification of the influence of certain contingency and contextual variables on user satisfaction and, above all, for the description of the importance of interactions between the IS Function and the users", "title": "" }, { "docid": "e678405fd86a3d8a52ecf779ea11758b", "text": "The high carrier mobility of graphene has been exploited in field-effect transistors that operate at high frequencies. Transistors were fabricated on epitaxial graphene synthesized on the silicon face of a silicon carbide wafer, achieving a cutoff frequency of 100 gigahertz for a gate length of 240 nanometers. The high-frequency performance of these epitaxial graphene transistors exceeds that of state-of-the-art silicon transistors of the same gate length.", "title": "" }, { "docid": "d5f905fb66ba81ecde0239a4cc3bfe3f", "text": "Bidirectional path tracing (BDPT) can render highly realistic scenes with complicated lighting scenarios. The Light Vertex Cache (LVC) based BDPT method by Davidovic et al. [Davidovič et al. 2014] provided good performance on scenes with simple materials in a progressive rendering scenario. In this paper, we propose a new bidirectional path tracing formulation based on the LVC approach that handles scenes with complex, layered materials efficiently on the GPU. We achieve coherent material evaluation while conserving GPU memory requirements using sorting. We propose a modified method for selecting light vertices using the contribution importance which improves the image quality for a given amount of work. Progressive rendering can empower artists in the production pipeline to iterate and preview their work quickly. We hope the work presented here will enable the use of GPUs in the production pipeline with complex materials and complicated lighting scenarios.", "title": "" }, { "docid": "6707eb036c97e7bc9ea4416462a9ceaf", "text": "Large networks are becoming a widely used abstraction for studying complex systems in a broad set of disciplines, ranging from social-network analysis to molecular biology and neuroscience. Despite an increasing need to analyze and manipulate large networks, only a limited number of tools are available for this task.\n Here, we describe the Stanford Network Analysis Platform (SNAP), a general-purpose, high-performance system that provides easy-to-use, high-level operations for analysis and manipulation of large networks. We present SNAP functionality, describe its implementational details, and give performance benchmarks. SNAP has been developed for single big-memory machines, and it balances the trade-off between maximum performance, compact in-memory graph representation, and the ability to handle dynamic graphs in which nodes and edges are being added or removed over time. SNAP can process massive networks with hundreds of millions of nodes and billions of edges. SNAP offers over 140 different graph algorithms that can efficiently manipulate large graphs, calculate structural properties, generate regular and random graphs, and handle attributes and metadata on nodes and edges. Besides being able to handle large graphs, an additional strength of SNAP is that networks and their attributes are fully dynamic; they can be modified during the computation at low cost. SNAP is provided as an open-source library in C++ as well as a module in Python.\n We also describe the Stanford Large Network Dataset, a set of social and information real-world networks and datasets, which we make publicly available. The collection is a complementary resource to our SNAP software and is widely used for development and benchmarking of graph analytics algorithms.", "title": "" }, { "docid": "85fdbd9d470d54196782a5d40abd2740", "text": "The purpose of this study was to investigate the morphology of the superficial musculoaponeurotic system (SMAS). Eight embalmed cadavers were analyzed: one side of the face was macroscopically dissected; on the other side, full-thickness samples of the parotid, zygomatic, nasolabial fold and buccal regions were taken. In all specimens, a laminar connective tissue layer (SMAS) bounding two different fibroadipose connective layers was identified. The superficial fibroadipose layer presented vertically oriented fibrous septa, connecting the dermis with the superficial aspect of the SMAS. In the deep fibroadipose connective layer, the fibrous septa were obliquely oriented, connecting the deep aspect of the SMAS to the parotid-masseteric fascia. This basic arrangement shows progressive thinning of the SMAS from the preauricular district to the nasolabial fold (p < 0.05). In the parotid region, the mean thicknesses of the superficial and deep fibroadipose connective tissues were 1.63 and 0.8 mm, respectively, whereas in the region of the nasolabial fold the superficial layer is not recognizable and the mean thickness of the deep fibroadipose connective layer was 2.9 mm. The connective subcutaneous tissue of the face forms a three-dimensional network connecting the SMAS to the dermis and deep muscles. These connective laminae connect adipose lobules of various sizes within the superficial and deep fibroadipose tissues, creating a three-dimensional network which modulates transmission of muscle contractions to the skin. Changes in the quantitative and qualitative characteristics of the fibroadipose connective system, reducing its viscoelastic properties, may contribute to ptosis of facial soft tissues during aging.", "title": "" }, { "docid": "dee37431ec24aae3fd8c9e43a4f9f93e", "text": "We present a new feature representation method for scene text recognition problem, particularly focusing on improving scene character recognition. Many existing methods rely on Histogram of Oriented Gradient (HOG) or part-based models, which do not span the feature space well for characters in natural scene images, especially given large variation in fonts with cluttered backgrounds. In this work, we propose a discriminative feature pooling method that automatically learns the most informative sub-regions of each scene character within a multi-class classification framework, whereas each sub-region seamlessly integrates a set of low-level image features through integral images. The proposed feature representation is compact, computationally efficient, and able to effectively model distinctive spatial structures of each individual character class. Extensive experiments conducted on challenging datasets (Chars74K, ICDAR'03, ICDAR'11, SVT) show that our method significantly outperforms existing methods on scene character classification and scene text recognition tasks.", "title": "" }, { "docid": "056eaedfbf8c18418ea627f46fa8ac16", "text": "The malleability of stereotyping matters in social psychology and in society. Previous work indicates rapid amygdala and cognitive responses to racial out-groups, leading some researchers to view these responses as inevitable. In this study, the methods of social-cognitive neuroscience were used to investigate how social goals control prejudiced responses. Participants viewed photographs of unfamiliar Black and White faces, under each of three social goals: social categorization (by age), social individuation (vegetable preference), and simple visual inspection (detecting a dot). One study recorded brain activity in the amygdala using functional magnetic resonance imaging, and another measured cognitive activation of stereotypes by lexical priming. Neither response to photos of the racial out-group was inevitable; instead, both responses depended on perceivers' current social-cognitive goal.", "title": "" }, { "docid": "f843ac182c496c7478421c682cb1e1b3", "text": "Birdsong often contains large amounts of rapid frequency modulation (FM). It is believed that the use or otherwise of FM is adaptive to the acoustic environment, and also that there are specific social uses of FM such as trills in aggressive territorial encounters. Yet temporal fine detail of FM is often absent or obscured in standard audio signal analysis methods such as Fourier analysis or linear prediction. Hence it is important to consider high resolution signal processing techniques for analysis of FM in bird vocalisations. If such methods can be applied at big data scales, this offers a further advantage as large datasets become available. We introduce methods from the signal processing literature which can go beyond spectrogram representations to analyse the fine modulations present in a signal at very short timescales. Focusing primarily on the genus Phylloscopus, we investigate which of a set of four analysis methods most strongly captures the species signal encoded in birdsong. In order to find tools useful in practical analysis of large databases, we also study the computational time taken by the methods, and their robustness to additive noise and MP3 compression. We find three methods which can robustly represent species-correlated FM attributes, and that the simplest method tested also appears to perform the best. We find that features representing the extremes of FM encode species identity supplementary to that captured in frequency features, whereas bandwidth features do not encode additional information. Large-scale FM analysis can efficiently extract information useful for bioacoustic studies, in addition to measures more commonly used to characterise vocalisations.", "title": "" } ]
scidocsrr
ef0878d4556e16bbb03bbc0313a7ee87
Offline Handwriting Recognition on Devanagari Using a New Benchmark Dataset
[ { "docid": "9139eed82708f03a097ba0b383f5a346", "text": "This paper presents a novel approach towards Indic handwritten word recognition using zone-wise information. Because of complex nature due to compound characters, modifiers, overlapping and touching, etc., character segmentation and recognition is a tedious job in Indic scripts (e.g. Devanagari, Bangla, Gurumukhi, and other similar scripts). To avoid character segmentation in such scripts, HMMbased sequence modeling has been used earlier in holistic way. This paper proposes an efficient word recognition framework by segmenting the handwritten word images horizontally into three zones (upper, middle and lower) and recognize the corresponding zones. The main aim of this zone segmentation approach is to reduce the number of distinct component classes compared to the total number of classes in Indic scripts. As a result, use of this zone segmentation approach enhances the recognition performance of the system. The components in middle zone where characters are mostly touching are recognized using HMM. After the recognition of middle zone, HMM based Viterbi forced alignment is applied to mark the left and right boundaries of the characters. Next, the residue components, if any, in upper and lower zones in their respective boundary are combined to achieve the final word level recognition. Water reservoir feature has been integrated in this framework to improve the zone segmentation and character alignment defects while segmentation. A novel sliding window-based feature, called Pyramid Histogram of Oriented Gradient (PHOG) is proposed for middle zone recognition. PHOG features has been compared with other existing features and found robust in Indic script recognition. An exhaustive experiment is performed on two Indic scripts namely, Bangla and Devanagari for the performance evaluation. From the experiment, it has been noted that proposed zone-wise recognition improves accuracy with respect to the traditional way of Indic word recognition.", "title": "" } ]
[ { "docid": "166b9cb75f8f81e3f143a44b1b3e0b99", "text": "This study aimed to classify different emotional states by means of EEG-based functional connectivity patterns. Forty young participants viewed film clips that evoked the following emotional states: neutral, positive, or negative. Three connectivity indices, including correlation, coherence, and phase synchronization, were used to estimate brain functional connectivity in EEG signals. Following each film clip, participants were asked to report on their subjective affect. The results indicated that the EEG-based functional connectivity change was significantly different among emotional states. Furthermore, the connectivity pattern was detected by pattern classification analysis using Quadratic Discriminant Analysis. The results indicated that the classification rate was better than chance. We conclude that estimating EEG-based functional connectivity provides a useful tool for studying the relationship between brain activity and emotional states.", "title": "" }, { "docid": "de016ffaace938c937722f8a47cc0275", "text": "Conventional traffic light detection methods often suffers from false positives in urban environment because of the complex backgrounds. To overcome such limitation, this paper proposes a method that combines a conventional approach, which is fast but weak to false positives, and a DNN, which is not suitable for detecting small objects but a very powerful classifier. Experiments on real data showed promising results.", "title": "" }, { "docid": "c66b529b1de24c8031622f3d28b3ada4", "text": "This work addresses the design of a dual-fed aperture-coupled circularly polarized microstrip patch antenna, operating at its fundamental mode. A numerical parametric assessment was carried out, from which some general practical guidelines that may aid the design of such antennas were derived. Validation was achieved by a good match between measured and simulated results obtained for a specific antenna set assembled, chosen from the ensemble of the numerical analysis.", "title": "" }, { "docid": "88de6047cec54692dea08abe752acd25", "text": "Heap-based attacks depend on a combination of memory management error and an exploitable memory allocator. Many allocators include ad hoc countermeasures against particular exploits but their effectiveness against future exploits has been uncertain. This paper presents the first formal treatment of the impact of allocator design on security. It analyzes a range of widely-deployed memory allocators, including those used by Windows, Linux, FreeBSD and OpenBSD, and shows that they remain vulnerable to attack. It them presents DieHarder, a new allocator whose design was guided by this analysis. DieHarder provides the highest degree of security from heap-based attacks of any practical allocator of which we are aware while imposing modest performance overhead. In particular, the Firefox web browser runs as fast with DieHarder as with the Linux allocator.", "title": "" }, { "docid": "8a6e7ac784b63253497207c63caa1036", "text": "Synchronized control (SYNC) is widely adopted for doubly fed induction generator (DFIG)-based wind turbine generators (WTGs) in microgrids and weak grids, which applies P-f droop control to achieve grid synchronization instead of phase-locked loop. The DFIG-based WTG with SYNC will reach a new equilibrium of rotor speed under frequency deviation, resulting in the WTG's acceleration or deceleration. The acceleration/deceleration process can utilize the kinetic energy stored in the rotating mass of WTG to provide active power support for the power grid, but the WTG may lose synchronous stability simultaneously. This stability problem occurs when the equilibrium of rotor speed is lost and the rotor speed exceeds the admissible range during the frequency deviations, which will be particularly analyzed in this paper. It is demonstrated that the synchronous stability can be improved by increasing the P-f droop coefficient. However, increasing the P-f droop coefficient will deteriorate the system's small signal stability. To address this contradiction, a modified synchronized control strategy is proposed. Simulation results verify the effectiveness of the analysis and the proposed control strategy.", "title": "" }, { "docid": "66c8bf3b0cfbfdf8add2fffd055b7f03", "text": "This paper continues the long-standing tradition of gradually improving the construction speed of spatial acceleration structures using sorted Morton codes. Previous work on this topic forms a clear sequence where each new paper sheds more light on the nature of the problem and improves the hierarchy generation phase in terms of performance, simplicity, parallelism and generality. Previous approaches constructed the tree by firstly generating the hierarchy and then calculating the bounding boxes of each node by using a bottom-up traversal. Continuing the work, we present an improvement by providing a bottom-up method that finds each node’s parent while assigning bounding boxes, thus constructing the tree in linear time in a single kernel launch. Also, our method allows clustering the sorted points using an user-defined distance metric function.", "title": "" }, { "docid": "8a0ff953c06daa958da79c6c6d3cfc72", "text": "Incremental Dynamic Analysis (IDA) is presented as a powerful tool to evaluate the variability in the seismic demand and capacity of non-deterministic structural models, building upon existing methodologies of Monte Carlo simulation and approximate moment-estimation. A nine-story steel moment-resisting frame is used as a testbed, employing parameterized moment-rotation relationships with non-deterministic quadrilinear backbones for the beam plastic-hinges. The uncertain properties of the backbones include the yield moment, the post-yield hardening ratio, the end-of-hardening rotation, the slope of the descending branch, the residual moment capacity and the ultimate rotation reached. IDA is employed to accurately assess the seismic performance of the model for any combination of the parameters by performing multiple nonlinear timehistory analyses for a suite of ground motion records. Sensitivity analyses on both the IDA and the static pushover level reveal the yield moment and the two rotational-ductility parameters to be the most influential for the frame behavior. To propagate the parametric uncertainty to the actual seismic performance we employ a) Monte Carlo simulation with latin hypercube sampling, b) point-estimate and c) first-order second-moment techniques, thus offering competing methods that represent different compromises between speed and accuracy. The final results provide firm ground for challenging current assumptions in seismic guidelines on using a median-parameter model to estimate the median seismic performance and employing the well-known square-root-sum-of-squares rule to combine aleatory randomness and epistemic uncertainty. Copyright c © 2009 John Wiley & Sons, Ltd.", "title": "" }, { "docid": "f61d8bcd3049f908784a7512d93010b4", "text": "This paper presents the results from a feasibility study where an artificial neural network is applied to detect person-borne improvised explosive devices (IEDs) from imagery acquired using three different sensors; a radar array, an infrared (IR) camera, and a passive millimeter-wave camera. The data set was obtained from the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T), and consists of hundreds of images of human subjects concealing various simulated IEDs, and clutter objects, beneath different types of clothing. The network used for detection is a hybrid, where feature extraction is performed using a multi-layer convolutional neural network, also known as a deep learning network, and final classification performed using a support vector machine (SVM). The performance of the combined network is scored using receiver operating curves for each IED type and sensor configuration. The results demonstrate (i) that deep learning is effective at extracting useful information from sensor imagery, and (ii) that performance is boosted significantly by combining complementary data from different sensor types.", "title": "" }, { "docid": "6a3cc8319b7a195ce7ec05a70ad48c7a", "text": "Image caption generation is the problem of generating a descriptive sentence of an image. Automatically describing the content of an image is a fundamental problem in artificial intelligence that connects computer vision and natural language processing. This paper presents a brief survey of some technical aspects and methods for description-generation of images. As there has been great interest in research community, to come up with automatic ways to retrieve images based on content. There are numbers of techniques, that, have been used to solve this problem, and purpose of this paper is to have an overview of many of these approaches and databases used for description generation purpose. Finally, we discuss open challenges and future directions for upcoming researchers.", "title": "" }, { "docid": "f2b4f786ecd63b454437f066deecfe4a", "text": "The causal role of human papillomavirus (HPV) in all cancers of the uterine cervix has been firmly established biologically and epidemiologically. Most cancers of the vagina and anus are likewise caused by HPV, as are a fraction of cancers of the vulva, penis, and oropharynx. HPV-16 and -18 account for about 70% of cancers of the cervix, vagina, and anus and for about 30-40% of cancers of the vulva, penis, and oropharynx. Other cancers causally linked to HPV are non-melanoma skin cancer and cancer of the conjunctiva. Although HPV is a necessary cause of cervical cancer, it is not a sufficient cause. Thus, other cofactors are necessary for progression from cervical HPV infection to cancer. Long-term use of hormonal contraceptives, high parity, tobacco smoking, and co-infection with HIV have been identified as established cofactors; co-infection with Chlamydia trachomatis (CT) and herpes simplex virus type-2 (HSV-2), immunosuppression, and certain dietary deficiencies are other probable cofactors. Genetic and immunological host factors and viral factors other than type, such as variants of type, viral load and viral integration, are likely to be important but have not been clearly identified.", "title": "" }, { "docid": "b07f858d08f40f61f3ed418674948f12", "text": "Nowadays, due to the great distance between design and implementation worlds, different skills are necessary to create a game system. To solve this problem, a lot of strategies for game development, trying to increase the abstraction level necessary for the game production, were proposed. In this way, a lot of game engines, game frameworks and others, in most cases without any compatibility or reuse criteria between them, were developed. This paper presents a new generative programming approach, able to increase the production of a digital game by the integration of different game development artifacts, following a system family strategy focused on variable and common aspects of a computer game. As result, high level abstractions of games, based on a common language, can be used to configure met programming transformations during the game production, providing a great compatibility level between game domain and game implementation artifacts.", "title": "" }, { "docid": "b1df1e6a6279501f45b65361e5a3917e", "text": "Politicians have high expectations for commercial open data use. Yet, companies appear to challenge the assumption that open data can be used to create competitive advantage, since any company can access open data and since open data use requires scarce resources. In this paper we examine commercial open data use for creating competitive advantage from the perspective of Resource Based Theory (RBT) and Resource Dependency Theory (RDT). Based on insights from a scenario, interviews and a survey and from RBT and RDT as a reference theory, we derive seven propositions. Our study suggests that the generation of competitive advantage with open data requires a company to have in-house capabilities and resources for open data use. The actual creation of competitive advantage might not be simple. The propositions also draw attention to the accomplishment of unique benefits for a company through the combination of internal and external resources. Recommendations for further research include testing the propositions.", "title": "" }, { "docid": "3f2312e385fc1c9aafc6f9f08e2e2d4f", "text": "Entity relation detection is a form of information extraction that finds predefined relations between pairs of entities in text. This paper describes a relation detection approach that combines clues from different levels of syntactic processing using kernel methods. Information from three different levels of processing is considered: tokenization, sentence parsing and deep dependency analysis. Each source of information is represented by kernel functions. Then composite kernels are developed to integrate and extend individual kernels so that processing errors occurring at one level can be overcome by information from other levels. We present an evaluation of these methods on the 2004 ACE relation detection task, using Support Vector Machines, and show that each level of syntactic processing contributes useful information for this task. When evaluated on the official test data, our approach produced very competitive ACE value scores. We also compare the SVM with KNN on different kernels.", "title": "" }, { "docid": "1288abeaddded1564b607c9f31924697", "text": "Dynamic time warping (DTW) is used for the comparison and processing of nonlinear signals and constitutes a widely researched field of study. The method has been initially designed for, and applied to, signals representing audio data. Afterwords it has been successfully modified and applied to many other fields of study. In this paper, we present the results of researches on the generalized DTW method designed for use with rotational sets of data parameterized by quaternions. The need to compare and process quaternion time series has been gaining in importance recently. Three-dimensional motion data processing is one of the most important applications here. Specifically, it is applied in the context of motion capture, and in many cases all rotational signals are described in this way. We propose a construction of generalized method called quaternion dynamic time warping (QDTW), which makes use of specific properties of quaternion space. It allows for the creation of a family of algorithms that deal with the higher order features of the rotational trajectory. This paper focuses on the analysis of the properties of this new approach. Numerical results show that the proposed method allows for efficient element assignment. Moreover, when used as the measure of similarity for a clustering task, the method helps to obtain good clustering performance both for synthetic and real datasets.", "title": "" }, { "docid": "87788e55769a7a840aaf41d9c3c5aec6", "text": "Cyber-attack detection is used to identify cyber-attacks while they are acting on a computer and network system to compromise the security (e.g., availability, integrity, and confidentiality) of the system. This paper presents a cyber-attack detection technique through anomaly-detection, and discusses the robustness of the modeling technique employed. In this technique, a Markov-chain model represents a profile of computer-event transitions in a normal/usual operating condition of a computer and network system (a norm profile). The Markov-chain model of the norm profile is generated from historic data of the system's normal activities. The observed activities of the system are analyzed to infer the probability that the Markov-chain model of the norm profile supports the observed activities. The lower probability the observed activities receive from the Markov-chain model of the norm profile, the more likely the observed activities are anomalies resulting from cyber-attacks, and vice versa. This paper presents the learning and inference algorithms of this anomaly-detection technique based on the Markov-chain model of a norm profile, and examines its performance using the audit data of UNIX-based host machines with the Solaris operating system. The robustness of the Markov-chain model for cyber-attack detection is presented through discussions & applications. To apply the Markov-chain technique and other stochastic process techniques to model the sequential ordering of events, the quality of activity-data plays an important role in the performance of intrusion detection. The Markov-chain technique is not robust to noise in the data (the mixture level of normal activities and intrusive activities). The Markov-chain technique produces desirable performance only at a low noise level. This study also shows that the performance of the Markov-chain techniques is not always robust to the window size: as the window size increases, the amount of noise in the window also generally increases. Overall, this study provides some support for the idea that the Markov-chain technique might not be as robust as the other intrusion-detection methods such as the chi-square distance test technique , although it can produce better performance than the chi-square distance test technique when the noise level of the data is low, such as the Mill & Pascal data in this study.", "title": "" }, { "docid": "d46172afedf3e86d64ee3c7dcfbd5c3c", "text": "This paper compares the radial vibration forces in 10-pole/12-slot fractional-slot SPM and IPM machines which are designed to produce the same output torque, and employ an identical stator but different SPM, V-shape and arc-shape IPM rotor topologies. The airgap field and radial vibration force density distribution as a function of angular position and corresponding space harmonics (vibration modes) are analysed using the finite element method together with frozen permeability technique. It is shown that not only the lowest harmonic of radial force in IPM machine is much higher, but also the (2p)th harmonic of radial force in IPM machine is also higher than that in SPM machine.", "title": "" }, { "docid": "6387707b2aba0400e517e427b26e4589", "text": "This thesis investigates the phase noise of two different 2-stage cross-coupled pair unsaturated ring oscillators with no tail current source. One oscillator consists of top crosscoupled pair delay cells, and the other consists of top cross-coupled pair and bottom crosscoupled pair delay cells. Under a low supply voltage restriction, a phase noise model is developed and applied to both ring oscillators. Both top cross-coupled pair and top and bottom cross-coupled pair oscillators are fabricated with 0.13 μm CMOS technology. Phase noise measurements of -92 dBc/Hz and -89 dBc/Hz ,respectively, at 1 MHz offset is obtained from the chip, which agree with theory and simulations. Top cross-coupled ring oscillator, with phase noise of -92 dBc/Hz at 1 MHz offset, is implemented in a second order sigma-delta time to digital converter. System level and transistor level functional simulation and timing jitter simulation are obtained.", "title": "" }, { "docid": "4d3b988de22e4630e1b1eff9e0d4551b", "text": "In this chapter we present a methodology for introducing and maintaining ontology based knowledge management applications into enterprises with a focus on Knowledge Processes and Knowledge Meta Processes. While the former process circles around the usage of ontologies, the latter process guides their initial set up. We illustrate our methodology by an example from a case study on skills management. The methodology serves as a scaffold for Part B “Ontology Engineering” of the handbook. It shows where more specific concerns of ontology engineering find their place and how they are related in the overall process.", "title": "" }, { "docid": "44e0cd40b9a06abd5a4e54524b214dce", "text": "A large majority of road accidents are relative to driver fatigue, distraction and drowsiness which are widely believed to be the largest contributors to fatalities and severe injuries, either as a direct cause of falling asleep at the wheel or as a contributing factor in lowering the attention and reaction time of a driver in critical situations. Thus to prevent road accidents, a countermeasure device has to be used. This paper illuminates and highlights the various measures that have been studied to detect drowsiness such as vehicle based, physiological based, and behavioural based measures. The main objective is to develop a real time non-contact system which will be able to identify driver’s drowsiness beforehand. The system uses an IR sensitive monochrome camera that detects the position and state of the eyes to calculate the drowsiness of a driver. Once the driver is detected as drowsy, the system will generate warning signals to alert the driver. In case the signal is not re-established the system will shut off the engine to prevent any mishap. Keywords— Drowsiness, Road Accidents, Eye Detection, Face Detection, Blink Pattern, PERCLOS, MATLAB, Arduino Nano", "title": "" } ]
scidocsrr
2113da56aa1ad681b109a5be053bcd0f
Building phylogenetic trees from molecular data with MEGA.
[ { "docid": "7fe1cea4990acabf7bc3c199d3c071ce", "text": "Comparative analysis of molecular sequence data is essential for reconstructing the evolutionary histories of species and inferring the nature and extent of selective forces shaping the evolution of genes and species. Here, we announce the release of Molecular Evolutionary Genetics Analysis version 5 (MEGA5), which is a user-friendly software for mining online databases, building sequence alignments and phylogenetic trees, and using methods of evolutionary bioinformatics in basic biology, biomedicine, and evolution. The newest addition in MEGA5 is a collection of maximum likelihood (ML) analyses for inferring evolutionary trees, selecting best-fit substitution models (nucleotide or amino acid), inferring ancestral states and sequences (along with probabilities), and estimating evolutionary rates site-by-site. In computer simulation analyses, ML tree inference algorithms in MEGA5 compared favorably with other software packages in terms of computational efficiency and the accuracy of the estimates of phylogenetic trees, substitution parameters, and rate variation among sites. The MEGA user interface has now been enhanced to be activity driven to make it easier for the use of both beginners and experienced scientists. This version of MEGA is intended for the Windows platform, and it has been configured for effective use on Mac OS X and Linux desktops. It is available free of charge from http://www.megasoftware.net.", "title": "" } ]
[ { "docid": "ee40d2e4a049f61a2c2b7eee2a2a98ae", "text": "In Analog to digital convertor design converter, high speed comparator influences the overall performance of Flash/Pipeline Analog to Digital Converter (ADC) directly. This paper presents the schematic design of a CMOS comparator with high speed, low noise and low power dissipation. A schematic design of this comparator is given with 0.18μm TSMC Technology and simulated in cadence environment. Simulation results are presented and it shows that this design can work under high speed clock frequency 100MHz. The design has a low offset voltage 280.7mv, low power dissipation 0.37 mw and low noise 6.21μV.", "title": "" }, { "docid": "40e06996a22e1de4220a09e65ac1a04d", "text": "Obtaining a compact and discriminative representation of facial and body expressions is a difficult problem in emotion recognition. Part of the difficulty is capturing microexpressions, i.e., short, involuntary expressions that last for only a fraction of a second: at a micro-temporal scale, there are so many other subtle face and body movements that do not convey semantically meaningful information. We present a novel approach to this problem by exploiting the sparsity of the frequent micro-temporal motion patterns. Local space-time features are extracted over the face and body region for a very short time period, e.g., few milliseconds. A codebook of microexpressions is learned from the data and used to encode the features in a sparse manner. This allows us to obtain a representation that captures the most salient motion patterns of the face and body at a micro-temporal scale. Experiments performed on the AVEC 2012 dataset show our approach achieving the best published performance on the arousal dimension based solely on visual features. We also report experimental results on audio-visual emotion recognition, comparing early and late data fusion techniques.", "title": "" }, { "docid": "00277e4562f707d37844e6214d1f8777", "text": "Video super-resolution (SR) aims at estimating a high-resolution video sequence from a low-resolution (LR) one. Given that the deep learning has been successfully applied to the task of single image SR, which demonstrates the strong capability of neural networks for modeling spatial relation within one single image, the key challenge to conduct video SR is how to efficiently and effectively exploit the temporal dependence among consecutive LR frames other than the spatial relation. However, this remains challenging because the complex motion is difficult to model and can bring detrimental effects if not handled properly. We tackle the problem of learning temporal dynamics from two aspects. First, we propose a temporal adaptive neural network that can adaptively determine the optimal scale of temporal dependence. Inspired by the inception module in GoogLeNet [1], filters of various temporal scales are applied to the input LR sequence before their responses are adaptively aggregated, in order to fully exploit the temporal relation among the consecutive LR frames. Second, we decrease the complexity of motion among neighboring frames using a spatial alignment network that can be end-to-end trained with the temporal adaptive network and has the merit of increasing the robustness to complex motion and the efficiency compared with the competing image alignment methods. We provide a comprehensive evaluation of the temporal adaptation and the spatial alignment modules. We show that the temporal adaptive design considerably improves the SR quality over its plain counterparts, and the spatial alignment network is able to attain comparable SR performance with the sophisticated optical flow-based approach, but requires a much less running time. Overall, our proposed model with learned temporal dynamics is shown to achieve the state-of-the-art SR results in terms of not only spatial consistency but also the temporal coherence on public video data sets. More information can be found in http://www.ifp.illinois.edu/~dingliu2/videoSR/.", "title": "" }, { "docid": "3f2bb2a383e34bc4a5cae29b3709d199", "text": "We present Cardinal, a tool for computer-assisted authoring of movie scripts. Cardinal provides a means of viewing a script through a variety of perspectives, for interpretation as well as editing. This is made possible by virtue of intelligent automated analysis of natural language scripts and generating different intermediate representations. Cardinal generates 2-D and 3-D visualizations of the scripted narrative and also presents interactions in a timeline-based view. The visualizations empower the scriptwriter to understand their story from a spatial perspective, and the timeline view provides an overview of the interactions in the story. The user study reveals that users of the system demonstrated confidence and comfort using the system.", "title": "" }, { "docid": "bdefafd4277c1f71e9f4c8d7769e0645", "text": "In many applications, one has to actively select among a set of expensive observations before making an informed decision. For example, in environmental monitoring, we want to select locations to measure in order to most effectively predict spatial phenomena. Often, we want to select observations which are robust against a number of possible objective functions. Examples include minimizing the maximum posterior variance in Gaussian Process regression, robust experimental design, and sensor placement for outbreak detection. In this paper, we present the Submodular Saturation algorithm, a simple and efficient algorithm with strong theoretical approximation guarantees for cases where the possible objective functions exhibit submodularity, an intuitive diminishing returns property. Moreover, we prove that better approximation algorithms do not exist unless NP-complete problems admit efficient algorithms. We show how our algorithm can be extended to handle complex cost functions (incorporating non-unit observation cost or communication and path costs). We also show how the algorithm can be used to near-optimally trade off expected-case (e.g., the Mean Square Prediction Error in Gaussian Process regression) and worst-case (e.g., maximum predictive variance) performance. We show that many important machine learning problems fit our robust submodular observation selection formalism, and provide extensive empirical evaluation on several real-world problems. For Gaussian Process regression, our algorithm compares favorably with state-of-the-art heuristics described in the geostatistics literature, while being simpler, faster and providing theoretical guarantees. For robust experimental design, our algorithm performs favorably compared to SDP-based algorithms. ∗ School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA † Google Inc., Pittsburgh, PA, USA.", "title": "" }, { "docid": "f66dfbbd6d2043744d32b44dba145ef2", "text": "Newly emerging location-based and event-based social network services provide us with a new platform to understand users' preferences based on their activity history. A user can only visit a limited number of venues/events and most of them are within a limited distance range, so the user-item matrix is very sparse, which creates a big challenge for traditional collaborative filtering-based recommender systems. The problem becomes more challenging when people travel to a new city where they have no activity history.\n In this paper, we propose LCARS, a location-content-aware recommender system that offers a particular user a set of venues (e.g., restaurants) or events (e.g., concerts and exhibitions) by giving consideration to both personal interest and local preference. This recommender system can facilitate people's travel not only near the area in which they live, but also in a city that is new to them. Specifically, LCARS consists of two components: offline modeling and online recommendation. The offline modeling part, called LCA-LDA, is designed to learn the interest of each individual user and the local preference of each individual city by capturing item co-occurrence patterns and exploiting item contents. The online recommendation part automatically combines the learnt interest of the querying user and the local preference of the querying city to produce the top-k recommendations. To speed up this online process, a scalable query processing technique is developed by extending the classic Threshold Algorithm (TA). We evaluate the performance of our recommender system on two large-scale real data sets, DoubanEvent and Foursquare. The results show the superiority of LCARS in recommending spatial items for users, especially when traveling to new cities, in terms of both effectiveness and efficiency.", "title": "" }, { "docid": "7de29b042513aaf1a3b12e71bee6a338", "text": "The widespread use of deception in online sources has motivated the need for methods to automatically profile and identify deceivers. This work explores deception, gender and age detection in short texts using a machine learning approach. First, we collect a new open domain deception dataset also containing demographic data such as gender and age. Second, we extract feature sets including n-grams, shallow and deep syntactic features, semantic features, and syntactic complexity and readability metrics. Third, we build classifiers that aim to predict deception, gender, and age. Our findings show that while deception detection can be performed in short texts even in the absence of a predetermined domain, gender and age prediction in deceptive texts is a challenging task. We further explore the linguistic differences in deceptive content that relate to deceivers gender and age and find evidence that both age and gender play an important role in people’s word choices when fabricating lies.", "title": "" }, { "docid": "1c1d8901dea3474d1a6ecf84a2044bd4", "text": "Zero-shot learning (ZSL) is typically achieved by resorting to a class semantic embedding space to transfer the knowledge from the seen classes to unseen ones. Capturing the common semantic characteristics between the visual modality and the class semantic modality (e.g., attributes or word vector) is a key to the success of ZSL. In this paper, we propose a novel encoder-decoder approach, namely latent space encoding (LSE), to connect the semantic relations of different modalities. Instead of requiring a projection function to transfer information across different modalities like most previous work, LSE performs the interactions of different modalities via a feature aware latent space, which is learned in an implicit way. Specifically, different modalities are modeled separately but optimized jointly. For each modality, an encoder-decoder framework is performed to learn a feature aware latent space via jointly maximizing the recoverability of the original space from the latent space and the predictability of the latent space from the original space. To relate different modalities together, their features referring to the same concept are enforced to share the same latent codings. In this way, the common semantic characteristics of different modalities are generalized with the latent representations. Another property of the proposed approach is that it is easily extended to more modalities. Extensive experimental results on four benchmark datasets [animal with attribute, Caltech UCSD birds, aPY, and ImageNet] clearly demonstrate the superiority of the proposed approach on several ZSL tasks, including traditional ZSL, generalized ZSL, and zero-shot retrieval.", "title": "" }, { "docid": "35d11265d367c6eeca6f3dfb8ef67a36", "text": "A synthetic aperture radar (SAR) can produce high-resolution two-dimensional images of mapped areas. The SAR comprises a pulsed transmitter, an antenna, and a phase-coherent receiver. The SAR is borne by a constant velocity vehicle such as an aircraft or satellite, with the antenna beam axis oriented obliquely to the velocity vector. The image plane is defined by the velocity vector and antenna beam axis. The image orthogonal coordinates are range and cross range (azimuth). The amplitude and phase of the received signals are collected for the duration of an integration time after which the signal is processed. High range resolution is achieved by the use of wide bandwidth transmitted pulses. High azimuth resolution is achieved by focusing, with a signal processing technique, an extremely long antenna that is synthesized from the coherent phase history. The pulse repetition frequency of the SAR is constrained within bounds established by the geometry and signal ambiguity limits. SAR operation requires relative motion between radar and target. Nominal velocity values are assumed for signal processing and measurable deviations are used for error compensation. Residual uncertainties and high-order derivatives of the velocity which are difficult to compensate may cause image smearing, defocusing, and increased image sidelobes. The SAR transforms the ocean surface into numerous small cells, each with dimensions of range and azimuth resolution. An image of a cell can be produced provided the radar cross section of the cell is sufficiently large and the cell phase history is deterministic. Ocean waves evidently move sufficiently uniformly to produce SAR images which correlate well with optical photographs and visual observations. The relationship between SAR images and oceanic physical features is not completely understood, and more analyses and investigations are desired.", "title": "" }, { "docid": "c03a2f4634458d214d961c3ae9438d1d", "text": "An accurate small-signal model of three-phase photovoltaic (PV) inverters with a high-order grid filter is derived in this paper. The proposed model takes into account the influence of both the inverter operating point and the PV panel characteristics on the inverter dynamic response. A sensitivity study of the control loops to variations of the DC voltage, PV panel transconductance, supplied power, and grid inductance is performed using the proposed small-signal model. Analytical and experimental results carried out on a 100-kW PV inverter are presented.", "title": "" }, { "docid": "3c27b3e11ba9924e9c102fc9ba7907b6", "text": "The Visagraph IITM Eye Movement Recording System is an instrument that assesses reading eye movement efficiency and related parameters objectively. It also incorporates automated data analysis. In the standard protocol, the patient reads selections only at the level of their current school grade, or at the level that has been determined by a standardized reading test. In either case, deficient reading eye movements may be the consequence of a language-based reading disability, an oculomotor-based reading inefficiency, or both. We propose an addition to the standard protocol: the patient’s eye movements are recorded a second time with text that is significantly below the grade level of the initial reading. The goal is to determine which factor is primarily contributing to the patient’s reading problem, oculomotor or language. This concept is discussed in the context of two representative cases.", "title": "" }, { "docid": "5c4f20fcde1cc7927d359fd2d79c2ba5", "text": "There are different interpretations of user experience that lead to different scopes of measure. The ISO definition suggests measures of user experience are similar to measures of satisfaction in usability. A survey at Nokia showed that user experience was interpreted in a similar way to usability, but with the addition of anticipation and hedonic responses. CHI 2009 SIG participants identified not just measurement methods, but methods that help understanding of how and why people use products. A distinction can be made between usability methods that have the objective of improving human performance, and user experience methods that have the objective of improving user satisfaction with achieving both pragmatic and hedonic goals. Sometimes the term “user experience” is used to refer to both approaches. DEFINITIONS OF USABILITY AND USER EXPERIENCE There has been a lot of recent debate about the scope of user experience, and how it should be defined [5]. The definition of user experience in ISO FDIS 9241-210 is: A person's perceptions and responses that result from the use and/or anticipated use of a product, system or service. This contrasts with the revised definition of usability in ISO FDIS 9241-210: Extent to which a system, product or service can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use. Both these definitions suggest that usability or user experience can be measured during or after use of a product, system or service. A person's “perceptions and responses” in the definition of user experience are similar to the concept of satisfaction in usability. From this perspective, measures of user experience can be encompassed within the 3-component model of usability [1], particularly when the experience is task-related. A weakness of both definitions is that they are not explicitly concerned with time. Just as the ISO 9241-11 definition of usability has nothing to say about learnability (where usability changes over time), so the ISO 9241-210 definition of user experience has nothing to say about the way user experience evolves from expectation, through actual interaction, to a total experience that includes reflection on the experience [7]. USER EXPERIENCE NEEDS IN DESIGN AND DEVELOPMENT Ketola and Roto [4] surveyed the needs for information on user experience in Nokia, asking senior staff: Which User Experience information (measurable data gained from our target users directly or indirectly), is useful for your organization? How? 21 needs were identified from 18 respondents who worked in Research, Development, Care, and Quality. Ketola and Roto categorised the responses in terms of the area measured: UX lifecycle, retention, use of functions, breakdowns, customer care, localization, device performance and new technology. In Table 1, the needs have been recategorized by type of measure. It is clear that most of the measures are common to conventional approaches to user centred design, but three measures are specific to user experience: • The impact of expected UX to purchase decisions • Continuous excitement • Why and when the user experiences frustration? USER EXPERIENCE EVALUATION METHODS At the CHI 2009 SIG: “User Experience Evaluation – Do You Know Which Method to Use?” [6] [8], participants were asked to describe user experience evaluation methods that they used. 36 methods were collected (including the example methods presented by the organizers). These have been categorised in Table 2 by the type of evaluation context, and the type of data collected. There was very little mention of using measures specific to user experience, particularly from industry participants. It seems that industry's interpretation of user experience evaluation methods is much broader, going beyond conventional evaluation to encompass methods that collect information that helps design for user experience. In that sense user experience evaluation seems to be interpreted as user centred design methods for achieving user experience. The differentiating factor from more traditional usability work is thus a wider end goal: not just achieving effectiveness, efficiency and satisfaction, but optimising the whole user experience from expectation through actual interaction to reflection on the experience. DIFFERENCES BETWEEN USABILITY AND USER EXPERIENCE Although there is no fundamental difference between measures of usability and measures of user experience at a particular point in time, the difference in emphasis between task performance and pleasure leads to different concerns during development. In the context of user centred design, typical usability concerns include: Measurement category Measurement type Measure Area measured Anticipation Pre-purchase Anticipated use The impact of expected UX to purchase decisions UX lifecycle Overall usability First use Effectiveness Success of taking the product into use UX lifecycle Product upgrade Effectiveness Success in transferring content from old device to the new device UX lifecycle Expectations vs. reality Satisfaction Has the device met your expectations? Retention Long term experience Satisfaction Are you satisfied with the product quality (after 3 months of use) Retention Hedonic Engagement Pleasure Continuous excitement Retention UX Obstacles Frustration Why and when the user experiences frustration? Breakdowns Detailed usability Use of device functions How used What functions are used, how often, why, how, when, where? Use of functions Malfunction Technical problems Amount of “reboots” and severe technical problems experienced. Breakdowns Usability problems Usability problems Top 10 usability problems experienced by the customers. Breakdowns Effect of localization Satisfaction with localisation How do users perceive content in their local language? Localization Latencies Satisfaction with device performance Perceived latencies in key tasks. Device performance Performance Satisfaction with device performance Perceived UX on device performance Device performance Perceived complexity Satisfaction with task complexity Actual and perceived complexity of task accomplishments. Device performance User differences Previous devices Previous user experience Which device you had previously? Retention Differences in user groups User differences How different user groups access features? Use of functions Reliability of product planning User differences Comparison of target users vs. actual buyers? Use of functions Support Customer experience in “touchpoints” Satisfaction with support How does customer think & feel about the interaction in the touch points? Customer care Accuracy of support information Consequences of poor support Does inaccurate support information result in product returns? How? Customer care Innovation feedback User wish list New user ideas & innovations triggered by new experiences New technologies Impact of use Change in user behaviour How the device affects user behaviour How are usage patterns changing when new technologies are introduced New technologies Table 1. Categorisation of usability measures reported in [4] 1. Designing for and evaluating overall effectiveness and efficiency. 2. Designing for and evaluating user comfort and satisfaction. 3. Designing to make the product easy to use, and evaluating the product in order to identify and fix usability problems. 4. When relevant, the temporal aspect leads to a concern for learnability. In the context of user centred design, typical user experience concerns include: 1. Understanding and designing the user’s experience with a product: the way in which people interact with a product over time: what they do and why. 2. Maximising the achievement of the hedonic goals of stimulation, identification and evocation and associated emotional responses. Sometimes the two sets of issues are contrasted as usability and user experience. But some organisations would include both under the common umbrella of user experience. Evaluation context Lab tests Lab study with mind maps Paper prototyping Field tests Product / Tool Comparison Competitive evaluation of prototypes in the wild Field observation Long term pilot study Longitudinal comparison Contextual Inquiry Observation/Post Interview Activity Experience Sampling Longitudinal Evaluation Ethnography Field observations Longitudinal Studies Evaluation of groups Evaluating collaborative user experiences, Instrumented product TRUE Tracking Realtime User Experience Domain specific Nintendi Wii Children OPOS Outdoor Play Observation Scheme This-or-that Approaches Evaluating UX jointly with usability Evaluation data User opinion/interview Lab study with mind maps Quick and dirty evaluation Audio narrative Retrospective interview Contextual Inquiry Focus groups evaluation Observation \\ Post Interview Activity Experience Sampling Sensual Evaluation Instrument Contextual Laddering Interview ESM User questionnaire Survey Questions Emocards Experience sampling triggered by events, SAM Magnitude Estimation TRUE Tracking Realtime User Experience Questionnaire (e.g. AttrakDiff) Human responses PURE preverbal user reaction evaluation Psycho-physiological measurements Expert evaluation Expert evaluation Heuristic matrix Perspective-Based Inspection Table2. User experience evaluation methods (CHI 2009 SIG) CONCLUSIONS The scope of user experience The concept of user experience both broadens: • The range of human responses that would be measured to include pleasure. • The circumstances in which they would be measured to include anticipated use and reflection on use. Equally importantly the goal to achieve improved user experience over the whole lifecycle of user involvement with the product leads to increased emphasis on use of methods that help understand what can be done to improve this experience through the whole lifecycle of user involvement. However, notably absent from any of the current surveys or initiative", "title": "" }, { "docid": "40d2b1e5b12a3239aed16cd1691037a2", "text": "Identifiers in programs contain semantic information that might be leveraged to build tools that help programmers write code. This work explores using RNN models to predict Haskell type signatures given the name of the entity being typed. A large corpus of real-world type signatures is gathered from online sources for training and evaluation. In real-world Haskell files, the same type signature is often immediately repeated for a new name. To attempt to take advantage of this repetition, a varying attention mechanism was developed and evaluated. The RNN models explored show some facility at predicting type signature structure from the name, but not the entire signature. The varying attention mechanism provided little gain.", "title": "" }, { "docid": "de7d29c7e11445e836bd04c003443c67", "text": "Logistic regression with `1 regularization has been proposed as a promising method for feature selection in classification problems. In this paper we describe an efficient interior-point method for solving large-scale `1-regularized logistic regression problems. Small problems with up to a thousand or so features and examples can be solved in seconds on a PC; medium sized problems, with tens of thousands of features and examples, can be solved in tens of seconds (assuming some sparsity in the data). A variation on the basic method, that uses a preconditioned conjugate gradient method to compute the search step, can solve very large problems, with a million features and examples (e.g., the 20 Newsgroups data set), in a few minutes, on a PC. Using warm-start techniques, a good approximation of the entire regularization path can be computed much more efficiently than by solving a family of problems independently.", "title": "" }, { "docid": "ccacb7e5d59c4d9fc5d31664260f25f5", "text": "This paper presents a systematic survey on existing literatures and seminal works relevant to the application of ontologies in different aspects of Cloud computing. Our hypothesis is that ontologies along with their reasoning capabilities can have significant impact on improving various aspects of the Cloud computing phenomena. Ontologies can promote intelligent decision support mechanisms for various Cloud based services. They can also provide effective interoperability among the Cloud based systems and resources. This survey can promote a comprehensive understanding on the roles and significance of ontologies within the overall domain of Cloud Computing. Also, this project can potentially form the basis of new research area and possibilities for both ontology and Cloud computing communities.", "title": "" }, { "docid": "105b0c048852de36d075b1db929c1fa4", "text": "OBJECTIVES\nThis study was carried out to investigate the potential of titanium to induce hypersensitivity in patients chronically exposed to titanium-based dental or endoprosthetic implants.\n\n\nMETHODS\nFifty-six patients who had developed clinical symptoms after receiving titanium-based implants were tested in the optimized lymphocyte transformation test MELISA against 10 metals including titanium. Out of 56 patients, 54 were patch-tested with titanium as well as with other metals. The implants were removed in 54 patients (2 declined explantation), and 15 patients were retested in MELISA.\n\n\nRESULTS\nOf the 56 patients tested in MELISA, 21 (37.5%) were positive, 16 (28.6%) ambiguous, and 19 (33.9%) negative to titanium. In the latter group, 11 (57.9%) showed lymphocyte reactivity to other metals, including nickel. All 54 patch-tested patients were negative to titanium. Following removal of the implants, all 54 patients showed remarkable clinical improvement. In the 15 retested patients, this clinical improvement correlated with normalization in MELISA reactivity.\n\n\nCONCLUSION\nThese data clearly demonstrate that titanium can induce clinically-relevant hypersensitivity in a subgroup of patients chronically exposed via dental or endoprosthetic implants.", "title": "" }, { "docid": "bdb2a80b6139e7fd229acf2a1f8c33f1", "text": "This paper aims to determine the maximum frequency achievable in a 25 kW series inverter for induction heating applications and to compare, in hard switching conditions, four fast transistors IGBTs 600A and 1200V modules encapsulated in 62mm from different suppliers. The comparison has been done at 25 and 125ºC in a set-up. Important differences between modules have been obtained depending on the die temperature.", "title": "" }, { "docid": "a2f062482157efb491ca841cc68b7fd3", "text": "Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume. One of the most common approaches in literature is using machine learning techniques, to automatically learn models and patterns behind such complexity, and to develop technologies to keep pace with malware evolution. This survey aims at providing an overview on the way machine learning has been used so far in the context of malware analysis in Windows environments, i.e. for the analysis of Portable Executables. We systematize surveyed papers according to their objectives (i.e., the expected output), what information about malware they specifically use (i.e., the features), and what machine learning techniques they employ (i.e., what algorithm is used to process the input and produce the output). We also outline a number of issues and challenges, including those concerning the used datasets, and identify the main current topical trends and how to possibly advance them. In particular, we introduce the novel concept of malware analysis economics, regarding the study of existing trade-offs among key metrics, such as analysis accuracy and economical costs.", "title": "" }, { "docid": "87c973e92ef3affcff4dac0d0183067c", "text": "Drug-drug interaction (DDI) is a major cause of morbidity and mortality and a subject of intense scientific interest. Biomedical literature mining can aid DDI research by extracting evidence for large numbers of potential interactions from published literature and clinical databases. Though DDI is investigated in domains ranging in scale from intracellular biochemistry to human populations, literature mining has not been used to extract specific types of experimental evidence, which are reported differently for distinct experimental goals. We focus on pharmacokinetic evidence for DDI, essential for identifying causal mechanisms of putative interactions and as input for further pharmacological and pharmacoepidemiology investigations. We used manually curated corpora of PubMed abstracts and annotated sentences to evaluate the efficacy of literature mining on two tasks: first, identifying PubMed abstracts containing pharmacokinetic evidence of DDIs; second, extracting sentences containing such evidence from abstracts. We implemented a text mining pipeline and evaluated it using several linear classifiers and a variety of feature transforms. The most important textual features in the abstract and sentence classification tasks were analyzed. We also investigated the performance benefits of using features derived from PubMed metadata fields, various publicly available named entity recognizers, and pharmacokinetic dictionaries. Several classifiers performed very well in distinguishing relevant and irrelevant abstracts (reaching F1≈0.93, MCC≈0.74, iAUC≈0.99) and sentences (F1≈0.76, MCC≈0.65, iAUC≈0.83). We found that word bigram features were important for achieving optimal classifier performance and that features derived from Medical Subject Headings (MeSH) terms significantly improved abstract classification. We also found that some drug-related named entity recognition tools and dictionaries led to slight but significant improvements, especially in classification of evidence sentences. Based on our thorough analysis of classifiers and feature transforms and the high classification performance achieved, we demonstrate that literature mining can aid DDI discovery by supporting automatic extraction of specific types of experimental evidence.", "title": "" } ]
scidocsrr
5662b5df80d0f67f79f36630f82f6b7f
Joint Optimization of User-desired Content in Multi-document Summaries by Learning from User Feedback
[ { "docid": "bf9ef1e84275ac77be0fd71334dde1ab", "text": "The development of summarization research has been significantly hampered by the costly acquisition of reference summaries. This paper proposes an effective way to automatically collect large scales of news-related multi-document summaries with reference to social media’s reactions. We utilize two types of social labels in tweets, i.e., hashtags and hyper-links. Hashtags are used to cluster documents into different topic sets. Also, a tweet with a hyper-link often highlights certain key points of the corresponding document. We synthesize a linked document cluster to form a reference summary which can cover most key points. To this aim, we adopt the ROUGE metrics to measure the coverage ratio, and develop an Integer Linear Programming solution to discover the sentence set reaching the upper bound of ROUGE. Since we allow summary sentences to be selected from both documents and highquality tweets, the generated reference summaries could be abstractive. Both informativeness and readability of the collected summaries are verified by manual judgment. In addition, we train a Support Vector Regression summarizer on DUC generic multi-document summarization benchmarks. With the collected data as extra training resource, the performance of the summarizer improves a lot on all the test sets. We release this dataset for further research.", "title": "" }, { "docid": "66af4d496e98e4b407922fbe9970a582", "text": "Automatic summarization of open-domain spoken dialogues is a relatively new research area. This article introduces the task and the challenges involved and motivates and presents an approach for obtaining automatic-extract summaries for human transcripts of multiparty dialogues of four different genres, without any restriction on domain. We address the following issues, which are intrinsic to spoken-dialogue summarization and typically can be ignored when summarizing written text such as news wire data: (1) detection and removal of speech disfluencies; (2) detection and insertion of sentence boundaries; and (3) detection and linking of cross-speaker information units (question-answer pairs). A system evaluation is performed using a corpus of 23 dialogue excerpts with an average duration of about 10 minutes, comprising 80 topical segments and about 47,000 words total. The corpus was manually annotated for relevant text spans by six human annotators. The global evaluation shows that for the two more informal genres, our summarization system using dialogue-specific components significantly outperforms two baselines: (1) a maximum-marginal-relevance ranking algorithm using TFIDF term weighting, and (2) a LEAD baseline that extracts the first n words from a text.", "title": "" } ]
[ { "docid": "c4ed6293bd0e216cefe2bc3f0577ca0b", "text": "In this paper, we describe our end-to-end content-based image retrieval system built upon Elasticsearch, a well-known and popular textual search engine. As far as we know, this is the first time such a system has been implemented in eCommerce, and our efforts have turned out to be highly worthwhile. We end up with a novel and exciting visual search solution that is extremely easy to be deployed, distributed, scaled and monitored in a cost-friendly manner. Moreover, our platform is intrinsically flexible in supporting multimodal searches, where visual and textual information can be jointly leveraged in retrieval. The core idea is to encode image feature vectors into a collection of string tokens in a way such that closer vectors will share more string tokens in common. By doing that, we can utilize Elasticsearch to efficiently retrieve similar images based on similarities within encoded sting tokens. As part of the development, we propose a novel vector to string encoding method, which is shown to substantially outperform the previous ones in terms of both precision and latency. First-hand experiences in implementing this Elasticsearchbased platform are extensively addressed, which should be valuable to practitioners also interested in building visual search engine on top of Elasticsearch.", "title": "" }, { "docid": "fb123464a674e27f3dd36b109ad531e6", "text": "Buerger exercise can improve the peripheral circulation of lower extremities. However, the evidence and a quantitative assessment of skin perfusion immediately after this exercise in patients with diabetes feet are still rare.We recruited 30 patients with unilateral or bilateral diabetic ulcerated feet in Chang Gung Memorial Hospital, Chia-Yi Branch, from October 2012 to December 2013. Real-time dorsal foot skin perfusion pressures (SPPs) before and after Buerger exercise were measured and analyzed. In addition, the severity of ischemia and the presence of ulcers before exercise were also stratified.A total of 30 patients with a mean age of 63.4 ± 13.7 years old were enrolled in this study. Their mean duration of diabetes was 13.6 ± 8.2 years. Among them, 26 patients had unilateral and 4 patients had bilateral diabetes foot ulcers. Of the 34 wounded feet, 23 (68%) and 9 (27%) feet were classified as Wagner class II and III, respectively. The real-time SPP measurement indicated that Buerger exercise significantly increased the level of SPP by more than 10 mm Hg (n = 46, 58.3 vs 70.0 mm Hg, P < 0.001). In terms of pre-exercise dorsal foot circulation condition, the results showed that Buerger exercise increased the level of SPP in severe ischemia (n = 5, 22.1 vs 37.3 mm Hg, P = 0.043), moderate ischemia (n = 14, 42.2 vs 64.4 mm Hg, P = 0.001), and borderline-normal (n = 7, 52.9 vs 65.4 mm Hg, P = 0.028) groups, respectively. However, the 20 feet with SPP levels more than 60 mm Hg were not improved significantly after exercise (n = 20, 58.3 vs 71.5 mm Hg, P = 0.239). As to the presence of ulcers, Buerger exercise increased the level of SPP in either unwounded feet (n = 12, 58.5 vs 66.0 mm Hg, P = 0.012) or wounded feet (n = 34, 58.3 vs 71.5 mm Hg, P < 0.001). The majority of the ulcers was either completely healed (9/34 = 27%) or still improving (14/34 = 41%).This study quantitatively demonstrates the evidence of dorsal foot peripheral circulation improvement after Buerger exercise in patients with diabetes.", "title": "" }, { "docid": "9f7987bd6e65f26cd240cc5fcda82094", "text": "Surface roughness is known to amplify hydrophobicity. It is observed that, in general, two drop shapes are possible on a given rough surface. These two cases correspond to the Wenzel (liquid wets the grooves of the rough surface) and Cassie (the drop sits on top of the peaks of the rough surface) formulas. Depending on the geometric parameters of the substrate, one of these two cases has lower energy. It is not guaranteed, though, that a drop will always exist in the lower energy state; rather, the state in which a drop will settle depends typically on how the drop is formed. In this paper, we investigate the transition of a drop from one state to another. In particular, we are interested in the transition of a \"Cassie drop\" to a \"Wenzel drop\", since it has implications on the design of superhydrophobic rough surfaces. We propose a methodology, based on energy balance, to determine whether a transition from the Cassie to Wenzel case is possible.", "title": "" }, { "docid": "8213f9488af8e1492d7a4ac2eec3a573", "text": "The loss surface of deep neural networks has recently attracted interest in the optimization and machine learning communities as a prime example of highdimensional non-convex problem. Some insights were recently gained using spin glass models and mean-field approximations, but at the expense of strongly simplifying the nonlinear nature of the model. In this work, we do not make any such assumption and study conditions on the data distribution and model architecture that prevent the existence of bad local minima. Our theoretical work quantifies and formalizes two important folklore facts: (i) the landscape of deep linear networks has a radically different topology from that of deep half-rectified ones, and (ii) that the energy landscape in the non-linear case is fundamentally controlled by the interplay between the smoothness of the data distribution and model over-parametrization. Our main theoretical contribution is to prove that half-rectified single layer networks are asymptotically connected, and we provide explicit bounds that reveal the aforementioned interplay. The conditioning of gradient descent is the next challenge we address. We study this question through the geometry of the level sets, and we introduce an algorithm to efficiently estimate the regularity of such sets on large-scale networks. Our empirical results show that these level sets remain connected throughout all the learning phase, suggesting a near convex behavior, but they become exponentially more curvy as the energy level decays, in accordance to what is observed in practice with very low curvature attractors.", "title": "" }, { "docid": "43dd1be8cd133e500d82e3bfab26a4d3", "text": "This study investigates the solutions incorporated by the Architecture Board in global healthcare enterprise (GHE) to mitigate architecture risks especially in Digital IT areas while proposing and implementing the Adaptive Integrated EA framework, which can be applied in companies promoting IT strategy with Cloud/Mobile IT. The study revealed the distribution of solutions across the architecture domains in Enterprise Architecture covering applications and technologies with Cloud/Mobile IT/Digital IT to mitigate risks. An in-depth analysis of this distribution resulted in practical guidance for companies that consider Risk Management for Digital Transformation while starting up the Architecture Board in Enterprise Architecture with IT strategy covering Digital IT related elements.", "title": "" }, { "docid": "c8d936c8878a27015590bd7551023d79", "text": "Rich high-quality annotated data is critical for semantic segmentation learning, yet acquiring dense and pixel-wise ground-truth is both labor- and time-consuming. Coarse annotations (e.g., scribbles, coarse polygons) offer an economical alternative, with which training phase could hardly generate satisfactory performance unfortunately. In order to generate high-quality annotated data with a low time cost for accurate segmentation, in this paper, we propose a novel annotation enrichment strategy, which expands existing coarse annotations of training data to a finer scale. Extensive experiments on the Cityscapes and PASCAL VOC 2012 benchmarks have shown that the neural networks trained with the enriched annotations from our framework yield a significant improvement over that trained with the original coarse labels. It is highly competitive to the performance obtained by using human annotated dense annotations. The proposed method also outperforms among other state-of-the-art weakly-supervised segmentation methods.", "title": "" }, { "docid": "1781ad48e91920d2c71d3238015c061e", "text": "Click-through data has proven to be a critical resource for improving search ranking quality. Though a large amount of click data can be easily collected by search engines, various biases make it difficult to fully leverage this type of data. In the past, many click models have been proposed and successfully used to estimate the relevance for individual query-document pairs in the context of web search. These click models typically require a large quantity of clicks for each individual pair and this makes them difficult to apply in systems where click data is highly sparse due to personalized corpora and information needs, e.g., personal search. In this paper, we study the problem of how to leverage sparse click data in personal search and introduce a novel selection bias problem and address it in the learning-to-rank framework. This paper proposes a few bias estimation methods, including a novel query-dependent one that captures queries with similar results and can successfully deal with sparse data. We empirically demonstrate that learning-to-rank that accounts for query-dependent selection bias yields significant improvements in search effectiveness through online experiments with one of the world's largest personal search engines.", "title": "" }, { "docid": "cb85db604bf21751766daf3751dd73bd", "text": "The heterogeneous cloud radio access network (H-CRAN) is a promising paradigm that incorporates cloud computing into heterogeneous networks (HetNets), thereby taking full advantage of cloud radio access networks (C-RANs) and HetNets. Characterizing cooperative beamforming with fronthaul capacity and queue stability constraints is critical for multimedia applications to improve the energy efficiency (EE) in H-CRANs. An energy-efficient optimization objective function with individual fronthaul capacity and intertier interference constraints is presented in this paper for queue-aware multimedia H-CRANs. To solve this nonconvex objective function, a stochastic optimization problem is reformulated by introducing the general Lyapunov optimization framework. Under the Lyapunov framework, this optimization problem is equivalent to an optimal network-wide cooperative beamformer design algorithm with instantaneous power, average power, and intertier interference constraints, which can be regarded as a weighted sum EE maximization problem and solved by a generalized weighted minimum mean-square error approach. The mathematical analysis and simulation results demonstrate that a tradeoff between EE and queuing delay can be achieved, and this tradeoff strictly depends on the fronthaul constraint.", "title": "" }, { "docid": "a500af4d27774a3f36db90a79dec91c3", "text": "This paper introduces Internet of Things (IoTs), which offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of IoTs, serious concerns are raised over access of personal information pertaining to device and individual privacy. This survey summarizes the security threats and privacy concerns of IoT..", "title": "" }, { "docid": "be3e02812e35000b39e4608afc61f229", "text": "The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks. In this paper, an extensive analysis on face spoofing detection works published in the last decade is presented. The analyzed works are categorized by their fundamental parts, i.e., descriptors and classifiers. This structured survey also brings a comparative performance analysis of the works considering the most important public data sets in the field. The methodology followed in this work is particularly relevant to observe temporal evolution of the field, trends in the existing approaches, Corresponding author: Luciano Oliveira, tel. +55 71 3283-9472 Email addresses: luiz.otavio@ufba.br (Luiz Souza), lrebouca@ufba.br (Luciano Oliveira), mauricio@dcc.ufba.br (Mauricio Pamplona), papa@fc.unesp.br (Joao Papa) to discuss still opened issues, and to propose new perspectives for the future of face spoofing detection.", "title": "" }, { "docid": "92fb73e03b487d5fbda44e54cf59640d", "text": "The eyes and periocular area are the central aesthetic unit of the face. Facial aging is a dynamic process that involves skin, subcutaneous soft tissues, and bony structures. An understanding of what is perceived as youthful and beautiful is critical for success. Knowledge of the functional aspects of the eyelid and periocular area can identify pre-preoperative red flags.", "title": "" }, { "docid": "6886b42b7624d2a47466d7356973f26c", "text": "Conventional on-off keyed signals, such as return-to-zero (RZ) and nonreturn-to-zero (NRZ) signals are susceptible to cross-gain modulation (XGM) in semiconductor optical amplifiers (SOAs) due to pattern effect. In this letter, XGM effect of Manchester-duobinary, RZ differential phase-shift keying (RZ-DPSK), NRZ-DPSK, RZ, and NRZ signals in SOAs were compared. The experimental results confirmed the reduction of crosstalk penalty in SOAs by using Manchester-duobinary signals", "title": "" }, { "docid": "4fb301cffa66f37c07bd6c44a108e142", "text": "Unambiguous identities of resources are important aspect for semantic web. This paper addresses the personal identity issue in the context of bibliographies. Because of abbreviations or misspelling of names in publications or bibliographies, an author may have multiple names and multiple authors may share the same name. Such name ambiguity affects the performance of identity matching, document retrieval and database federation, and causes improper attribution of research credit. This paper describes a new K-means clustering algorithm based on an extensible Naïve Bayes probability model to disambiguate authors with the same first name initial and last name in the bibliographies and proposes a canonical name. The model captures three types of bibliographic information: coauthor names, the title of the paper and the title of the journal or proceeding. The algorithm achieves best accuracies of 70.1% and 73.6% on disambiguating 6 different “J Anderson” s and 9 different \"J Smith\" s based on the citations collected from researchers’ publication web pages.", "title": "" }, { "docid": "bb815929889d93e19c6581c3f9a0b491", "text": "This paper presents an HMM-MLP hybrid system to recognize complex date images written on Brazilian bank cheques. The system first segments implicitly a date image into sub-fields through the recognition process based on an HMM-based approach. Afterwards, the three obligatory date sub-fields are processed by the system (day, month and year). A neural approach has been adopted to work with strings of digits and a Markovian strategy to recognize and verify words. We also introduce the concept of meta-classes of digits, which is used to reduce the lexicon size of the day and year and improve the precision of their segmentation and recognition. Experiments show interesting results on date recognition.", "title": "" }, { "docid": "040b56db2f85ad43ed9f3f9adbbd5a71", "text": "This study examined the relations between source credibility of eWOM (electronic word of mouth), perceived risk and food products customer's information adoption mediated by argument quality and information usefulness. eWOM has been commonly used to refer the customers during decision-making process for food commodities. Based on this study, we used Elaboration Likelihood Model of information adoption presented by Sussman and Siegal (2003) to check the willingness to buy. Non-probability purposive samples of 300 active participants were taken through questionnaire from several regions of the Republic of China and analyzed the data through structural equation modeling (SEM) accordingly. We discussed that whether eWOM source credibility and perceived risk would impact the degree of information adoption through argument quality and information usefulness. It reveals that eWOM has positively influenced on perceived risk by source credibility to the extent of information adoption and, for this, customers use eWOM for the reduction of the potential hazards when decision making. Companies can make their marketing strategies according to their target towards loyal clients' needs through online foodproduct forums review sites. © 2016 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "c66b9dbc0321fe323a519aff49da6bb5", "text": "Stratum, the de-facto mining communication protocol used by blockchain based cryptocurrency systems, enables miners to reliably and efficiently fetch jobs from mining pool servers. In this paper we exploit Stratum’s lack of encryption to develop passive and active attacks on Bitcoin’s mining protocol, with important implications on the privacy, security and even safety of mining equipment owners. We introduce StraTap and ISP Log attacks, that infer miner earnings if given access to miner communications, or even their logs. We develop BiteCoin, an active attack that hijacks shares submitted by miners, and their associated payouts. We build BiteCoin on WireGhost, a tool we developed to hijack and surreptitiously maintain Stratum connections. Our attacks reveal that securing Stratum through pervasive encryption is not only undesirable (due to large overheads), but also ineffective: an adversary can predict miner earnings even when given access to only packet timestamps. Instead, we devise Bedrock, a minimalistic Stratum extension that protects the privacy and security of mining participants. We introduce and leverage the mining cookie concept, a secret that each miner shares with the pool and includes in its puzzle computations, and that prevents attackers from reconstructing or hijacking the puzzles. We have implemented our attacks and collected 138MB of Stratum protocol traffic from mining equipment in the US and Venezuela. We show that Bedrock is resilient to active attacks even when an adversary breaks the crypto constructs it uses. Bedrock imposes a daily overhead of 12.03s on a single pool server that handles mining traffic from 16,000 miners.", "title": "" }, { "docid": "fa098ce1740f85512469750286fa6d01", "text": "Multiple emulsions have received great interest due to their ability to be used as templates for the production of multicompartment particles for a variety of applications. However, scaling these complex droplets to nanoscale dimensions has been a challenge due to limitations on their fabrication methods. Here, we report the development of oil-in-water-in-oil (O1/W/O2) double nanoemulsions via a two-step high-energy method and their use as templates for complex nanogels comprised of inner oil droplets encapsulated within a hydrogel matrix. Using a combination of characterization methods, we determine how the properties of the nanogels are controlled by the size, stability, internal morphology, and chemical composition of the nanoemulsion templates from which they are formed. This allows for identification of compositional and emulsification parameters that can be used to optimize the size and oil encapsulation efficiency of the nanogels. Our templating method produces oil-laden nanogels with high oil encapsulation efficiencies and average diameters of 200-300 nm. In addition, we demonstrate the versatility of the system by varying the types of inner oil, the hydrogel chemistry, the amount of inner oil, and the hydrogel network cross-link density. These nontoxic oil-laden nanogels have potential applications in food, pharmaceutical, and cosmetic formulations.", "title": "" }, { "docid": "7a1a9ed8e9a6206c3eaf20da0c156c14", "text": "Formal modeling rules can be used to ensure that an enterprise architecture is correct. Despite their apparent utility and despite mature tool support, formal modelling rules are rarely, if ever, used in practice in enterprise architecture in industry. In this paper we propose a rule authoring method that we believe aligns with actual modelling practice, at least as witnessed in enterprise architecture projects at the Swedish Defence Materiel Administration. The proposed method follows the business rules approach: the rules are specified in a (controlled) natural language which makes them accessible to all stakeholders and easy to modify as the meta-model matures and evolves over time. The method was put to test during 2014 in two large scale enterprise architecture projects, and we report on the experiences from that. To the best of our knowledge, this is the first time extensive formal modelling rules for enterprise architecture has been tested in industry and reported in the", "title": "" }, { "docid": "103b784d7cc23663584486fa3ca396bb", "text": "A single, stationary topic model such as latent Dirichlet allocation is inappropriate for modeling corpora that span long time periods, as the popularity of topics is likely to change over time. A number of models that incorporate time have been proposed, but in general they either exhibit limited forms of temporal variation, or require computationally expensive inference methods. In this paper we propose non-parametric Topics over Time (npTOT), a model for time-varying topics that allows an unbounded number of topics and flexible distribution over the temporal variations in those topics’ popularity. We develop a collapsed Gibbs sampler for the proposed model and compare against existing models on synthetic and real document sets.", "title": "" }, { "docid": "0959dba02fee08f7e359bcc816f5d22d", "text": "We prove a closed-form solution to tensor voting (CFTV): Given a point set in any dimensions, our closed-form solution provides an exact, continuous, and efficient algorithm for computing a structure-aware tensor that simultaneously achieves salient structure detection and outlier attenuation. Using CFTV, we prove the convergence of tensor voting on a Markov random field (MRF), thus termed as MRFTV, where the structure-aware tensor at each input site reaches a stationary state upon convergence in structure propagation. We then embed structure-aware tensor into expectation maximization (EM) for optimizing a single linear structure to achieve efficient and robust parameter estimation. Specifically, our EMTV algorithm optimizes both the tensor and fitting parameters and does not require random sampling consensus typically used in existing robust statistical techniques. We performed quantitative evaluation on its accuracy and robustness, showing that EMTV performs better than the original TV and other state-of-the-art techniques in fundamental matrix estimation for multiview stereo matching. The extensions of CFTV and EMTV for extracting multiple and nonlinear structures are underway.", "title": "" } ]
scidocsrr
9e5318fd5b7335338fa4f466150f0bf1
Image-to-image translation for cross-domain disentanglement
[ { "docid": "25b417a20e9ff8798d1ec74c8dec95ea", "text": "Many latent factors of variation interact to generate sensory data; for example, pose, morphology and expression in face images. In this work, we propose to learn manifold coordinates for the relevant factors of variation and to model their joint interaction. Many existing feature learning algorithms focus on a single task and extract features that are sensitive to the task-relevant factors and invariant to all others. However, models that just extract a single set of invariant features do not exploit the relationships among the latent factors. To address this, we propose a higher-order Boltzmann machine that incorporates multiplicative interactions among groups of hidden units that each learn to encode a distinct factor of variation. Furthermore, we propose correspondencebased training strategies that allow effective disentangling. Our model achieves state-of-the-art emotion recognition and face verification performance on the Toronto Face Database. We also demonstrate disentangled features learned on the CMU Multi-PIE dataset.", "title": "" }, { "docid": "6f22283e5142035d6f6f9d5e06ab1cd2", "text": "We present a novel technique to automatically colorize grayscale images that combines both global priors and local image features. Based on Convolutional Neural Networks, our deep network features a fusion layer that allows us to elegantly merge local information dependent on small image patches with global priors computed using the entire image. The entire framework, including the global and local priors as well as the colorization model, is trained in an end-to-end fashion. Furthermore, our architecture can process images of any resolution, unlike most existing approaches based on CNN. We leverage an existing large-scale scene classification database to train our model, exploiting the class labels of the dataset to more efficiently and discriminatively learn the global priors. We validate our approach with a user study and compare against the state of the art, where we show significant improvements. Furthermore, we demonstrate our method extensively on many different types of images, including black-and-white photography from over a hundred years ago, and show realistic colorizations.", "title": "" } ]
[ { "docid": "27e0059fb9be7ada93fd2d1e01149582", "text": "OBJECTIVE\nTo assess the psychosocial impact of psoriatic arthritis (PsA), describe how health-related quality of life (QoL) is affected in patients with PsA, discuss measures used to evaluate the psychosocial impact of PsA, and review studies examining the effect of therapy on QoL.\n\n\nMETHODS\nA targeted review on the impact of PsA on QoL and the role of tailored psychosocial management in reducing the psychosocial burden of the disease was performed. PubMed literature searches were conducted using the terms PsA, psychosocial burden, QoL, and mood/behavioral changes. Articles were deemed relevant if they presented information regarding the psychosocial impact of PsA, methods used to evaluate these impacts, or ways to manage/improve management of PsA and its resulting comorbidities. The findings of this literature search are descriptively reviewed and the authors׳ expert opinion on their interpretation is provided.\n\n\nRESULTS\nThe psychosocial burden of PsA negatively affects QoL. Patients suffer from sleep disorders, fatigue, low-level stress, depression and mood/behavioral changes, poor body image, and reduced work productivity. Additionally, each patient responds to pain differently, depending on a variety of psychological factors including personality structure, cognition, and attention to pain. Strategies for evaluating the burdens associated with PsA and the results of properly managing patients with PsA are described.\n\n\nCONCLUSIONS\nPsA is associated with a considerable psychosocial burden and new assessment tools, specific to PsA, have been developed to help quantify this burden in patients. Future management algorithms of PsA should incorporate appropriate assessment and management of psychological and physical concerns of patients. Furthermore, patients with PsA should be managed by a multidisciplinary team that works in coordination with the patient and their family or caregivers.", "title": "" }, { "docid": "1b5bb38b0a451238b2fc98a39d6766b0", "text": "OBJECTIVES\nWe quantified concomitant medication polypharmacy, pharmacokinetic and pharmacodynamic interactions, adverse effects and adherence in Australian adults on effective antiretroviral therapy.\n\n\nDESIGN\nCross-sectional.\n\n\nMETHODS\nPatients recruited into a nationwide cohort and assessed for prevalence and type of concomitant medication (including polypharmacy, defined as ≥5 concomitant medications), pharmacokinetic or pharmacodynamic interactions, potential concomitant medication adverse effects and concomitant medication adherence. Factors associated with concomitant medication polypharmacy and with imperfect adherence were identified using multivariable logistic regression.\n\n\nRESULTS\nOf 522 participants, 392 (75%) took a concomitant medication (mostly cardiovascular, nonprescription or antidepressant). Overall, 280 participants (54%) had polypharmacy of concomitant medications and/or a drug interaction or contraindication. Polypharmacy was present in 122 (23%) and independently associated with clinical trial participation, renal impairment, major comorbidity, hospital/general practice-based HIV care (versus sexual health clinic) and benzodiazepine use. Seventeen participants (3%) took at least one concomitant medication contraindicated with their antiretroviral therapy, and 237 (45%) had at least one pharmacokinetic/pharmacodynamic interaction. Concomitant medication use was significantly associated with sleep disturbance and myalgia, and polypharmacy of concomitant medications with diarrhoea, fatigue, myalgia and peripheral neuropathy. Sixty participants (12%) reported imperfect concomitant medication adherence, independently associated with requiring financial support, foregoing necessities for financial reasons, good/very good self-reported general health and at least 1 bed day for illness in the previous 12 months.\n\n\nCONCLUSION\nIn a resource-rich setting with universal healthcare access, the majority of this sample took a concomitant medication. Over half had at least one of concomitant medication polypharmacy, pharmacokinetic or pharmacodynamic interaction. Concomitant medication use was associated with several adverse clinical outcomes.", "title": "" }, { "docid": "35822f51adaef207b205910a48dd497f", "text": "BACKGROUND\nThe adoption of healthcare technology is arduous, and it requires planning and implementation time. Healthcare organizations are vulnerable to modern trends and threats because it has not kept up with threats.\n\n\nOBJECTIVE\nThe objective of this systematic review is to identify cybersecurity trends, including ransomware, and identify possible solutions by querying academic literature.\n\n\nMETHODS\nThe reviewers conducted three separate searches through the CINAHL and PubMed (MEDLINE) and the Nursing and Allied Health Source via ProQuest databases. Using key words with Boolean operators, database filters, and hand screening, we identified 31 articles that met the objective of the review.\n\n\nRESULTS\nThe analysis of 31 articles showed the healthcare industry lags behind in security. Like other industries, healthcare should clearly define cybersecurity duties, establish clear procedures for upgrading software and handling a data breach, use VLANs and deauthentication and cloud-based computing, and to train their users not to open suspicious code.\n\n\nCONCLUSIONS\nThe healthcare industry is a prime target for medical information theft as it lags behind other leading industries in securing vital data. It is imperative that time and funding is invested in maintaining and ensuring the protection of healthcare technology and the confidentially of patient information from unauthorized access.", "title": "" }, { "docid": "7192e2ae32eb79aaefdf8e54cdbba715", "text": "Recently, ridge gap waveguides are considered as guiding structures in high-frequency applications. One of the major problems facing this guiding structure is the limited ability of using all the possible bandwidths due to the limited bandwidth of the transition to the coaxial lines. Here, a review of the different excitation techniques associated with this guiding structure is presented. Next, some modifications are proposed to improve its response in order to cover the possible actual bandwidth. The major aim of this paper is to introduce a wideband coaxial to ridge gap waveguide transition based on five sections of matching networks. The introduced transition shows excellent return loss, which is better than 15 dB over the actual possible bandwidth for double transitions.", "title": "" }, { "docid": "4894c7683db13e71764eb9bf570586aa", "text": "In previous works, Juba and Sudan [6] and Goldreich, Juba and Sudan [4] considered the idea of “semantic communication”, wherein two players, a user and a server, attempt to communicate with each other without any prior common language (or communication) protocol. They showed that if communication was goal-oriented and the user could sense progress towards the goal (or verify when it has been achieved), then meaningful communication is possible, in that the user’s goal can be achieved whenever the server is helpful. A principal criticism of their result has been that it is inefficient: in order to determine the “right” protocol to communicate with the server, the user enumerates protocols and tries them out with the server until it finds one that allows it to achieve its goal. They also show settings in which such enumeration is essentially the best possible solution. In this work we introduce definitions which allow for efficient behavior in practice. Roughly, we measure the performance of users and servers against their own “beliefs” about natural protocols. We show that if user and server are efficient with respect to their own beliefs and their beliefs are (even just slightly) compatible with each other, then they can achieve their goals very efficiently. We show that this model allows sufficiently “broad-minded” servers to talk with “exponentially” many different users in polynomial time, while dismissing the “counterexamples” in the previous work as being “narrow-minded,” or based on “incompatible beliefs.” ∗Portions of this work are presented in modified form in the first author’s Ph.D. thesis. [5, Chapter 4]. Research supported in part by NSF Awards CCF-0915155 and CCF-0939370.", "title": "" }, { "docid": "80058ed2de002f05c9f4c1451c53e69c", "text": "Purchasing decisions in many product categories are heavily influenced by the shopper's aesthetic preferences. It's insufficient to simply match a shopper with popular items from the category in question; a successful shopping experience also identifies products that match those aesthetics. The challenge of capturing shoppers' styles becomes more difficult as the size and diversity of the marketplace increases. At Etsy, an online marketplace for handmade and vintage goods with over 30 million diverse listings, the problem of capturing taste is particularly important -- users come to the site specifically to find items that match their eclectic styles.\n In this paper, we describe our methods and experiments for deploying two new style-based recommender systems on the Etsy site. We use Latent Dirichlet Allocation (LDA) to discover trending categories and styles on Etsy, which are then used to describe a user's \"interest\" profile. We also explore hashing methods to perform fast nearest neighbor search on a map-reduce framework, in order to efficiently obtain recommendations. These techniques have been implemented successfully at very large scale, substantially improving many key business metrics.", "title": "" }, { "docid": "e27d949155cef2885a4ab93f4fba18b3", "text": "Because of its richness and availability, micro-blogging has become an ideal platform for conducting psychological research. In this paper, we proposed to predict active users' personality traits through micro-blogging behaviors. 547 Chinese active users of micro-blogging participated in this study. Their personality traits were measured by the Big Five Inventory, and digital records of micro-blogging behaviors were collected via web crawlers. After extracting 839 micro-blogging behavioral features, we first trained classification models utilizing Support Vector Machine (SVM), differentiating participants with high and low scores on each dimension of the Big Five Inventory [corrected]. The classification accuracy ranged from 84% to 92%. We also built regression models utilizing PaceRegression methods, predicting participants' scores on each dimension of the Big Five Inventory. The Pearson correlation coefficients between predicted scores and actual scores ranged from 0.48 to 0.54. Results indicated that active users' personality traits could be predicted by micro-blogging behaviors.", "title": "" }, { "docid": "4d147b58340571f4254f7c2190b383b9", "text": "We propose an efficient and unified framework, namely ThiNet, to simultaneously accelerate and compress CNN models in both training and inference stages. We focus on the filter level pruning, i.e., the whole filter would be discarded if it is less important. Our method does not change the original network structure, thus it can be perfectly supported by any off-the-shelf deep learning libraries. We formally establish filter pruning as an optimization problem, and reveal that we need to prune filters based on statistics information computed from its next layer, not the current layer, which differentiates ThiNet from existing methods. Experimental results demonstrate the effectiveness of this strategy, which has advanced the state-of-the-art. We also show the performance of ThiNet on ILSVRC-12 benchmark. ThiNet achieves 3.31 x FLOPs reduction and 16.63× compression on VGG-16, with only 0.52% top-5 accuracy drop. Similar experiments with ResNet-50 reveal that even for a compact network, ThiNet can also reduce more than half of the parameters and FLOPs, at the cost of roughly 1% top-5 accuracy drop. Moreover, the original VGG-16 model can be further pruned into a very small model with only 5.05MB model size, preserving AlexNet level accuracy but showing much stronger generalization ability.", "title": "" }, { "docid": "b86f9981230708c2e84dc643d9ad16ad", "text": "The article provides an analysis and reports experimental validation of the various performance metrics of the LoRa low-power wide-area network technology. The LoRa modulation is based on chirp spread spectrum, which enables use of low-quality oscillators in the end device, and to make the synchronization faster and more reliable. Moreover, LoRa technology provides over 150 dB link budget, providing good coverage. Therefore, LoRa seems to be quite a promising option for implementing communication in many diverse Internet of Things applications. In this article, we first briefly overview the specifics of the LoRa technology and analyze the scalability of the LoRa wide-area network. Then, we introduce setups of the performance measurements. The results show that using the transmit power of 14 dBm and the highest spreading factor of 12, more than 60% of the packets are received from the distance of 30 km on water. With the same configuration, we measured the performance of LoRa communication in mobile scenarios. The presented results reveal that at around 40 km/h, the communication performance gets worse, because duration of the LoRa-modulated symbol exceeds coherence time. However, it is expected that communication link is more reliable when lower spreading factors are used.", "title": "" }, { "docid": "2a894e7b94f5f0e553d9e4101ff5b60b", "text": "It is an open question whether the motor system is involved during understanding of concrete nouns, as it is for concrete verbs. To clarify this issue, we carried out a behavioral experiment using a go-no go paradigm with an early and delayed go-signal delivery. Italian nouns referring to concrete objects (hand-related or foot-related) and abstract entities served as stimuli. Right-handed participants read the stimuli and responded when the presented word was concrete using the left or right hand. At the early go-signal, slower right-hand responses were found for hand-related nouns compared to foot-related nouns. The opposite pattern was found for the left hand. These findings demonstrate an early lateralized modulation of the motor system during noun processing, most likely crucial for noun comprehension.", "title": "" }, { "docid": "9c74807f3c1a5b0928ade3f9e3c1229d", "text": "Current perception systems of intelligent vehicles not only make use of visual sensors, but also take advantage of depth sensors. Extrinsic calibration of these heterogeneous sensors is required for fusing information obtained separately by vision sensors and light detection and ranging (LIDARs). In this paper, an optimal extrinsic calibration algorithm between a binocular stereo vision system and a 2-D LIDAR is proposed. Most extrinsic calibration methods between cameras and a LIDAR proceed by calibrating separately each camera with the LIDAR. We show that by placing a common planar chessboard with different poses in front of the multisensor system, the extrinsic calibration problem is solved by a 3-D reconstruction of the chessboard and geometric constraints between the views from the stereovision system and the LIDAR. Furthermore, our method takes sensor noise into account that it provides optimal results under Mahalanobis distance constraints. To evaluate the performance of the algorithm, experiments based on both computer simulation and real datasets are presented and analyzed. The proposed approach is also compared with a popular camera/LIDAR calibration method to show the benefits of our method.", "title": "" }, { "docid": "e6cba9e178f568c402be7b25c4f0777f", "text": "This paper is a tutorial introduction to the Viterbi Algorithm, this is reinforced by an example use of the Viterbi Algorithm in the area of error correction in communications channels. Some extensions to the basic algorithm are also discussed briefly. Some of the many application areas where the Viterbi Algorithm has been used are considered, including it's use in communications, target tracking and pattern recognition problems. A proposal for further research into the use of the Viterbi Algorithm in Signature Verification is then presented, and is the area of present research at the moment.", "title": "" }, { "docid": "9975b9d094249ddcefe8a78450a6920d", "text": "The acquisition of soccer skills is fundamental to our enjoyment of the game and is essential to the attainment of expertise. Players spend most of their time in practice with the intention of improving technical skills. However, there is a lack of scientific research relating to the effective acquisition of soccer skills, especially when compared with the extensive research base on physiological aspects of performance. Current coaching practice is therefore based on tradition, intuition and emulation rather than empirical evidence. The aim of this review is to question some of the popular beliefs that guide current practice and instruction in soccer. Empirical evidence is presented to dispel many of these beliefs as myths, thereby challenging coaches to self-reflect and critically evaluate contemporary doctrine. The review should inform sports scientists and practitioners as to the important role that those interested in skill acquisition can play in enhancing performance at all levels of the game.", "title": "" }, { "docid": "87ed7ebdf8528df1491936000649761b", "text": "Internet of Vehicles (IoV) is an important constituent of next generation smart cities that enables city wide connectivity of vehicles for traffic management applications. A secure and reliable communications is an important ingredient of safety applications in IoV. While the use of a more robust security algorithm makes communications for safety applications secure, it could reduce application QoS due to increased packet overhead and security processing delays. Particularly, in high density scenarios where vehicles receive large number of safety packets from neighborhood, timely signature verification of these packets could not be guaranteed. As a result, critical safety packets remain unverified resulting in cryptographic loss. In this paper, we propose two security mechanisms that aim to reduce cryptographic loss rate. The first mechanism is random transmitter security level section whereas the second one is adaptive scheme that iteratively selects the best possible security level at the transmitter depending on the current cryptographic loss rate. Simulation results show the effectiveness of the proposed mechanisms in comparison with the static security technique recommended by the ETSI standard.", "title": "" }, { "docid": "68c7509ec0261b1ddccef7e3ad855629", "text": "This research comprehensively illustrates the design, implementation and evaluation of a novel marker less environment tracking technology for an augmented reality based indoor navigation application, adapted to efficiently operate on a proprietary head-mounted display. Although the display device used, Google Glass, had certain pitfalls such as short battery life, slow processing speed, and lower quality visual display but the tracking technology was able to complement these limitations by rendering a very efficient, precise, and intuitive navigation experience. The performance assessments, conducted on the basis of efficiency and accuracy, substantiated the utility of the device for everyday navigation scenarios, whereas a later conducted subjective evaluation of handheld and wearable devices also corroborated the wearable as the preferred device for indoor navigation.", "title": "" }, { "docid": "1f5d8df6e85e1f97411b701c0a1be0c7", "text": "In 2013, 392 research papers and notes were published in the CHI conference (The ACM CHI Conference on Human Factors in Computing Systems) and even more papers in the domain of Human-Computer Interaction (HCI) are constantly published in various conferences and journals. It is quite arduous, if not impossible, to read all of these papers. One approach to deal with this information deluge is to focus on skimming through lots of papers in a short period of time, so that one can more wisely choose what to read before investing time in them. In order to teach such a skimming technique, I have taught a technique, called \"Quick and Dirty Review (QnDReview),\" in a graduate-level HCI course. The method has been employed in the course for five semesters, and students' responses were collected and analyzed. Results showed that students spent, on average, 4.3 minutes per paper and believed that they got the gist of each paper. However, the largest benefit I noticed is that students get the overall pictures of the fields while exposing themselves to various new ideas through this approach.", "title": "" }, { "docid": "2bb4366b813728af555be714da0ee241", "text": "A case of acute mathamphetamine (MA) poisoning death was occasionally found in autopsy by leaking into alimentary tract from package in drug traffic. A Korean man (39-year-old) was found dead in his apartment in Shenyang and 158 columned-shaped packages (390 g) of MA were found in his alimentary tract by autopsy, in which four packages were found in the esophagus, 118 in the stomach and 36 in the lower part of small intestine. The packages were wrapped with tinfoil and plastic film, from which one package in the stomach was empty and ruptured. Extreme pulmonary edema, congestion and hemorrhage as well as moderate edema, congestion and petechial hemorrhage in the other viscera were observed at autopsy and microscopically. Simultaneously AMP (amphatamine) in urine was tested positive by Trige DOA kit. Quantitative analysis was performed by gas chromatography/mass spectrometry. Extremely high concentrations of MA were found in the cardiac blood (24.8 microg/mL), the urine (191 microg/mL), the liver (116 microg/mL) and the gastric contents (1045 microg/mL), and no alcohol and other conventional drugs or poisons were detected in the same samples. The poisoning dosage is 5 microg/mL in the plasma and lethal dosage is 10-40 microg/mL in the plasma according the report. This high concentrations of MA in blood indicated that the cause of death was result from acute MA poisoning due to MA leaking into stomach. Much attention must be paid in the body packer of drugs in illegal drug traffic.", "title": "" }, { "docid": "fdd59ff419b9613a1370babe64ef1c98", "text": "The disentangling problem is to discover multiple complex factors of variations hidden in data. One recent approach is to take a dataset with grouping structure and separately estimate a factor common within a group (content) and a factor specific to each group member (transformation). Notably, this approach can learn to represent a continuous space of contents, which allows for generalization to data with unseen contents. In this study, we aim at cultivating this approach within probabilistic deep generative models. Motivated by technical complication in existing groupbased methods, we propose a simpler probabilistic method, called group-contrastive variational autoencoders. Despite its simplicity, our approach achieves reasonable disentanglement with generalizability for three grouped datasets of 3D object images. In comparison with a previous model, although conventional qualitative evaluation shows little difference, our qualitative evaluation using few-shot classification exhibits superior performances for some datasets. We analyze the content representations from different methods and discuss their transformation-dependency and potential performance impacts.", "title": "" }, { "docid": "7c4104651e484e4cbff5735d62f114ef", "text": "A pair of salient tradeoffs have driven the multiple-input multiple-output (MIMO) systems developments. More explicitly, the early era of MIMO developments was predominantly motivated by the multiplexing-diversity tradeoff between the Bell Laboratories layered space-time and space-time block coding. Later, the linear dispersion code concept was introduced to strike a flexible tradeoff. The more recent MIMO system designs were motivated by the performance-complexity tradeoff, where the spatial modulation and space-time shift keying concepts eliminate the problem of inter-antenna interference and perform well with the aid of low-complexity linear receivers without imposing a substantial performance loss on generic maximum-likelihood/max a posteriori -aided MIMO detection. Against the background of the MIMO design tradeoffs in both uncoded and coded MIMO systems, in this treatise, we offer a comprehensive survey of MIMO detectors ranging from hard decision to soft decision. The soft-decision MIMO detectors play a pivotal role in approaching to the full-performance potential promised by the MIMO capacity theorem. In the near-capacity system design, the soft-decision MIMO detection dominates the total complexity, because all the MIMO signal combinations have to be examined, when both the channel’s output signal and the a priori log-likelihood ratios gleaned from the channel decoder are taken into account. Against this background, we provide reduced-complexity design guidelines, which are conceived for a wide-range of soft-decision MIMO detectors.", "title": "" } ]
scidocsrr
87a02f40994745a087c6cb72768462c0
Personalized, Cross-Lingual TTS Using Phonetic Posteriorgrams
[ { "docid": "0f6183057c6b61cefe90e4fa048ab47f", "text": "This paper investigates the use of Deep Bidirectional Long Short-Term Memory based Recurrent Neural Networks (DBLSTM-RNNs) for voice conversion. Temporal correlations across speech frames are not directly modeled in frame-based methods using conventional Deep Neural Networks (DNNs), which results in a limited quality of the converted speech. To improve the naturalness and continuity of the speech output in voice conversion, we propose a sequence-based conversion method using DBLSTM-RNNs to model not only the frame-wised relationship between the source and the target voice, but also the long-range context-dependencies in the acoustic trajectory. Experiments show that DBLSTM-RNNs outperform DNNs where Mean Opinion Scores are 3.2 and 2.3 respectively. Also, DBLSTM-RNNs without dynamic features have better performance than DNNs with dynamic features.", "title": "" }, { "docid": "e95541d0401a196b03b94dd51dd63a4b", "text": "In the information age, computer applications have become part of modern life and this has in turn encouraged the expectations of friendly interaction with them. Speech, as “the” communication mode, has seen the successful development of quite a number of applications using automatic speech recognition (ASR), including command and control, dictation, dialog systems for people with impairments, translation, etc. But the actual challenge goes beyond the use of speech in control applications or to access information. The goal is to use speech as an information source, competing, for example, with text online. Since the technology supporting computer applications is highly dependent on the performance of the ASR system, research into ASR is still an active topic, as is shown by the range of research directions suggested in (Baker et al., 2009a, 2009b). Automatic speech recognition – the recognition of the information embedded in a speech signal and its transcription in terms of a set of characters, (Junqua & Haton, 1996) – has been object of intensive research for more than four decades, achieving notable results. It is only to be expected that speech recognition advances make spoken language as convenient and accessible as online text when the recognizers reach error rates near zero. But while digit recognition has already reached a rate of 99.6%, (Li, 2008), the same cannot be said of phone recognition, for which the best rates are still under 80% 1,(Mohamed et al., 2011; Siniscalchi et al., 2007). Speech recognition based on phones is very attractive since it is inherently free from vocabulary limitations. Large Vocabulary ASR (LVASR) systems’ performance depends on the quality of the phone recognizer. That is why research teams continue developing phone recognizers, in order to enhance their performance as much as possible. Phone recognition is, in fact, a recurrent problem for the speech recognition community. Phone recognition can be found in a wide range of applications. In addition to typical LVASR systems like (Morris & Fosler-Lussier, 2008; Scanlon et al., 2007; Schwarz, 2008), it can be found in applications related to keyword detection, (Schwarz, 2008), language recognition, (Matejka, 2009; Schwarz, 2008), speaker identification, (Furui, 2005) and applications for music identification and translation, (Fujihara & Goto, 2008; Gruhne et al., 2007). The challenge of building robust acoustic models involves applying good training algorithms to a suitable set of data. The database defines the units that can be trained and", "title": "" } ]
[ { "docid": "4c7fed8107062e530e80ae784451b752", "text": "Tree structured models have been widely used for determining the pose of a human body, from either 2D or 3D data. While such models can effectively represent the kinematic constraints of the skeletal structure, they do not capture additional constraints such as coordination of the limbs. Tree structured models thus miss an important source of information about human body pose, as limb coordination is necessary for balance while standing, walking, or running, as well as being evident in other activities such as dancing and throwing. In this paper, we consider the use of undirected graphical models that augment a tree structure with latent variables in order to account for coordination between limbs. We refer to these as common-factor models, since they are constructed by using factor analysis to identify additional correlations in limb position that are not accounted for by the kinematic tree structure. These common-factor models have an underlying tree structure and thus a variant of the standard Viterbi algorithm for a tree can be applied for efficient estimation. We present some experimental results contrasting common-factor models with tree models, and quantify the improvement in pose estimation for 2D image data.", "title": "" }, { "docid": "8c0f20061bd09b328748d256d5ece7cc", "text": "Recognition is graduating from labs to real-world applications. While it is encouraging to see its potential being tapped, it brings forth a fundamental challenge to the vision researcher: scalability. How can we learn a model for any concept that exhaustively covers all its appearance variations, while requiring minimal or no human supervision for compiling the vocabulary of visual variance, gathering the training images and annotations, and learning the models? In this paper, we introduce a fully-automated approach for learning extensive models for a wide range of variations (e.g. actions, interactions, attributes and beyond) within any concept. Our approach leverages vast resources of online books to discover the vocabulary of variance, and intertwines the data collection and modeling steps to alleviate the need for explicit human supervision in training the models. Our approach organizes the visual knowledge about a concept in a convenient and useful way, enabling a variety of applications across vision and NLP. Our online system has been queried by users to learn models for several interesting concepts including breakfast, Gandhi, beautiful, etc. To date, our system has models available for over 50, 000 variations within 150 concepts, and has annotated more than 10 million images with bounding boxes.", "title": "" }, { "docid": "55160cc3013b03704555863c710e6d21", "text": "Localization is one of the most important capabilities for autonomous mobile agents. Markov Localization (ML), applied to dense range images, has proven to be an effective technique. But its computational and storage requirements put a large burden on robot systems, and make it difficult to update the map dynamically. In this paper we introduce a new technique, based on correlation of a sensor scan with the map, that is several orders of magnitude more efficient than M L . CBML (correlation-based ML) permits video-rate localization using dense range scans, dynamic map updates, and a more precise error model than M L . In this paper we present the basic method of CBML, and validate its efficiency and correctness in a series of experiments on an implemented mobile robot base.", "title": "" }, { "docid": "abef126b2e8cb932378013e1cf125b15", "text": "We describe our submission to the CoNLL 2017 shared task, which exploits the shared common knowledge of a language across different domains via a domain adaptation technique. Our approach is an extension to the recently proposed adversarial training technique for domain adaptation, which we apply on top of a graph-based neural dependency parsing model on bidirectional LSTMs. In our experiments, we find our baseline graphbased parser already outperforms the official baseline model (UDPipe) by a large margin. Further, by applying our technique to the treebanks of the same language with different domains, we observe an additional gain in the performance, in particular for the domains with less training data.", "title": "" }, { "docid": "997a1ec16394a20b3a7f2889a583b09d", "text": "This second article of our series looks at the process of designing a survey. The design process begins with reviewing the objectives, examining the target population identified by the objectives, and deciding how best to obtain the information needed to address those objectives. However, we also need to consider factors such as determining the appropriate sample size and ensuring the largest possible response rate.To illustrate our ideas, we use the three surveys described in Part 1 of this series to suggest good and bad practice in software engineering survey research.", "title": "" }, { "docid": "3dfe5dbdd83f0c56f403884f38420ae7", "text": "There is an increasing interest in studying control systems employing multiple sensors and actuators that are geographically distributed. Communication is an important component of these distributed and networked control systems. Hence, there is a need to understand the interactions between the control components and the communication components of the distributed system. In this paper, we formulate a control problem with a communication channel connecting the sensor to the controller. Our task involves designing the channel encoder and channel decoder along with the controller to achieve different control objectives. We provide upper and lower bounds on the channel rate required to achieve these different control objectives. In many cases, these bounds are tight. In doing so, we characterize the \"information complexity\" of different control objectives.", "title": "" }, { "docid": "a34a49a337cd0d198fe8bcc05f8a91ea", "text": "In most real-world audio recordings, we encounter several types of audio events. In this paper, we develop a technique for detecting signature audio events, that is based on identifying patterns of occurrences of automatically learned atomic units of sound, which we call Acoustic Unit Descriptors or AUDs. Experiments show that the methodology works as well for detection of individual events and their boundaries in complex recordings.", "title": "" }, { "docid": "b9546d8f52b19ba99bb9c8f4dc62f2bd", "text": "One of the main unresolved problems that arise during the data mining process is treating data that contains temporal information. In this case, a complete understanding of the entire phenomenon requires that the data should be viewed as a sequence of events. Temporal sequences appear in a vast range of domains, from engineering, to medicine and finance, and the ability to model and extract information from them is crucial for the advance of the information society. This paper provides a survey on the most significant techniques developed in the past ten years to deal with temporal sequences.", "title": "" }, { "docid": "05fa2bcd251f44f8a62e90104844926f", "text": "A challenging task in the natural language question answering (Q/A for short) over RDF knowledge graph is how to bridge the gap between unstructured natural language questions (NLQ) and graph-structured RDF data (GOne of the effective tools is the \"template\", which is often used in many existing RDF Q/A systems. However, few of them study how to generate templates automatically. To the best of our knowledge, we are the first to propose a join approach for template generation. Given a workload D of SPARQL queries and a set N of natural language questions, the goal is to find some pairs q, n, for q∈ D ∧ n ∈, N, where SPARQL query q is the best match for natural language question n. These pairs provide promising hints for automatic template generation. Due to the ambiguity of the natural languages, we model the problem above as an uncertain graph join task. We propose several structural and probability pruning techniques to speed up joining. Extensive experiments over real RDF Q/A benchmark datasets confirm both the effectiveness and efficiency of our approach.", "title": "" }, { "docid": "891efd54485c7cf73edd690e0d9b3cfa", "text": "Quantitative-diffusion-tensor MRI consists of deriving and displaying parameters that resemble histological or physiological stains, i.e., that characterize intrinsic features of tissue microstructure and microdynamics. Specifically, these parameters are objective, and insensitive to the choice of laboratory coordinate system. Here, these two properties are used to derive intravoxel measures of diffusion isotropy and the degree of diffusion anisotropy, as well as intervoxel measures of structural similarity, and fiber-tract organization from the effective diffusion tensor, D, which is estimated in each voxel. First, D is decomposed into its isotropic and anisotropic parts, [D] I and D - [D] I, respectively (where [D] = Trace(D)/3 is the mean diffusivity, and I is the identity tensor). Then, the tensor (dot) product operator is used to generate a family of new rotationally and translationally invariant quantities. Finally, maps of these quantitative parameters are produced from high-resolution diffusion tensor images (in which D is estimated in each voxel from a series of 2D-FT spin-echo diffusion-weighted images) in living cat brain. Due to the high inherent sensitivity of these parameters to changes in tissue architecture (i.e., macromolecular, cellular, tissue, and organ structure) and in its physiologic state, their potential applications include monitoring structural changes in development, aging, and disease.", "title": "" }, { "docid": "c795c3fbf976c5746c75eb33c622ad21", "text": "We develop a high-quality multi-turn dialog dataset, DailyDialog, which is intriguing in several aspects. The language is human-written and less noisy. The dialogues in the dataset reflect our daily communication way and cover various topics about our daily life. We also manually label the developed dataset with communication intention and emotion information. Then, we evaluate existing approaches on DailyDialog dataset and hope it benefit the research field of dialog systems1.", "title": "" }, { "docid": "9f84630422777d869edd7167ff6da443", "text": "Video surveillance, closed-circuit TV and IP-camera systems became virtually omnipresent and indispensable for many organizations, businesses, and users. Their main purpose is to provide physical security, increase safety, and prevent crime. They also became increasingly complex, comprising many communication means, embedded hardware and non-trivial firmware. However, most research to date focused mainly on the privacy aspects of such systems, and did not fully address their issues related to cyber-security in general, and visual layer (i.e., imagery semantics) attacks in particular. In this paper, we conduct a systematic review of existing and novel threats in video surveillance, closed-circuit TV and IP-camera systems based on publicly available data. The insights can then be used to better understand and identify the security and the privacy risks associated with the development, deployment and use of these systems. We study existing and novel threats, along with their existing or possible countermeasures, and summarize this knowledge into a comprehensive table that can be used in a practical way as a security checklist when assessing cyber-security level of existing or new CCTV designs and deployments. We also provide a set of recommendations and mitigations that can help improve the security and privacy levels provided by the hardware, the firmware, the network communications and the operation of video surveillance systems. We hope the findings in this paper will provide a valuable knowledge of the threat landscape that such systems are exposed to, as well as promote further research and widen the scope of this field beyond its current boundaries.", "title": "" }, { "docid": "c9966a6589d75b2ee87ba375e690de93", "text": "The novel electronic properties of graphene, including a linear energy dispersion relation and purely two-dimensional structure, have led to intense research into possible applications of this material in nanoscale devices. Here we report the first observation of saturating transistor characteristics in a graphene field-effect transistor. The saturation velocity depends on the charge-carrier concentration and we attribute this to scattering by interfacial phonons in the SiO2 layer supporting the graphene channels. Unusual features in the current-voltage characteristic are explained by a field-effect model and diffusive carrier transport in the presence of a singular point in the density of states. The electrostatic modulation of the channel through an efficiently coupled top gate yields transconductances as high as 150 microS microm-1 despite low on-off current ratios. These results demonstrate the feasibility of two-dimensional graphene devices for analogue and radio-frequency circuit applications without the need for bandgap engineering.", "title": "" }, { "docid": "1014a09fbded05ab4eb2438aa3631d2d", "text": "In the last decade, self-myofascial release has become an increasingly common modality to supplement traditional methods of massage, so a masseuse is not necessary. However, there are limited clinical data demonstrating the efficacy or mechanism of this treatment on athletic performance. The purpose of this study was to determine whether the use of myofascial rollers before athletic tests can enhance performance. Twenty-six (13 men and 13 women) healthy college-aged individuals (21.56 ± 2.04 years, 23.97 ± 3.98 body mass index, 20.57 ± 12.21 percent body fat) were recruited. The study design was a randomized crossover design in which subject performed a series of planking exercises or foam rolling exercises and then performed a series of athletic performance tests (vertical jump height and power, isometric force, and agility). Fatigue, soreness, and exertion were also measured. A 2 × 2 (trial × gender) analysis of variance with repeated measures and appropriate post hoc was used to analyze the data. There were no significant differences between foam rolling and planking for all 4 of the athletic tests. However, there was a significant difference between genders on all the athletic tests (p ≤ 0.001). As expected, there were significant increases from pre to post exercise during both trials for fatigue, soreness, and exertion (p ≤ 0.01). Postexercise fatigue after foam rolling was significantly less than after the subjects performed planking (p ≤ 0.05). The reduced feeling of fatigue may allow participants to extend acute workout time and volume, which can lead to chronic performance enhancements. However, foam rolling had no effect on performance.", "title": "" }, { "docid": "96ab2d8de746234c79e87902de49f343", "text": "Background subtraction is one of the most commonly used components in machine vision systems. Despite the numerous algorithms proposed in the literature and used in practical applications, key challenges remain in designing a single system that can handle diverse environmental conditions. In this paper we present Multiple Background Model based Background Subtraction Algorithm as such a candidate. The algorithm was originally designed for handling sudden illumination changes. The new version has been refined with changes at different steps of the process, specifically in terms of selecting optimal color space, clustering of training images for Background Model Bank and parameter for each channel of color space. This has allowed the algorithm's applicability to wide variety of challenges associated with change detection including camera jitter, dynamic background, Intermittent Object Motion, shadows, bad weather, thermal, night videos etc. Comprehensive evaluation demonstrates the superiority of algorithm against state of the art.", "title": "" }, { "docid": "61874faf29648c7d90b9cd24f6368a33", "text": "Industry is currently undergoing a transformation towards full digitalization and intelligentization of manufacturing processes. Visionary but quite realistic concepts such as the Internet of Things, Industrial Internet, Cloud-based Manufacturing and Smart Manufacturing are drivers of the so called Fourth Industrial Revolution which is commonly referred to as Industry 4.0. Although a common agreement exists on the necessity for technological advancement of production technologies and business models in the sense of Industry 4.0, a major obstacle lies in the perceived complexity and abstractness which partly hinders its quick transformation into industrial practice. To overcome these burdens, we suggest a Scenario-based Industry 4.0 Learning Factory concept that we are currently planning to implement in Austria's first Industry 4.0 Pilot Factory. The concept is built upon a tentative competency model for Industry 4.0 and the use of scenarios for problem-oriented learning of future produc-", "title": "" }, { "docid": "72c15ca427c2ba991a7dfd7a52d32a43", "text": "From the ancient times, abortion appeared as a method of controlling the fertility. But starting with XIX century, modern states used the abortion as a mechanism of demographic policy, the state intending to adjust the fertility of population by this. It is worth underlining the ethical and moral aspects of abortion, which determined strong debates on the political scene and further at the level of civil society and mass media. So, in the last decades there have been questioned not only ethic and moral implications of abortion, but also practical outsets. A responsible demographic policy should take into account the whole set of socio-economic and cultural factors that condition a society.", "title": "" }, { "docid": "b19aab238e0eafef52974a87300750a3", "text": "This paper introduces a method to detect a fault associated with critical components/subsystems of an engineered system. It is required, in this case, to detect the fault condition as early as possible, with specified degree of confidence and a prescribed false alarm rate. Innovative features of the enabling technologies include a Bayesian estimation algorithm called particle filtering, which employs features or condition indicators derived from sensor data in combination with simple models of the system's degrading state to detect a deviation or discrepancy between a baseline (no-fault) distribution and its current counterpart. The scheme requires a fault progression model describing the degrading state of the system in the operation. A generic model based on fatigue analysis is provided and its parameters adaptation is discussed in detail. The scheme provides the probability of abnormal condition and the presence of a fault is confirmed for a given confidence level. The efficacy of the proposed approach is illustrated with data acquired from bearings typically found on aircraft and monitored via a properly instrumented test rig.", "title": "" }, { "docid": "77c98efaba38e54e8aae1216ed9ac0c0", "text": "There is a disconnect between explanatory artificial intelligence (XAI) methods and the types of explanations that are useful for and demanded by society (policy makers, government officials, etc.) Questions that experts in artificial intelligence (AI) ask opaque systems provide inside explanations, focused on debugging, reliability, and validation. These are different from those that society will ask of these systems to build trust and confidence in their decisions. Although explanatory AI systems can answer many questions that experts desire, they often don’t explain why they made decisions in a way that is precise (true to the model) and understandable to humans. These outside explanations can be used to build trust, comply with regulatory and policy changes, and act as external validation. In this paper, we focus on XAI methods for deep neural networks (DNNs) because of DNNs’ use in decision-making and inherent opacity. We explore the types of questions that explanatory DNN systems can answer and discuss challenges in building explanatory systems that provide outside explanations for societal requirements and benefit.", "title": "" }, { "docid": "ef2738cfced7ef069b13e5b5dca1558b", "text": "Organic agriculture (OA) is practiced on 1% of the global agricultural land area and its importance continues to grow. Specifically, OA is perceived by many as having less Advances inAgronomy, ISSN 0065-2113 © 2016 Elsevier Inc. http://dx.doi.org/10.1016/bs.agron.2016.05.003 All rights reserved. 1 ARTICLE IN PRESS", "title": "" } ]
scidocsrr
d7e0b5a0e8d081c9cb08eaf06fe35909
Learning to Play Computer Games with Deep Learning and Reinforcement Learning Final Report
[ { "docid": "28ee32149227e4a26bea1ea0d5c56d8c", "text": "We consider an agent’s uncertainty about its environment and the problem of generalizing this uncertainty across states. Specifically, we focus on the problem of exploration in non-tabular reinforcement learning. Drawing inspiration from the intrinsic motivation literature, we use density models to measure uncertainty, and propose a novel algorithm for deriving a pseudo-count from an arbitrary density model. This technique enables us to generalize count-based exploration algorithms to the non-tabular case. We apply our ideas to Atari 2600 games, providing sensible pseudo-counts from raw pixels. We transform these pseudo-counts into exploration bonuses and obtain significantly improved exploration in a number of hard games, including the infamously difficult MONTEZUMA’S REVENGE.", "title": "" } ]
[ { "docid": "1dee4c916308295626bce658529a8e0e", "text": "Despite their impressive performance, deep neural networks exhibit striking failures on out-of-distribution inputs. One core idea of adversarial example research is to reveal neural network errors under such distribution shifts. We decompose these errors into two complementary sources: sensitivity and invariance. We show deep networks are not only too sensitive to task-irrelevant changes of their input, as is well-known from -adversarial examples, but are also too invariant to a wide range of task-relevant changes, thus making vast regions in input space vulnerable to adversarial attacks. We show such excessive invariance occurs across various tasks and architecture types. On MNIST and ImageNet one can manipulate the class-specific content of almost any image without changing the hidden activations. We identify an insufficiency of the standard cross-entropy loss as a reason for these failures. Further, we extend this objective based on an informationtheoretic analysis so it encourages the model to consider all task-dependent features in its decision. This provides the first approach tailored explicitly to overcome excessive invariance and resulting vulnerabilities.", "title": "" }, { "docid": "40ad6bf9f233b58e13cf6a709daba2ca", "text": "While syntactic dependency annotations concentrate on the surface or functional structure of a sentence, semantic dependency annotations aim to capture betweenword relationships that are more closely related to the meaning of a sentence, using graph-structured representations. We extend the LSTM-based syntactic parser of Dozat and Manning (2017) to train on and generate these graph structures. The resulting system on its own achieves stateof-the-art performance, beating the previous, substantially more complex stateof-the-art system by 1.9% labeled F1. Adding linguistically richer input representations pushes the margin even higher, allowing us to beat it by 2.6% labeled F1.", "title": "" }, { "docid": "afbe496b98f6bb956cf22b5f08afec93", "text": "The fibula osteoseptocutaneous flap is a versatile method for reconstruction of composite-tissue defects of the mandible. The vascularized fibula can be osteotomized to permit contouring of any mandibular defect. The skin flap is reliable and can be used to resurface intraoral, extraoral, or both intraoral and extraoral defects. Twenty-seven fibula osteoseptocutaneous flaps were used for composite mandibular reconstructions in 25 patients. All the defects were reconstructed primarily following resection of oral cancers (23), excision of radiation-induced osteonecrotic lesions (2), excision of a chronic osteomyelitic lesion (1), or postinfective mandibular hypoplasia (1). The mandibular defects were between 6 and 14 cm in length. The number of fibular osteotomy sites ranged from one to three. All patients had associated soft-tissue losses. Six of the reconstructions had only oral lining defects, and 1 had only an external facial defect, while 18 had both lining and skin defects. Five patients used the skin portion of the fibula osteoseptocutaneous flaps for both oral lining and external facial reconstruction, while 13 patients required a second simultaneous free skin or musculocutaneous flap because of the size of the defects. Four of these flaps used the distal runoff of the peroneal pedicles as the recipient vessels. There was one total flap failure (96.3 percent success). There were no instances of isolated partial or complete skin necrosis. All osteotomy sites healed primarily. The contour of the mandibles was good to excellent.", "title": "" }, { "docid": "765b3b922a6d2cbc9f4af71e02b76f41", "text": "We make clear why virtual currencies are of interest, how self-regulation has failed, and what useful lessons can be learned. Finally, we produce useful and semi-permanent findings into the usefulness of virtual currencies in general, blockchains as a means of mining currency, and the profundity of Bitcoin as compared with the development of block chain technologies. We conclude that though Bitcoin may be the equivalent of Second Life a decade later, so blockchains may be the equivalent of Web 2.0 social networks, a truly transformative social technology.", "title": "" }, { "docid": "628c8b906e3db854ea92c021bb274a61", "text": "Taxi demand prediction is an important building block to enabling intelligent transportation systems in a smart city. An accurate prediction model can help the city pre-allocate resources to meet travel demand and to reduce empty taxis on streets which waste energy and worsen the traffic congestion. With the increasing popularity of taxi requesting services such as Uber and Didi Chuxing (in China), we are able to collect large-scale taxi demand data continuously. How to utilize such big data to improve the demand prediction is an interesting and critical real-world problem. Traditional demand prediction methods mostly rely on time series forecasting techniques, which fail to model the complex non-linear spatial and temporal relations. Recent advances in deep learning have shown superior performance on traditionally challenging tasks such as image classification by learning the complex features and correlations from largescale data. This breakthrough has inspired researchers to explore deep learning techniques on traffic prediction problems. However, existing methods on traffic prediction have only considered spatial relation (e.g., using CNN) or temporal relation (e.g., using LSTM) independently. We propose a Deep Multi-View Spatial-Temporal Network (DMVST-Net) framework to model both spatial and temporal relations. Specifically, our proposed model consists of three views: temporal view (modeling correlations between future demand values with near time points via LSTM), spatial view (modeling local spatial correlation via local CNN), and semantic view (modeling correlations among regions sharing similar temporal patterns). Experiments on large-scale real taxi demand data demonstrate effectiveness of our approach over state-ofthe-art methods.", "title": "" }, { "docid": "3dd6682c4307567e49b025d11b36b8a5", "text": "Deep generative architectures provide a way to model not only images, but also complex, 3-dimensional objects, such as point clouds. In this work, we present a novel method to obtain meaningful representations of 3D shapes that can be used for clustering and reconstruction. Contrary to existing methods for 3D point cloud generation that train separate decoupled models for representation learning and generation, our approach is the first end-to-end solution that allows to simultaneously learn a latent space of representation and generate 3D shape out of it. To achieve this goal, we extend a deep Adversarial Autoencoder model (AAE) to accept 3D input and create 3D output. Thanks to our end-to-end training regime, the resulting method called 3D Adversarial Autoencoder (3dAAE) obtains either binary or continuous latent space that covers much wider portion of training data distribution, hence allowing smooth interpolation between the shapes. Finally, our extensive quantitative evaluation shows that 3dAAE provides state-of-theart results on a set of benchmark tasks.", "title": "" }, { "docid": "773da4f213b7cbe7421c2f1481b71341", "text": "To meet the demand of increasing mobile data traffic and provide better user experience, heterogeneous cellular networks (HCNs) have become a promising solution to improve both the system capacity and coverage. However, due to dense self-deployment of small cells in a limited area, serious interference from nearby base stations may occur, which results in severe performance degradation. To mitigate downlink interference and utilize spectrum resources more efficiently, we present a novel graph-based resource allocation and interference management approach in this paper. First, we divide small cells into cell clusters, considering their neighborhood relationships in the scenario. Then, we develop another graph clustering scheme to group user equipment (UE) in each cell cluster into UE clusters with minimum intracluster interference. Finally, we utilize a proportional fairness scheduling scheme to assign subchannels to each UE cluster and allocate power using water-filling method. To show the efficacy and effectiveness of our proposed approach, we propose a dual-based approach to search for optimal solutions as the baseline for comparisons. Furthermore, we compare the graph-based approach with the state of the art and a distributed approach without interference coordination. The simulation results show that our graph-based approach reaches more than 90% of the optimal performance and achieves a significant improvement in spectral efficiency compared with the state of the art and the distributed approach both under cochannel and orthogonal deployments. Moreover, the proposed graph-based approach has low computation complexity, making it feasible for real-time implementation.", "title": "" }, { "docid": "58b4320c2cf52c658275eaa4748dede5", "text": "Backing-out and heading-out maneuvers in perpendicular or angle parking lots are one of the most dangerous maneuvers, especially in cases where side parked cars block the driver view of the potential traffic flow. In this paper, a new vision-based Advanced Driver Assistance System (ADAS) is proposed to automatically warn the driver in such scenarios. A monocular grayscale camera was installed at the back-right side of a vehicle. A Finite State Machine (FSM) defined according to three CAN Bus variables and a manual signal provided by the user is used to handle the activation/deactivation of the detection module. The proposed oncoming traffic detection module computes spatio-temporal images from a set of predefined scan-lines which are related to the position of the road. A novel spatio-temporal motion descriptor is proposed (STHOL) accounting for the number of lines, their orientation and length of the spatio-temporal images. Some parameters of the proposed descriptor are adapted for nighttime conditions. A Bayesian framework is then used to trigger the warning signal using multivariate normal density functions. Experiments are conducted on image data captured from a vehicle parked at different location of an urban environment, including both daytime and nighttime lighting conditions. We demonstrate that the proposed approach provides robust results maintaining processing rates close to real time.", "title": "" }, { "docid": "ee833203c939cfa9c5ab4135a75e1559", "text": "The multiconstraint 0-1 knapsack problem is encountered when one has to decide how to use a knapsack with multiple resource constraints. Even though the single constraint version of this problem has received a lot of attention, the multiconstraint knapsack problem has been seldom addressed. This paper deals with developing an effective solution procedure for the multiconstraint knapsack problem. Various relaxations of the problem are suggested and theoretical relations between these relaxations are pointed out. Detailed computational experiments are carried out to compare bounds produced by these relaxations. New algorithms for obtaining surrogate bounds are developed and tested. Rules for reducing problem size are suggested and shown to be effective through computational tests. Different separation, branching and bounding rules are compared using an experimental branch and bound code. An efficient branch and bound procedure is developed, tested and compared with two previously developed optimal algorithms. Solution times with the new procedure are found to be considerably lower. This procedure can also be used as a heuristic for large problems by early termination of the search tree. This scheme was tested and found to be very effective.", "title": "" }, { "docid": "f2205324dbf3a828e695854402ebbafe", "text": "Current research in law and neuroscience is promising to answer these questions with a \"yes.\" Some legal scholars working in this area claim that we are close to realizing the \"early criminologists' dream of identifying the biological roots of criminality.\" These hopes for a neuroscientific transformation of the criminal law, although based in the newest research, are part of a very old story. Criminal law and neuroscience have been engaged in an ill-fated and sometimes tragic affair for over two hundred years. Three issues have recurred that track those that bedeviled earlier efforts to ground criminal law in brain sciences. First is the claim that the brain is often the most relevant or fundamental level at which to understand criminal conduct. Second is that the various phenomena we call \"criminal violence\" arise causally from dysfunction within specific locations in the brain (\"localization\"). Third is the related claim that, because much violent criminality arises from brain dysfunction, people who commit such acts are biologically different from typical people (\"alterity\" or \"otherizing\").", "title": "" }, { "docid": "acab6a0a8b5e268cd0a5416bd00b4f55", "text": "We propose SocialFilter, a trust-aware collaborative spam mitigation system. Our proposal enables nodes with no email classification functionality to query the network on whether a host is a spammer. It employs Sybil-resilient trust inference to weigh the reports concerning spamming hosts that collaborating spam-detecting nodes (reporters) submit to the system. It weighs the spam reports according to the trustworthiness of their reporters to derive a measure of the system's belief that a host is a spammer. SocialFilter is the first collaborative unwanted traffic mitigation system that assesses the trustworthiness of spam reporters by both auditing their reports and by leveraging the social network of the reporters' administrators. The design and evaluation of our proposal offers us the following lessons: a) it is plausible to introduce Sybil-resilient Online-Social-Network-based trust inference mechanisms to improve the reliability and the attack-resistance of collaborative spam mitigation; b) using social links to obtain the trustworthiness of reports concerning spammers can result in comparable spam-blocking effectiveness with approaches that use social links to rate-limit spam (e.g., Ostra [27]); c) unlike Ostra, in the absence of reports that incriminate benign email senders, SocialFilter yields no false positives.", "title": "" }, { "docid": "086269223c00209787310ee9f0bcf875", "text": "The availability of large annotated datasets and affordable computation power have led to impressive improvements in the performance of CNNs on various object detection and recognition benchmarks. These, along with a better understanding of deep learning methods, have also led to improved capabilities of machine understanding of faces. CNNs are able to detect faces, locate facial landmarks, estimate pose, and recognize faces in unconstrained images and videos. In this paper, we describe the details of a deep learning pipeline for unconstrained face identification and verification which achieves state-of-the-art performance on several benchmark datasets. We propose a novel face detector, Deep Pyramid Single Shot Face Detector (DPSSD), which is fast and capable of detecting faces with large scale variations (especially tiny faces). We give design details of the various modules involved in automatic face recognition: face detection, landmark localization and alignment, and face identification/verification. We provide evaluation results of the proposed face detector on challenging unconstrained face detection datasets. Then, we present experimental results for IARPA Janus Benchmarks A, B and C (IJB-A, IJB-B, IJB-C), and the Janus Challenge Set 5 (CS5).", "title": "" }, { "docid": "cdee51ab9562e56aee3fff58cd2143ba", "text": "Stochastic gradient descent (SGD) still is the workhorse for many practical problems. However, it converges slow, and can be difficult to tune. It is possible to precondition SGD to accelerate its convergence remarkably. But many attempts in this direction either aim at solving specialized problems, or result in significantly more complicated methods than SGD. This paper proposes a new method to adaptively estimate a preconditioner, such that the amplitudes of perturbations of preconditioned stochastic gradient match that of the perturbations of parameters to be optimized in a way comparable to Newton method for deterministic optimization. Unlike the preconditioners based on secant equation fitting as done in deterministic quasi-Newton methods, which assume positive definite Hessian and approximate its inverse, the new preconditioner works equally well for both convex and nonconvex optimizations with exact or noisy gradients. When stochastic gradient is used, it can naturally damp the gradient noise to stabilize SGD. Efficient preconditioner estimation methods are developed, and with reasonable simplifications, they are applicable to large-scale problems. Experimental results demonstrate that equipped with the new preconditioner, without any tuning effort, preconditioned SGD can efficiently solve many challenging problems like the training of a deep neural network or a recurrent neural network requiring extremely long-term memories.", "title": "" }, { "docid": "74593565b633d29041637d877428a0a4", "text": "The kinematics of contact describe the motion of a point of contact over the surfaces of two contacting objects in response to a relative motion of these objects. Using concepts from differential geometry, I derive a set of equations, called the contact equations, that embody this relationship. I employ the contact equations to design the following applications to be executed by an end-effector with tactile sensing capability: (1) determining the curvature form of an unknown object at a point of contact; and (2) following the surface of an unknown object. The contact equations also serve as a basis for an investigation of the kinematics of grasp. I derive the relationship between the relative motion of two fingers grasping an object and the motion of the points of contact over the object surface. Based on this analysis, we explore the following applications: (1) rolling a sphere between two arbitrarily shaped fingers ; (2) fine grip adjustment (i.e., having two fingers that grasp an unknown object locally optimize their grip for maximum stability ).", "title": "" }, { "docid": "915ad4f43eef7db8fb24080f8389b424", "text": "This paper details the design and architecture of a series elastic actuated snake robot, the SEA Snake. The robot consists of a series chain of 1-DOF modules that are capable of torque, velocity and position control. Additionally, each module includes a high-speed Ethernet communications bus, internal IMU, modular electro-mechanical interface, and ARM based on-board control electronics.", "title": "" }, { "docid": "66f6668f2c96b602a1f3be67e1f79e87", "text": "Web advertising is the primary driving force behind many Web activities, including Internet search as well as publishing of online content by third-party providers. Even though the notion of online advertising barely existed a decade ago, the topic is so complex that it attracts attention of a variety of established scientific disciplines, including computational linguistics, computer science, economics, psychology, and sociology, to name but a few. Consequently, a new discipline — Computational Advertising — has emerged, which studies the process of advertising on the Internet from a variety of angles. A successful advertising campaign should be relevant to the immediate user’s information need as well as more generally to user’s background and personalized interest profile, be economically worthwhile to the advertiser and the intermediaries (e.g., the search engine), as well as be aesthetically pleasant and not detrimental to user experience.", "title": "" }, { "docid": "826e01210bb9ce8171ed72043b4a304d", "text": "Despite their local fluency, long-form text generated from RNNs is often generic, repetitive, and even self-contradictory. We propose a unified learning framework that collectively addresses all the above issues by composing a committee of discriminators that can guide a base RNN generator towards more globally coherent generations. More concretely, discriminators each specialize in a different principle of communication, such as Grice’s maxims, and are collectively combined with the base RNN generator through a composite decoding objective. Human evaluation demonstrates that text generated by our model is preferred over that of baselines by a large margin, significantly enhancing the overall coherence, style, and information of the generations.", "title": "" }, { "docid": "58359b7b3198504fa2475cc0f20ccc2d", "text": "OBJECTIVES\nTo review and synthesize the state of research on a variety of meditation practices, including: the specific meditation practices examined; the research designs employed and the conditions and outcomes examined; the efficacy and effectiveness of different meditation practices for the three most studied conditions; the role of effect modifiers on outcomes; and the effects of meditation on physiological and neuropsychological outcomes.\n\n\nDATA SOURCES\nComprehensive searches were conducted in 17 electronic databases of medical and psychological literature up to September 2005. Other sources of potentially relevant studies included hand searches, reference tracking, contact with experts, and gray literature searches.\n\n\nREVIEW METHODS\nA Delphi method was used to develop a set of parameters to describe meditation practices. Included studies were comparative, on any meditation practice, had more than 10 adult participants, provided quantitative data on health-related outcomes, and published in English. Two independent reviewers assessed study relevance, extracted the data and assessed the methodological quality of the studies.\n\n\nRESULTS\nFive broad categories of meditation practices were identified (Mantra meditation, Mindfulness meditation, Yoga, Tai Chi, and Qi Gong). Characterization of the universal or supplemental components of meditation practices was precluded by the theoretical and terminological heterogeneity among practices. Evidence on the state of research in meditation practices was provided in 813 predominantly poor-quality studies. The three most studied conditions were hypertension, other cardiovascular diseases, and substance abuse. Sixty-five intervention studies examined the therapeutic effect of meditation practices for these conditions. Meta-analyses based on low-quality studies and small numbers of hypertensive participants showed that TM(R), Qi Gong and Zen Buddhist meditation significantly reduced blood pressure. Yoga helped reduce stress. Yoga was no better than Mindfulness-based Stress Reduction at reducing anxiety in patients with cardiovascular diseases. No results from substance abuse studies could be combined. The role of effect modifiers in meditation practices has been neglected in the scientific literature. The physiological and neuropsychological effects of meditation practices have been evaluated in 312 poor-quality studies. Meta-analyses of results from 55 studies indicated that some meditation practices produced significant changes in healthy participants.\n\n\nCONCLUSIONS\nMany uncertainties surround the practice of meditation. Scientific research on meditation practices does not appear to have a common theoretical perspective and is characterized by poor methodological quality. Firm conclusions on the effects of meditation practices in healthcare cannot be drawn based on the available evidence. Future research on meditation practices must be more rigorous in the design and execution of studies and in the analysis and reporting of results.", "title": "" }, { "docid": "7ee4a708d41065c619a5bf9e86f871a3", "text": "Cyber attack comes in various approach and forms, either internally or externally. Remote access and spyware are forms of cyber attack leaving an organization to be susceptible to vulnerability. This paper investigates illegal activities and potential evidence of cyber attack through studying the registry on the Windows 7 Home Premium (32 bit) Operating System in using the application Virtual Network Computing (VNC) and keylogger application. The aim is to trace the registry artifacts left by the attacker which connected using Virtual Network Computing (VNC) protocol within Windows 7 Operating System (OS). The analysis of the registry focused on detecting unwanted applications or unauthorized access to the machine with regard to the user activity via the VNC connection for the potential evidence of illegal activities by investigating the Registration Entries file and image file using the Forensic Toolkit (FTK) Imager. The outcome of this study is the findings on the artifacts which correlate to the user activity.", "title": "" } ]
scidocsrr
37069742cd21eb8bc3971621e1103eb6
Parallelization and characterization of pattern matching using GPUs
[ { "docid": "d9bd07f0c83f1f2ac8a3eddf9b66e000", "text": "The constant increase in link speeds and number of threats poses challenges to network intrusion detection systems (NIDS), which must cope with higher traffic throughput and perform even more complex per-packet processing. In this paper, we present an intrusion detection system based on the Snort open-source NIDS that exploits the underutilized computational power of modern graphics cards to offload the costly pattern matching operations from the CPU, and thus increase the overall processing throughput. Our prototype system, called Gnort, achieved a maximum traffic processing throughput of 2.3 Gbit/s using synthetic network traces, while when monitoring real traffic using a commodity Ethernet interface, it outperformed unmodified Snort by a factor of two. The results suggest that modern graphics cards can be used effectively to speed up intrusion detection systems, as well as other systems that involve pattern matching operations.", "title": "" } ]
[ { "docid": "a050ae6738a8c511b8942deb19155b7c", "text": "Electrocardiogram (ECG) measurement without skin-contact is essential for u-healthcare. ECG measurement using capacitive-coupled electrode (CC-electrode) is a well-known method for unconstrained ECG measurement. Although the CC-electrode has the advantage of non-contact measurement, common mode noise is increased, which decreases the signal-to-noise ratio (SNR). In this study, we proposed non-contact ECG measurement system using CC-electrode and driven circuit to reduce noise. The components of driven circuit were similar to those of driven-right-leg circuit and conductive sheet was employed for driven electrode to contact uniformly to the body over clothes. We evaluated the performance of the driven circuit under different conditions, including a contact area to the body and a gain of the driven circuit to find out a relationship between them and the SNR of ECG. As the results, as contact area became larger and gain became higher, SNR increased.", "title": "" }, { "docid": "8cf336a0d57681f55b9fadbb769996a4", "text": "Games-based learning has captured the interest of educationalists and industrialists who seek to exploit the characteristics of computer games as they are perceived by some to be a potentially effective approach for teaching and learning. Despite this interest in using games-based learning there is a dearth of empirical evidence supporting the validity of the approach covering the wider context of gaming and education. This study presents a large scale gaming survey, involving 887 students from 13 different Higher Education (HE) institutes in Scotland and the Netherlands, which examines students’ characteristics related to their gaming preferences, game playing habits, and their perceptions and thoughts on the use of games in education. It presents a comparison of three separate groups of students: a group in regular education in a Scottish university, a group in regular education in universities in the Netherlands and a distance learning group from a university in the Netherlands. This study addresses an overall research question of: Can computer games be used for educational purposes at HE level in regular and distance education in different countries? The study then addresses four sub-research questions related to the overall research question: What are the different game playing habits of the three groups? What are the different motivations for playing games across the three groups? What are the different reasons for using games in HE across the three groups? What are the different attitudes towards games across the three groups? To our knowledge this is the first in-depth cross-national survey on gaming and education. We found that a large number of participants believed that computer games could be used at HE level for educational purposes and that further research in the area of game playing habits, motivations for playing computer games and motivations for playing computer games in education are worthy of extensive further investigation. We also found a clear distinction between the views of students in regular education and those in distance education. Regular education students in both countries rated all motivations for playing computer games as significantly more important than distance education students. Also the results suggest that Scottish students aim to enhance their social experience with regards to competition and cooperation, while Dutch students aim to enhance their leisurely experience with regards to leisure, feeling good, preventing boredom and excitement. 2013 Elsevier Ltd. All rights reserved. Hainey), wim.westera@ou.nl (W. Westera), thomas.connolly@uws.ac.uk (T.M. Connolly), gavin.baxter@uws.ac.uk", "title": "" }, { "docid": "8994470e355b5db188090be731ee4fe9", "text": "A system that allows museums to build and manage Virtual and Augmented Reality exhibitions based on 3D models of artifacts is presented. Dynamic content creation based on pre-designed visualization templates allows content designers to create virtual exhibitions very efficiently. Virtual Reality exhibitions can be presented both inside museums, e.g. on touch-screen displays installed inside galleries and, at the same time, on the Internet. Additionally, the presentation based on Augmented Reality technologies allows museum visitors to interact with the content in an intuitive and exciting manner.", "title": "" }, { "docid": "3171587b5b4554d151694f41206bcb4e", "text": "Embedded systems are ubiquitous in society and can contain information that could be used in criminal cases for example in a serious road traffic accident where the car management systems could provide vital forensic information concerning the engine speed etc. A critical review of a number of methods and procedures for the analysis of embedded systems were compared against a ‘standard’ methodology for use in a Forensic Computing Investigation. A Unified Forensic Methodology (UFM) has been developed that is forensically sound and capable of dealing with the analysis of a wide variety of Embedded Systems.", "title": "" }, { "docid": "5fb732fd3210a5c9bba42426b1b4ce49", "text": "While there are optimal TSP solvers, as well as recent learning-based approaches, the generalization of the TSP to the Multiple Traveling Salesmen Problem is much less studied. Here, we design a neural network solution that treats the salesmen, cities and depot as three different sets of varying cardinalities. We apply a novel technique that combines elements from recent architectures that were developed for sets, as well as elements from graph networks. Coupled with new constraint enforcing output layers, a dedicated loss, and a search method, our solution is shown to outperform all the meta-heuristics of the leading solver in the field.", "title": "" }, { "docid": "6781bc56c476876ff40705b642f2ab45", "text": "Mapping functional requirements first to specifications and then to code is one of the most challenging tasks in software development. Since requirements are commonly written in natural language, they can be prone to ambiguity, incompleteness and inconsistency. Structured semantic representations allow requirements to be translated to formal models, which can be used to detect problems at an early stage of the development process through validation. Storing and querying such models can also facilitate software reuse. Several approaches constrain the input format of requirements to produce specifications, however they usually require considerable human effort in order to adopt domain-specific heuristics and/or controlled languages. We propose a mechanism that automates the mapping of requirements to formal representations using semantic role labeling. We describe the first publicly available dataset for this task, employ a hierarchical framework that allows requirements concepts to be annotated, and discuss how semantic role labeling can be adapted for parsing software requirements.", "title": "" }, { "docid": "1856fe698a338335f998b27eccb7c582", "text": "Grounded theory is a qualitative research approach that uses inductive analysis as a principal technique. Yet, researchers who embrace this approach often use sensitizing concepts to guide their analysis. In this article, the author examines the relationship between sensitizing concepts and grounded theory. Furthermore, he illustrates the application of sensitizing concepts in a study of community-based antipoverty projects in Jamaica. The article contains commentary about trustworthiness techniques, the coding process, and the constant comparative method of analysis, as well as a synopsis of study findings.", "title": "" }, { "docid": "ee07cf061a1a3b7283c22434dcabd4eb", "text": "Over the past decade, machine learning techniques and in particular predictive modeling and pattern recognition in biomedical sciences, from drug delivery systems to medical imaging, have become one of the most important methods of assisting researchers in gaining a deeper understanding of issues in their entirety and solving complex medical problems. Deep learning is a powerful machine learning algorithm in classification that extracts low-to high-level features. In this paper, we employ a convolutional neural network to distinguish an Alzheimers brain from a normal, healthy brain. The importance of classifying this type of medical data lies in its potential to develop a predictive model or system in order to recognize the symptoms of Alzheimers disease when compared with normal subjects and to estimate the stages of the disease. Classification of clinical data for medical conditions such as Alzheimers disease has always been challenging, and the most problematic aspect has always been selecting the strongest discriminative features. Using the Convolutional Neural Network (CNN) and the famous architecture LeNet-5, we successfully classified functional MRI data of Alzheimers subjects from normal controls, where the accuracy of testing data reached 96.85%. This experiment suggests that the shift and scale invariant features extracted by CNN followed by deep learning classification represents the most powerful method of distinguishing clinical data from healthy data in fMRI. This approach also allows for expansion of the methodology to predict more complicated systems.", "title": "" }, { "docid": "f1bbfe878069fcea9b7c7c24ee2e5b2d", "text": "We show that the MEMS gyroscopes found on modern smart phones are sufficiently sensitive to measure acoustic signals in the vicinity of the phone. The resulting signals contain only very low-frequency information (<200Hz). Nevertheless we show, using signal processing and machine learning, that this information is sufficient to identify speaker information and even parse speech. Since iOS and Android require no special permissions to access the gyro, our results show that apps and active web content that cannot access the microphone can nevertheless eavesdrop on speech in the vicinity of the phone.", "title": "" }, { "docid": "f9cf40dd84781c46ee007667b2e8a948", "text": "The purpose of this study was to compare the effects of lumbar stabilization exercises using balls to the effects of general lumbar stabilization exercises with respect to changes in the cross section of the multifidus (MF), weight bearing, pain, and functional disorders in patients with non-specific chronic low back pain. Twelve patients participated in either a 8 week (3 days per week) stabilization exercise program using balls and control group (n = 12). The computer tomography (CT) was used to analyze MF cross-sectional areas (CSA) and Tetrax balancing scale was used to analyze left and right weight bearing differences. Both groups had significant changes in the CSA of the MF by segment after training (p < 0.05) and the experimental group showed greater increases at the L4 (F = 9.854, p = 0.005) and L5 (F = 39. 266, p = 0.000). Both groups showed significant decreases in weight bearing, from 9.25% to 5.83% in the experimental group and from 9.33% to 4.25% in the control group (p < 0.05), but did not differ significantly between the two groups. These results suggests that stabilization exercises using ball can increases in the CSA of the MF segments, improvement in weight bearing, pain relief, and recovery from functional disorders, and the increases in the CSA of the MF of the L4 and L5 segments for patients with low back pain. Key PointsCompared with the stabilization exercise using a ball and general stabilization exercise increased the CSA of the MF, weight bearing, pain, and functional ability in patients with low back pain.We verified that increases in the CSA of the MF of the L4 and L5 segments and functional ability during the stabilization exercise using a ball.The stabilization exercise using a ball was shown to be an effective exercise method for patients with low back pain in a rehabilitation program by increasing functional ability and the CSA of the MF.", "title": "" }, { "docid": "5440299847905e042ea8b3dc1482e3de", "text": "Web personalization is the process of customizing a Web site to the needs of specific users, taking advantage of the knowledge acquired from the analysis of the user's navigational behavior (usage data) in correlation with other information collected in the Web context, namely, structure, content, and user profile data. Due to the explosive growth of the Web, the domain of Web personalization has gained great momentum both in the research and commercial areas. In this article we present a survey of the use of Web mining for Web personalization. More specifically, we introduce the modules that comprise a Web personalization system, emphasizing the Web usage mining module. A review of the most common methods that are used as well as technical issues that occur is given, along with a brief overview of the most popular tools and applications available from software vendors. Moreover, the most important research initiatives in the Web usage mining and personalization areas are presented.", "title": "" }, { "docid": "375de005698ccaf54d7b82875f1f16c5", "text": "This paper describes design, Simulation and manufacturing procedures of HIRAD - a teleoperated Tracked Surveillance UGV for military, Rescue and other civilian missions in various hazardous environments. A Double Stabilizer Flipper mechanism mounted on front pulleys enables the Robot to have good performance in travelling over uneven terrains and climbing stairs. Using this Stabilizer flipper mechanism reduces energy consumption while climbing the stairs or crossing over obstacles. The locomotion system mechanical design is also described in detail. The CAD geometry 3D-model has been produced by CATIA software. To analyze the system mobility, a virtual model was developed with ADAMS Software. This simulation included different mobility maneuvers such as stair climbing, gap crossing and travelling over steep slopes. The simulations enabled us to define motor torque requirements. We performed many experiments with manufactured prototype under various terrain conditions Such as stair climbing, gap crossing and slope elevation. In experiments, HIRAD shows good overcoming ability for the tested terrain conditions.", "title": "" }, { "docid": "cb62164bc5a582be0c45df28d8ebb797", "text": "Android rooting enables device owners to freely customize their own devices and run useful apps that require root privileges. While useful, rooting weakens the security of Android devices and opens the door for malware to obtain privileged access easily. Thus, several rooting prevention mechanisms have been introduced by vendors, and sensitive or high-value mobile apps perform rooting detection to mitigate potential security exposures on rooted devices. However, there is a lack of understanding whether existing rooting prevention and detection methods are effective. To fill this knowledge gap, we studied existing Android rooting methods and performed manual and dynamic analysis on 182 selected apps, in order to identify current rooting detection methods and evaluate their effectiveness. Our results suggest that these methods are ineffective. We conclude that reliable methods for detecting rooting must come from integrity-protected kernels or trusted execution environments, which are difficult to bypass.", "title": "" }, { "docid": "5d557ecb67df253662e37d6ec030d055", "text": "Low-rank matrix approximation methods provide one of the simplest and most effective approaches to collaborative filtering. Such models are usually fitted to data by finding a MAP estimate of the model parameters, a procedure that can be performed efficiently even on very large datasets. However, unless the regularization parameters are tuned carefully, this approach is prone to overfitting because it finds a single point estimate of the parameters. In this paper we present a fully Bayesian treatment of the Probabilistic Matrix Factorization (PMF) model in which model capacity is controlled automatically by integrating over all model parameters and hyperparameters. We show that Bayesian PMF models can be efficiently trained using Markov chain Monte Carlo methods by applying them to the Netflix dataset, which consists of over 100 million movie ratings. The resulting models achieve significantly higher prediction accuracy than PMF models trained using MAP estimation.", "title": "" }, { "docid": "e648b97ead434fa9daadaec7fa850fac", "text": "Internet of Things (IoT) is now in its initial stage but very soon, it is going to influence almost every day-to-day items we use. The more it will be included in our lifestyle, more will be the threat of it being misused. There is an urgent need to make IoT devices secure from getting cracked. Very soon IoT is going to expand the area for the cyber-attacks on homes and businesses by transforming objects that were used to be offline into online systems. Existing security technologies are just not enough to deal with this problem. Blockchain has emerged as the possible solution for creating more secure IoT systems in the time to come. In this paper, first an overview of the blockchain technology and its implementation has been explained; then we have discussed the infrastructure of IoT which is based on Blockchain network and at last a model has been provided for the security of internet of things using blockchain.", "title": "" }, { "docid": "ff418efbdd2381692f01b5cdc94143d5", "text": "The U.S. legislation at both the federal and state levels mandates certain organizations to inform customers about information uses and disclosures. Such disclosures are typically accomplished through privacy policies, both online and offline. Unfortunately, the policies are not easy to comprehend, and, as a result, online consumers frequently do not read the policies provided at healthcare Web sites. Because these policies are often required by law, they should be clear so that consumers are likely to read them and to ensure that consumers can comprehend these policies. This, in turn, may increase consumer trust and encourage consumers to feel more comfortable when interacting with online organizations. In this paper, we present results of an empirical study, involving 993 Internet users, which compared various ways to present privacy policy information to online consumers. Our findings suggest that users perceive typical, paragraph-form policies to be more secure than other forms of policy representation, yet user comprehension of such paragraph-form policies is poor as compared to other policy representations. The results of this study can help managers create more trustworthy policies, aid compliance officers in detecting deceptive organizations, and serve legislative bodies by providing tangible evidence as to the ineffectiveness of current privacy policies.", "title": "" }, { "docid": "252526e9d50cab28d702f695c12acc27", "text": "This paper describes several optimization techniques used to create an adequate route network graph for autonomous cars as a map reference for driving on German autobahn or similar highway tracks. We have taken the Route Network Definition File Format (RNDF) specified by DARPA and identified multiple flaws of the RNDF for creating digital maps for autonomous vehicles. Thus, we introduce various enhancements to it to form a digital map graph called RND-FGraph, which is well suited to map almost any urban transportation infrastructure. We will also outline and show results of fast optimizations to reduce the graph size. The RNDFGraph has been used for path-planning and trajectory evaluation by the behavior module of our two autonomous cars “Spirit of Berlin” and “MadeInGermany”. We have especially tuned the graph to map structured high speed environments such as autobahns where we have tested autonomously hundreds of kilometers under real traffic conditions.", "title": "" }, { "docid": "707c918dbde3d7a89ee0a6e02320f6ec", "text": "BACKGROUND\nFew longitudinal studies of child and adolescent psychopathology have examined the links between specific childhood anxiety disorders and adolescent psychiatric disorder. In this paper we test the predictive specificity of separation anxiety disorder (SAD), overanxious disorder (OAD), generalized anxiety disorder (GAD), and social phobia.\n\n\nMETHODS\nData come from the Great Smoky Mountains Study (GSMS). A representative population sample of children--ages 9, 11, and 13 years at intake--was followed to age 19. Diagnoses of both childhood (before age 13 years) and adolescent psychiatric disorders (age 13 to 19 years) were available from 906 participants.\n\n\nRESULTS\nChildhood SAD predicted adolescent SAD, whereas OAD was associated with later OAD, panic attacks, depression and conduct disorder (CD). GAD was related only to CD. Social phobia in childhood was associated with adolescent OAD, social phobia, and attention-deficit/hyperactivity disorder (ADHD).\n\n\nCONCLUSIONS\nAnxiety disorders in childhood are predictors of a range of psychiatric disorders in adolescence. It appears that children meriting a well-defined diagnosis are missed by the current rules for the diagnosis of GAD. Future studies should examine whether OAD deserves reconsideration as a nosological entity.", "title": "" }, { "docid": "ad0ed4bca299c9961705cc40793ae697", "text": "An ultra-wideband mixer using standard complementery metal oxide semiconductor (CMOS) technology was first proposed in this paper. This broadband mixer achieves measured conversion gain of 11 1 5 dB with a bandwidth of 0.3 to 25 GHz. The mixer was fabricated in a commercial 0.18m CMOS technology and demonstrated the highest frequency and bandwidth of operation. It also presented better gain-bandwidth-product performance compared with that of GaAs-based HBT technologies. The chip area is 0.8 1 mm.", "title": "" }, { "docid": "f284c6e32679d8413e366d2daf1d4613", "text": "Summary form only given. Existing studies on ensemble classifiers typically take a static approach in assembling individual classifiers, in which all the important features are specified in advance. In this paper, we propose a new concept, dynamic ensemble, as an advanced classifier that could have dynamic component classifiers and have dynamic configurations. Toward this goal, we have substantially expanded the existing \"overproduce and choose\" paradigm for ensemble construction. A new algorithm called BAGA is proposed to explore this approach. Taking a set of decision tree component classifiers as input, BAGA generates a set of candidate ensembles using combined bagging and genetic algorithm techniques so that component classifiers are determined at execution time. Empirical studies have been carried out on variations of the BAGA algorithm, where the sizes of chosen classifiers, effects of bag size, voting function and evaluation functions on the dynamic ensemble construction, are investigated.", "title": "" } ]
scidocsrr
30c474ca277ce4ff36b8c8cb8412065b
CNN Based Transfer Learning for Historical Chinese Character Recognition
[ { "docid": "3bb905351ce1ea2150f37059ed256a90", "text": "A major assumption in many machine learning and data mining algorithms is that the training and future data must be in the same feature space and have the same distribution. However, in many real-world applications, this assumption may not hold. For example, we sometimes have a classification task in one domain of interest, but we only have sufficient training data in another domain of interest, where the latter data may be in a different feature space or follow a different data distribution. In such cases, knowledge transfer, if done successfully, would greatly improve the performance of learning by avoiding much expensive data-labeling efforts. In recent years, transfer learning has emerged as a new learning framework to address this problem. This survey focuses on categorizing and reviewing the current progress on transfer learning for classification, regression, and clustering problems. In this survey, we discuss the relationship between transfer learning and other related machine learning techniques such as domain adaptation, multitask learning and sample selection bias, as well as covariate shift. We also explore some potential future issues in transfer learning research.", "title": "" }, { "docid": "ebb01a778c668ef7b439875eaa5682ac", "text": "In this paper, we present a large scale off-line handwritten Chinese character database-HCL2000 which will be made public available for the research community. The database contains 3,755 frequently used simplified Chinesecharacters written by 1,000 different subjects. The writers’ information is incorporated in the database to facilitate testing on grouping writers with different background such as age, occupation, gender, and education etc. We investigate some characteristics of writing styles from different groups of writers. We evaluate HCL2000 database using three different algorithms as a baseline. We decide to publish the database along with this paper and make it free for a research purpose.", "title": "" } ]
[ { "docid": "6f371e0a8f0bfd3cd1b5eb4208160818", "text": "A key aim of current research is to create robots that can reliably manipulate objects. However, in many applications, general-purpose object detection or manipulation is not required: the robot would be useful if it could recognize, localize, and manipulate the relatively small set of specific objects most important in that application, but do so with very high reliability. Instance-based approaches can achieve this high reliability but to work well, they require large amounts of data about the objects that are being manipulated. The first contribution of this paper is a system that automates this data collection using a robot. When the robot encounters a novel object, it collects data that enables it to detect the object, estimate its pose, and grasp it. However for some objects, information needed to infer a successful grasp is not visible to the robot’s sensors; for example, a heavy object might need to be grasped in the middle or else it will twist out of the robot’s gripper. The second contribution of this paper is an approach that allows a robot to identify the best grasp point by attempting to pick up the object and tracking its successes and failures. Because the number of grasp points is very large, we formalize grasping as an N-armed bandit problem and define a new algorithm for best arm identification in budgeted bandits that enables the robot to quickly find an arm corresponding to a good grasp without pulling all the arms. We demonstrate that a stock Baxter robot with no additional sensing can autonomously acquire models for a wide variety of objects and use the models to detect, classify, and manipulate the objects. Additionally, we show that our adaptation step significantly improves accuracy over a non-adaptive system, enabling a robot to improve its pick success rate from 55% to 75% on a collection of 30 household objects. Our instance-based approach exploits the robot’s ability to collect its own training data, enabling experience with the object to directly improve the robot’s performance during future interactions.", "title": "" }, { "docid": "0d8c38444954a0003117e7334195cb00", "text": "Although mature technologies exist for acquiring images, geometry, and normals of small objects, they remain cumbersome and time-consuming for non-experts to employ on a large scale. In an archaeological setting, a practical acquisition system for routine use on every artifact and fragment would open new possibilities for archiving, analysis, and dissemination. We present an inexpensive system for acquiring all three types of information, and associated metadata, for small objects such as fragments of wall paintings. The acquisition system requires minimal supervision, so that a single, non-expert user can scan at least 10 fragments per hour. To achieve this performance, we introduce new algorithms to robustly and automatically align range scans, register 2-D scans to 3-D geometry, and compute normals from 2-D scans. As an illustrative application, we present a novel 3-D matching algorithm that efficiently searches for matching fragments using the scanned geometry.", "title": "" }, { "docid": "3d310295592775bbe785692d23649c56", "text": "BACKGROUND\nEvidence indicates that sexual assertiveness is one of the important factors affecting sexual satisfaction. According to some studies, traditional gender norms conflict with women's capability in expressing sexual desires. This study examined the relationship between gender roles and sexual assertiveness in married women in Mashhad, Iran.\n\n\nMETHODS\nThis cross-sectional study was conducted on 120 women who referred to Mashhad health centers through convenient sampling in 2014-15. Data were collected using Bem Sex Role Inventory (BSRI) and Hulbert index of sexual assertiveness. Data were analyzed using SPSS 16 by Pearson and Spearman's correlation tests and linear Regression Analysis.\n\n\nRESULTS\nThe mean scores of sexual assertiveness was 54.93±13.20. According to the findings, there was non-significant correlation between Femininity and masculinity score with sexual assertiveness (P=0.069 and P=0.080 respectively). Linear regression analysis indicated that among the predictor variables, only Sexual function satisfaction was identified as the sexual assertiveness summary predictor variables (P=0.001).\n\n\nCONCLUSION\nBased on the results, sexual assertiveness in married women does not comply with gender role, but it is related to Sexual function satisfaction. So, counseling psychologists need to consider this variable when designing intervention programs for modifying sexual assertiveness and find other variables that affect sexual assertiveness.", "title": "" }, { "docid": "3c0cc3398139b6a558a56b934d96c641", "text": "Targeted nucleases are powerful tools for mediating genome alteration with high precision. The RNA-guided Cas9 nuclease from the microbial clustered regularly interspaced short palindromic repeats (CRISPR) adaptive immune system can be used to facilitate efficient genome engineering in eukaryotic cells by simply specifying a 20-nt targeting sequence within its guide RNA. Here we describe a set of tools for Cas9-mediated genome editing via nonhomologous end joining (NHEJ) or homology-directed repair (HDR) in mammalian cells, as well as generation of modified cell lines for downstream functional studies. To minimize off-target cleavage, we further describe a double-nicking strategy using the Cas9 nickase mutant with paired guide RNAs. This protocol provides experimentally derived guidelines for the selection of target sites, evaluation of cleavage efficiency and analysis of off-target activity. Beginning with target design, gene modifications can be achieved within as little as 1–2 weeks, and modified clonal cell lines can be derived within 2–3 weeks.", "title": "" }, { "docid": "210ec3c86105f496087c7b012619e1d3", "text": "An ultra compact projection system based on a high brightness OLEd micro display is developed. System design and realization of a prototype are presented. This OLEd pico projector with a volume of about 10 cm3 can be integrated into portable systems like mobile phones or PdAs. The Fraunhofer IPMS developed the high brightness monochrome OLEd micro display. The Fraunhofer IOF desig­ ned the specific projection lens [1] and in tegrated the OLEd and the projection optic to a full functional pico projection system. This article provides a closer look on the technology and its possibilities.", "title": "" }, { "docid": "620bed2762c52ad377ceac677adfebef", "text": "Shape is an important image feature - it is one of the primary low level image features exploited in content-based image retrieval (CBIR). There are generally two types of shape descriptors in the literature: contour-based and region-based. In MPEG-7, the curvature scale space descriptor (CSSD) and Zernike moment descriptor (ZMD) have been adopted as the contour-based shape descriptor and region-based shape descriptor, respectively. In this paper, the two shape descriptors are evaluated against other shape descriptors, and the two shape descriptors are also evaluated against each other. Standard methodology is used in the evaluation. Specifically, we use standard databases, large data sets and query sets, commonly used performance measurement and guided principles. A Java-based client-server retrieval framework has been implemented to facilitate the evaluation. Results show that Fourier descriptor (FD) outperforms CSSD, and that CSSD can be replaced by either FD or ZMD.", "title": "" }, { "docid": "147c1fb2c455325ff5e4e4e4659a0040", "text": "A Ka-band 2D flat-profiled Luneburg lens antenna implemented with a glide-symmetric holey structure is presented. The required refractive index for the lens design has been investigated via an analysis of the hole depth and the gap between the two metallic layers constituting the lens. The final unit cell is described and applied to create the complete metasurface Luneburg lens showing that a plane wave is obtained when feeding at an opposite arbitrary point with a discrete source.", "title": "" }, { "docid": "572453e5febc5d45be984d7adb5436c5", "text": "An analysis of several role playing games indicates that player quests share common elements, and that these quests may be abstractly represented using a small expressive language. One benefit of this representation is that it can guide procedural content generation by allowing quests to be generated using this abstraction, and then later converting them into a concrete form within a game’s domain.", "title": "" }, { "docid": "4d4540a59e637f9582a28ed62083bfd6", "text": "Targeted sentiment analysis classifies the sentiment polarity towards each target entity mention in given text documents. Seminal methods extract manual discrete features from automatic syntactic parse trees in order to capture semantic information of the enclosing sentence with respect to a target entity mention. Recently, it has been shown that competitive accuracies can be achieved without using syntactic parsers, which can be highly inaccurate on noisy text such as tweets. This is achieved by applying distributed word representations and rich neural pooling functions over a simple and intuitive segmentation of tweets according to target entity mentions. In this paper, we extend this idea by proposing a sentencelevel neural model to address the limitation of pooling functions, which do not explicitly model tweet-level semantics. First, a bi-directional gated neural network is used to connect the words in a tweet so that pooling functions can be applied over the hidden layer instead of words for better representing the target and its contexts. Second, a three-way gated neural network structure is used to model the interaction between the target mention and its surrounding contexts. Experiments show that our proposed model gives significantly higher accuracies compared to the current best method for targeted sentiment analysis.", "title": "" }, { "docid": "f3cb6de57ba293be0b0833a04086b2ce", "text": "Due to increasing globalization, urban societies are becoming more multicultural. The availability of large-scale digital mobility traces e.g. from tweets or checkins provides an opportunity to explore multiculturalism that until recently could only be addressed using survey-based methods. In this paper we examine a basic facet of multiculturalism through the lens of language use across multiple cities in Switzerland. Using data obtained from Foursquare over 330 days, we present a descriptive analysis of linguistic differences and similarities across five urban agglomerations in a multicultural, western European country.", "title": "" }, { "docid": "2a13609a94050c4477d94cf0d89cbdd3", "text": "In this work, we introduce the average top-k (ATk) loss as a new aggregate loss for supervised learning, which is the average over the k largest individual losses over a training dataset. We show that the ATk loss is a natural generalization of the two widely used aggregate losses, namely the average loss and the maximum loss, but can combine their advantages and mitigate their drawbacks to better adapt to different data distributions. Furthermore, it remains a convex function over all individual losses, which can lead to convex optimization problems that can be solved effectively with conventional gradient-based methods. We provide an intuitive interpretation of the ATk loss based on its equivalent effect on the continuous individual loss functions, suggesting that it can reduce the penalty on correctly classified data. We further give a learning theory analysis of MATk learning on the classification calibration of the ATk loss and the error bounds of ATk-SVM. We demonstrate the applicability of minimum average top-k learning for binary classification and regression using synthetic and real datasets.", "title": "" }, { "docid": "76791240fa26fef46578d600bfd7f665", "text": "PURPOSE\nTo investigate the effectiveness of a multistation proprioceptive exercise program for the prevention of ankle injuries in basketball players using a prospective randomized controlled trial in combination with biomechanical tests of neuromuscular performance.\n\n\nMETHODS\nA total of 232 players participated in the study and were randomly assigned to a training or control group following the CONSORT statement. The training group performed a multistation proprioceptive exercise program, and the control group continued with their normal workout routines. During one competitive basketball season, the number of ankle injuries was counted and related to the number of sports participation sessions using logistic regression. Additional biomechanical pre–post tests (angle reproduction and postural sway) were performed in both groups to investigate the effects on neuromuscular performance.\n\n\nRESULTS\nIn the control group, 21 injuries occurred, whereas in the training group, 7 injuries occurred. The risk for sustaining an ankle injury was significantly reduced in the training group by approximately 65%. [corrected] The corresponding number needed to treat was 7. Additional biomechanical tests revealed significant improvements in joint position sense and single-limb stance in the training group.\n\n\nCONCLUSIONS\nThe multistation proprioceptive exercise program effectively prevented ankle injuries in basketball players. Analysis of number needed to treat clearly showed the relatively low prevention effort that is necessary to avoid an ankle injury. Additional biomechanical tests confirmed the neuromuscular effect and confirmed a relationship between injury prevention and altered neuromuscular performance. With this knowledge, proprioceptive training may be optimized to specifically address the demands in various athletic activities.", "title": "" }, { "docid": "343dd7c6bb6751eb0368da729c2b704a", "text": "The coupling of computer science and theoretical bases such as nonlinear dynamics and chaos theory allows the creation of 'intelligent' agents, such as artificial neural networks (ANNs), able to adapt themselves dynamically to problems of high complexity. ANNs are able to reproduce the dynamic interaction of multiple factors simultaneously, allowing the study of complexity; they can also draw conclusions on individual basis and not as average trends. These tools can offer specific advantages with respect to classical statistical techniques. This article is designed to acquaint gastroenterologists with concepts and paradigms related to ANNs. The family of ANNs, when appropriately selected and used, permits the maximization of what can be derived from available data and from complex, dynamic, and multidimensional phenomena, which are often poorly predictable in the traditional 'cause and effect' philosophy.", "title": "" }, { "docid": "accebc4ebc062f9676977b375e0c4f32", "text": "Microtask crowdsourcing organizes complex work into workflows, decomposing large tasks into small, relatively independent microtasks. Applied to software development, this model might increase participation in open source software development by lowering the barriers to contribu-tion and dramatically decrease time to market by increasing the parallelism in development work. To explore this idea, we have developed an approach to decomposing programming work into microtasks. Work is coordinated through tracking changes to a graph of artifacts, generating appropriate microtasks and propagating change notifications to artifacts with dependencies. We have implemented our approach in CrowdCode, a cloud IDE for crowd development. To evaluate the feasibility of microtask programming, we performed a small study and found that a small crowd of 12 workers was able to successfully write 480 lines of code and 61 unit tests in 14.25 person-hours of time.", "title": "" }, { "docid": "ca659ea60b5d7c214460b32fe5aa3837", "text": "Address Decoder is an important digital block in SRAM which takes up to half of the total chip access time and significant part of the total SRAM power in normal read/write cycle. To design address decoder need to consider two objectives, first choosing the optimal circuit technique and second sizing of their transistors. Novel address decoder circuit is presented and analysed in this paper. Address decoder using NAND-NOR alternate stages with predecoder and replica inverter chain circuit is proposed and compared with traditional and universal block architecture, using 90nm CMOS technology. Delay and power dissipation in proposed decoder is 60.49% and 52.54% of traditional and 82.35% and 73.80% of universal block architecture respectively.", "title": "" }, { "docid": "47ef46ef69a23e393d8503154f110a81", "text": "Question answering (Q&A) communities have been gaining popularity in the past few years. The success of such sites depends mainly on the contribution of a small number of expert users who provide a significant portion of the helpful answers, and so identifying users that have the potential of becoming strong contributers is an important task for owners of such communities.\n We present a study of the popular Q&A website StackOverflow (SO), in which users ask and answer questions about software development, algorithms, math and other technical topics. The dataset includes information on 3.5 million questions and 6.9 million answers created by 1.3 million users in the years 2008--2012. Participation in activities on the site (such as asking and answering questions) earns users reputation, which is an indicator of the value of that user to the site.\n We describe an analysis of the SO reputation system, and the participation patterns of high and low reputation users. The contributions of very high reputation users to the site indicate that they are the primary source of answers, and especially of high quality answers. Interestingly, we find that while the majority of questions on the site are asked by low reputation users, on average a high reputation user asks more questions than a user with low reputation. We consider a number of graph analysis methods for detecting influential and anomalous users in the underlying user interaction network, and find they are effective in detecting extreme behaviors such as those of spam users. Lastly, we show an application of our analysis: by considering user contributions over first months of activity on the site, we predict who will become influential long-term contributors.", "title": "" }, { "docid": "19d8b6ff70581307e0a00c03b059964f", "text": "We propose a novel approach for analysing time series using complex network theory. We identify the recurrence matrix (calculated from time series) with the adjacency matrix of a complex network and apply measures for the characterisation of complex networks to this recurrence matrix. By using the logistic map, we illustrate the potential of these complex network measures for the detection of dynamical transitions. Finally, we apply the proposed approach to a marine palaeo-climate record and identify the subtle changes to the climate regime.", "title": "" }, { "docid": "0e02a468a65909b93d3876f30a247ab1", "text": "Implant therapy can lead to peri-implantitis, and none of the methods used to treat this inflammatory response have been predictably effective. It is nearly impossible to treat infected surfaces such as TiUnite (a titanium oxide layer) that promote osteoinduction, but finding an effective way to do so is essential. Experiments were conducted to determine the optimum irradiation power for stripping away the contaminated titanium oxide layer with Er:YAG laser irradiation, the degree of implant heating as a result of Er:YAG laser irradiation, and whether osseointegration was possible after Er:YAG laser microexplosions were used to strip a layer from the surface of implants placed in beagle dogs. The Er:YAG laser was effective at removing an even layer of titanium oxide, and the use of water spray limited heating of the irradiated implant, thus protecting the surrounding bone tissue from heat damage.", "title": "" }, { "docid": "745a89e24f439b6f31cdadea25386b17", "text": "Developmental imaging studies show that cortical grey matter decreases in volume during childhood and adolescence. However, considerably less research has addressed the development of subcortical regions (caudate, putamen, pallidum, accumbens, thalamus, amygdala, hippocampus and the cerebellar cortex), in particular not in longitudinal designs. We used the automatic labeling procedure in FreeSurfer to estimate the developmental trajectories of the volume of these subcortical structures in 147 participants (age 7.0-24.3years old, 94 males; 53 females) of whom 53 participants were scanned twice or more. A total of 223 magnetic resonance imaging (MRI) scans (acquired at 1.5-T) were analyzed. Substantial diversity in the developmental trajectories was observed between the different subcortical gray matter structures: the volume of caudate, putamen and nucleus accumbens decreased with age, whereas the volume of hippocampus, amygdala, pallidum and cerebellum showed an inverted U-shaped developmental trajectory. The thalamus showed an initial small increase in volume followed by a slight decrease. All structures had a larger volume in males than females over the whole age range, except for the cerebellum that had a sexually dimorphic developmental trajectory. Thus, subcortical structures appear to not yet be fully developed in childhood, similar to the cerebral cortex, and continue to show maturational changes into adolescence. In addition, there is substantial heterogeneity between the developmental trajectories of these structures.", "title": "" }, { "docid": "6aee20acd54b5d6f2399106075c9fee1", "text": "BACKGROUND\nThe aim of this study was to compare the effectiveness of the ampicillin plus ceftriaxone (AC) and ampicillin plus gentamicin (AG) combinations for treating Enterococcus faecalis infective endocarditis (EFIE).\n\n\nMETHODS\nAn observational, nonrandomized, comparative multicenter cohort study was conducted at 17 Spanish and 1 Italian hospitals. Consecutive adult patients diagnosed of EFIE were included. Outcome measurements were death during treatment and at 3 months of follow-up, adverse events requiring treatment withdrawal, treatment failure requiring a change of antimicrobials, and relapse.\n\n\nRESULTS\nA larger percentage of AC-treated patients (n = 159) had previous chronic renal failure than AG-treated patients (n = 87) (33% vs 16%, P = .004), and AC patients had a higher incidence of cancer (18% vs 7%, P = .015), transplantation (6% vs 0%, P = .040), and healthcare-acquired infection (59% vs 40%, P = .006). Between AC and AG-treated EFIE patients, there were no differences in mortality while on antimicrobial treatment (22% vs 21%, P = .81) or at 3-month follow-up (8% vs 7%, P = .72), in treatment failure requiring a change in antimicrobials (1% vs 2%, P = .54), or in relapses (3% vs 4%, P = .67). However, interruption of antibiotic treatment due to adverse events was much more frequent in AG-treated patients than in those receiving AC (25% vs 1%, P < .001), mainly due to new renal failure (≥25% increase in baseline creatinine concentration; 23% vs 0%, P < .001).\n\n\nCONCLUSIONS\nAC appears as effective as AG for treating EFIE patients and can be used with virtually no risk of renal failure and regardless of the high-level aminoglycoside resistance status of E. faecalis.", "title": "" } ]
scidocsrr
4161a47d40b6ff09d0bff26cd2e55295
Detecting Changes in Twitter Streams using Temporal Clusters of Hashtags
[ { "docid": "c0235dd0dc574f18c6f11e1afc7c4903", "text": "Today streaming text mining plays an important role within real-time social media mining. Given the amount and cadence of the data generated by those platforms, classical text mining techniques are not suitable to deal with such new mining challenges. Event detection is no exception, available algorithms rely on text mining techniques applied to pre-known datasets processed with no restrictions about computational complexity and required execution time per document analysis. This work presents a lightweight event detection using wavelet signal analysis of hashtag occurrences in the twitter public stream. It also proposes a strategy to describe detected events using a Latent Dirichlet Allocation topic inference model based on Gibbs Sampling. Peak detection using Continuous Wavelet Transformation achieved good results in the identification of abrupt increases on the mentions of specific hashtags. The combination of this method with the extraction of topics from tweets with hashtag mentions proved to be a viable option to summarize detected twitter events in streaming environments.", "title": "" }, { "docid": "18738a644f88af299d9e94157f804812", "text": "Twitter is among the fastest-growing microblogging and online social networking services. Messages posted on Twitter (tweets) have been reporting everything from daily life stories to the latest local and global news and events. Monitoring and analyzing this rich and continuous user-generated content can yield unprecedentedly valuable information, enabling users and organizations to acquire actionable knowledge. This article provides a survey of techniques for event detection from Twitter streams. These techniques aim at finding real-world occurrences that unfold over space and time. In contrast to conventional media, event detection from Twitter streams poses new challenges. Twitter streams contain large amounts of meaningless messages and polluted content, which negatively affect the detection performance. In addition, traditional text mining techniques are not suitable, because of the short length of tweets, the large number of spelling and grammatical errors, and the frequent use of informal and mixed language. Event detection techniques presented in literature address these issues by adapting techniques from various fields to the uniqueness of Twitter. This article classifies these techniques according to the event type, detection task, and detection method and discusses commonly used features. Finally, it highlights the need for public benchmarks to evaluate the performance of different detection approaches and various features.", "title": "" } ]
[ { "docid": "2a4eb6d12a50034b5318d246064cb86e", "text": "In this paper, we study the 3D volumetric modeling problem by adopting the Wasserstein introspective neural networks method (WINN) that was previously applied to 2D static images. We name our algorithm 3DWINN which enjoys the same properties as WINN in the 2D case: being simultaneously generative and discriminative. Compared to the existing 3D volumetric modeling approaches, 3DWINN demonstrates competitive results on several benchmarks in both the generation and the classification tasks. In addition to the standard inception score, the Fréchet Inception Distance (FID) metric is also adopted to measure the quality of 3D volumetric generations. In addition, we study adversarial attacks for volumetric data and demonstrate the robustness of 3DWINN against adversarial examples while achieving appealing results in both classification and generation within a single model. 3DWINN is a general framework and it can be applied to the emerging tasks for 3D object and scene modeling.", "title": "" }, { "docid": "befd91b3e6874b91249d101f8373db01", "text": "Today's biomedical research has become heavily dependent on access to the biological knowledge encoded in expert curated biological databases. As the volume of biological literature grows rapidly, it becomes increasingly difficult for biocurators to keep up with the literature because manual curation is an expensive and time-consuming endeavour. Past research has suggested that computer-assisted curation can improve efficiency, but few text-mining systems have been formally evaluated in this regard. Through participation in the interactive text-mining track of the BioCreative 2012 workshop, we developed PubTator, a PubMed-like system that assists with two specific human curation tasks: document triage and bioconcept annotation. On the basis of evaluation results from two external user groups, we find that the accuracy of PubTator-assisted curation is comparable with that of manual curation and that PubTator can significantly increase human curatorial speed. These encouraging findings warrant further investigation with a larger number of publications to be annotated. Database URL: http://www.ncbi.nlm.nih.gov/CBBresearch/Lu/Demo/PubTator/", "title": "" }, { "docid": "ab47dbcafba637ae6e3b474642439bd3", "text": "Ear detection from a profile face image is an important step in many applications including biometric recognition. But accurate and rapid detection of the ear for real-time applications is a challenging task, particularly in the presence of occlusions. In this work, a cascaded AdaBoost based ear detection approach is proposed. In an experiment with a test set of 203 profile face images, all the ears were accurately detected by the proposed detector with a very low (5 x 10-6) false positive rate. It is also very fast and relatively robust to the presence of occlusions and degradation of the ear images (e.g. motion blur). The detection process is fully automatic and does not require any manual intervention.", "title": "" }, { "docid": "8f8bd08f73ee191a1f826fa0d61ff149", "text": "We propose an algorithm for designing linear equalizers that maximize the structural similarity (SSIM) index between the reference and restored signals. The SSIM index has enjoyed considerable application in the evaluation of image processing algorithms. Algorithms, however, have not been designed yet to explicitly optimize for this measure. The design of such an algorithm is nontrivial due to the nonconvex nature of the distortion measure. In this paper, we reformulate the nonconvex problem as a quasi-convex optimization problem, which admits a tractable solution. We compute the optimal solution in near closed form, with complexity of the resulting algorithm comparable to complexity of the linear minimum mean squared error (MMSE) solution, independent of the number of filter taps. To demonstrate the usefulness of the proposed algorithm, it is applied to restore images that have been blurred and corrupted with additive white gaussian noise. As a special case, we consider blur-free image denoising. In each case, its performance is compared to a locally adaptive linear MSE-optimal filter. We show that the images denoised and restored using the SSIM-optimal filter have higher SSIM index, and superior perceptual quality than those restored using the MSE-optimal adaptive linear filter. Through these results, we demonstrate that a) designing image processing algorithms, and, in particular, denoising and restoration-type algorithms, can yield significant gains over existing (in particular, linear MMSE-based) algorithms by optimizing them for perceptual distortion measures, and b) these gains may be obtained without significant increase in the computational complexity of the algorithm.", "title": "" }, { "docid": "07015d54df716331e42613e547e74771", "text": "A complex computing problem may be efficiently solved on a system with multiple processing elements by dividing its implementation code into several tasks or modules that execute in parallel. The modules may then be assigned to and scheduled on the processing elements so that the total execution time is minimum. Finding an optimal schedule for parallel programs is a non-trivial task and is considered to be NP-complete. For heterogeneous systems having processors with different characteristics, most of the scheduling algorithms use greedy approach to assign processors to the modules. This paper suggests a novel approach called constrained earliest finish time (CEFT) to provide better schedules for heterogeneous systems using the concept of the constrained critical paths (CCPs). In contrast to other approaches used for heterogeneous systems, the CEFT strategy takes into account a broader view of the input task graph. Furthermore, the statically generated CCPs may be efficiently scheduled in comparison with other approaches. The experimentation results show that the CEFT scheduling strategy outperforms the well-known HEFT, DLS and LMT strategies by producing shorter schedules for a diverse collection of task graphs. 2012 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "c2177b7e3cdca3800b3d465229835949", "text": "BACKGROUND\nIn 2010, the World Health Organization published benchmarks for training in osteopathy in which osteopathic visceral techniques are included. The purpose of this study was to identify and critically appraise the scientific literature concerning the reliability of diagnosis and the clinical efficacy of techniques used in visceral osteopathy.\n\n\nMETHODS\nDatabases MEDLINE, OSTMED.DR, the Cochrane Library, Osteopathic Research Web, Google Scholar, Journal of American Osteopathic Association (JAOA) website, International Journal of Osteopathic Medicine (IJOM) website, and the catalog of Académie d'ostéopathie de France website were searched through December 2017. Only inter-rater reliability studies including at least two raters or the intra-rater reliability studies including at least two assessments by the same rater were included. For efficacy studies, only randomized-controlled-trials (RCT) or crossover studies on unhealthy subjects (any condition, duration and outcome) were included. Risk of bias was determined using a modified version of the quality appraisal tool for studies of diagnostic reliability (QAREL) in reliability studies. For the efficacy studies, the Cochrane risk of bias tool was used to assess their methodological design. Two authors performed data extraction and analysis.\n\n\nRESULTS\nEight reliability studies and six efficacy studies were included. The analysis of reliability studies shows that the diagnostic techniques used in visceral osteopathy are unreliable. Regarding efficacy studies, the least biased study shows no significant difference for the main outcome. The main risks of bias found in the included studies were due to the absence of blinding of the examiners, an unsuitable statistical method or an absence of primary study outcome.\n\n\nCONCLUSIONS\nThe results of the systematic review lead us to conclude that well-conducted and sound evidence on the reliability and the efficacy of techniques in visceral osteopathy is absent.\n\n\nTRIAL REGISTRATION\nThe review is registered PROSPERO 12th of December 2016. Registration number is CRD4201605286 .", "title": "" }, { "docid": "bd3ba8635a8cd2112a1de52c90e2a04b", "text": "Neural Machine Translation (NMT) is a new technique for machine translation that has led to remarkable improvements compared to rule-based and statistical machine translation (SMT) techniques, by overcoming many of the weaknesses in the conventional techniques. We study and apply NMT techniques to create a system with multiple models which we then apply for six Indian language pairs. We compare the performances of our NMT models with our system using automatic evaluation metrics such as UNK Count, METEOR, F-Measure, and BLEU. We find that NMT techniques are very effective for machine translations of Indian language pairs. We then demonstrate that we can achieve good accuracy even using a shallow network; on comparing the performance of Google Translate on our test dataset, our best model outperformed Google Translate by a margin of 17 BLEU points on Urdu-Hindi, 29 BLEU points on Punjabi-Hindi, and 30 BLEU points on Gujarati-Hindi translations.", "title": "" }, { "docid": "6547b8d856a742925936ae20bdbf3543", "text": "In this work we present a visual servoing approach that enables a humanoid robot to robustly execute dual arm grasping and manipulation tasks. Therefore the target object(s) and both hands are tracked alternately and a combined open-/ closed-loop controller is used for positioning the hands with respect to the target(s). We address the perception system and how the observable workspace can be increased by using an active vision system on a humanoid head. Furthermore a control framework for reactive positioning of both hands using position based visual servoing is presented, where the sensor data streams coming from the vision system, the joint encoders and the force/torque sensors are fused and joint velocity values are generated. This framework can be used for bimanual grasping as well as for two handed manipulations which is demonstrated with the humanoid robot Armar-III that executes grasping and manipulation tasks in a kitchen environment.", "title": "" }, { "docid": "e2e47bef900599b0d7b168e02acf7e88", "text": "Reflection seismic data from the F3 block in the Dutch North Sea exhibits many largeamplitude reflections at shallow horizons, typically categorized as “brightspots ” (Schroot and Schuttenhelm, 2003), mainly because of their bright appearance. In most cases, these bright reflections show a significant “flatness” contrasting with local structural trends. While flatspots are often easily identified in thick reservoirs, we have often occasionally observed apparent flatspot tuning effects at fluid contacts near reservoir edges and in thin reservoir beds, while only poorly understanding them. We conclude that many of the shallow large-amplitude reflections in block F3 are dominated by flatspots, and we investigate the thin-bed tuning effects that such flatspots cause as they interact with the reflection from the reservoir’s upper boundary. There are two possible effects to be considered: (1) the “wedge-model” tuning effects of the flatspot and overlying brightspots, dimspots, or polarity-reversals; and (2) the stacking effects that result from possible inclusion of post-critical flatspot reflections in these shallow sands. We modeled the effects of these two phenomena for the particular stratigraphic sequence in block F3. Our results suggest that stacking of post-critical flatspot reflections can cause similar large-amplitude but flat reflections, in some cases even causing an interface expected to produce a ‘dimspot’ to appear as a ‘brightspot’. Analysis of NMO stretch and muting shows the likely exclusion of critical offset data in stacked output. If post-critical reflections are included in stacking, unusual results will be observed. In the North Sea case, we conclude the tuning effect was the primary reason causing for the brightness and flatness of these reflections. However, it is still important to note that care should be taken while applying muting on reflections with wide range of incidence angles and the inclusion of critical offset data may cause some spurious features in the stacked section.", "title": "" }, { "docid": "d69d694eadb068dc019dce0eb51d5322", "text": "In this paper the application of image prior combinations to the Bayesian Super Resolution (SR) image registration and reconstruction problem is studied. Two sparse image priors, a Total Variation (TV) prior and a prior based on the `1 norm of horizontal and vertical first order differences (f.o.d.), are combined with a non-sparse Simultaneous Auto Regressive (SAR) prior. Since, for a given observation model, each prior produces a different posterior distribution of the underlying High Resolution (HR) image, the use of variational approximation will produce as many posterior approximations as priors we want to combine. A unique approximation is obtained here by finding the distribution on the HR image given the observations that minimizes a linear convex combination of Kullback-Leibler (KL) divergences. We find this distribution in closed form. The estimated HR images are compared with the ones obtained by other SR reconstruction methods.", "title": "" }, { "docid": "2aa9d6eb5c8e3fd62541a562530352a2", "text": "In the last few years, we have seen an exponential increase in the number of Internet-enabled devices, which has resulted in popularity of fog and cloud computing among end users. End users expect high data rates coupled with secure data access for various applications executed either at the edge (fog computing) or in the core network (cloud computing). However, the bidirectional data flow between the end users and the devices located at either the edge or core may cause congestion at the cloud data centers, which are used mainly for data storage and data analytics. The high mobility of devices (e.g., vehicles) may also pose additional challenges with respect to data availability and processing at the core data centers. Hence, there is a need to have most of the resources available at the edge of the network to ensure the smooth execution of end-user applications. Considering the challenges of future user demands, we present an architecture that integrates cloud and fog computing in the 5G environment that works in collaboration with the advanced technologies such as SDN and NFV with the NSC model. The NSC service model helps to automate the virtual resources by chaining in a series for fast computing in both computing technologies. The proposed architecture also supports data analytics and management with respect to device mobility. Moreover, we also compare the core and edge computing with respect to the type of hypervisors, virtualization, security, and node heterogeneity. By focusing on nodes' heterogeneity at the edge or core in the 5G environment, we also present security challenges and possible types of attacks on the data shared between different devices in the 5G environment.", "title": "" }, { "docid": "cbdb038d8217ec2e0c4174519d6f2012", "text": "Many information retrieval algorithms rely on the notion of a good distance that allows to efficiently compare objects of different nature. Recently, a new promising metric called Word Mover’s Distance was proposed to measure the divergence between text passages. In this paper, we demonstrate that this metric can be extended to incorporate term-weighting schemes and provide more accurate and computationally efficient matching between documents using entropic regularization. We evaluate the benefits of both extensions in the task of cross-lingual document retrieval (CLDR). Our experimental results on eight CLDR problems suggest that the proposed methods achieve remarkable improvements in terms of Mean Reciprocal Rank compared to several baselines.", "title": "" }, { "docid": "6886b42b7624d2a47466d7356973f26c", "text": "Conventional on-off keyed signals, such as return-to-zero (RZ) and nonreturn-to-zero (NRZ) signals are susceptible to cross-gain modulation (XGM) in semiconductor optical amplifiers (SOAs) due to pattern effect. In this letter, XGM effect of Manchester-duobinary, RZ differential phase-shift keying (RZ-DPSK), NRZ-DPSK, RZ, and NRZ signals in SOAs were compared. The experimental results confirmed the reduction of crosstalk penalty in SOAs by using Manchester-duobinary signals", "title": "" }, { "docid": "4f6979ca99ec7fb0010fd102e7796248", "text": "Cryptographic systems are essential for computer and communication security, for instance, RSA is used in PGP Email clients and AES is employed in full disk encryption. In practice, the cryptographic keys are loaded and stored in RAM as plain-text, and therefore vulnerable to physical memory attacks (e.g., cold-boot attacks). To tackle this problem, we propose Copker, which implements asymmetric cryptosystems entirely within the CPU, without storing plain-text private keys in the RAM. In its active mode, Copker stores kilobytes of sensitive data, including the private key and the intermediate states, only in onchip CPU caches (and registers). Decryption/signing operations are performed without storing sensitive information in system memory. In the suspend mode, Copker stores symmetrically encrypted private keys in memory, while employs existing solutions to keep the key-encryption key securely in CPU registers. Hence, Copker releases the system resources in the suspend mode. In this paper, we implement Copker with the most common asymmetric cryptosystem, RSA, with the support of multiple private keys. We show that Copker provides decryption/signing services that are secure against physical memory attacks. Meanwhile, with intensive experiments, we demonstrate that our implementation of Copker is secure and requires reasonable overhead. Keywords—Cache-as-RAM; cold-boot attack; key management; asymmetric cryptography implementation.", "title": "" }, { "docid": "b0f13c59bb4ba0f81ebc86373ad80d81", "text": "3D-stacked memory devices with processing logic can help alleviate the memory bandwidth bottleneck in GPUs. However, in order for such Near-Data Processing (NDP) memory stacks to be used for different GPU architectures, it is desirable to standardize the NDP architecture. Our proposal enables this standardization by allowing data to be spread across multiple memory stacks as is the norm in high-performance systems without an MMU on the NDP stack. The keys to this architecture are the ability to move data between memory stacks as required for computation, and a partitioned execution mechanism that offloads memory-intensive application segments onto the NDP stack and decouples address translation from DRAM accesses. By enhancing this system with a smart offload selection mechanism that is cognizant of the compute capability of the NDP and cache locality on the host processor, system performance and energy are improved by up to 66.8% and 37.6%, respectively.", "title": "" }, { "docid": "a65d67cdd3206a99f91774ae983064b4", "text": "BACKGROUND\nIn recent years there has been a progressive rise in the number of asylum seekers and refugees displaced from their country of origin, with significant social, economic, humanitarian and public health implications. In this population, up-to-date information on the rate and characteristics of mental health conditions, and on interventions that can be implemented once mental disorders have been identified, are needed. This umbrella review aims at systematically reviewing existing evidence on the prevalence of common mental disorders and on the efficacy of psychosocial and pharmacological interventions in adult and children asylum seekers and refugees resettled in low, middle and high income countries.\n\n\nMETHODS\nWe conducted an umbrella review of systematic reviews summarizing data on the prevalence of common mental disorders and on the efficacy of psychosocial and pharmacological interventions in asylum seekers and/or refugees. Methodological quality of the included studies was assessed with the AMSTAR checklist.\n\n\nRESULTS\nThirteen reviews reported data on the prevalence of common mental disorders while fourteen reviews reported data on the efficacy of psychological or pharmacological interventions. Although there was substantial variability in prevalence rates, we found that depression and anxiety were at least as frequent as post-traumatic stress disorder, accounting for up to 40% of asylum seekers and refugees. In terms of psychosocial interventions, cognitive behavioral interventions, in particular narrative exposure therapy, were the most studied interventions with positive outcomes against inactive but not active comparators.\n\n\nCONCLUSIONS\nCurrent epidemiological data needs to be expanded with more rigorous studies focusing not only on post-traumatic stress disorder but also on depression, anxiety and other mental health conditions. In addition, new studies are urgently needed to assess the efficacy of psychosocial interventions when compared not only with no treatment but also each other. Despite current limitations, existing epidemiological and experimental data should be used to develop specific evidence-based guidelines, possibly by international independent organizations, such as the World Health Organization or the United Nations High Commission for Refugees. Guidelines should be applicable to different organizations of mental health care, including low and middle income countries as well as high income countries.", "title": "" }, { "docid": "a7747c3329f26833e01ade020b45eaeb", "text": "The objective of this paper is to present the role of Ontology Learning Process in supporting an ontology engineer for creating and maintaining ontologies from textual resources. The knowledge structures that interest us are legal domain-specific ontologies. We will use these ontologies to build legal domain ontology for a Lebanese legal knowledge based system. The domain application of this work is the Lebanese criminal system. Ontologies can be learnt from various sources, such as databases, structured and unstructured documents. Here, the focus is on the acquisition of ontologies from unstructured text, provided as input. In this work, the Ontology Learning Process represents a knowledge extraction phase using Natural Language Processing techniques. The resulted ontology is considered as inexpressive ontology. There is a need to reengineer it in order to build a complete, correct and more expressive domain-specific ontology.", "title": "" }, { "docid": "ad2655aaed8a4f3379cb206c6e405f16", "text": "Lesions of the orbital frontal lobe, particularly its medial sectors, are known to cause deficits in empathic ability, whereas the role of this region in theory of mind processing is the subject of some controversy. In a functional magnetic resonance imaging study with healthy participants, emotional perspective-taking was contrasted with cognitive perspective-taking in order to examine the role of the orbital frontal lobe in subcomponents of theory of mind processing. Subjects responded to a series of scenarios presented visually in three conditions: emotional perspective-taking, cognitive perspective-taking and a control condition that required inferential reasoning, but not perspective-taking. Group results demonstrated that the medial orbitofrontal lobe, defined as Brodmann's areas 11 and 25, was preferentially involved in emotional as compared to cognitive perspective-taking. This finding is both consistent with the lesion literature, and resolves the inconsistency of orbital frontal findings in the theory of mind literature.", "title": "" }, { "docid": "d60ea5f80654adeb4442f6aaa0c2f164", "text": "Repetition and semantic-associative priming effects have been demonstrated for words in nonstructured contexts (i.e., word pairs or lists of words) in numerous behavioral and electrophysiological studies. The processing of a word has thus been shown to benefit from the prior presentation of an identical or associated word in the absence of a constraining context. An examination of such priming effects for words that are embedded within a meaningful discourse context provides information about the interaction of different levels of linguistic analysis. This article reviews behavioral and electrophysiological research that has examined the processing of repeated and associated words in sentence and discourse contexts. It provides examples of the ways in which eye tracking and event-related potentials might be used to further explore priming effects in discourse. The modulation of lexical priming effects by discourse factors suggests the interaction of information at different levels in online language comprehension.", "title": "" }, { "docid": "0624dd3af2c1df013783b76a6ce0c7b3", "text": "In SAC'05, Strangio proposed protocol ECKE- 1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication. In this letter, we show that protocol ECKE-1 is vulnerable to key-compromise impersonation attacks. We also present an improved protocol - ECKE-1N, which can withstand such attacks. The new protocol's performance is comparable to the well-known MQV protocol and maintains the same remarkable list of security properties.", "title": "" } ]
scidocsrr
b25bee05a0985e3121c97c818613abb5
Haggle: Seamless Networking for Mobile Applications
[ { "docid": "0763497a09f54e2d49a03e262dcc7b6e", "text": "Content-based subscription systems are an emerging alternative to traditional publish-subscribe systems, because they permit more flexible subscriptions along multiple dimensions. In these systems, each subscription is a predicate which may test arbitrary attributes within an event. However, the matching problem for content-based systems — determining for each event the subset of all subscriptions whose predicates match the event — is still an open problem. We present an efficient, scalable solution to the matching problem. Our solution has an expected time complexity that is sub-linear in the number of subscriptions, and it has a space complexity that is linear. Specifically, we prove that for predicates reducible to conjunctions of elementary tests, the expected time to match a random event is no greater than O(N ) where N is the number of subscriptions, and is a closed-form expression that depends on the number and type of attributes (in some cases, 1=2). We present some optimizations to our algorithms that improve the search time. We also present the results of simulations that validate the theoretical bounds and that show acceptable performance levels for tens of thousands of subscriptions. Department of Computer Science, Cornell University, Ithaca, N.Y. 14853-7501, aguilera@cs.cornell.edu IBM T.J. Watson Research Center, Yorktown Heights, N.Y. 10598, fstrom, sturman, tusharg@watson.ibm.com Department of Computer Science, University of Illinois at Urbana-Champaign, 1304 W. Springfield Ave, Urbana, I.L. 61801, astley@cs.uiuc.edu", "title": "" } ]
[ { "docid": "7d3f0c22674ac3febe309c2440ad3d90", "text": "MAC address randomization is a common privacy protection measure deployed in major operating systems today. It is used to prevent user-tracking with probe requests that are transmitted during IEEE 802.11 network scans. We present an attack to defeat MAC address randomization through observation of the timings of the network scans with an off-the-shelf Wi-Fi interface. This attack relies on a signature based on inter-frame arrival times of probe requests, which is used to group together frames coming from the same device although they use distinct MAC addresses. We propose several distance metrics based on timing and use them together with an incremental learning algorithm in order to group frames. We show that these signatures are consistent over time and can be used as a pseudo-identifier to track devices. Our framework is able to correctly group frames using different MAC addresses but belonging to the same device in up to 75% of the cases. These results show that the timing of 802.11 probe frames can be abused to track individual devices and that address randomization alone is not always enough to protect users against tracking.", "title": "" }, { "docid": "0dddf6b52dd45035cf6caa4ac7d43bac", "text": "The performance of switching devices such as display driver ICs is degraded by large power supply noise at switching frequencies from a few hundreds of kilohertz to a few megahertz. In order to minimize the power supply noise, a low-dropout (LDO) regulator with higher power supply rejection (PSR) is essential. In this brief, a capless LDO regulator with a negative capacitance circuit and voltage damper is proposed for enhancing PSR and figure of merit (FOM), respectively, in switching devices. The proposed LDO regulator is fabricated in a $0.18~\\boldsymbol {\\mu }\\text{m}$ CMOS. Measurement results show that the proposed LDO regulator achieves −76 dB PSR at 1 MHz and 96.3 fs FOM with a total on-chip capacitance of as small as 12.7 pF.", "title": "" }, { "docid": "b0709248d08564b7d1a1f23243aa0946", "text": "TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-time protection of the OS kernel using the ARM TrustZone secure world. TZ-RKP is more secure than current approaches that use hypervisors to host kernel protection tools. Although hypervisors provide privilege and isolation, they face fundamental security challenges due to their growing complexity and code size. TZ-RKP puts its security monitor, which represents its entire Trusted Computing Base (TCB), in the TrustZone secure world; a safe isolated environment that is dedicated to security services. Hence, the security monitor is safe from attacks that can potentially compromise the kernel, which runs in the normal world. Using the secure world for kernel protection has been crippled by the lack of control over targets that run in the normal world. TZ-RKP solves this prominent challenge using novel techniques that deprive the normal world from the ability to control certain privileged system functions. These functions are forced to route through the secure world for inspection and approval before being executed. TZ-RKP's control of the normal world is non-bypassable. It can effectively stop attacks that aim at modifying or injecting kernel binaries. It can also stop attacks that involve modifying the system memory layout, e.g, through memory double mapping. This paper presents the implementation and evaluation of TZ-RKP, which has gone through rigorous and thorough evaluation of effectiveness and performance. It is currently deployed on the latest models of the Samsung Galaxy series smart phones and tablets, which clearly demonstrates that it is a practical real-world system.", "title": "" }, { "docid": "511149c5713b3d40f61814e4db6acec0", "text": "BACKGROUND\nVitamin K antagonists are highly effective in preventing stroke in patients with atrial fibrillation but have several limitations. Apixaban is a novel oral direct factor Xa inhibitor that has been shown to reduce the risk of stroke in a similar population in comparison with aspirin.\n\n\nMETHODS\nIn this randomized, double-blind trial, we compared apixaban (at a dose of 5 mg twice daily) with warfarin (target international normalized ratio, 2.0 to 3.0) in 18,201 patients with atrial fibrillation and at least one additional risk factor for stroke. The primary outcome was ischemic or hemorrhagic stroke or systemic embolism. The trial was designed to test for noninferiority, with key secondary objectives of testing for superiority with respect to the primary outcome and to the rates of major bleeding and death from any cause.\n\n\nRESULTS\nThe median duration of follow-up was 1.8 years. The rate of the primary outcome was 1.27% per year in the apixaban group, as compared with 1.60% per year in the warfarin group (hazard ratio with apixaban, 0.79; 95% confidence interval [CI], 0.66 to 0.95; P<0.001 for noninferiority; P=0.01 for superiority). The rate of major bleeding was 2.13% per year in the apixaban group, as compared with 3.09% per year in the warfarin group (hazard ratio, 0.69; 95% CI, 0.60 to 0.80; P<0.001), and the rates of death from any cause were 3.52% and 3.94%, respectively (hazard ratio, 0.89; 95% CI, 0.80 to 0.99; P=0.047). The rate of hemorrhagic stroke was 0.24% per year in the apixaban group, as compared with 0.47% per year in the warfarin group (hazard ratio, 0.51; 95% CI, 0.35 to 0.75; P<0.001), and the rate of ischemic or uncertain type of stroke was 0.97% per year in the apixaban group and 1.05% per year in the warfarin group (hazard ratio, 0.92; 95% CI, 0.74 to 1.13; P=0.42).\n\n\nCONCLUSIONS\nIn patients with atrial fibrillation, apixaban was superior to warfarin in preventing stroke or systemic embolism, caused less bleeding, and resulted in lower mortality. (Funded by Bristol-Myers Squibb and Pfizer; ARISTOTLE ClinicalTrials.gov number, NCT00412984.).", "title": "" }, { "docid": "6f00b925e8330fe3d673d8ed9fd646bb", "text": "There is an increasing amount of evidence that during mental fatigue, shifts in motivation drive performance rather than reductions in finite mental energy. So far, studies that investigated such an approach have mainly focused on cognitive indicators of task engagement that were measured during controlled tasks, offering limited to no alternative stimuli. Therefore it remained unclear whether during fatigue, attention is diverted to stimuli that are unrelated to the task, or whether fatigued individuals still focused on the task but were unable to use their cognitive resources efficiently. With a combination of subjective, EEG, pupil, eye-tracking, and performance measures the present study investigated the influence of mental fatigue on a cognitive task which also contained alternative task-unrelated stimuli. With increasing time-on-task, task engagement and performance decreased, but there was no significant decrease in gaze toward the task-related stimuli. After increasing the task rewards, irrelevant rewarding stimuli where largely ignored, and task engagement and performance were restored, even though participants still reported to be highly fatigued. Overall, these findings support an explanation of less efficient processing of the task that is influenced by motivational cost/reward tradeoffs, rather than a depletion of a finite mental energy resource. (PsycINFO Database Record", "title": "" }, { "docid": "5e9b2f767d146d1aa221949a7766344f", "text": "Ant Colony Optimization (ACO) [31, 32] is a recently propose d metaheuristic approach for solving hard combinatorial optimization proble ms. The inspiring source of ACO is the pheromone trail laying and following behavior o f eal ants which use pheromones as a communication medium. In analogy to the biol ogical example, ACO is based on the indirect communication of a colony of simp le agents, called (artificial) ants, mediated by (artificial) pheromone trail s. The pheromone trails in ACO serve as a distributed, numerical information which t he ants use to probabilistically construct solutions to the problem being sol ved and which the ants adapt during the algorithm’s execution to reflect their sear ch experience. The first example of such an algorithm is Ant System (AS) [29, 3 6, 7, 38], which was proposed using as example application the well kno wn Traveling Salesman Problem (TSP) [58, 74]. Despite encouraging initial res ults, AS could not compete with state-of-the-art algorithms for the TSP. Neve rtheless, it had the important role of stimulating further research on algorithmi c variants which obtain much better computational performance, as well as on applic ations to a large variety of different problems. In fact, there exists now a cons iderable amount of applications obtaining world class performance on problem s like the quadratic assignment, vehicle routing, sequential ordering, scheduli ng, routing in Internet-like networks, and so on [21, 25, 44, 45, 66, 83]. Motivated by this success, the ACO metaheuristic has been proposed [31, 32] as a common framewo rk for the existing", "title": "" }, { "docid": "6d552edc0d60470ce942b9d57b6341e3", "text": "A rich element of cooperative games are mechanics that communicate. Unlike automated awareness cues and synchronous verbal communication, cooperative communication mechanics enable players to share information and direct action by engaging with game systems. These include both explicitly communicative mechanics, such as built-in pings that direct teammates' attention to specific locations, and emergent communicative mechanics, where players develop their own conventions about the meaning of in-game activities, like jumping to get attention. We use a grounded theory approach with 40 digital games to identify and classify the types of cooperative communication mechanics game designers might use to enable cooperative play. We provide details on the classification scheme and offer a discussion on the implications of cooperative communication mechanics.", "title": "" }, { "docid": "e6300989e5925d38d09446b3e43092e5", "text": "Cloud computing provides resources as services in pay-as-you-go mode to customers by using virtualization technology. As virtual machine (VM) is hosted on physical server, great energy is consumed by maintaining the servers in data center. More physical servers means more energy consumption and more money cost. Therefore, the VM placement (VMP) problem is significant in cloud computing. This paper proposes an approach based on ant colony optimization (ACO) to solve the VMP problem, named as ACO-VMP, so as to effectively use the physical resources and to reduce the number of running physical servers. The number of physical servers is the same as the number of the VMs at the beginning. Then the ACO approach tries to reduce the physical server one by one. We evaluate the performance of the proposed ACO-VMP approach in solving VMP with the number of VMs being up to 600. Experimental results compared with the ones obtained by the first-fit decreasing (FFD) algorithm show that ACO-VMP can solve VMP more efficiently to reduce the number of physical servers significantly, especially when the number of VMs is large.", "title": "" }, { "docid": "fb53b5d48152dd0d71d1816a843628f6", "text": "Online banking and e-commerce have been experiencing rapid growth over the past few years and show tremendous promise of growth even in the future. This has made it easier for fraudsters to indulge in new and abstruse ways of committing credit card fraud over the Internet. This paper focuses on real-time fraud detection and presents a new and innovative approach in understanding spending patterns to decipher potential fraud cases. It makes use of Self Organization Map to decipher, filter and analyze customer behavior for detection of fraud.", "title": "" }, { "docid": "0d2e5667545ebc9380416f9f625dd836", "text": "New developments in assistive technology are likely to make an important contribution to the care of elderly people in institutions and at home. Video-monitoring, remote health monitoring, electronic sensors and equipment such as fall detectors, door monitors, bed alerts, pressure mats and smoke and heat alarms can improve older people's safety, security and ability to cope at home. Care at home is often preferable to patients and is usually less expensive for care providers than institutional alternatives.", "title": "" }, { "docid": "5664ca8d7f0f2f069d5483d4a334c670", "text": "In Semantic Textual Similarity, systems rate the degree of semantic equivalence between two text snippets. This year, the participants were challenged with new data sets for English, as well as the introduction of Spanish, as a new language in which to assess semantic similarity. For the English subtask, we exposed the systems to a diversity of testing scenarios, by preparing additional OntoNotesWordNet sense mappings and news headlines, as well as introducing new genres, including image descriptions, DEFT discussion forums, DEFT newswire, and tweet-newswire headline mappings. For Spanish, since, to our knowledge, this is the first time that official evaluations are conducted, we used well-formed text, by featuring sentences extracted from encyclopedic content and newswire. The annotations for both tasks leveraged crowdsourcing. The Spanish subtask engaged 9 teams participating with 22 system runs, and the English subtask attracted 15 teams with 38 system runs.", "title": "" }, { "docid": "c09fc633fd17919f45ccc56c4a28ceef", "text": "The 6-pole UHF helical resonators filter was designed, simulated, fabricated, and tested. The design factors, simulation results, filter performance characteristics are presented in this paper. The coupling of helical resonators was designed using a mode-matching technique. The design procedures are simple, and measured performance is excellent. The simulated and measured results show the validity of the proposed design method.", "title": "" }, { "docid": "10b65d46a5a9dcc8b049804866122b68", "text": "We present a novel bioinspired dynamic climbing robot, with a recursive name: ROCR is an oscillating climbing robot. ROCR, pronounced “Rocker,” is a pendular, two-link, serial-chain robot that utilizes alternating handholds and an actuated tail to propel itself upward in a climbing style based on observation of human climbers and brachiating gibbons. ROCR's bioinspired pendular climbing strategy is simple and efficient. In fact, to our knowledge, ROCR is also the first climbing robot that is designed for efficiency. ROCR is a lightweight, flexible, and self-contained robot. This robot is intended for autonomous surveillance and inspection on sheer vertical surfaces. Potential locomotion gait strategies were investigated in simulation using Working Model 2D, and were evaluated on a basis of climbing rate, energy efficiency, and whether stable open-loop climbing was achieved. We identified that the most effective climbing resulted from sinusoidal tail motions. The addition of a body stabilizer reduced the robot's out-of-plane motion at higher frequencies and promoted more reliable gripper attachment. Experimental measurements of the robot showed climbing efficiencies of over 20% and a specific resistance of 5.0, while consuming 27 J/m at a maximum climbing speed of 15.7 cm/s (0.34 body lengths/s) - setting a first benchmark for efficiency of climbing robots. Future work will include further design optimization, integration of more complex gripping mechanisms, and investigating more complex control strategies.", "title": "" }, { "docid": "305dac2ffd4a04fa0ef9ca727edc6247", "text": "A new control strategy for obtaining the maximum traction force of electric vehicles with individual rear-wheel drive is presented. A sliding-mode observer is proposed to estimate the wheel slip and vehicle velocity under unknown road conditions by measuring only the wheel speeds. The proposed observer is based on the LuGre dynamic friction model and allows the maximum transmissible torque for each driven wheel to be obtained instantaneously. The maximum torque can be determined at any operating point and road condition, thus avoiding wheel skid. The proposed strategy maximizes the traction force while avoiding tire skid by controlling the torque of each traction motor. Simulation results using a complete vehicle model under different road conditions are presented to validate the proposed strategy.", "title": "" }, { "docid": "661f7bcccc22d1834d224b2b17d0c615", "text": "Offline handwriting recognition in Indian regional scripts is an interesting area of research as almost 460 million people in India use regional scripts. The nine major Indian regional scripts are Bangla (for Bengali and Assamese languages), Gujarati, Kannada, Malayalam, Oriya, Gurumukhi (for Punjabi language), Tamil, Telugu, and Nastaliq (for Urdu language). A state-of-the-art survey about the techniques available in the area of offline handwriting recognition (OHR) in Indian regional scripts will be of a great aid to the researchers in the subcontinent and hence a sincere attempt is made in this article to discuss the advancements reported in this regard during the last few decades. The survey is organized into different sections. A brief introduction is given initially about automatic recognition of handwriting and official regional scripts in India. The nine regional scripts are then categorized into four subgroups based on their similarity and evolution information. The first group contains Bangla, Oriya, Gujarati and Gurumukhi scripts. The second group contains Kannada and Telugu scripts and the third group contains Tamil and Malayalam scripts. The fourth group contains only Nastaliq script (Perso-Arabic script for Urdu), which is not an Indo-Aryan script. Various feature extraction and classification techniques associated with the offline handwriting recognition of the regional scripts are discussed in this survey. As it is important to identify the script before the recognition step, a section is dedicated to handwritten script identification techniques. A benchmarking database is very important for any pattern recognition related research. The details of the datasets available in different Indian regional scripts are also mentioned in the article. A separate section is dedicated to the observations made, future scope, and existing difficulties related to handwriting recognition in Indian regional scripts. We hope that this survey will serve as a compendium not only for researchers in India, but also for policymakers and practitioners in India. It will also help to accomplish a target of bringing the researchers working on different Indian scripts together. Looking at the recent developments in OHR of Indian regional scripts, this article will provide a better platform for future research activities.", "title": "" }, { "docid": "1a90c5688663bcb368d61ba7e0d5033f", "text": "Content-based audio classification and segmentation is a basis for further audio/video analysis. In this paper, we present our work on audio segmentation and classification which employs support vector machines (SVMs). Five audio classes are considered in this paper: silence, music, background sound, pure speech, and non- pure speech which includes speech over music and speech over noise. A sound stream is segmented by classifying each sub-segment into one of these five classes. We have evaluated the performance of SVM on different audio type-pairs classification with testing unit of different- length and compared the performance of SVM, K-Nearest Neighbor (KNN), and Gaussian Mixture Model (GMM). We also evaluated the effectiveness of some new proposed features. Experiments on a database composed of about 4- hour audio data show that the proposed classifier is very efficient on audio classification and segmentation. It also shows the accuracy of the SVM-based method is much better than the method based on KNN and GMM.", "title": "" }, { "docid": "0d1193978e4f8be0b78c6184d7ece3fe", "text": "Network representations of systems from various scientific and societal domains are neither completely random nor fully regular, but instead appear to contain recurring structural building blocks [1]. These features tend to be shared by networks belonging to the same broad class, such as the class of social networks or the class of biological networks. At a finer scale of classification within each such class, networks describing more similar systems tend to have more similar features. This occurs presumably because networks representing similar purposes or constructions would be expected to be generated by a shared set of domain specific mechanisms, and it should therefore be possible to classify these networks into categories based on their features at various structural levels. Here we describe and demonstrate a new, hybrid approach that combines manual selection of features of potential interest with existing automated classification methods. In particular, selecting well-known and well-studied features that have been used throughout social network analysis and network science [2, 3] and then classifying with methods such as random forests [4] that are of special utility in the presence of feature collinearity, we find that we achieve higher accuracy, in shorter computation time, with greater interpretability of the network classification results. Past work in the area of network classification has primarily focused on distinguishing networks from different categories using two different broad classes of approaches. In the first approach , network classification is carried out by examining certain specific structural features and investigating whether networks belonging to the same category are similar across one or more dimensions as defined by these features [5, 6, 7, 8]. In other words, in this approach the investigator manually chooses the structural characteristics of interest and more or less manually (informally) determines the regions of the feature space that correspond to different classes. These methods are scalable to large networks and yield results that are easily interpreted in terms of the characteristics of interest, but in practice they tend to lead to suboptimal classification accuracy. In the second approach, network classification is done by using very flexible machine learning classi-fiers that, when presented with a network as an input, classify its category or class as an output To somewhat oversimplify, the first approach relies on manual feature specification followed by manual selection of a classification system, whereas the second approach is its opposite, relying on automated feature detection followed by automated classification. While …", "title": "" }, { "docid": "9e6f69cb83422d756909104f2c1c8887", "text": "We introduce a novel method for approximate alignment of point-based surfaces. Our approach is based on detecting a set of salient feature points using a scale-space representation. For each feature point we compute a signature vector that is approximately invariant under rigid transformations. We use the extracted signed feature set in order to obtain approximate alignment of two surfaces. We apply our method for the automatic alignment of multiple scans using both scan-to-scan and scan-to-model matching capabilities.", "title": "" }, { "docid": "752f874bf81bae1d77f2acec04fed521", "text": "The World Wide Web (WWW) is becoming one of the most preferred and widespread mediums of learning. Unfortunately, most of the current Web-based learning systems are still delivering the same educational resources in the same way to learners with different profiles. A number of past efforts have dealt with e-learning personalization, generally, relying on explicit information. In this paper, we aim to compute on-line automatic recommendations to an active learner based on his/her recent navigation history, as well as exploiting similarities and dissimilarities among user preferences and among the contents of the learning resources. First we start by mining learner profiles using Web usage mining techniques and content-based profiles using information retrieval techniques. Then, we use these profiles to compute relevant links to recommend for an active learner by applying a number of different recommendation strategies.", "title": "" } ]
scidocsrr
aed39b459260dd7023a7c5fe2e1a9758
Automatic Goal Generation for Reinforcement Learning Agents
[ { "docid": "935c404529b02cee2620e52f7a09b84d", "text": "We introduce the Self-Adaptive Goal Generation Robust Intelligent Adaptive Curiosity (SAGG-RIAC) architecture as an intrinsically motivated goal exploration mechanism which allows active learning of inverse models in high-dimensional redundant robots. This allows a robot to efficiently and actively learn distributions of parameterized motor skills/policies that solve a corresponding distribution of parameterized tasks/goals. The architecture makes the robot sample actively novel parameterized tasks in the task space, based on a measure of competence progress, each of which triggers low-level goal-directed learning of the motor policy parameters that allow to solve it. For both learning and generalization, the system leverages regression techniques which allow to infer the motor policy parameters corresponding to a given novel parameterized task, and based on the previously learnt correspondences between policy and task parameters. We present experiments with high-dimensional continuous sensorimotor spaces in three different robotic setups: 1) learning the inverse kinematics in a highly-redundant robotic arm, 2) learning omnidirectional locomotion with motor primitives in a quadruped robot, 3) an arm learning to control a fishing rod with a flexible wire. We show that 1) exploration in the task space can be a lot faster than exploration in the actuator space for learning inverse models in redundant robots; 2) selecting goals maximizing competence progress creates developmental trajectories driving the robot to progressively focus on tasks of increasing complexity and is statistically significantly more efficient than selecting tasks randomly, as well as more efficient than different standard active motor babbling methods; 3) this architecture allows the robot to actively discover which parts of its task space it can learn to reach and which part it cannot.", "title": "" }, { "docid": "6838d497f81c594cb1760c075b0f5d48", "text": "Unsupervised learning with generative adversarial networks (GANs) has proven hugely successful. Regular GANs hypothesize the discriminator as a classifier with the sigmoid cross entropy loss function. However, we found that this loss function may lead to the vanishing gradients problem during the learning process. To overcome such a problem, we propose in this paper the Least Squares Generative Adversarial Networks (LSGANs) which adopt the least squares loss function for the discriminator. We show that minimizing the objective function of LSGAN yields minimizing the Pearson $x^{2}$ divergence. There are two benefits of LSGANs over regular GANs. First, LSGANs are able to generate higher quality images than regular GANs. Second, LSGANs perform more stable during the learning process. We train LSGANs on several datasets, and the experimental results show that the images generated by LSGANs are of better quality than regular GANs. Furthermore, we evaluate the stability of LSGANs in two groups. One is to compare between LSGANs and regular GANs without gradient penalty. The other one is to compare between LSGANs with gradient penalty and WGANs with gradient penalty. We conduct four experiments to illustrate the stability of LSGANs. The other one is to compare between LSGANs with gradient penalty (LSGANs-GP) and WGANs with gradient penalty (WGANs-GP). The experimental results show that LSGANs-GP succeed in training for all the difficult architectures used in WGANs-GP, including 101-layer ResNet.", "title": "" }, { "docid": "9b013f0574cc8fd4139a94aa5cf84613", "text": "Monte Carlo Tree Search (MCTS) methods have proven powerful in planning for sequential decision-making problems such as Go and video games, but their performance can be poor when the planning depth and sampling trajectories are limited or when the rewards are sparse. We present an adaptation of PGRD (policy-gradient for rewarddesign) for learning a reward-bonus function to improve UCT (a MCTS algorithm). Unlike previous applications of PGRD in which the space of reward-bonus functions was limited to linear functions of hand-coded state-action-features, we use PGRD with a multi-layer convolutional neural network to automatically learn features from raw perception as well as to adapt the non-linear reward-bonus function parameters. We also adopt a variance-reducing gradient method to improve PGRD’s performance. The new method improves UCT’s performance on multiple ATARI games compared to UCT without the reward bonus. Combining PGRD and Deep Learning in this way should make adapting rewards for MCTS algorithms far more widely and practically applicable than before.", "title": "" }, { "docid": "ddae1c6469769c2c7e683bfbc223ad1a", "text": "Deep reinforcement learning has achieved many impressive results in recent years. However, tasks with sparse rewards or long horizons continue to pose significant challenges. To tackle these important problems, we propose a general framework that first learns useful skills in a pre-training environment, and then leverages the acquired skills for learning faster in downstream tasks. Our approach brings together some of the strengths of intrinsic motivation and hierarchical methods: the learning of useful skill is guided by a single proxy reward, the design of which requires very minimal domain knowledge about the downstream tasks. Then a high-level policy is trained on top of these skills, providing a significant improvement of the exploration and allowing to tackle sparse rewards in the downstream tasks. To efficiently pre-train a large span of skills, we use Stochastic Neural Networks combined with an information-theoretic regularizer. Our experiments1 show2 that this combination is effective in learning a wide span of interpretable skills in a sample-efficient way, and can significantly boost the learning performance uniformly across a wide range of downstream tasks.", "title": "" } ]
[ { "docid": "46dad00b95cc8c1490a53ca1c73474f9", "text": "OBJECTIVE\nThe purpose of this study is to determine the association between fetal nasal bone length (NBL) and gestational age (GA), biparietal diameter (BPD) and head circumference (HC) in women undergoing prenatal assessments and Down syndrome screening.\n\n\nMETHODS\nCross-sectional data were obtained from 3,003 women with singleton pregnancies who underwent a prenatal ultrasound examination at the Department of Obstetrics and Gynecology, Cheng Hsin General Hospital between August 2006 and July 2009.\n\n\nRESULTS\nStatistical analyses involved linear regression. NBL with GA, BPD and HC as measured between 14(+0) and 35(+6) weeks of gestation were linearly related.\n\n\nCONCLUSIONS\nUsing multiple parameters (GA, BPD and HC) to estimate NBL is more accurate than using than using GA or BPD or HC alone, as indicated by the higher predictive value.", "title": "" }, { "docid": "2679d251d413adf208cb8b764ce55468", "text": "We compare variations of string comparators based on the Jaro-Winkler comparator and edit distance comparator. We apply the comparators to Census data to see which are better classifiers for matches and nonmatches, first by comparing their classification abilities using a ROC curve based analysis, then by considering a direct comparison between two candidate comparators in record linkage results.", "title": "" }, { "docid": "42f5e355ddf13e5e339bd46d5ff584fd", "text": "The phenomenal growth of the Internet in the last decade and society's increasing dependence on it has brought along, a flood of security attacks on the networking and computing infrastructure. Intrusion detection/prevention systems provide defenses against these attacks by monitoring headers and payload of packets flowing through the network. Multiple string matching that can compare hundreds of string patterns simultaneously is a critical component of these systems, and is a well-studied problem. Most of the string matching solutions today are based on the classic Aho-Corasick algorithm, which has an inherent limitation; they can process only one input character in one cycle. As memory speed is not growing at the same pace as network speed, this limitation has become a bottleneck in the current network, having speeds of tens of gigabits per second. In this paper, we propose a novel multiple string matching algorithm that can process multiple characters at a time thus achieving multi-gigabit rate search speeds. We also propose an architecture for an efficient implementation on TCAM-based hardware. We additionally propose novel optimizations by making use of the properties of TCAMs to significantly reduce the memory requirements of the proposed algorithm. We finally present extensive simulation results of network-based virus/worm detection using real signature databases to illustrate the effectiveness of the proposed scheme.", "title": "" }, { "docid": "9228218e663951e54f31d697997c80f9", "text": "In this paper, we describe a simple set of \"recipes\" for the analysis of high spatial density EEG. We focus on a linear integration of multiple channels for extracting individual components without making any spatial or anatomical modeling assumptions, instead requiring particular statistical properties such as maximum difference, maximum power, or statistical independence. We demonstrate how corresponding algorithms, for example, linear discriminant analysis, principal component analysis and independent component analysis, can be used to remove eye-motion artifacts, extract strong evoked responses, and decompose temporally overlapping components. The general approach is shown to be consistent with the underlying physics of EEG, which specifies a linear mixing model of the underlying neural and non-neural current sources.", "title": "" }, { "docid": "6129ad7e63901f862db5405711692cf8", "text": "We propose a new algorithm for computing authentication paths in the Merkle signature scheme. Compared to the best algorithm for this task, our algorithm reduces the worst case running time considerably.", "title": "" }, { "docid": "5ecde325c3d01dc62bc179bc21fc8a0d", "text": "Rapid access to situation-sensitive data through social media networks creates new opportunities to address a number of real-world problems. Damage assessment during disasters is a core situational awareness task for many humanitarian organizations that traditionally takes weeks and months. In this work, we analyze images posted on social media platforms during natural disasters to determine the level of damage caused by the disasters. We employ state-of-the-art machine learning techniques to perform an extensive experimentation of damage assessment using images from four major natural disasters. We show that the domain-specific fine-tuning of deep Convolutional Neural Networks (CNN) outperforms other state-of-the-art techniques such as Bag-of-Visual-Words (BoVW). High classification accuracy under both event-specific and cross-event test settings demonstrate that the proposed approach can effectively adapt deep-CNN features to identify the severity of destruction from social media images taken after a disaster strikes.", "title": "" }, { "docid": "56a3a761606e699c3f21fb0fe1ecbf0a", "text": "Internet banking (IB) has become one of the widely used banking services among Malaysian retail banking customers in recent years. Despite its attractiveness, customer loyalty towards Internet banking website has become an issue due to stiff competition among the banks in Malaysia. As the development and validation of a customer loyalty model in Internet banking website context in Malaysia had not been addressed by past studies, this study attempts to develop a model based on the usage of Information System (IS), with the purpose to investigate factors influencing customer loyalty towards Internet banking websites. A questionnaire survey was conducted with the sample consisting of Internet banking users in Malaysia. Factors that influence customer loyalty towards Internet banking website in Malaysia have been investigated and tested. The study also attempts to identify the most essential factors among those investigated: service quality, perceived value, trust, habit and reputation of the bank. Based on the findings, trust, habit and reputation are found to have a significant influence on customer loyalty towards individual Internet banking websites in Malaysia. As compared to trust or habit factors, reputation is the strongest influence. The results also indicated that service quality and perceived value are not significantly related to customer loyalty. Service quality is found to be an important factor in influencing the adoption of the technology, but did not have a significant influence in retention of customers. The findings have provided an insight to the internet banking providers on the areas to be focused on in retaining their customers.", "title": "" }, { "docid": "abea5fcab86877f1d085183a714bc37d", "text": "In this work, we introduce the challenging problem of joint multi-person pose estimation and tracking of an unknown number of persons in unconstrained videos. Existing methods for multi-person pose estimation in images cannot be applied directly to this problem, since it also requires to solve the problem of person association over time in addition to the pose estimation for each person. We therefore propose a novel method that jointly models multi-person pose estimation and tracking in a single formulation. To this end, we represent body joint detections in a video by a spatio-temporal graph and solve an integer linear program to partition the graph into sub-graphs that correspond to plausible body pose trajectories for each person. The proposed approach implicitly handles occlusion and truncation of persons. Since the problem has not been addressed quantitatively in the literature, we introduce a challenging Multi-Person PoseTrack dataset, and also propose a completely unconstrained evaluation protocol that does not make any assumptions about the scale, size, location or the number of persons. Finally, we evaluate the proposed approach and several baseline methods on our new dataset.", "title": "" }, { "docid": "09b399d6416c1821bc4635690559cdfa", "text": "One of the most complicated academic endeavours in transmission pedagogies is to generate democratic participation of all students and public expression of silenced voices. While the potential of mobile phones, particularly mobile instant messaging (MIM), to trigger broadened academic participation is increasingly acknowledged in literature, integrating MIM into classrooms and out-of-the-classroom tasks has often been confronted with academic resistance. Academic uncertainty about MIM is often predicated on its perceived distractive nature and potential to trigger off-task social behaviours. This paper argues that MIM has potential to create alternative dialogic spaces for student collaborative engagements in informal contexts, which can gainfully transform teaching and learning. An instance of a MIM, WhatsApp, was adopted for an information technology course at a South African university with a view to heighten lecturer–student and peer-based participation, and enhance pedagogical delivery and inclusive learning in formal (lectures) and informal spaces. The findings suggest heightened student participation, the fostering of learning communities for knowledge creation and progressive shifts in the lecturer’s mode of pedagogical delivery. However, the concomitant challenge of using MIM included mature adults’ resentment of the merging of academic and family life occasioned by WhatsApp consultations after hours. Students also expressed ambivalence about MIM’s wide-scale roll-out in different academic programmes. Introduction The surging popularity of mobile devices as technologies that support collaborative learning has been widely debated in recent years (Echeverría et al, 2011; Hwang, Huang & Wu, 2011; Koole, 2009). Echeverría et al (2011) articulate the multiple academic purposes of mobile devices as follows: access to content, supplementation of institutionally provided content and acquisition of specific information, fostering interaction and information sharing among students. Despite this tremendous potential of mobile phones to activate deep student engagement with content, mobile instant messaging (MIM) remains one of the least exploited functionalities of mobile devices in higher educational institutions (HIEs). The academic uncertainty about MIM at African HIEs is British Journal of Educational Technology Vol 44 No 4 2013 544–561 doi:10.1111/bjet.12057 © 2013 British Educational Research Association possibly explained by (1) the distractive nature of text messages, (2) limited academic conceptualisation of how textual resources can be optimally integrated into mainstream instructional practices and (3) uncertainties about the academic rigour of discussions generated via text messages. Notwithstanding these academic concerns about MIM, this social practice promotes subscriptions to information, builds social networks, supports brainstorming and fosters mutual understanding through sharing of assets like opinions (Hwang et al, 2011). Therefore, MIM enhances productive communication among learning clusters through the sharing of mutual intentions, social objects, learning resources and needs. Practitioner Notes What is already known about this topic • Mobile devices are productive technologies with potential to foster informal collaborative learning. • Mobile phones are useful tools for the transmission of basic content and the supplementation of institutionally generated content. • Academic potential of mobile instant messaging (MIM) has been suboptimally exploited in higher education in general and South African higher education in particular. What this paper adds • Underutilisation of MIM can be attributed to lecturers’ limited conceptualisation of how to integrate textual resources into mainstream instructional practices and their uncertainties about the academic rigour of discussions generated via text messages. • Lecturer’s use of an instance of MIM, WhatsApp, for peer-based engagement in an information technology course contributed to peer-based coaching and informal work teams, which transformed his hierarchical models of teaching. • WhatsApp impacted student participation by promoting social constructivist learning through spontaneous discussions, boosting student self-confidence to engage anonymously and enhancing the sharing of collectively generated resources across multiple spaces. • WhatsApp’s supplementation of student academic material after hours bridged the information divide for geographically remote students who had limited access to academic resources after work hours. • Mature, married students conceived the provision of academic materials after hours via WhatsApp as disruptive of their family life as quality family time became seamlessly integrated into academic pursuits. Implications for practice and/or policy • Academic use of WhatsApp should consider the additional responsibilities that it requires—need to contribute to an online learning community, expectations to interact at odd hours, and the pressure to read and reflect on peer-generated postings. • Interaction after hours should be well timed and streamlined to account for mature students’ competing family commitments, and additional software that signals and triggers to their learning clusters their availability for interaction should be installed on WhatsApp. • Lecturers should harvest (mine) collectively generated resources on WhatsApp to support the institutional memory and sustained student meaningful interaction. Using instant messaging to leverage participation 545 © 2013 British Educational Research Association Despite the aforementioned academic incentives, what is least understood in literature is MIM’s influence on pedagogy (student academic participation, lecturers’ ways of instructional delivery) and digital inclusion of learners from diverse academic backgrounds. The rationale of this paper, therefore, is twofold: (1) to explore the pedagogical value of a MIM service, WhatsApp, particularly its potential to enhance academic participation of all learners and transform lecturers’ teaching practices and (2) examine its capacity to breach the digital divide among learners in geographically dispersed informal contexts. An informing framework comprising WhatsAppenabled lecturer–student and student–peer consultations was drawn upon to explore the potential of MIM to promote equitable participation in diverse informal spaces. The rest of the paper is structured as follows: a literature review and theoretical framework are articulated, research questions and methodology are presented, findings are discussed and a conclusion is given. Literature review M-Learning For Kukulska-Hulme and Traxler (2005), mobile learning (m-learning) is generally about enabling flexible learning through mobile devices. However, new constructions of m-learning embrace the mobility of the context of interaction that is mediated by technologies. The Centre for Digital Education (2011) suggests that a new direction in m-learning enables lecturer mobility including mobile device-mediated creation of learning materials on the spot and in the field. This new approach foregrounds a transitory context in which all learning resources (interacting peers, lecturers, pedagogical content, the enabling technology) are all “on-the-move.” Consequently, m-learning potentially breaches the spatial, temporal and time zones by bringing educational resources at the disposal of the roaming learner in real time. MIM MIM is an asynchronous communication tool that works on wireless connections, handhelds and desktop devices via the Internet and allows students and peers to chat in real time (Dourando, Parker & de la Harpe, 2007). It fosters unique social presence that is qualitatively and visually distinct from email systems. As Quan-Haase, Cothrel and Wellman (2005) suggest, IM applications differ from emails primarily in their focus on the immediate delivery of messages through (1) a “pop-up” mechanism to display messages the moment they are received, (2) a user-generated visible list of other users (“buddy list”) and (3) a mechanism for indicating when “buddies” are online and available to receive messages. By providing a detailed account of the online presence of users (online, offline, in a meeting, away), MIM provides a rich context for open and transparent interaction that alerts communicants to the temporal and time-span constraints of the interaction. However, what remains unknown are the influences of MIM social presence on lecturers’ instructional practices and the digital inclusion of students with varied exposure and experience in MIM academic usage. Cameron and Webster’s (2005) study on IM usage by 19 employees from four organisations suggests that critical mass is among the core explanations for the widespread adoption of IM. IM was considered appropriate when senders wanted to emphasise the intentionality of messages, elicit quick responses and enhance efficient communication (ibid.). What has not been explored, nevertheless, is the influence of pedagogical intentionality on the meaningful academic participation of underprepared learners. Sotillo’s (2006) study explored English as Second Language (ESL) learners’ negotiation of interaction and collaborative problem solving using IM. IM environment rendered interactions that facilitated student awareness of grammatical structures of second language communication. Although the study examined technology-mediated interactions of students with varied linguistic competences, it did not interrogate the relationship between MIM and digital inclusion of students. 546 British Journal of Educational Technology Vol 44 No 4 2013 © 2013 British Educational Research Association The educational benefits of MIM are as follows: encouraging contact between students and lecturers, developing student-based reciprocal interactions and academic cooperation, promoting active learning, providing instant feedback, emphasising", "title": "" }, { "docid": "98bf4ff9980a703e663dd689ee702b8f", "text": "Theoretical considerations and diverse empirical data from clinical, psycholinguistic, and developmental studies suggest that language comprehension processes are decomposable into separate subsystems, including distinct systems for semantic and grammatical processing. Here we report that event-related potentials (ERPs) to syntactically well-formed but semantically anomalous sentences produced a pattern of brain activity that is distinct in timing and distribution from the patterns elicited by syntactically deviant sentences, and further, that different types of syntactic deviance produced distinct ERP patterns. Forty right-handed young adults read sentences presented at 2 words/sec while ERPs were recorded from over several positions between and within the hemispheres. Half of the sentences were semantically and grammatically acceptable and were controls for the remainder, which contained sentence medial words that violated (1) semantic expectations, (2) phrase structure rules, or (3) WH-movement constraints on Specificity and (4) Subjacency. As in prior research, the semantic anomalies produced a negative potential, N400, that was bilaterally distributed and was largest over posterior regions. The phrase structure violations enhanced the N125 response over anterior regions of the left hemisphere, and elicited a negative response (300-500 msec) over temporal and parietal regions of the left hemisphere. Violations of Specificity constraints produced a slow negative potential, evident by 125 msec, that was also largest over anterior regions of the left hemisphere. Violations of Subjacency constraints elicited a broadly and symmetrically distributed positivity that onset around 200 msec. The distinct timing and distribution of these effects provide biological support for theories that distinguish between these types of grammatical rules and constraints and more generally for the proposal that semantic and grammatical processes are distinct subsystems within the language faculty.", "title": "" }, { "docid": "3d267b494eda6271ca9ce5037a2a4c5c", "text": "The Web of Linked Data forms a single, globally distributed dataspace. Due to the openness of this dataspace, it is not possible to know in advance all data sources that might be relevant for query answering. This openness poses a new challenge that is not addressed by traditional research on federated query processing. In this paper we present an approach to execute SPARQL queries over the Web of Linked Data. The main idea of our approach is to discover data that might be relevant for answering a query during the query execution itself. This discovery is driven by following RDF links between data sources based on URIs in the query and in partial results. The URIs are resolved over the HTTP protocol into RDF data which is continuously added to the queried dataset. This paper describes concepts and algorithms to implement our approach using an iterator-based pipeline. We introduce a formalization of the pipelining approach and show that classical iterators may cause blocking due to the latency of HTTP requests. To avoid blocking, we propose an extension of the iterator paradigm. The evaluation of our approach shows its strengths as well as the still existing challenges.", "title": "" }, { "docid": "211cf327b65cbd89cf635bbeb5fa9552", "text": "BACKGROUND\nAdvanced mobile communications and portable computation are now combined in handheld devices called \"smartphones\", which are also capable of running third-party software. The number of smartphone users is growing rapidly, including among healthcare professionals. The purpose of this study was to classify smartphone-based healthcare technologies as discussed in academic literature according to their functionalities, and summarize articles in each category.\n\n\nMETHODS\nIn April 2011, MEDLINE was searched to identify articles that discussed the design, development, evaluation, or use of smartphone-based software for healthcare professionals, medical or nursing students, or patients. A total of 55 articles discussing 83 applications were selected for this study from 2,894 articles initially obtained from the MEDLINE searches.\n\n\nRESULTS\nA total of 83 applications were documented: 57 applications for healthcare professionals focusing on disease diagnosis (21), drug reference (6), medical calculators (8), literature search (6), clinical communication (3), Hospital Information System (HIS) client applications (4), medical training (2) and general healthcare applications (7); 11 applications for medical or nursing students focusing on medical education; and 15 applications for patients focusing on disease management with chronic illness (6), ENT-related (4), fall-related (3), and two other conditions (2). The disease diagnosis, drug reference, and medical calculator applications were reported as most useful by healthcare professionals and medical or nursing students.\n\n\nCONCLUSIONS\nMany medical applications for smartphones have been developed and widely used by health professionals and patients. The use of smartphones is getting more attention in healthcare day by day. Medical applications make smartphones useful tools in the practice of evidence-based medicine at the point of care, in addition to their use in mobile clinical communication. Also, smartphones can play a very important role in patient education, disease self-management, and remote monitoring of patients.", "title": "" }, { "docid": "44013f5b8ec7eb584bf675b52aabaeb2", "text": "Same as Report (SAR) 18. NUMBER", "title": "" }, { "docid": "19d35c0f4e3f0b90d0b6e4d925a188e4", "text": "This paper presents a new approach to the computer aided diagnosis (CAD) of diabetic retinopathy (DR)—a common and severe complication of long-term diabetes which damages the retina and cause blindness. Since microaneurysms are regarded as the first signs of DR, there has been extensive research on effective detection and localization of these abnormalities in retinal images. In contrast to existing algorithms, a new approach based on multi-scale correlation filtering (MSCF) and dynamic thresholding is developed. This consists of two levels, microaneurysm candidate detection (coarse level) and true microaneurysm classification (fine level). The approach was evaluated based on two public datasets—ROC (retinopathy on-line challenge, http://roc.healthcare.uiowa.edu) and DIARETDB1 (standard diabetic retinopathy database, http://www.it.lut.fi/project/imageret/diaretdb1). We conclude our method to be effective and efficient. & 2010 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "85719d4bc86c7c8bbe5799a716d6533b", "text": "We propose Sparse Neural Network architectures that are based on random or structured bipartite graph topologies. Sparse architectures provide compression of the models learned and speed-ups of computations, they can also surpass their unstructured or fully connected counterparts. As we show, even more compact topologies of the so-called SNN (Sparse Neural Network) can be achieved with the use of structured graphs of connections between consecutive layers of neurons. In this paper, we investigate how the accuracy and training speed of the models depend on the topology and sparsity of the neural network. Previous approaches using sparcity are all based on fully connected neural network models and create sparcity during training phase, instead we explicitly define a sparse architectures of connections before the training. Building compact neural network models is coherent with empirical observations showing that there is much redundancy in learned neural network models. We show experimentally that the accuracy of the models learned with neural networks depends on ”expander-like” properties of the underlying topologies such as the spectral gap and algebraic connectivity rather than the density of the graphs of connections. 1 ar X iv :1 70 6. 05 68 3v 1 [ cs .L G ] 1 8 Ju n 20 17", "title": "" }, { "docid": "ba8ae795796d9d5c1d33d4e5ce692a13", "text": "This work presents a type of capacitive sensor for intraocular pressure (IOP) measurement on soft contact lens with Radio Frequency Identification (RFID) module. The flexible capacitive IOP sensor and Rx antenna was designed and fabricated using MEMS fabrication technologies that can be embedded on a soft contact lens. The IOP sensing unit is a sandwich structure composed of parylene C as the substrate and the insulating layer, gold as the top and bottom electrodes of the capacitor, and Hydroxyethylmethacrylate (HEMA) as dielectric material between top plate and bottom plate. The main sensing principle is using wireless IOP contact lenses sensor (CLS) system placed on corneal to detect the corneal deformation caused due to the variations of IOP. The variations of intraocular pressure will be transformed into capacitance change and this change will be transmitted to RFID system and recorded as continuous IOP monitoring. The measurement on in-vitro porcine eyes show the pressure reproducibility and a sensitivity of 0.02 pF/4.5 mmHg.", "title": "" }, { "docid": "9a10716e1d7e24b790fb5dd48ad254ab", "text": "Probabilistic models based on Bayes' rule are an increasingly popular approach to understanding human cognition. Bayesian models allow immense representational latitude and complexity. Because they use normative Bayesian mathematics to process those representations, they define optimal performance on a given task. This article focuses on key mechanisms of Bayesian information processing, and provides numerous examples illustrating Bayesian approaches to the study of human cognition. We start by providing an overview of Bayesian modeling and Bayesian networks. We then describe three types of information processing operations-inference, parameter learning, and structure learning-in both Bayesian networks and human cognition. This is followed by a discussion of the important roles of prior knowledge and of active learning. We conclude by outlining some challenges for Bayesian models of human cognition that will need to be addressed by future research. WIREs Cogn Sci 2011 2 8-21 DOI: 10.1002/wcs.80 For further resources related to this article, please visit the WIREs website.", "title": "" }, { "docid": "373daff94b0867437e2211f460437a19", "text": "We live in an increasingly connected and automated society. Smart environments embody this trend by linking computers to everyday tasks and settings. Important features of such environments are that they possess a degree of autonomy, adapt themselves to changing conditions, and communicate with humans in a natural way. These systems can be found in offices, airports, hospitals, classrooms, or any other environment. This article discusses automation of our most personal environment: the home. There are several characteristics that are commonly found in smart homes. This type of environment assumes controls and coordinates a network of sensors and devices, relieving the inhabitants of this burden. Interaction with smart homes is in a form that is comfortable to people: speech, gestures, and actions take the place of windows, icons, menus, and pointers. We define a smart home as one that is able to acquire and apply knowledge about its inhabitants and their surroundings in order to adapt to the inhabitants and meet the goals of comfort and efficiency. Designing and implementing smart homes requires a unique breadth of knowledge not limited to a single discipline, but integrates aspects of machine learning, decision making, human-machine interfaces, wireless networking, mobile communications, databases, sensor networks, and pervasive computing. With these capabilities, the home can control many aspects of the environment such as climate, lighting, maintenance, and entertainment. Intelligent automation of these activities can reduce the amount of interaction required by inhabitants and reduce energy consumption and other potential operating costs. The same capabilities can be", "title": "" }, { "docid": "8ac8ad61dc5357f3dc3ab1020db8bada", "text": "We show how to learn many layers of features on color images and we use these features to initialize deep autoencoders. We then use the autoencoders to map images to short binary codes. Using semantic hashing [6], 28-bit codes can be used to retrieve images that are similar to a query image in a time that is independent of the size of the database. This extremely fast retrieval makes it possible to search using multiple di erent transformations of the query image. 256-bit binary codes allow much more accurate matching and can be used to prune the set of images found using the 28-bit codes.", "title": "" }, { "docid": "9a9decf28c0f97f311a50fe7cca185e7", "text": "500 kV Extra High Voltage Transmission Lines, which have higher insulation level than other transmission lines with lower voltage level, should have more strength against lightning strikes. But in reality several problems appear. Broken insulators due to lightning strikes are often found in 500 kV EHV lines. Research on these problems was carried out at Paiton-Kediri lines. It took place especially in the areas that have higher lightning density. Broken insulator can cause lack of insulation strength and potentially reduce lines performance due to outages on the lines.", "title": "" } ]
scidocsrr
01080490d8845e603208753303c2cc7c
The transformation of product development process into lean environment using set-based concurrent engineering: A case study from an aerospace industry
[ { "docid": "61768befa972c8e9f46524a59c44fabb", "text": "This paper presents a newly defined set-based concurrent engineering process, which the authors believe addresses some of the key challenges faced by engineering enterprises in the 21 century. The main principles of Set-Based Concurrent Engineering (SBCE) have been identified via an extensive literature review. Based on these principles the SBCE baseline model was developed. The baseline model defines the stages and activities which represent the product development process to be employed in the LeanPPD (lean product and process development) project. The LeanPPD project is addressing the needs of European manufacturing companies for a new model that extends beyond lean manufacturing, and incorporates lean thinking in the product design development process.", "title": "" } ]
[ { "docid": "32d0a26f21a25fe1e783b1edcfbcf673", "text": "Histologic grading has been used as a guide for clinical management in follicular lymphoma (FL). Proliferation index (PI) of FL generally correlates with tumor grade; however, in cases of discordance, it is not clear whether histologic grade or PI correlates with clinical aggressiveness. To objectively evaluate these cases, we determined PI by Ki-67 immunostaining in 142 cases of FL (48 grade 1, 71 grade 2, and 23 grade 3). A total of 24 cases FL with low histologic grade but high PI (LG-HPI) were identified, a frequency of 18%. On histologic examination, LG-HPI FL often exhibited blastoid features. Patients with LG-HPI FL had inferior disease-specific survival but a higher 5-year disease-free rate than low-grade FL with concordantly low PI (LG-LPI). However, transformation to diffuse large B-cell lymphoma was uncommon in LG-HPI cases (1 of 19; 5%) as compared with LG-LPI cases (27 of 74; 36%). In conclusion, LG-HPI FL appears to be a subgroup of FL with clinical behavior more akin to grade 3 FL. We propose that these LG-HPI FL cases should be classified separately from cases of low histologic grade FL with concordantly low PI.", "title": "" }, { "docid": "8b1734f040031e22c50b6b2a573ff58a", "text": "Is it permissible to harm one to save many? Classic moral dilemmas are often defined by the conflict between a putatively rational response to maximize aggregate welfare (i.e., the utilitarian judgment) and an emotional aversion to harm (i.e., the non-utilitarian judgment). Here, we address two questions. First, what specific aspect of emotional responding is relevant for these judgments? Second, is this aspect of emotional responding selectively reduced in utilitarians or enhanced in non-utilitarians? The results reveal a key relationship between moral judgment and empathic concern in particular (i.e., feelings of warmth and compassion in response to someone in distress). Utilitarian participants showed significantly reduced empathic concern on an independent empathy measure. These findings therefore reveal diminished empathic concern in utilitarian moral judges.", "title": "" }, { "docid": "8c7b6d0ecb1b1a4a612f44e8de802574", "text": "Recently, the Fisher vector representation of local features has attracted much attention because of its effectiveness in both image classification and image retrieval. Another trend in the area of image retrieval is the use of binary feature such as ORB, FREAK, and BRISK. Considering the significant performance improvement in terms of accuracy in both image classification and retrieval by the Fisher vector of continuous feature descriptors, if the Fisher vector were also to be applied to binary features, we would receive the same benefits in binary feature based image retrieval and classification. In this paper, we derive the closed-form approximation of the Fisher vector of binary features which are modeled by the Bernoulli mixture model. In experiments, it is shown that the Fisher vector representation improves the accuracy of image retrieval by 25% compared with a bag of binary words approach.", "title": "" }, { "docid": "b0eb2048209c7ceeb3c67c2b24693745", "text": "Modeling an ontology is a hard and time-consuming task. Although methodologies are useful for ontologists to create good ontologies, they do not help with the task of evaluating the quality of the ontology to be reused. For these reasons, it is imperative to evaluate the quality of the ontology after constructing it or before reusing it. Few studies usually present only a set of criteria and questions, but no guidelines to evaluate the ontology. The effort to evaluate an ontology is very high as there is a huge dependence on the evaluator’s expertise to understand the criteria and questions in depth. Moreover, the evaluation is still very subjective. This study presents a novel methodology for ontology evaluation, taking into account three fundamental principles: i) it is based on the Goal, Question, Metric approach for empirical evaluation; ii) the goals of the methodologies are based on the roles of knowledge representations combined with specific evaluation criteria; iii) each ontology is evaluated according to the type of ontology. The methodology was empirically evaluated using different ontologists and ontologies of the same domain. The main contributions of this study are: i) defining a step-by-step approach to evaluate the quality of an ontology; ii) proposing an evaluation based on the roles of knowledge representations; iii) the explicit difference of the evaluation according to the type of the ontology iii) a questionnaire to evaluate the ontologies; iv) a statistical model that automatically calculates the quality of the ontologies.", "title": "" }, { "docid": "4b6a4f9d91bc76c541f4879a1a684a3f", "text": "Query auto-completion (QAC) is one of the most prominent features of modern search engines. The list of query candidates is generated according to the prefix entered by the user in the search box and is updated on each new key stroke. Query prefixes tend to be short and ambiguous, and existing models mostly rely on the past popularity of matching candidates for ranking. However, the popularity of certain queries may vary drastically across different demographics and users. For instance, while instagram and imdb have comparable popularities overall and are both legitimate candidates to show for prefix i, the former is noticeably more popular among young female users, and the latter is more likely to be issued by men.\n In this paper, we present a supervised framework for personalizing auto-completion ranking. We introduce a novel labelling strategy for generating offline training labels that can be used for learning personalized rankers. We compare the effectiveness of several user-specific and demographic-based features and show that among them, the user's long-term search history and location are the most effective for personalizing auto-completion rankers. We perform our experiments on the publicly available AOL query logs, and also on the larger-scale logs of Bing. The results suggest that supervised rankers enhanced by personalization features can significantly outperform the existing popularity-based base-lines, in terms of mean reciprocal rank (MRR) by up to 9%.", "title": "" }, { "docid": "b0c4b345063e729d67396dce77e677a6", "text": "Work done on the implementation of a fuzzy logic controller in a single intersection of two one-way streets is presented. The model of the intersection is described and validated, and the use of the theory of fuzzy sets in constructing a controller based on linguistic control instructions is introduced. The results obtained from the implementation of the fuzzy logic controller are tabulated against those corresponding to a conventional effective vehicle-actuated controller. With the performance criterion being the average delay of vehicles, it is shown that the use of a fuzzy logic controller results in a better performance.", "title": "" }, { "docid": "ad6672657fc07ed922f1e2c0212b30bc", "text": "As a generalization of the ordinary wavelet transform, the fractional wavelet transform (FRWT) is a very promising tool for signal analysis and processing. Many of its fundamental properties are already known; however, little attention has been paid to its sampling theory. In this paper, we first introduce the concept of multiresolution analysis associated with the FRWT, and then propose a sampling theorem for signals in FRWT-based multiresolution subspaces. The necessary and sufficient condition for the sampling theorem is derived. Moreover, sampling errors due to truncation and aliasing are discussed. The validity of the theoretical derivations is demonstrated via simulations.", "title": "" }, { "docid": "892e70d9666267bc1faf3911c8e60264", "text": "Interactive spoken dialogue provides many new challenges for natural language understanding systems. One of the most critical challenges is simply determining the speaker’s intended utterances: both segmenting a speaker’s turn into utterances and determining the intended words in each utterance. Even assuming perfect word recognition, the latter problem is complicated by the occurrence of speech repairs, which occur where speakers go back and change (or repeat) something they just said. The words that are replaced or repeated are no longer part of the intended utterance, and so need to be identified. Segmenting turns and resolving repairs are strongly intertwined with a third task: identifying discourse markers. Because of the interactions, and interactions with POS tagging and speech recognition, we need to address these tasks together and early on in the processing stream. This paper presents a statistical language model in which we redefine the speech recognition problem so that it includes the identification of POS tags, discourse markers, speech repairs and intonational phrases. By solving these simultaneously, we obtain better results on each task than addressing them separately. Our model is able to identify 72% of turn-internal intonational boundaries with a precision of 71%, 97% of discourse markers with 96% precision, and detect and correct 66% of repairs with 74% precision.", "title": "" }, { "docid": "1adc476c1e322d7cc7a0c93e726a8e2c", "text": "A wireless body area network is a radio-frequency- based wireless networking technology that interconnects tiny nodes with sensor or actuator capabilities in, on, or around a human body. In a civilian networking environment, WBANs provide ubiquitous networking functionalities for applications varying from healthcare to safeguarding of uniformed personnel. This article surveys pioneer WBAN research projects and enabling technologies. It explores application scenarios, sensor/actuator devices, radio systems, and interconnection of WBANs to provide perspective on the trade-offs between data rate, power consumption, and network coverage. Finally, a number of open research issues are discussed.", "title": "" }, { "docid": "fe55db2d04fdba4f4655e39520f135bd", "text": "The application of virtual reality in e-commerce has enormous potential for transforming online shopping into a real-world equivalent. However, the growing research interest focuses on virtual reality technology adoption for the development of e-commerce environments without addressing social and behavioral facets of online shopping such as trust. At the same time, trust is a critical success factor for e-commerce and remains an open issue as to how it can be accomplished within an online store. This paper shows that the use of virtual reality for online shopping environments offers an advanced customer experience compared to conventional web stores and enables the formation of customer trust. The paper presents a prototype virtual shopping mall environment, designed on principles derived by an empirically tested model for building trust in e-commerce. The environment is evaluated with an empirical study providing evidence and explaining that a virtual reality shopping environment would be preferred by customers over a conventional web store and would facilitate the assessment of the e-vendor’s trustworthiness.", "title": "" }, { "docid": "3e6151d32fc5c2be720aab5cc467eecb", "text": "The weighted linear combination (WLC) technique is a decision rule for deriving composite maps using GIS. It is one of the most often used decision models in GIS. The method, however, is frequently applied without full understanding of the assumptions underling this approach. In many case studies, the WLC model has been applied incorrectly and with dubious results because analysts (decision makers) have ignored or been unaware of the assumptions. This paper provides a critical overview of the current practice with respect to GIS/WLC and suggests the best practice approach.", "title": "" }, { "docid": "5a7e97c755e29a9a3c82fc3450f9a929", "text": "Intel Software Guard Extensions (SGX) is a hardware-based Trusted Execution Environment (TEE) that enables secure execution of a program in an isolated environment, called an enclave. SGX hardware protects the running enclave against malicious software, including the operating system, hypervisor, and even low-level firmware. This strong security property allows trustworthy execution of programs in hostile environments, such as a public cloud, without trusting anyone (e.g., a cloud provider) between the enclave and the SGX hardware. However, recent studies have demonstrated that enclave programs are vulnerable to accurate controlled-channel attacks conducted by a malicious OS. Since enclaves rely on the underlying OS, curious and potentially malicious OSs can observe a sequence of accessed addresses by intentionally triggering page faults. In this paper, we propose T-SGX, a complete mitigation solution to the controlled-channel attack in terms of compatibility, performance, and ease of use. T-SGX relies on a commodity component of the Intel processor (since Haswell), called Transactional Synchronization Extensions (TSX), which implements a restricted form of hardware transactional memory. As TSX is implemented as an extension (i.e., snooping the cache protocol), any unusual event, such as an exception or interrupt, that should be handled in its core component, results in an abort of the ongoing transaction. One interesting property is that the TSX abort suppresses the notification of errors to the underlying OS. This means that the OS cannot know whether a page fault has occurred during the transaction. T-SGX, by utilizing this property of TSX, can carefully isolate the effect of attempts to tap running enclaves, thereby completely eradicating the known controlledchannel attack. We have implemented T-SGX as a compiler-level scheme to automatically transform a normal enclave program into a secured enclave program without requiring manual source code modification or annotation. We not only evaluate the security properties of T-SGX, but also demonstrate that it could be applied to all the previously demonstrated attack targets, such as libjpeg, Hunspell, and FreeType. To evaluate the performance of T-SGX, we ported 10 benchmark programs of nbench to the SGX environment. Our evaluation results look promising. T-SGX is † The two lead authors contributed equally to this work. ⋆ The author did part of this work during an intership at Microsoft Research. an order of magnitude faster than the state-of-the-art mitigation schemes. On our benchmarks, T-SGX incurs on average 50% performance overhead and less than 30% storage overhead.", "title": "" }, { "docid": "3081cab6599394a1cc062e1f2e00decf", "text": "This paper describes the 3Book, a 3D interactive visualization of a codex book as a component for digital library and information-intensive applications. The 3Book is able to represent books of almost unlimited length, allows users to read large format books, and has features to enhance reading and sensemaking.", "title": "" }, { "docid": "33c113db245fb36c3ce8304be9909be6", "text": "Bring Your Own Device (BYOD) is growing in popularity. In fact, this inevitable and unstoppable trend poses new security risks and challenges to control and manage corporate networks and data. BYOD may be infected by viruses, spyware or malware that gain access to sensitive data. This unwanted access led to the disclosure of information, modify access policy, disruption of service, loss of productivity, financial issues, and legal implications. This paper provides a review of existing literature concerning the access control and management issues, with a focus on recent trends in the use of BYOD. This article provides an overview of existing research articles which involve access control and management issues, which constitute of the recent rise of usage of BYOD devices. This review explores a broad area concerning information security research, ranging from management to technical solution of access control in BYOD. The main aim for this is to investigate the most recent trends touching on the access control issues in BYOD concerning information security and also to analyze the essential and comprehensive requirements needed to develop an access control framework in the future. Keywords— Bring Your Own Device, BYOD, access control, policy, security.", "title": "" }, { "docid": "21025b37c5c172399c63148f1bfa49ab", "text": "Buffer overflows belong to the most common class of attacks on today’s Internet. Although stack-based variants are still by far more frequent and well-understood, heap-based overflows have recently gained more attention. Several real-world exploits have been published that corrupt heap management information and allow arbitrary code execution with the privileges of the victim process. This paper presents a technique that protects the heap management information and allows for run-time detection of heap-based overflows. We discuss the structure of these attacks and our proposed detection scheme that has been implemented as a patch to the GNU Lib C. We report the results of our experiments, which demonstrate the detection effectiveness and performance impact of our approach. In addition, we discuss different mechanisms to deploy the memory protection.", "title": "" }, { "docid": "b51f3871cf5354c23e5ffd18881fe951", "text": "As the Internet grows in importance, concerns about online privacy have arisen. We describe the development and validation of three short Internet-administered scales measuring privacy related attitudes ('Privacy Concern') and behaviors ('General Caution' and 'Technical Protection'). Internet Privacy Scales 1 In Press: Journal of the American Society for Information Science and Technology UNCORRECTED proofs. This is a preprint of an article accepted for publication in Journal of the American Society for Information Science and Technology copyright 2006 Wiley Periodicals, Inc. Running Head: INTERNET PRIVACY SCALES Development of measures of online privacy concern and protection for use on the", "title": "" }, { "docid": "05f77aceabb886ea54af07e1bfeb1686", "text": "The associations between time spent in sleep, sedentary behaviors (SB) and physical activity with health are usually studied without taking into account that time is finite during the day, so time spent in each of these behaviors are codependent. Therefore, little is known about the combined effect of time spent in sleep, SB and physical activity, that together constitute a composite whole, on obesity and cardio-metabolic health markers. Cross-sectional analysis of NHANES 2005-6 cycle on N = 1937 adults, was undertaken using a compositional analysis paradigm, which accounts for this intrinsic codependence. Time spent in SB, light intensity (LIPA) and moderate to vigorous activity (MVPA) was determined from accelerometry and combined with self-reported sleep time to obtain the 24 hour time budget composition. The distribution of time spent in sleep, SB, LIPA and MVPA is significantly associated with BMI, waist circumference, triglycerides, plasma glucose, plasma insulin (all p<0.001), and systolic (p<0.001) and diastolic blood pressure (p<0.003), but not HDL or LDL. Within the composition, the strongest positive effect is found for the proportion of time spent in MVPA. Strikingly, the effects of MVPA replacing another behavior and of MVPA being displaced by another behavior are asymmetric. For example, re-allocating 10 minutes of SB to MVPA was associated with a lower waist circumference by 0.001% but if 10 minutes of MVPA is displaced by SB this was associated with a 0.84% higher waist circumference. The proportion of time spent in LIPA and SB were detrimentally associated with obesity and cardiovascular disease markers, but the association with SB was stronger. For diabetes risk markers, replacing SB with LIPA was associated with more favorable outcomes. Time spent in MVPA is an important target for intervention and preventing transfer of time from LIPA to SB might lessen the negative effects of physical inactivity.", "title": "" }, { "docid": "7471dc4c3020d479457dfbbdac924501", "text": "Objective:Communicating with families is a core skill for neonatal clinicians, yet formal communication training rarely occurs. This study examined the impact of an intensive interprofessional communication training for neonatology fellows and nurse practitioners.Study Design:Evidence-based, interactive training for common communication challenges in neonatology incorporated didactic sessions, role-plays and reflective exercises. Participants completed surveys before, after, and one month following the training.Result:Five neonatology fellows and eight nurse practitioners participated (n=13). Before the training, participants overall felt somewhat prepared (2.6 on 5 point Likert-type scale) to engage in core communication challenges; afterwards, participants overall felt very well prepared (4.5 on Likert-type scale) (P<0.05). One month later, participants reported frequently practicing the taught skills and felt quite willing to engage in difficult conversations.Conclusion:An intensive communication training program increased neonatology clinicians’ self-perceived competence to face communication challenges which commonly occur, but for which training is rarely provided.", "title": "" }, { "docid": "a2253bf241f7e5f60e889258e4c0f40c", "text": "BACKGROUND-Software Process Improvement (SPI) is a systematic approach to increase the efficiency and effectiveness of a software development organization and to enhance software products. OBJECTIVE-This paper aims to identify and characterize evaluation strategies and measurements used to assess the impact of different SPI initiatives. METHOD-The systematic literature review includes 148 papers published between 1991 and 2008. The selected papers were classified according to SPI initiative, applied evaluation strategies, and measurement perspectives. Potential confounding factors interfering with the evaluation of the improvement effort were assessed. RESULTS-Seven distinct evaluation strategies were identified, wherein the most common one, “Pre-Post Comparison,” was applied in 49 percent of the inspected papers. Quality was the most measured attribute (62 percent), followed by Cost (41 percent), and Schedule (18 percent). Looking at measurement perspectives, “Project” represents the majority with 66 percent. CONCLUSION-The evaluation validity of SPI initiatives is challenged by the scarce consideration of potential confounding factors, particularly given that “Pre-Post Comparison” was identified as the most common evaluation strategy, and the inaccurate descriptions of the evaluation context. Measurements to assess the short and mid-term impact of SPI initiatives prevail, whereas long-term measurements in terms of customer satisfaction and return on investment tend to be less used.", "title": "" }, { "docid": "c699ede2caeb5953decc55d8e42c2741", "text": "Traditionally, two distinct approaches have been employed for exploratory factor analysis: maximum likelihood factor analysis and principal component analysis. A third alternative, called regularized exploratory factor analysis, was introduced recently in the psychometric literature. Small sample size is an important issue that has received considerable discussion in the factor analysis literature. However, little is known about the differential performance of these three approaches to exploratory factor analysis in a small sample size scenario. A simulation study and an empirical example demonstrate that regularized exploratory factor analysis may be recommended over the two traditional approaches, particularly when sample sizes are small (below 50) and the sample covariance matrix is near singular.", "title": "" } ]
scidocsrr
29956b32543c17678d99228c24c9ded0
Thinking Like a Vertex: A Survey of Vertex-Centric Frameworks for Large-Scale Distributed Graph Processing
[ { "docid": "86cdce8b04818cc07e1003d85305bd40", "text": "Balanced graph partitioning is a well known NP-complete problem with a wide range of applications. These applications include many large-scale distributed problems including the optimal storage of large sets of graph-structured data over several hosts-a key problem in today's Cloud infrastructure. However, in very large-scale distributed scenarios, state-of-the-art algorithms are not directly applicable, because they typically involve frequent global operations over the entire graph. In this paper, we propose a fully distributed algorithm, called JA-BE-JA, that uses local search and simulated annealing techniques for graph partitioning. The algorithm is massively parallel: there is no central coordination, each node is processed independently, and only the direct neighbors of the node, and a small subset of random nodes in the graph need to be known locally. Strict synchronization is not required. These features allow JA-BE-JA to be easily adapted to any distributed graph-processing system from data centers to fully distributed networks. We perform a thorough experimental analysis, which shows that the minimal edge-cut value achieved by JA-BE-JA is comparable to state-of-the-art centralized algorithms such as METIS. In particular, on large social networks JA-BEJA outperforms METIS, which makes JA-BE-JA-a bottom-up, self-organizing algorithm-a highly competitive practical solution for graph partitioning.", "title": "" }, { "docid": "a94278bafc093c37bcba719a4b6a03fa", "text": "Community detection and analysis is an important methodology for understanding the organization of various real-world networks and has applications in problems as diverse as consensus formation in social communities or the identification of functional modules in biochemical networks. Currently used algorithms that identify the community structures in large-scale real-world networks require a priori information such as the number and sizes of communities or are computationally expensive. In this paper we investigate a simple label propagation algorithm that uses the network structure alone as its guide and requires neither optimization of a predefined objective function nor prior information about the communities. In our algorithm every node is initialized with a unique label and at every step each node adopts the label that most of its neighbors currently have. In this iterative process densely connected groups of nodes form a consensus on a unique label to form communities. We validate the algorithm by applying it to networks whose community structures are known. We also demonstrate that the algorithm takes an almost linear time and hence it is computationally less expensive than what was possible so far.", "title": "" } ]
[ { "docid": "3ba57a63ffb5e50cbfe913bc25d39388", "text": "Factorization machines are a generic framework which allows to mimic many factorization models simply by feature engineering. In this way, they combine the high predictive accuracy of factorization models with the flexibility of feature engineering. Unfortunately, factorization machines involve a non-convex optimization problem and are thus subject to bad local minima. In this paper, we propose a convex formulation of factorization machines based on the nuclear norm. Our formulation imposes fewer restrictions on the learned model and is thus more general than the original formulation. To solve the corresponding optimization problem, we present an efficient globally-convergent twoblock coordinate descent algorithm. Empirically, we demonstrate that our approach achieves comparable or better predictive accuracy than the original factorization machines on 4 recommendation tasks and scales to datasets with 10 million samples.", "title": "" }, { "docid": "381ce2a247bfef93c67a3c3937a29b5a", "text": "Product reviews are now widely used by individuals and organizations for decision making (Litvin et al., 2008; Jansen, 2010). And because of the profits at stake, people have been known to try to game the system by writing fake reviews to promote target products. As a result, the task of deceptive review detection has been gaining increasing attention. In this paper, we propose a generative LDA-based topic modeling approach for fake review detection. Our model can aptly detect the subtle differences between deceptive reviews and truthful ones and achieves about 95% accuracy on review spam datasets, outperforming existing baselines by a large margin.", "title": "" }, { "docid": "374e5a4ad900a6f31e4083bef5c08ca4", "text": "Procedural modeling deals with (semi-)automatic content generation by means of a program or procedure. Among other advantages, its data compression and the potential to generate a large variety of detailed content with reduced human intervention, have made procedural modeling attractive for creating virtual environments increasingly used in movies, games, and simulations. We survey procedural methods that are useful to generate features of virtual worlds, including terrains, vegetation, rivers, roads, buildings, and entire cities. In this survey, we focus particularly on the degree of intuitive control and of interactivity offered by each procedural method, because these properties are instrumental for their typical users: designers and artists. We identify the most promising research results that have been recently achieved, but we also realize that there is far from widespread acceptance of procedural methods among non-technical, creative professionals. We conclude by discussing some of the most important challenges of procedural modeling.", "title": "" }, { "docid": "78b371e7df39a1ebbad64fdee7303573", "text": "This state of the art report focuses on glyph-based visualization, a common form of visual design where a data set is depicted by a collection of visual objects referred to as glyphs. Its major strength is that patterns of multivariate data involving more than two attribute dimensions can often be more readily perceived in the context of a spatial relationship, whereas many techniques for spatial data such as direct volume rendering find difficult to depict with multivariate or multi-field data, and many techniques for non-spatial data such as parallel coordinates are less able to convey spatial relationships encoded in the data. This report fills several major gaps in the literature, drawing the link between the fundamental concepts in semiotics and the broad spectrum of glyph-based visualization, reviewing existing design guidelines and implementation techniques, and surveying the use of glyph-based visualization in many applications.", "title": "" }, { "docid": "fb43cec4064dfad44d54d1f2a4981262", "text": "Knowledge representation is a major topic in AI, and many studies attempt to represent entities and relations of know ledge base in a continuous vector space. Among these attempts, translation-based methods build entity and relati on vectors by minimizing the translation loss from a head entity to a tail one. In spite of the success of these methods, translation-based methods also suffer from the oversimpli fied loss metric, and are not competitive enough to model various and complex entities/relations in knowledge bases. To address this issue, we propose TransA, an adaptive metric approach for embedding, utilizing the metric learning idea s to provide a more flexible embedding method. Experiments are conducted on the benchmark datasets and our proposed method makes significant and consistent improvements over the state-of-the-art baselines.", "title": "" }, { "docid": "33cab03ab9773efe22ba07dd461811ef", "text": "This paper describes a real-time feature-based stereo SLAM system that is robust and accurate in a wide variety of conditions –indoors, outdoors, with dynamic objects, changing light conditions, fast robot motions and large-scale loops. Our system follows a parallel-tracking-and-mapping strategy: a tracking thread estimates the camera pose at frame rate; and a mapping thread updates a keyframe-based map at a lower frequency. The stereo constraints of our system allow a robust initialization –avoiding the well-known bootstrapping problem in monocular systems– and the recovery of the real scale. Both aspects are essential for its practical use in real robotic systems that interact with the physical world. In this paper we provide the implementation details, an exhaustive evaluation of the system in public datasets and a comparison of most state-of-the-art feature detectors and descriptors on the presented system. For the benefit of the community, its code for ROS (Robot Operating System) has been released.", "title": "" }, { "docid": "107c34ebf283971942f7a9e4dc603f95", "text": "Universal schema jointly embeds knowledge bases and textual patterns to reason about entities and relations for automatic knowledge base construction and information extraction. In the past, entity pairs and relations were represented as learned vectors with compatibility determined by a scoring function, limiting generalization to unseen text patterns and entities. Recently, ‘column-less’ versions of Universal Schema have used compositional pattern encoders to generalize to all text patterns. In this work we take the next step and propose a ‘row-less’ model of universal schema, removing explicit entity pair representations. Instead of learning vector representations for each entity pair in our training set, we treat an entity pair as a function of its relation types. In experimental results on the FB15k-237 benchmark we demonstrate that we can match the performance of a comparable model with explicit entity pair representations using a model of attention over relation types. We further demonstrate that the model performs with nearly the same accuracy on entity pairs never seen during training.", "title": "" }, { "docid": "9e648d8a00cb82489e1b2cd0991f2fbd", "text": "In this work, we propose and evaluate generic hardware countermeasures against DPA attacks for recent FPGA devices. The proposed set of FPGA-specific countermeasures can be combined to resist a large variety of first-order DPA attacks, even with 100 million recorded power traces. This set includes generic and resource-efficient countermeasures for on-chip noise generation, random-data processing delays and S-box scrambling using dual-ported block memories. In particular, it is possible to build many of these countermeasures into a single IP-core or hard macro that then provides basic protection for any cryptographic implementation just by its inclusion in the design process – what is particularly useful for engineers with no or little background on IT security and SCA attacks.", "title": "" }, { "docid": "374b87b187fbc253477cd1e8f60e9d91", "text": "Term Used Definition Provided Source I/T strategy None provided Henderson and Venkatraman 1999 Information Management Strategy \" A long-term precept for directing, implementing and supervising information management \" (information management left undefined) Reponen 1994 (p. 30) \" Deals with management of the entire information systems function, \" referring to Earl (1989, p. 117): \" the management framework which guides how the organization should run IS/IT activities \" Ragu-Nathan et al. 2001 (p. 269)", "title": "" }, { "docid": "426d3b0b74eacf4da771292abad06739", "text": "Brain tumor is considered as one of the deadliest and most common form of cancer both in children and in adults. Consequently, determining the correct type of brain tumor in early stages is of significant importance to devise a precise treatment plan and predict patient's response to the adopted treatment. In this regard, there has been a recent surge of interest in designing Convolutional Neural Networks (CNNs) for the problem of brain tumor type classification. However, CNNs typically require large amount of training data and can not properly handle input transformations. Capsule networks (referred to as CapsNets) are brand new machine learning architectures proposed very recently to overcome these shortcomings of CNNs, and posed to revolutionize deep learning solutions. Of particular interest to this work is that Capsule networks are robust to rotation and affine transformation, and require far less training data, which is the case for processing medical image datasets including brain Magnetic Resonance Imaging (MRI) images. In this paper, we focus to achieve the following four objectives: (i) Adopt and incorporate CapsNets for the problem of brain tumor classification to design an improved architecture which maximizes the accuracy of the classification problem at hand; (ii) Investigate the over-fitting problem of CapsNets based on a real set of MRI images; (iii) Explore whether or not CapsNets are capable of providing better fit for the whole brain images or just the segmented tumor, and; (iv) Develop a visualization paradigm for the output of the CapsNet to better explain the learned features. Our results show that the proposed approach can successfully overcome CNNs for the brain tumor classification problem.", "title": "" }, { "docid": "5106566168dbca72d0c7fa598a05c1d7", "text": "Article history: Received 28 April 2008 Received in revised form 8 September 2008 Accepted 5 October 2008", "title": "" }, { "docid": "1a59bf4467e73a6cae050e5670dbf4fa", "text": "BACKGROUND\nNivolumab combined with ipilimumab resulted in longer progression-free survival and a higher objective response rate than ipilimumab alone in a phase 3 trial involving patients with advanced melanoma. We now report 3-year overall survival outcomes in this trial.\n\n\nMETHODS\nWe randomly assigned, in a 1:1:1 ratio, patients with previously untreated advanced melanoma to receive nivolumab at a dose of 1 mg per kilogram of body weight plus ipilimumab at a dose of 3 mg per kilogram every 3 weeks for four doses, followed by nivolumab at a dose of 3 mg per kilogram every 2 weeks; nivolumab at a dose of 3 mg per kilogram every 2 weeks plus placebo; or ipilimumab at a dose of 3 mg per kilogram every 3 weeks for four doses plus placebo, until progression, the occurrence of unacceptable toxic effects, or withdrawal of consent. Randomization was stratified according to programmed death ligand 1 (PD-L1) status, BRAF mutation status, and metastasis stage. The two primary end points were progression-free survival and overall survival in the nivolumab-plus-ipilimumab group and in the nivolumab group versus the ipilimumab group.\n\n\nRESULTS\nAt a minimum follow-up of 36 months, the median overall survival had not been reached in the nivolumab-plus-ipilimumab group and was 37.6 months in the nivolumab group, as compared with 19.9 months in the ipilimumab group (hazard ratio for death with nivolumab plus ipilimumab vs. ipilimumab, 0.55 [P<0.001]; hazard ratio for death with nivolumab vs. ipilimumab, 0.65 [P<0.001]). The overall survival rate at 3 years was 58% in the nivolumab-plus-ipilimumab group and 52% in the nivolumab group, as compared with 34% in the ipilimumab group. The safety profile was unchanged from the initial report. Treatment-related adverse events of grade 3 or 4 occurred in 59% of the patients in the nivolumab-plus-ipilimumab group, in 21% of those in the nivolumab group, and in 28% of those in the ipilimumab group.\n\n\nCONCLUSIONS\nAmong patients with advanced melanoma, significantly longer overall survival occurred with combination therapy with nivolumab plus ipilimumab or with nivolumab alone than with ipilimumab alone. (Funded by Bristol-Myers Squibb and others; CheckMate 067 ClinicalTrials.gov number, NCT01844505 .).", "title": "" }, { "docid": "b3db9ba5bd1a6c467f2cf526072641f3", "text": "This paper describes the design and analysis of a Log-Periodic Microstrip Antenna Array operating between 3.3 Gigahertz (GHz) and 4.5 GHz. A five square patches fed by inset feed line technique are connected with a single transmission line by a log-periodic array formation. By applying five PIN Diodes at the transmission line with a quarter-wave length radial stub biasing, four different sub-band frequencies are configured by switching ON and OFF the PIN Diode. Simulation as well as measurement results with antenna design is presented and it shows that a good agreement in term of return loss. The simulated radiation pattern and realized gain for every sub bands also presented and discussed.", "title": "" }, { "docid": "390cb70c820d0ebefe936318f8668ac3", "text": "BACKGROUND\nMandatory labeling of products with top allergens has improved food safety for consumers. Precautionary allergen labeling (PAL), such as \"may contain\" or \"manufactured on shared equipment,\" are voluntarily placed by the food industry.\n\n\nOBJECTIVE\nTo establish knowledge of PAL and its impact on purchasing habits by food-allergic consumers in North America.\n\n\nMETHODS\nFood Allergy Research & Education and Food Allergy Canada surveyed consumers in the United States and Canada on purchasing habits of food products featuring different types of PAL. Associations between respondents' purchasing behaviors and individual characteristics were estimated using multiple logistic regression.\n\n\nRESULTS\nOf 6684 participants, 84.3% (n = 5634) were caregivers of a food-allergic child and 22.4% had food allergy themselves. Seventy-one percent reported a history of experiencing a severe allergic reaction. Buying practices varied on the basis of PAL wording; 11% of respondents purchased food with \"may contain\" labeling, whereas 40% purchased food that used \"manufactured in a facility that also processes.\" Twenty-nine percent of respondents were unaware that the law requires labeling of priority food allergens. Forty-six percent were either unsure or incorrectly believed that PAL is required by law. Thirty-seven percent of respondents thought PAL was based on the amount of allergen present. History of a severe allergic reaction decreased the odds of purchasing foods with PAL.\n\n\nCONCLUSIONS\nAlmost half of consumers falsely believed that PAL was required by law. Up to 40% surveyed consumers purchased products with PAL. Understanding of PAL is poor, and improved awareness and guidelines are needed to help food-allergic consumers purchase food safely.", "title": "" }, { "docid": "7b5d2e7f1475997a49ed9fa820d565fe", "text": "PURPOSE\nImplementations of health information technologies are notoriously difficult, which is due to a range of inter-related technical, social and organizational factors that need to be considered. In the light of an apparent lack of empirically based integrated accounts surrounding these issues, this interpretative review aims to provide an overview and extract potentially generalizable findings across settings.\n\n\nMETHODS\nWe conducted a systematic search and critique of the empirical literature published between 1997 and 2010. In doing so, we searched a range of medical databases to identify review papers that related to the implementation and adoption of eHealth applications in organizational settings. We qualitatively synthesized this literature extracting data relating to technologies, contexts, stakeholders, and their inter-relationships.\n\n\nRESULTS\nFrom a total body of 121 systematic reviews, we identified 13 systematic reviews encompassing organizational issues surrounding health information technology implementations. By and large, the evidence indicates that there are a range of technical, social and organizational considerations that need to be deliberated when attempting to ensure that technological innovations are useful for both individuals and organizational processes. However, these dimensions are inter-related, requiring a careful balancing act of strategic implementation decisions in order to ensure that unintended consequences resulting from technology introduction do not pose a threat to patients.\n\n\nCONCLUSIONS\nOrganizational issues surrounding technology implementations in healthcare settings are crucially important, but have as yet not received adequate research attention. This may in part be due to the subjective nature of factors, but also due to a lack of coordinated efforts toward more theoretically-informed work. Our findings may be used as the basis for the development of best practice guidelines in this area.", "title": "" }, { "docid": "7da0a472f0a682618eccbfd4229ca14f", "text": "A Search Join is a join operation which extends a user-provided table with additional attributes based on a large corpus of heterogeneous data originating from the Web or corporate intranets. Search Joins are useful within a wide range of application scenarios: Imagine you are an analyst having a local table describing companies and you want to extend this table with attributes containing the headquarters, turnover, and revenue of each company. Or imagine you are a film enthusiast and want to extend a table describing films with attributes like director, genre, and release date of each film. This article presents the Mannheim Search Join Engine which automatically performs such table extension operations based on a large corpus of Web data. Given a local table, the Mannheim Search Join Engine searches the corpus for additional data describing the entities contained in the input table. The discovered data is then joined with the local table and is consolidated using schema matching and data fusion techniques. As result, the user is presented with an extended table and given the opportunity to examine the provenance of the added data. We evaluate the Mannheim Search Join Engine using heterogeneous data originating from over one million different websites. The data corpus consists of HTML tables, as well as Linked Data and Microdata annotations which are converted into tabular form. Our experiments show that the Mannheim Search Join Engine achieves a coverage close to 100% and a precision of around 90% for the tasks of extending tables describing cities, companies, countries, drugs, books, films, and songs.", "title": "" }, { "docid": "db87c7b7ff0ef870d12a98031f559f02", "text": "Volatility prediction—an essential concept in financial markets—has recently been addressed using sentiment analysis methods. We investigate the sentiment of annual disclosures of companies in stock markets to forecast volatility. We specifically explore the use of recent Information Retrieval (IR) term weighting models that are effectively extended by related terms using word embeddings. In parallel to textual information, factual market data have been widely used as the mainstream approach to forecast market risk. We therefore study different fusion methods to combine text and market data resources. Our word embedding-based approach significantly outperforms state-ofthe-art methods. In addition, we investigate the characteristics of the reports of the companies in different financial sectors.", "title": "" }, { "docid": "32c28df748ea98dffac8bc0fe5aea395", "text": "The stability of an interconnected power system is its ability to return to normal or stable operation after having been subjected to some form of disturbance. Instability means a condition denoting loss of synchronism or falling out of step. Stability considerations have been recognized as an essential part of power system planning for a long time. With interconnected system continually growing in size and extending over vast geographical regions, it is becoming increasingly more difficult to maintain synchronism between various parts of a power system. FACTS devices have shown very promising results when used to improve power system steady-state performance. They have been very promising Candidates for utilization in power system damping enhancement. Hybrid Power Flow Controller (HPFC) is incorporated with MM system in the present work as it can be used to replace or supplement the existing equipments. Usually, it can be installed at locations already having the reactive power compensation equipments like the SVC, STATCOM etc. In this Paper author Studied the power system stability enhancement by implementing the HPFC in MM System power system. The system also has the provision of a comparative study of the performances of UPFC and HPFC regarding power system stability enhancement of the system. Results obtained are encouraging and indicate that the designed model has very good performance which is comparable to the already existing UPFC.", "title": "" }, { "docid": "6c284026d7f798377c2f7c7ba3b57501", "text": "In this paper, for the first time, an InAs/Si heterojunction double-gate tunnel FET (H-DGTFET) has been analyzed for low-power high-frequency applications. For this purpose, the suitability of the device for low-power applications is investigated by extracting the threshold voltage of the device using a transconductance change method and a constant current method. Furthermore, the effects of uniform and Gaussian drain doping profile on dc characteristics and analog/RF performances are investigated for different channel lengths. A highly doped layer is placed in the channel near the source-channel junction, and this decreases the width of the depletion region, which improves the ON-current (ION) and the RF performance. Furthermore, the circuit-level performance assessment is done by implementing a common source amplifier using the H-DGTFET; a 3-dB roll-off frequency of 230.11 GHz and a unity-gain frequency of 5.4 THz were achieved.", "title": "" }, { "docid": "aa3e8c4e4695d8c372987c8e409eb32f", "text": "We present a novel sketch-based system for the interactive modeling of a variety of free-form 3D objects using just a few strokes. Our technique is inspired by the traditional illustration strategy for depicting 3D forms where the basic geometric forms of the subjects are identified, sketched and progressively refined using few key strokes. We introduce two parametric surfaces, rotational and cross sectional blending, that are inspired by this illustration technique. We also describe orthogonal deformation and cross sectional oversketching as editing tools to complement our modeling techniques. Examples with models ranging from cartoon style to botanical illustration demonstrate the capabilities of our system.", "title": "" } ]
scidocsrr
52944b9b907da2f4956eb0c891f32727
Towards Verifiably Ethical Robot Behaviour
[ { "docid": "854c0cc4f9beb2bf03ac58be8bf79e8c", "text": "Mobile robots have the potential to become the ideal tool to teach a broad range of engineering disciplines. Indeed, mobile robots are getting increasingly complex and accessible. They embed elements from diverse fields such as mechanics, digital electronics, automatic control, signal processing, embedded programming, and energy management. Moreover, they are attractive for students which increases their motivation to learn. However, the requirements of an effective education tool bring new constraints to robotics. This article presents the e-puck robot design, which specifically targets engineering education at university level. Thanks to its particular design, the e-puck can be used in a large spectrum of teaching activities, not strictly related to robotics. Through a systematic evaluation by the students, we show that the epuck fits this purpose and is appreciated by 90 percent of a large sample of students.", "title": "" }, { "docid": "b4b06fc0372537459de882b48152c4c9", "text": "As humans are being progressively pushed further downstream in the decision-making process of autonomous systems, the need arises to ensure that moral standards, however defined, are adhered to by these robotic artifacts. While meaningful inroads have been made in this area regarding the use of ethical lethal military robots, including work by our laboratory, these needs transcend the warfighting domain and are pervasive, extending to eldercare, robot nannies, and other forms of service and entertainment robotic platforms. This paper presents an overview of the spectrum and specter of ethical issues raised by the advent of these systems, and various technical results obtained to date by our research group, geared towards managing ethical behavior in autonomous robots in relation to humanity. This includes: 1) the use of an ethical governor capable of restricting robotic behavior to predefined social norms; 2) an ethical adaptor which draws upon the moral emotions to allow a system to constructively and proactively modify its behavior based on the consequences of its actions; 3) the development of models of robotic trust in humans and its dual, deception, drawing on psychological models of interdependence theory; and 4) concluding with an approach towards the maintenance of dignity in human-robot relationships.", "title": "" } ]
[ { "docid": "e807c0b74553a62a0e57caa2665aaa98", "text": "Reverse genetics in model organisms such as Drosophila melanogaster, Arabidopsis thaliana, zebrafish and rats, efficient genome engineering in human embryonic stem and induced pluripotent stem cells, targeted integration in crop plants, and HIV resistance in immune cells — this broad range of outcomes has resulted from the application of the same core technology: targeted genome cleavage by engineered, sequence-specific zinc finger nucleases followed by gene modification during subsequent repair. Such 'genome editing' is now established in human cells and a number of model organisms, thus opening the door to a range of new experimental and therapeutic possibilities.", "title": "" }, { "docid": "fad6638497886e557d8c55a98e5a00b0", "text": "Cancer remains a major killer worldwide. Traditional methods of cancer treatment are expensive and have some deleterious side effects on normal cells. Fortunately, the discovery of anticancer peptides (ACPs) has paved a new way for cancer treatment. With the explosive growth of peptide sequences generated in the post genomic age, it is highly desired to develop computational methods for rapidly and effectively identifying ACPs, so as to speed up their application in treating cancer. Here we report a sequence-based predictor called iACP developed by the approach of optimizing the g-gap dipeptide components. It was demonstrated by rigorous cross-validations that the new predictor remarkably outperformed the existing predictors for the same purpose in both overall accuracy and stability. For the convenience of most experimental scientists, a publicly accessible web-server for iACP has been established at http://lin.uestc.edu.cn/server/iACP, by which users can easily obtain their desired results.", "title": "" }, { "docid": "a8af37df01ad45139589e82bd81deb61", "text": "As technology use continues to rise, especially among young individuals, there are concerns that excessive use of technology may impact academic performance. Researchers have started to investigate the possible negative effects of technology use on college academic performance, but results have been mixed. The following study seeks to expand upon previous studies by exploring the relationship among the use of a wide variety of technology forms and an objective measure of academic performance (GPA) using a 7-day time diary data collection method. The current study also seeks to examine both underclassmen and upperclassmen to see if these groups differ in how they use technology. Upperclassmen spent significantly more time using technology for academic and workrelated purposes, whereas underclassmen spent significantly more time using cell phones, online chatting, and social networking sites. Significant negative correlations with GPA emerged for television, online gaming, adult site, and total technology use categories. Keyword: Technology use, academic performance, post-secondary education.", "title": "" }, { "docid": "f5532b33092d22c97d1b6ebe69de051f", "text": "Automatic personality recognition is useful for many computational applications, including recommendation systems, dating websites, and adaptive dialogue systems. There have been numerous successful approaches to classify the “Big Five” personality traits from a speaker’s utterance, but these have largely relied on judgments of personality obtained from external raters listening to the utterances in isolation. This work instead classifies personality traits based on self-reported personality tests, which are more valid and more difficult to identify. Our approach, which uses lexical and acoustic-prosodic features, yields predictions that are between 6.4% and 19.2% more accurate than chance. This approach predicts Opennessto-Experience and Neuroticism most successfully, with less accurate recognition of Extroversion. We compare the performance of classification and regression techniques, and also explore predicting personality clusters.", "title": "" }, { "docid": "a88eb6af576d056e8d3871afef725516", "text": "Clouds play an important role in creating realistic images of outdoor scenes. Many methods have therefore been proposed for displaying realistic clouds. However, the realism of the resulting images depends on many parameters used to render them and it is often difficult to adjust those parameters manually. This paper proposes a method for addressing this problem by solving an inverse rendering problem: given a non-uniform synthetic cloud density distribution, the parameters for rendering the synthetic clouds are estimated using photographs of real clouds. The objective function is defined as the difference between the color histograms of the photograph and the synthetic image. Our method searches for the optimal parameters using genetic algorithms. During the search process, we take into account the multiple scattering of light inside the clouds. The search process is accelerated by precomputing a set of intermediate images. After ten to twenty minutes of precomputation, our method estimates the optimal parameters within a minute.", "title": "" }, { "docid": "93064713fe271a9e173d790de09f2da6", "text": "Network science is an interdisciplinary endeavor, with methods and applications drawn from across the natural, social, and information sciences. A prominent problem in network science is the algorithmic detection of tightly connected groups of nodes known as communities. We developed a generalized framework of network quality functions that allowed us to study the community structure of arbitrary multislice networks, which are combinations of individual networks coupled through links that connect each node in one network slice to itself in other slices. This framework allows studies of community structure in a general setting encompassing networks that evolve over time, have multiple types of links (multiplexity), and have multiple scales.", "title": "" }, { "docid": "1e30732092d2bcdeff624364c27e4c9c", "text": "Beliefs that individuals hold about whether emotions are malleable or fixed, also referred to as emotion malleability beliefs, may play a crucial role in individuals' emotional experiences and their engagement in changing their emotions. The current review integrates affective science and clinical science perspectives to provide a comprehensive review of how emotion malleability beliefs relate to emotionality, emotion regulation, and specific clinical disorders and treatment. Specifically, we discuss how holding more malleable views of emotion could be associated with more active emotion regulation efforts, greater motivation to engage in active regulatory efforts, more effort expended regulating emotions, and lower levels of pathological distress. In addition, we explain how extending emotion malleability beliefs into the clinical domain can complement and extend current conceptualizations of major depressive disorder, social anxiety disorder, and generalized anxiety disorder. This may prove important given the increasingly central role emotion dysregulation has been given in conceptualization and intervention for these psychiatric conditions. Additionally, discussion focuses on how emotion beliefs could be more explicitly addressed in existing cognitive therapies. Promising future directions for research are identified throughout the review.", "title": "" }, { "docid": "776e04fa00628e249900b02f1edf9432", "text": "We propose an algorithm for minimizing the total variation of an image, and provide a proof of convergence. We show applications to image denoising, zooming, and the computation of the mean curvature motion of interfaces.", "title": "" }, { "docid": "1b2d34a38f026b5e24d39cb68c8235ee", "text": "This book offers a comprehensive introduction to workflow management, the management of business processes with information technology. By defining, analyzing, and redesigning an organization’s resources and operations, workflow management systems ensure that the right information reaches the right person or computer application at the right time. The book provides a basic overview of workflow terminology and organization, as well as detailed coverage of workflow modeling with Petri nets. Because Petri nets make definitions easier to understand for nonexperts, they facilitate communication between designers and users. The book includes a chapter of case studies, review exercises, and a glossary.", "title": "" }, { "docid": "b4ed15850674851fb7e479b7181751d7", "text": "In this paper we propose an approach to holistic scene understanding that reasons jointly about regions, location, class and spatial extent of objects, presence of a class in the image, as well as the scene type. Learning and inference in our model are efficient as we reason at the segment level, and introduce auxiliary variables that allow us to decompose the inherent high-order potentials into pairwise potentials between a few variables with small number of states (at most the number of classes). Inference is done via a convergent message-passing algorithm, which, unlike graph-cuts inference, has no submodularity restrictions and does not require potential specific moves. We believe this is very important, as it allows us to encode our ideas and prior knowledge about the problem without the need to change the inference engine every time we introduce a new potential. Our approach outperforms the state-of-the-art on the MSRC-21 benchmark, while being much faster. Importantly, our holistic model is able to improve performance in all tasks.", "title": "" }, { "docid": "417307155547a565d03d3f9c2a235b2e", "text": "Recent deep learning based methods have achieved the state-of-the-art performance for handwritten Chinese character recognition (HCCR) by learning discriminative representations directly from raw data. Nevertheless, we believe that the long-and-well investigated domain-specific knowledge should still help to boost the performance of HCCR. By integrating the traditional normalization-cooperated direction-decomposed feature map (directMap) with the deep convolutional neural network (convNet), we are able to obtain new highest accuracies for both online and offline HCCR on the ICDAR-2013 competition database. With this new framework, we can eliminate the needs for data augmentation and model ensemble, which are widely used in other systems to achieve their best results. This makes our framework to be efficient and effective for both training and testing. Furthermore, although directMap+convNet can achieve the best results and surpass human-level performance, we show that writer adaptation in this case is still effective. A new adaptation layer is proposed to reduce the mismatch between training and test data on a particular source layer. The adaptation process can be efficiently and effectively implemented in an unsupervised manner. By adding the adaptation layer into the pre-trained convNet, it can adapt to the new handwriting styles of particular writers, and the recognition accuracy can be further improved consistently and significantly. This paper gives an overview and comparison of recent deep learning based approaches for HCCR, and also sets new benchmarks for both online and offline HCCR.", "title": "" }, { "docid": "063a1fe002e0f69dcd6f525d8bb864b2", "text": "Information retrieval over semantic metadata has recently received a great amount of interest in both industry and academia. In particular, discovering complex and meaningful relationships among this data is becoming an active research topic. Just as ranking of documents is a critical component of today’s search engines, the ranking of relationships will be essential in tomorrow’s semantic analytics engines. Building upon our recent work on specifying these semantic relationships, which we refer to as Semantic Associations, we demonstrate a system where these associations are discovered among a large semantic metabase represented in RDF. Additionally we employ ranking techniques to provide users with the most interesting and relevant results.", "title": "" }, { "docid": "c3c1ca3e4e05779bccf4247296df0876", "text": "Intramedullary nailing is one of the most convenient biological options for treating distal femoral fractures. Because the distal medulla of the femur is wider than the middle diaphysis and intramedullary nails cannot completely fill the intramedullary canal, intramedullary nailing of distal femoral fractures can be difficult when trying to obtain adequate reduction. Some different methods exist for achieving reduction. The purpose of this study was determine whether the use of blocking screws resolves varus or valgus and translation and recurvatum deformities, which can be encountered in antegrade and retrograde intramedullary nailing. Thirty-four patients with distal femoral fractures underwent intramedullary nailing between January 2005 and June 2011. Fifteen patients treated by intramedullary nailing and blocking screws were included in the study. Six patients had distal diaphyseal fractures and 9 had distal diaphyseo-metaphyseal fractures. Antegrade nailing was performed in 7 patients and retrograde nailing was performed in 8. Reduction during surgery and union during follow-up were achieved in all patients with no significant complications. Mean follow-up was 26.6 months. Mean time to union was 12.6 weeks. The main purpose of using blocking screws is to achieve reduction, but they are also useful for maintaining permanent reduction. When inserting blocking screws, the screws must be placed 1 to 3 cm away from the fracture line to avoid from propagation of the fracture. When applied properly and in an adequate way, blocking screws provide an efficient solution for deformities encountered during intramedullary nailing of distal femur fractures.", "title": "" }, { "docid": "c0d8842983a2d7952de1c187a80479ac", "text": "Two new topologies of three-phase segmented rotor switched reluctance machine (SRM) that enables the use of standard voltage source inverters (VSIs) for its operation are presented. The topologies has shorter end-turn length, axial length compared to SRM topologies that use three-phase inverters; compared to the conventional SRM (CSRM), these new topologies has the advantage of shorter flux paths that results in lower core losses. FEA based optimization have been performed for a given design specification. The new concentrated winding segmented SRMs demonstrate competitive performance with three-phase standard inverters compared to CSRM.", "title": "" }, { "docid": "51b7cf820e3a46b5daeee6eb83058077", "text": "Previous taxonomies of software change have focused on the purpose of the change (i.e., the why) rather than the underlying mechanisms. This paper proposes a taxonomy of software change based on characterizing the mechanisms of change and the factors that influence these mechanisms. The ultimate goal of this taxonomy is to provide a framework that positions concrete tools, formalisms and methods within the domain of software evolution. Such a framework would considerably ease comparison between the various mechanisms of change. It would also allow practitioners to identify and evaluate the relevant tools, methods and formalisms for a particular change scenario. As an initial step towards this taxonomy, the paper presents a framework that can be used to characterize software change support tools and to identify the factors that impact on the use of these tools. The framework is evaluated by applying it to three different change support tools and by comparing these tools based on this analysis. Copyright c © 2005 John Wiley & Sons, Ltd.", "title": "" }, { "docid": "a9bc624da2e1fe5787d5a1da63f0bc52", "text": "While research studies of digital and mobile payment systems in HCI have pointed out design opportunities situated within informal and nuanced mobile contexts, we have not yet understood how we can design digital monies to allow users to use monies more easily in these contexts. In this study, we examined the design of Alipay and WeChat Wallet, two successful mobile payment apps in China, which have been used by Chinese users for purposes such as playing, gifting, and ceremonial practices. Through semi-structured interviews with 24 Chinese users and grounded theory coding, we identified five contexts in which the flexibility and extensive functions of these payment apps have allowed these users to adaptively use digital monies in highly flexible ways. Finally, our analysis arrived at our conceptual frame—special digital monies—to highlight how digital monies, by allowing users to alter and define their transactional rules and pathways, could vastly expand the potential of digital monies to support users beyond standard retail contexts.", "title": "" }, { "docid": "384c0b4e02b1d16eaa42ed12c3f0ae6b", "text": "In this paper, we discuss the problem of distributing streaming media content, both live and on-demand, to a large number of hosts in a scalable way. Our work is set in the context of the traditional client-server framework. Specifically, we consider the problem that arises when the server is overwhelmed by the volume of requests from its clients. As a solution, we propose Cooperative Networking (CoopNet), where clients cooperate to distribute content, thereby alleviating the load on the server. We discuss the proposed solution in some detail, pointing out the interesting research issues that arise, and present a preliminary evaluation using traces gathered at a busy news site during the flash crowd that occurred on September 11, 2001.", "title": "" }, { "docid": "877a1f7bab575c1a8101ff02ed637767", "text": "Many language-sensitive tools for detecting plagiarism in natural language documents have been developed, particularly for English. Languageindependent tools exist as well, but are considered restrictive as they usually do not take into account specific language features. Detecting plagiarism in Arabic documents is particularly a challenging task because of the complex linguistic structure of Arabic. In this paper, we present a plagiarism detection tool for comparison of Arabic documents to identify potential similarities. The tool is based on a new comparison algorithm that uses heuristics to compare suspect documents at different hierarch ical levels to avoid unnecessary comparisons. We evaluate its performance in terms of precision and recall on a large data set of Arabic documents, and show its capability in identifying direct and sophisticated copying, such as sentence reordering and synonym substitution. We also demonstrate its advantages over other plagiarism detection tools, including Turnitin, the well-known language-independent tool.", "title": "" }, { "docid": "76753fe26a2ed69c5b7099009c9a094f", "text": "A total of 82 strains of presumptive Aeromonas spp. were identified biochemically and genetically (16S rDNA-RFLP). The strains were isolated from 250 samples of frozen fish (Tilapia, Oreochromis niloticus niloticus) purchased in local markets in Mexico City. In the present study, we detected the presence of several genes encoding for putative virulence factors and phenotypic activities that may play an important role in bacterial infection. In addition, we studied the antimicrobial patterns of those strains. Molecular identification demonstrated that the prevalent species in frozen fish were Aeromonas salmonicida (67.5%) and Aeromonas bestiarum (20.9%), accounting for 88.3% of the isolates, while the other strains belonged to the species Aeromonas veronii (5.2%), Aeromonas encheleia (3.9%) and Aeromonas hydrophila (2.6%). Detection by polymerase chain reaction (PCR) of genes encoding putative virulence factors common in Aeromonas, such as aerolysin/hemolysin, lipases including the glycerophospholipid-cholesterol acyltransferase (GCAT), serine protease and DNases, revealed that they were all common in these strains. Our results showed that first generation quinolones and second and third generation cephalosporins were the drugs with the best antimicrobial effect against Aeromonas spp. In Mexico, there have been few studies on Aeromonas and its putative virulence factors. The present work therefore highlights an important incidence of Aeromonas spp., with virulence potential and antimicrobial resistance, isolated from frozen fish intended for human consumption in Mexico City.", "title": "" } ]
scidocsrr
fb556ebac93294e6db1daecc39155ea4
ClaimFinder: A Framework for Identifying Claims in Microblogs
[ { "docid": "a8b818b30bee92efaf43e195590a27fd", "text": "Twitter, or the world of 140 characters poses serious challenges to the efficacy of topic models on short, messy text. While topic models such as Latent Dirichlet Allocation (LDA) have a long history of successful application to news articles and academic abstracts, they are often less coherent when applied to microblog content like Twitter. In this paper, we investigate methods to improve topics learned from Twitter content without modifying the basic machinery of LDA; we achieve this through various pooling schemes that aggregate tweets in a data preprocessing step for LDA. We empirically establish that a novel method of tweet pooling by hashtags leads to a vast improvement in a variety of measures for topic coherence across three diverse Twitter datasets in comparison to an unmodified LDA baseline and a variety of pooling schemes. An additional contribution of automatic hashtag labeling further improves on the hashtag pooling results for a subset of metrics. Overall, these two novel schemes lead to significantly improved LDA topic models on Twitter content.", "title": "" }, { "docid": "e668f84e16a5d17dff7d638a5543af82", "text": "Mining topics in Twitter is increasingly attracting more attention. However, the shortness and informality of tweets leads to extreme sparse vector representation with a large vocabulary, which makes the conventional topic models (e.g., Latent Dirichlet Allocation) often fail to achieve high quality underlying topics. Luckily, tweets always show up with rich user-generated hash tags as keywords. In this paper, we propose a novel topic model to handle such semi-structured tweets, denoted as Hash tag Graph based Topic Model (HGTM). By utilizing relation information between hash tags in our hash tag graph, HGTM establishes word semantic relations, even if they haven't co-occurred within a specific tweet. In addition, we enhance the dependencies of both multiple words and hash tags via latent variables (topics) modeled by HGTM. We illustrate that the user-contributed hash tags could serve as weakly-supervised information for topic modeling, and hash tag relation could reveal the semantic relation between tweets. Experiments on a real-world twitter data set show that our model provides an effective solution to discover more distinct and coherent topics than the state-of-the-art baselines and has a strong ability to control sparseness and noise in tweets.", "title": "" }, { "docid": "7641f8f3ed2afd0c16665b44c1216e79", "text": "In this article we explore the behavior of Twitter users under an emergency situation. In particular, we analyze the activity related to the 2010 earthquake in Chile and characterize Twitter in the hours and days following this disaster. Furthermore, we perform a preliminary study of certain social phenomenons, such as the dissemination of false rumors and confirmed news. We analyze how this information propagated through the Twitter network, with the purpose of assessing the reliability of Twitter as an information source under extreme circumstances. Our analysis shows that the propagation of tweets that correspond to rumors differs from tweets that spread news because rumors tend to be questioned more than news by the Twitter community. This result shows that it is posible to detect rumors by using aggregate analysis on tweets.", "title": "" } ]
[ { "docid": "5b110a3e51de3489168e7edca81b5f3e", "text": "This paper is a review of research in product development, which we define as the transformation of a market opportunity into a product available for sale. Our review is broad, encompassing work in the academic fields of marketing, operations management, and engineering design. The value of this breadth is in conveying the shape of the entire research landscape. We focus on product development projects within a single firm. We also devote our attention to the development of physical goods, although much of the work we describe applies to products of all kinds. We look inside the “black box” of product development at the fundamental decisions that are made by intention or default. In doing so, we adopt the perspective of product development as a deliberate business process involving hundreds of decisions, many of which can be usefully supported by knowledge and tools. We contrast this approach to prior reviews of the literature, which tend to examine the importance of environmental and contextual variables, such as market growth rate, the competitive environment, or the level of top-management support. (Product Development Decisions; Survey; Literature Review)", "title": "" }, { "docid": "9debe1fbdb49f4224e57ebb0635e2f56", "text": "INTRODUCTION\nRadial forearm free flap (RFFF) tube-in-tube phalloplasty is the most performed phalloplasty technique worldwide. The conspicuous donor-site scar is a drawback for some transgender men. In search for techniques with less conspicuous donor-sites, we performed a series of one-stage pedicled anterolateral thigh flap (ALT) phalloplasties combined with RFFF urethral reconstruction. In this study, we aim to describe this technique and assess its surgical outcome in a series of transgender men.\n\n\nPATIENTS AND METHODS\nBetween January 2008 and December 2015, nineteen transgender men (median age 37, range 21-57) underwent pedicled ALT phalloplasty combined with RFFF urethral reconstruction in one stage. The surgical procedure was described. Patient demographics, surgical characteristics, intra- and postoperative complications, hospitalization length, and reoperations were recorded.\n\n\nRESULTS\nThe size of the ALT flaps ranged from 12 × 12 to 15 × 13 cm, the size of the RFFFs from 14 × 3 to 17 × 3 cm. Median clinical follow-up was 35 months (range 3-95). Total RFFF failure occurred in two patients, total ALT flap failure in one patient, and partial necrosis of the ALT flap in one patient. Long-term urinary complications occurred in 10 (53%) patients, of which 9 concerned urethral strictures.\n\n\nCONCLUSIONS\nIn experienced hands, one-stage pedicled ALT phalloplasty combined with RFFF urethral reconstruction is a feasible alternative surgical option in eligible transgender men, who desire a less conspicuous forearm scar. Possible drawbacks comprise flap-related complications, difficult inner flap monitoring and urethral complications.", "title": "" }, { "docid": "daba02e791922ea8c20ebd22f5e592db", "text": "For intrinsically diverse tasks, in which collecting extensive information from different aspects of a topic is required, searchers often have difficulty formulating queries to explore diverse aspects and deciding when to stop searching. With the goal of helping searchers discover unexplored aspects and find the appropriate timing for search stopping in intrinsically diverse tasks, we propose ScentBar, a query suggestion interface visualizing the amount of important information that a user potentially misses collecting from the search results of individual queries. We define the amount of missed information for a query as the additional gain that can be obtained from unclicked search results of the query, where gain is formalized as a set-wise metric based on aspect importance, aspect novelty, and per-aspect document relevance and is estimated by using a state-of-the-art algorithm for subtopic mining and search result diversification. Results of a user study involving 24 participants showed that the proposed interface had the following advantages when the gain estimation algorithm worked reasonably: (1) ScentBar users stopped examining search results after collecting a greater amount of relevant information; (2) they issued queries whose search results contained more missed information; (3) they obtained higher gain, particularly at the late stage of their sessions; and (4) they obtained higher gain per unit time. These results suggest that the simple query visualization helps make the search process of intrinsically diverse tasks more efficient, unless inaccurate estimates of missed information are visualized.", "title": "" }, { "docid": "19a78b1fc19fe25ec5d29baebfe14feb", "text": "A split-capacitor Vcm-based capacitor-switching scheme is proposed for successive approximation register (SAR) analog-to-digital converters (ADCs) to reduce the capacitor-switching energy. By rearranging the structure and procedure of the capacitive array, the scheme can save the capacitor-switching energy by about 92% than the conventional scheme with better monotonicity. Meanwhile, a two-segment DC offset correction scheme for the comparator is also proposed to meet the speed and accuracy requirements. These techniques are utilized in the design of a 10b 70MS/s SAR ADC in 65nm 1P9M CMOS technology. Measurement results show a peak signal-to-noise-and-distortion ratio (SNDR) of 53.2dB, while consuming 960μW from 1.2V supply. The figure of merit (FoM) is 36.8fJ/Conversion-step and the total active area is 220×220μm2.", "title": "" }, { "docid": "2c2574e1eb29ad45bedf346417c85e2d", "text": "Technology has shown great promise in providing access to textual information for visually impaired people. Optical Braille Recognition (OBR) allows people with visual impairments to read volumes of typewritten documents with the help of flatbed scanners and OBR software. This project looks at developing a system to recognize an image of embossed Arabic Braille and then convert it to text. It particularly aims to build fully functional Optical Arabic Braille Recognition system. It has two main tasks, first is to recognize printed Braille cells, and second is to convert them to regular text. Converting Braille to text is not simply a one to one mapping, because one cell may represent one symbol (alphabet letter, digit, or special character), two or more symbols, or part of a symbol. Moreover, multiple cells may represent a single symbol.", "title": "" }, { "docid": "ecf63c35fd0c12a94ee406abe423ac02", "text": "Bitcoin and its underlying technology Blockchain have become popular in recent years. Designed to facilitate a secure distributed platform without central authorities, Blockchain is heralded as a paradigm that will be as powerful as Big Data, Cloud Computing and Machine learning. Blockchain incorporates novel ideas from various fields such as public key encryption and distributed systems. As such, a reader often comes across resources that explain the Blockchain technology from a certain perspective only, leaving the reader with more questions than before. We will offer a holistic view on Blockchain. Starting with a brief history, we will give the building blocks of Blockchain, and explain their interactions. As graph mining has become a major part its analysis, we will elaborate on graph theoretical aspects of the Blockchain technology. We also devote a section to the future of Blockchain and explain how extensions like Smart Contracts and De-centralized Autonomous Organizations will function. Without assuming any reader expertise, our aim is to provide a concise but complete description of the Blockchain technology.", "title": "" }, { "docid": "bb3f4fdbc627cd891b4db9f9e987d585", "text": "In this paper we propose a new design solution for network architecture of future 5G mobile networks. The proposed design is based on user-centric mobile environment with many wireless and mobile technologies on the ground. In heterogeneous wireless environment changes in all, either new or older wireless technologies, is not possible, so each solution towards the next generation mobile and wireless networks should be implemented in the service stratum, while the radio access technologies belong to the transport stratum regarding the Next Generation Networks approach. In the proposed design the user terminal has possibility to change the Radio Access Technology RAT based on certain criteria. For the purpose of transparent change of the RATs by the mobile terminal, we introduce so-called Policy-Router as node in the core network, which establishes IP tunnels to the mobile terminal via different available RATs to the terminal. The selection of the RAT is performed by the mobile terminal by using the proposed user agent for multi-criteria decision making based on the experience from the performance measurements performed by the mobile terminal. For the process of performance measurements we introduce the QoSPRO procedure for control information exchange between the mobile terminal and the Policy Router.", "title": "" }, { "docid": "c3365370cdbf4afe955667f575d1fbb6", "text": "One of the overriding interests of the literature on health care economics is to discover where personal choice in market economies end and corrective government intervention should begin. Our study addresses this question in the context of John Stuart Mill's utilitarian principle of harm. Our primary objective is to determine whether public policy interventions concerning more than 35,000 online pharmacies worldwide are necessary and efficient compared to traditional market-oriented approaches. Secondly, we seek to determine whether government interference could enhance personal  utility maximization, despite its direct and indirect (unintended) costs on medical e-commerce. This study finds that containing the negative externalities of medical e-commerce provides the most compelling raison d'etre of government interference. It asserts that autonomy and paternalism need not be mutually exclusive, despite their direct and indirect consequences on individual choice and decision-making processes. Valuable insights derived from Mill's principle should enrich theory-building in health care economics and policy.", "title": "" }, { "docid": "e640c691a45a5435dcdb7601fb581280", "text": "We study the problem of response selection for multi-turn conversation in retrieval-based chatbots. The task involves matching a response candidate with a conversation context, the challenges for which include how to recognize important parts of the context, and how to model the relationships among utterances in the context. Existing matching methods may lose important information in contexts as we can interpret them with a unified framework in which contexts are transformed to fixed-length vectors without any interaction with responses before matching. This motivates us to propose a new matching framework that can sufficiently carry important information in contexts to matching and model relationships among utterances at the same time. The new framework, which we call a sequential matching framework (SMF), lets each utterance in a context interact with a response candidate at the first step and transforms the pair to a matching vector. The matching vectors are then accumulated following the order of the utterances in the context with a recurrent neural network (RNN) that models relationships among utterances. Context-response matching is then calculated with the hidden states of the RNN. Under SMF, we propose a sequential convolutional network and sequential attention network and conduct experiments on two public data sets to test their performance. Experiment results show that both models can significantly outperform state-of-the-art matching methods. We also show that the models are interpretable with visualizations that provide us insights on how they capture and leverage important information in contexts for matching.", "title": "" }, { "docid": "76d22feb7da3dbc14688b0d999631169", "text": "Guilt proneness is a personality trait indicative of a predisposition to experience negative feelings about personal wrongdoing, even when the wrongdoing is private. It is characterized by the anticipation of feeling bad about committing transgressions rather than by guilty feelings in a particular moment or generalized guilty feelings that occur without an eliciting event. Our research has revealed that guilt proneness is an important character trait because knowing a person’s level of guilt proneness helps us to predict the likelihood that they will behave unethically. For example, online studies of adults across the U.S. have shown that people who score high in guilt proneness (compared to low scorers) make fewer unethical business decisions, commit fewer delinquent behaviors, and behave more honestly when they make economic decisions. In the workplace, guilt-prone employees are less likely to engage in counterproductive behaviors that harm their organization.", "title": "" }, { "docid": "c70c814c8b509b3635089387332fb374", "text": "We have investigated the electromagnetic properties of a 3D wire mesh in a geometry rese covalently bonded diamond. The frequency and wave vector dispersion show forbidden bands a frequenciesn0, corresponding to the lattice spacing, just as dielectric photonic crystals do. But have a new forbidden band which commences at zero frequency and extends, in our geome , 12 n0, acting as a type of plasma cutoff frequency. Wire mesh photonic crystals appear to sup longitudinal plane wave, as well as two transverse plane waves. We identify an important new r for microwave photonic crystals, an effective medium limit, in which electromagnetic waves pene deeply into the wire mesh through the aid of an impurity band.", "title": "" }, { "docid": "d02f4c07881b467b619b3d4a03bcade2", "text": "As more users are connected to the Internet and conduct their daily activities electronically, computer users have become the target of an underground economy that infects hosts with malware or adware for financial gain. Unfortunately, even a single visit to an infected web site enables the attacker to detect vulnerabilities in the user’s applications and force the download a multitude of malware binaries. Frequently, this malware allows the adversary to gain full control of the compromised systems leading to the ex-filtration of sensitive information or installation of utilities that facilitate remote control of the host. We believe that such behavior is similar to our traditional understanding of botnets. However, the main difference is that web-based malware infections are pull-based and that the resulting command feedback loop is looser. To characterize the nature of this rising thread, we identify the four prevalent mechanisms used to inject malicious content on popular web sites: web server security, user contributed content, advertising and third-party widgets. For each of these areas, we present examples of abuse found on the Internet. Our aim is to present the state of malware on the Web and emphasize the importance of this rising threat.", "title": "" }, { "docid": "f1c5f6f2bdff251e91df1dbd1e2302b2", "text": "In this paper, mathematical models for permutation flow shop scheduling and job shop scheduling problems are proposed. The first problem is based on a mixed integer programming model. As the problem is NP-complete, this model can only be used for smaller instances where an optimal solution can be computed. For large instances, another model is proposed which is suitable for solving the problem by stochastic heuristic methods. For the job shop scheduling problem, a mathematical model and its main representation schemes are presented. Keywords—Flow shop, job shop, mixed integer model, representation scheme.", "title": "" }, { "docid": "b96853c2efbc22e4f636d90650bfd4fc", "text": "BACKGROUND AND AIMS:The prevalence of functional dyspepsia (FD) in the general population is not known. The aim of this study is to measure the prevalence of FD and its risk factors in a multiethnic volunteer sample of the U.S. population.METHODS:One thousand employees at the Houston VA Medical Center were targeted with a symptom questionnaire asking about upper abdominal symptoms, followed by a request to undergo endsocopy. Dyspepsia was defined by the presence of epigastric pain, fullness, nausea, or vomiting, and FD was defined as dyspepsia in the absence of esophageal erosions, gastric ulcers, or duodenal ulcers or erosions. The presence of dyspepsia and FD was examined in multiple logistic regression analyses.RESULTS:A total of 465 employees completed the relevant questions and of those 203 had endoscopic examination. The age-adjusted prevalence rate of dyspepsia was 31.9 per 100 (95% CI: 26.7–37.1), and 15.8 per 100 (95% CI: 9.6–22.0) if participants with concomitant heartburn or acid regurgitation were excluded. Subjects with dyspepsia were more likely to report smoking, using antacids, aspirin or nonsteroidal antiinflammatory drugs (NSAIDs), and consulting a physician for their symptoms (p < 0.05) than participants without dyspepsia. Most (64.5%) participants with dyspepsia who underwent endoscopy had FD. The age-adjusted prevalence rate of FD was 29.2 per 100 (95% CI: 21.9–36.5), and 15.0 per 100 (6.7–23.3) if subjects with GERD were excluded. Apart from a trend towards association with older age in the multiple regression analysis, there were no significant predictors of FD among participants with dyspepsia.CONCLUSIONS:Most subjects with dyspepsia have FD. The prevalence of FD is high but predictors of FD remain poorly defined.", "title": "" }, { "docid": "8952cc1f9df1799bec6bcf5b5a5af8a0", "text": "Despite recent progress in understanding the cancer genome, there is still a relative delay in understanding the full aspects of the glycome and glycoproteome of cancer. Glycobiology has been instrumental in relevant discoveries in various biological and medical fields, and has contributed to the deciphering of several human diseases. Glycans are involved in fundamental molecular and cell biology processes occurring in cancer, such as cell signalling and communication, tumour cell dissociation and invasion, cell–matrix interactions, tumour angiogenesis, immune modulation and metastasis formation. The roles of glycans in cancer have been highlighted by the fact that alterations in glycosylation regulate the development and progression of cancer, serving as important biomarkers and providing a set of specific targets for therapeutic intervention. This Review discusses the role of glycans in fundamental mechanisms controlling cancer development and progression, and their applications in oncology.", "title": "" }, { "docid": "b3a80316fc98ded7c106018afb5acc0a", "text": "Adaptive antenna array processing is widely known to provide significant anti-interference capabilities within a Global Navigation Satellite Systems (GNSS) receiver. A main challenge in the quest for such receiver architecture has always been the computational/processing requirements. Even more demanding would be to try and incorporate the flexibility of the Software-Defined Radio (SDR) design philosophy in such an implementation. This paper documents a feasible approach to a real-time SDR implementation of a beam-steered GNSS receiver and validates its performance. This research implements a real-time software receiver on a widely-available x86-based multi-core microprocessor to process four-element antenna array data streams sampled with 16-bit resolution. The software receiver is capable of 12 channels all-in-view Controlled Reception Pattern Antenna (CRPA) array processing capable of rejecting multiple interferers. Single Instruction Multiple Data (SIMD) instructions assembly coding and multithreaded programming, the key to such an implementation to reduce computational complexity, are fully documented within the paper. In conventional antenna array systems, receivers use the geometry of antennas and cable lengths known in advance. The documented CRPA implementation is architected to operate without extensive set-up and pre-calibration and leverages Space-Time Adaptive Processing (STAP) to provide adaptation in both the frequency and space domains. The validation component of the paper demonstrates that the developed software receiver operates in real time with live Global Positioning System (GPS) and Wide Area Augmentation System (WAAS) L1 C/A code signal. Further, interference rejection capabilities of the implementation are also demonstrated using multiple synthetic interferers which are added to the live data stream.", "title": "" }, { "docid": "519e8ee14d170ce92eecc760e810ade4", "text": "Transcript-based annotation and pedigree analysis are two basic steps in the computational analysis of whole-exome sequencing experiments in genetic diagnostics and disease-gene discovery projects. Here, we present Jannovar, a stand-alone Java application as well as a Java library designed to be used in larger software frameworks for exome and genome analysis. Jannovar uses an interval tree to identify all transcripts affected by a given variant, and provides Human Genome Variation Society-compliant annotations both for variants affecting coding sequences and splice junctions as well as untranslated regions and noncoding RNA transcripts. Jannovar can also perform family-based pedigree analysis with Variant Call Format (VCF) files with data from members of a family segregating a Mendelian disorder. Using a desktop computer, Jannovar requires a few seconds to annotate a typical VCF file with exome data. Jannovar is freely available under the BSD2 license. Source code as well as the Java application and library file can be downloaded from http://compbio.charite.de (with tutorial) and https://github.com/charite/jannovar.", "title": "" }, { "docid": "144d1ad172d5dd2ca7b3fc93a83b5942", "text": "This paper extends the recently introduced approach to the modeling and control design in the framework of model predictive control of the dc-dc boost converter to the dc-dc parallel interleaved boost converter. Based on the converter's model a constrained optimal control problem is formulated and solved. This allows the controller to achieve (a) the regulation of the output voltage to a predefined reference value, despite changes in the input voltage and the load, and (b) the load current balancing to the converter's individual legs, by regulating the currents of the circuit's inductors to proper references, set by an outer loop based on an observer. Simulation results are provided to illustrate the merits of the proposed control scheme.", "title": "" }, { "docid": "7490e0039b8060ec1a4c27405a20a513", "text": "Trajectories obtained from GPS-enabled taxis grant us an opportunity to not only extract meaningful statistics, dynamics and behaviors about certain urban road users, but also to monitor adverse and/or malicious events. In this paper we focus on the problem of detecting anomalous routes by comparing against historically “normal” routes. We propose a real-time method, iBOAT, that is able to detect anomalous trajectories “on-the-fly”, as well as identify which parts of the trajectory are responsible for its anomalousness. We evaluate our method on a large dataset of taxi GPS logs and verify that it has excellent accuracy (AUC ≥ 0.99) and overcomes many of the shortcomings of other state-of-the-art methods.", "title": "" }, { "docid": "4e5f08928f37624178e8e2380e91faf6", "text": "Social media tend to be rife with rumours while new reports are released piecemeal during breaking news. Interestingly, one can mine multiple reactions expressed by social media users in those situations, exploring their stance towards rumours, ultimately enabling the flagging of highly disputed rumours as being potentially false. In this work, we set out to develop an automated, supervised classifier that uses multi-task learning to classify the stance expressed in each individual tweet in a conversation around a rumour as either supporting, denying or questioning the rumour. Using a Gaussian Process classifier, and exploring its effectiveness on two datasets with very different characteristics and varying distributions of stances, we show that our approach consistently outperforms competitive baseline classifiers. Our classifier is especially effective in estimating the distribution of different types of stance associated with a given rumour, which we set forth as a desired characteristic for a rumour-tracking system that will show both ordinary users of Twitter and professional news practitioners how others orient to the disputed veracity of a rumour, with the final aim of establishing its actual truth value.", "title": "" } ]
scidocsrr
c821c7f82279dcdfba94d58c70cd91ca
Olympus: an open-source framework for conversational spoken language interface research
[ { "docid": "282a6b06fb018fb7e2ec223f74345944", "text": "The DIPPER architecture is a collection of software agents for prototyping spoken dialogue systems. Implemented on top of the Open Agent Architecture (OAA), it comprises agents for speech input and output, dialogue management, and further supporting agents. We define a formal syntax and semantics for the DIPPER information state update language. The language is independent of particular programming languages, and incorporates procedural attachments for access to external resources using OAA.", "title": "" } ]
[ { "docid": "7b2e02c62c06f244d24fb798a5998725", "text": "This paper presents Integrated Information Theory (IIT) of consciousness 3.0, which incorporates several advances over previous formulations. IIT starts from phenomenological axioms: information says that each experience is specific--it is what it is by how it differs from alternative experiences; integration says that it is unified--irreducible to non-interdependent components; exclusion says that it has unique borders and a particular spatio-temporal grain. These axioms are formalized into postulates that prescribe how physical mechanisms, such as neurons or logic gates, must be configured to generate experience (phenomenology). The postulates are used to define intrinsic information as \"differences that make a difference\" within a system, and integrated information as information specified by a whole that cannot be reduced to that specified by its parts. By applying the postulates both at the level of individual mechanisms and at the level of systems of mechanisms, IIT arrives at an identity: an experience is a maximally irreducible conceptual structure (MICS, a constellation of concepts in qualia space), and the set of elements that generates it constitutes a complex. According to IIT, a MICS specifies the quality of an experience and integrated information ΦMax its quantity. From the theory follow several results, including: a system of mechanisms may condense into a major complex and non-overlapping minor complexes; the concepts that specify the quality of an experience are always about the complex itself and relate only indirectly to the external environment; anatomical connectivity influences complexes and associated MICS; a complex can generate a MICS even if its elements are inactive; simple systems can be minimally conscious; complicated systems can be unconscious; there can be true \"zombies\"--unconscious feed-forward systems that are functionally equivalent to conscious complexes.", "title": "" }, { "docid": "a8b99c09d71135f96a21600527dd58fa", "text": "When a program is modified during software evolution, developers typically run the new version of the program against its existing test suite to validate that the changes made on the program did not introduce unintended side effects (i.e., regression faults). This kind of regression testing can be effective in identifying some regression faults, but it is limited by the quality of the existing test suite. Due to the cost of testing, developers build test suites by finding acceptable tradeoffs between cost and thoroughness of the tests. As a result, these test suites tend to exercise only a small subset of the program's functionality and may be inadequate for testing the changes in a program. To address this issue, we propose a novel approach called Behavioral Regression Testing (BERT). Given two versions of a program, BERT identifies behavioral differences between the two versions through dynamical analysis, in three steps. First, it generates a large number of test inputs that focus on the changed parts of the code. Second, it runs the generated test inputs on the old and new versions of the code and identifies differences in the tests' behavior. Third, it analyzes the identified differences and presents them to the developers. By focusing on a subset of the code and leveraging differential behavior, BERT can provide developers with more (and more detailed) information than traditional regression testing techniques. To evaluate BERT, we implemented it as a plug-in for Eclipse, a popular Integrated Development Environment, and used the plug-in to perform a preliminary study on two programs. The results of our study are promising, in that BERT was able to identify true regression faults in the programs.", "title": "" }, { "docid": "eed45b473ebaad0740b793bda8345ef3", "text": "Plyometric training (PT) enhances soccer performance, particularly vertical jump. However, the effectiveness of PT depends on various factors. A systematic search of the research literature was conducted for randomized controlled trials (RCTs) studying the effects of PT on countermovement jump (CMJ) height in soccer players. Ten studies were obtained through manual and electronic journal searches (up to April 2017). Significant differences were observed when compared: (1) PT group vs. control group (ES=0.85; 95% CI 0.47-1.23; I2=68.71%; p<0.001), (2) male vs. female soccer players (Q=4.52; p=0.033), (3) amateur vs. high-level players (Q=6.56; p=0.010), (4) single session volume (<120 jumps vs. ≥120 jumps; Q=6.12, p=0.013), (5) rest between repetitions (5 s vs. 10 s vs. 15 s vs. 30 s; Q=19.10, p<0.001), (6) rest between sets (30 s vs. 60 s vs. 90 s vs. 120 s vs. 240 s; Q=19.83, p=0.001) and (7) and overall training volume (low: <1600 jumps vs. high: ≥1600 jumps; Q=5.08, p=0.024). PT is an effective form of training to improve vertical jump performance (i.e., CMJ) in soccer players. The benefits of PT on CMJ performance are greater for interventions of longer rest interval between repetitions (30 s) and sets (240 s) with higher volume of more than 120 jumps per session and 1600 jumps in total. Gender and competitive level differences should be considered when planning PT programs in soccer players.", "title": "" }, { "docid": "f5252c34f7467520fb785add6d74a0ac", "text": "Over the past decade self-compassion has gained popularity as a related and complementary construct to mindfulness, and research on self-compassion is growing at an exponential rate. Self-compassion involves treating yourself with the same kindness, concern and support you'd show to a good friend. When faced with difficult life struggles, or confronting personal mistakes, failures, and inadequacies, self-compassion responds with kindness rather than harsh self-judgment, recognizing that imperfection is part of the shared human experience. In order to give oneself compassion, one must be able to turn toward, acknowledge, and accept that one is suffering, meaning that mindfulness is a core component of self-compassion. This chapter provides a comprehensive description of self-compassion and a review of the empirical literature supporting its psychological benefits. Similarities and distinctions between mindfulness and self-compassion are also explored, as these have important implications for research and intervention. This chapter hopes to provide a compelling argument for the use of both self-compassion and mindfulness as important means to help individuals develop emotional resilience and wellbeing. This chapter will present a conceptual account of self-compassion and review research on its benefits. It will also consider how self-compassion relates to mindfulness, given that these constructs are both drawn from It is important to understand the similar and unique features of self-compassion and mindfulness in order to understand how they each relate to wellbeing, and to consider how these states of heart and mind might best be developed. Self-compassion has received increased research attention lately, with over 200 journal articles and dissertations examining the topic since 2003, the year that the first two articles defining and measuring self-compassion were published (Neff, 2003a; Neff, 2003b). So what is self-compassion exactly? In order to better understand what self-compassion is, it is useful to first consider what it means to feel compassion more generally. From the Buddhist point of view, compassion is given to our own as well as to others' suffering. We include ourselves in the circle of compassion because to do otherwise would construct a false sense of separate self (Salzberg, 1997). Compassion involves sensitivity to the experience of suffering, coupled with a deep desire to alleviate that suffering (Goetz, Keltner, & Simon-Thomas, 2010). This means that in order to experience compassion, you must first acknowledge the presence of pain. Rather than rushing past that homeless woman as you're walking down the busy street, for example, you must actually stop to …", "title": "" }, { "docid": "4f00d8fecd12179899ece621f44c4032", "text": "In this paper we present a deployed, scalable optical character recognition (OCR) system, which we call Rosetta , designed to process images uploaded daily at Facebook scale. Sharing of image content has become one of the primary ways to communicate information among internet users within social networks such as Facebook, and the understanding of such media, including its textual information, is of paramount importance to facilitate search and recommendation applications. We present modeling techniques for efficient detection and recognition of text in images and describe Rosetta 's system architecture. We perform extensive evaluation of presented technologies, explain useful practical approaches to build an OCR system at scale, and provide insightful intuitions as to why and how certain components work based on the lessons learnt during the development and deployment of the system.", "title": "" }, { "docid": "cb266f07461a58493d35f75949c4605e", "text": "Zero shot learning in Image Classification refers to the setting where images from some novel classes are absent in the training data but other information such as natural language descriptions or attribute vectors of the classes are available. This setting is important in the real world since one may not be able to obtain images of all the possible classes at training. While previous approaches have tried to model the relationship between the class attribute space and the image space via some kind of a transfer function in order to model the image space correspondingly to an unseen class, we take a different approach and try to generate the samples from the given attributes, using a conditional variational autoencoder, and use the generated samples for classification of the unseen classes. By extensive testing on four benchmark datasets, we show that our model outperforms the state of the art, particularly in the more realistic generalized setting, where the training classes can also appear at the test time along with the novel classes.", "title": "" }, { "docid": "4d52865efa6c359d68125c7013647c86", "text": "In recent years, we have witnessed an unprecedented proliferation of large document collections. This development has spawned the need for appropriate analytical means. In particular, to seize the thematic composition of large document collections, researchers increasingly draw on quantitative topic models. Among their most prominent representatives is the Latent Dirichlet Allocation (LDA). Yet, these models have significant drawbacks, e.g. the generated topics lack context and thus meaningfulness. Prior research has rarely addressed this limitation through the lens of mixed-methods research. We position our paper towards this gap by proposing a structured mixedmethods approach to the meaningful analysis of large document collections. Particularly, we draw on qualitative coding and quantitative hierarchical clustering to validate and enhance topic models through re-contextualization. To illustrate the proposed approach, we conduct a case study of the thematic composition of the AIS Senior Scholars' Basket of Journals.", "title": "" }, { "docid": "659eea2d34037b6c72728c9149247218", "text": "Deep learning approaches to breast cancer detection in mammograms have recently shown promising results. However, such models are constrained by the limited size of publicly available mammography datasets, in large part due to privacy concerns and the high cost of generating expert annotations. Limited dataset size is further exacerbated by substantial class imbalance since “normal” images dramatically outnumber those with findings. Given the rapid progress of generative models in synthesizing realistic images, and the known effectiveness of simple data augmentation techniques (e.g. horizontal flipping), we ask if it is possible to synthetically augment mammogram datasets using generative adversarial networks (GANs). We train a class-conditional GAN to perform contextual in-filling, which we then use to synthesize lesions onto healthy screening mammograms. First, we show that GANs are capable of generating high-resolution synthetic mammogram patches. Next, we experimentally evaluate using the augmented dataset to improve breast cancer classification performance. We observe that a ResNet-50 classifier trained with GAN-augmented training data produces a higher AUROC compared to the same model trained only on traditionally augmented data, demonstrating the potential of our approach.", "title": "" }, { "docid": "1c5b71d028643c2bfc763146de242d34", "text": "Solving Winograd Schema Problems Quan Liu†, Hui Jiang‡, Zhen-Hua Ling†, Xiaodan Zhu, Si Wei§, Yu Hu†§ † National Engineering Laboratory for Speech and Language Information Processing University of Science and Technology of China, Hefei, Anhui, China ‡ Department of Electrical Engineering and Computer Science, York University, Canada ` National Research Council Canada, Ottawa, Canada § iFLYTEK Research, Hefei, China emails: quanliu@mail.ustc.edu.cn, hj@cse.yorku.ca, zhling@ustc.edu.cn, zhu2048@gmail.com siwei@iflytek.com, yuhu@iflytek.com Abstract", "title": "" }, { "docid": "9cd00d9975c1efa741d1b01200a7d660", "text": "BACKGROUND\nMany ethical problems exist in nursing homes. These include, for example, decision-making in end-of-life care, use of restraints and a lack of resources.\n\n\nAIMS\nThe aim of the present study was to investigate nursing home staffs' opinions and experiences with ethical challenges and to find out which types of ethical challenges and dilemmas occur and are being discussed in nursing homes.\n\n\nMETHODS\nThe study used a two-tiered approach, using a questionnaire on ethical challenges and systematic ethics work, given to all employees of a Norwegian nursing home including nonmedical personnel, and a registration of systematic ethics discussions from an Austrian model of good clinical practice.\n\n\nRESULTS\nNinety-one per cent of the nursing home staff described ethical problems as a burden. Ninety per cent experienced ethical problems in their daily work. The top three ethical challenges reported by the nursing home staff were as follows: lack of resources (79%), end-of-life issues (39%) and coercion (33%). To improve systematic ethics work, most employees suggested ethics education (86%) and time for ethics discussion (82%). Of 33 documented ethics meetings from Austria during a 1-year period, 29 were prospective resident ethics meetings where decisions for a resident had to be made. Agreement about a solution was reached in all 29 cases, and this consensus was put into practice in all cases. Residents did not participate in the meetings, while relatives participated in a majority of case discussions. In many cases, the main topic was end-of-life care and life-prolonging treatment.\n\n\nCONCLUSIONS\nLack of resources, end-of-life issues and coercion were ethical challenges most often reported by nursing home staff. The staff would appreciate systematic ethics work to aid decision-making. Resident ethics meetings can help to reach consensus in decision-making for nursing home patients. In the future, residents' participation should be encouraged whenever possible.", "title": "" }, { "docid": "baaf5616e7851dde1162fff27ba9475a", "text": "This paper presents the results of a detailed gross and histologic examination of the eyes and brain in a case of synophthalmia as well as radiographic studies of the skull. Data on 34 other cases of synophthalmia-cyclopia on file in the Registry of Ophthalmic Pathology, Armed Forces Institute of Pathology (AFIP), are also summarized. In synophthalmia-cyclopia, the median ocular structure is symmetrical and displays two gradients of ocular organization: (1) The anterior segments are usually paired and comparatively well differentiated, whereas, posteriorly, a single, more disorganized compartment is present; (2) the lateral components show more advanced differentiation than the medial. There is invariably a single optic nerve and no chiasm. The brain, the nose, and the bones and soft tissues of the upper facial region, while malformed, are symmetrical and show a similar gradient of organization in that the lateral parts are better developed than the medial. The constant occurrence of a profound cerebral malformation along with the ocular deformity suggests a widespread abnormality of the anterior neural plate from which both the eyes and brain emerge. The data indicate that the defect occurs at or before the time of closure of the neural folds when the neural plate is still labile. The probability of fusion of two ocular anlagen in synophthalmia-cyclopia seems less likely than the emergence of incomplete bicentricity in the ocular fields of the neural plate during the period when the eye primordia are initially induced by the mesoderm. Embryologic studies in experimental animals provide insight into possible mechanisms by which inperfect eye and brain primordia are established. Nonetheless, once established, the eye and brain primordia in synophthalmia-cyclopia are capable of and do complete each step of the usual sequence of ocular and cerebral organogenesis in an orderly manner. The resulting eyes and brain are organogenetically incomplete but histogenetically mature. Ancillary facial and osseous defects result from the faulty migration of neural crests and development of embryonic facial processes secondary to the abnormal ocular and cerebral rudiments. The opinions or assertions contained herein are the private views of the authors and are not to be construed as official or as reflecting the views of the Department of the Army or the Department of Defense. Presented in part at the annual meeting of the Association for Research in Vision and Ophthalmology in Sarasota, Florida, April 28, 1975, and at the biennial meeting of the AFIP-Ophthalmic Pathology Alumni Meeting in Washington, D.C., June 18, 1976.", "title": "" }, { "docid": "214231e8bb6ccd31a0ea42ffe73c0ee6", "text": "Language is increasingly being used to define rich visual recognition problems with supporting image collections sourced from the web. Structured prediction models are used in these tasks to take advantage of correlations between co-occurring labels and visual input but risk inadvertently encoding social biases found in web corpora. In this work, we study data and models associated with multilabel object classification and visual semantic role labeling. We find that (a) datasets for these tasks contain significant gender bias and (b) models trained on these datasets further amplify existing bias. For example, the activity cooking is over 33% more likely to involve females than males in a training set, and a trained model further amplifies the disparity to 68% at test time. We propose to inject corpus-level constraints for calibrating existing structured prediction models and design an algorithm based on Lagrangian relaxation for collective inference. Our method results in almost no performance loss for the underlying recognition task but decreases the magnitude of bias amplification by 47.5% and 40.5% for multilabel classification and visual semantic role labeling, respectively.", "title": "" }, { "docid": "d2aebe4f8d8d90427bee7c8b71b1361f", "text": "Automated vehicles are complex systems with a high degree of interdependencies between its components. This complexity sets increasing demands for the underlying software framework. This paper firstly analyzes the requirements for software frameworks. Afterwards an overview on existing software frameworks, that have been used for automated driving projects, is provided with an in-depth introduction into an emerging open-source software framework, the Robot Operating System (ROS). After discussing the main features, advantages and disadvantages of ROS, the communication overhead of ROS is analyzed quantitatively in various configurations showing its applicability for systems with a high data load.", "title": "" }, { "docid": "48af195d4dfa80f520f9d9a1b9c08596", "text": "Heuristic evaluation is a rapid, cheap and effective way for identifying usability problems in single user systems. However, current heuristics do not provide guidance for discovering problems specific to groupware usability. In this paper, we take the Locales Framework and restate it as heuristics appropriate for evaluating groupware. These are: 1) Provide locales; 2) Provide awareness within locales; 3) Allow individual views; 4) Allow people to manage and stay aware of their evolving interactions; and 5) Provide a way to organize and relate locales to one another. To see if these new heuristics are useful in practice, we used them to inspect the interface of Teamwave Workplace, a commercial groupware product. We were successful in identifying the strengths of Teamwave as well as both major and minor interface problems.", "title": "" }, { "docid": "096912a3104d4c46eb22c647de40a471", "text": "An I/Q active mixer in LTCC technology using packaged HEMTs as mixing devices is described. A mixer is designed for use in the 24 GHz automotive radar application. An on-tile buffer amplifier was added to compensate for the limited power available from the system oscillator. Careful choice of the type or topology for each of the passive circuits implemented resulted in an optimal mixer layout, so a very small size for a ceramic tile of 15times15times0.8 mm3 was achieved. The measured conversion gain of the mixer for a 0 dBm LO level was -6.7 dB for I and -5.2 dB for Q. The amplitude imbalance between I and Q signals resulting from the aggressive miniaturization of the quadrature coupler could be compensated in the DSP stages of the system at no additional cost. The measured I-Q phase imbalance was around 3 degrees. The measured return losses at mixer ports and LO-RF isolations are also very good.", "title": "" }, { "docid": "6b7d038584c69b8b2538961cefd512cb", "text": "I describe a test of linear moderated mediation in path analysis based on an interval estimate of the parameter of a function linking the indirect effect to values of a moderator-a parameter that I call the index of moderated mediation. This test can be used for models that integrate moderation and mediation in which the relationship between the indirect effect and the moderator is estimated as linear, including many of the models described by Edwards and Lambert ( 2007 ) and Preacher, Rucker, and Hayes ( 2007 ) as well as extensions of these models to processes involving multiple mediators operating in parallel or in serial. Generalization of the method to latent variable models is straightforward. Three empirical examples describe the computation of the index and the test, and its implementation is illustrated using Mplus and the PROCESS macro for SPSS and SAS.", "title": "" }, { "docid": "6cfedfc45ea1b3db23d022b06c46743a", "text": "This study examined the relationship between financial knowledge and credit card behavior of college students. The widespread availability of credit cards has raised concerns over how college students might use those cards given the negative consequences (both immediate and long-term) associated with credit abuse and mismanagement. Using a sample of 1,354 students from a major southeastern university, results suggest that financial knowledge is a significant factor in the credit card decisions of college students. Students with higher scores on a measure of personal financial knowledge are more likely to engage in more responsible credit card use. Specific behaviors chosen have been associated with greater costs of borrowing and adverse economic consequences in the past.", "title": "" }, { "docid": "64fbd2207a383bc4b04c66e8ee867922", "text": "Ultra compact, short pulse, high voltage, high current pulsers are needed for a variety of non-linear electrical and optical applications. With a fast risetime and short pulse width, these drivers are capable of producing sub-nanosecond electrical and thus optical pulses by gain switching semiconductor laser diodes. Gain-switching of laser diodes requires a sub-nanosecond pulser capable of driving a low output impedance (5 /spl Omega/ or less). Optical pulses obtained had risetimes as fast as 20 ps. The designed pulsers also could be used for triggering photo-conductive semiconductor switches (PCSS), gating high speed optical imaging systems, and providing electrical and optical sources for fast transient sensor applications. Building on concepts from Lawrence Livermore National Laboratory, the development of pulsers based on solid state avalanche transistors was adapted to drive low impedances. As each successive stage is avalanched in the circuit, the amount of overvoltage increases, increasing the switching speed and improving the turn on time of the output pulse at the final stage. The output of the pulser is coupled into the load using a Blumlein configuration.", "title": "" }, { "docid": "158225855e0a4eaf9327e93291100990", "text": "Music transcription is a core task in the field of music information retrieval. Transcribing the drum tracks of music pieces is a well-defined sub-task. The symbolic representation of a drum track contains much useful information about the piece, like meter, tempo, as well as various style and genre cues. This work introduces a novel approach for drum transcription using recurrent neural networks. We claim that recurrent neural networks can be trained to identify the onsets of percussive instruments based on general properties of their sound. Different architectures of recurrent neural networks are compared and evaluated using a well-known dataset. The outcomes are compared to results of a state-of-the-art approach on the same dataset. Furthermore, the ability of the networks to generalize is demonstrated using a second, independent dataset. The experiments yield promising results: while F-measures higher than state-of-the-art results are achieved, the networks are capable of generalizing reasonably well.", "title": "" }, { "docid": "3b1d73691176ada154bab7716c6e776c", "text": "Purpose – The purpose of this paper is to investigate the factors that affect the adoption of cloud computing by firms belonging to the high-tech industry. The eight factors examined in this study are relative advantage, complexity, compatibility, top management support, firm size, technology readiness, competitive pressure, and trading partner pressure. Design/methodology/approach – A questionnaire-based survey was used to collect data from 111 firms belonging to the high-tech industry in Taiwan. Relevant hypotheses were derived and tested by logistic regression analysis. Findings – The findings revealed that relative advantage, top management support, firm size, competitive pressure, and trading partner pressure characteristics have a significant effect on the adoption of cloud computing. Research limitations/implications – The research was conducted in the high-tech industry, which may limit the generalisability of the findings. Practical implications – The findings offer cloud computing service providers with a better understanding of what affects cloud computing adoption characteristics, with relevant insight on current promotions. Originality/value – The research contributes to the application of new technology cloud computing adoption in the high-tech industry through the use of a wide range of variables. The findings also help firms consider their information technologies investments when implementing cloud computing.", "title": "" } ]
scidocsrr
9bf4522a0451bd810edf653eed4f24cf
Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm
[ { "docid": "d3fc62a9858ddef692626b1766898c9f", "text": "In order to detect the Cross-Site Script (XSS) vulnerabilities in the web applications, this paper proposes a method of XSS vulnerability detection using optimal attack vector repertory. This method generates an attack vector repertory automatically, optimizes the attack vector repertory using an optimization model, and detects XSS vulnerabilities in web applications dynamically. To optimize the attack vector repertory, an optimization model is built in this paper with a machine learning algorithm, reducing the size of the attack vector repertory and improving the efficiency of XSS vulnerability detection. Based on this method, an XSS vulnerability detector is implemented, which is tested on 50 real-world websites. The testing results show that the detector can detect a total of 848 XSS vulnerabilities effectively in 24 websites.", "title": "" }, { "docid": "77b18fe7f6a2af7aaaafc20bc7b1a5e7", "text": "Recently, machine-learning based vulnerability prediction models are gaining popularity in web security space, as these models provide a simple and efficient way to handle web application security issues. Existing state-of-art Cross-Site Scripting (XSS) vulnerability prediction approaches do not consider the context of the user-input in output-statement, which is very important to identify context-sensitive security vulnerabilities. In this paper, we propose a novel feature extraction algorithm to extract basic and context features from the source code of web applications. Our approach uses these features to build various machine-learning models for predicting context-sensitive Cross-Site Scripting (XSS) security vulnerabilities. Experimental results show that the proposed features based prediction models can discriminate vulnerable code from non-vulnerable code at a very low false rate.", "title": "" } ]
[ { "docid": "495143978d38979b64c3556a77740979", "text": "We address the practical problems of estimating the information relations that characterize large networks. Building on methods developed for analysis of the neural code, we show that reliable estimates of mutual information can be obtained with manageable computational effort. The same methods allow estimation of higher order, multi–information terms. These ideas are illustrated by analyses of gene expression, financial markets, and consumer preferences. In each case, information theoretic measures correlate with independent, intuitive measures of the underlying structures in the system.", "title": "" }, { "docid": "9680944f9e6b4724bdba752981845b68", "text": "A software product line is a set of program variants, typically generated from a common code base. Feature models describe variability in product lines by documenting features and their valid combinations. In product-line engineering, we need to reason about variability and program variants for many different tasks. For example, given a feature model, we might want to determine the number of all valid feature combinations or compute specific feature combinations for testing. However, we found that contemporary reasoning approaches can only reason about feature combinations, not about program variants, because they do not take abstract features into account. Abstract features are features used to structure a feature model that, however, do not have any impact at implementation level. Using existing feature-model reasoning mechanisms for program variants leads to incorrect results. Hence, although abstract features represent domain decisions that do not affect the generation of a program variant. We raise awareness of the problem of abstract features for different kinds of analyses on feature models. We argue that, in order to reason about program variants, abstract features should be made explicit in feature models. We present a technique based on propositional formulas that enables to reason about program variants rather than feature combinations. In practice, our technique can save effort that is caused by considering the same program variant multiple times, for example, in product-line testing.", "title": "" }, { "docid": "b6f9d5015fddbf92ab44ae6ce2f7d613", "text": "Emojis are small images that are commonly included in social media text messages. The combination of visual and textual content in the same message builds up a modern way of communication, that automatic systems are not used to deal with. In this paper we extend recent advances in emoji prediction by putting forward a multimodal approach that is able to predict emojis in Instagram posts. Instagram posts are composed of pictures together with texts which sometimes include emojis. We show that these emojis can be predicted by using the text, but also using the picture. Our main finding is that incorporating the two synergistic modalities, in a combined model, improves accuracy in an emoji prediction task. This result demonstrates that these two modalities (text and images) encode different information on the use of emojis and therefore can complement each other.", "title": "" }, { "docid": "af6f5ef41a3737975893f95796558900", "text": "In this work, we propose a multi-task convolutional neural network learning approach that can simultaneously perform iris localization and presentation attack detection (PAD). The proposed multi-task PAD (MT-PAD) is inspired by an object detection method which directly regresses the parameters of the iris bounding box and computes the probability of presentation attack from the input ocular image. Experiments involving both intra-sensor and cross-sensor scenarios suggest that the proposed method can achieve state-of-the-art results on publicly available datasets. To the best of our knowledge, this is the first work that performs iris detection and iris presentation attack detection simultaneously.", "title": "" }, { "docid": "fc94c6fb38198c726ab3b417c3fe9b44", "text": "Tremor is a rhythmical and involuntary oscillatory movement of a body part and it is one of the most common movement disorders. Orthotic devices have been under investigation as a noninvasive tremor suppression alternative to medication or surgery. The challenge in musculoskeletal tremor suppression is estimating and attenuating the tremor motion without impeding the patient's intentional motion. In this research a robust tremor suppression algorithm was derived for patients with pathological tremor in the upper limbs. First the motion in the tremor frequency range is estimated using a high-pass filter. Then, by applying the backstepping method the appropriate amount of torque is calculated to drive the output of the estimator toward zero. This is equivalent to an estimation of the tremor torque. It is shown that the arm/orthotic device control system is stable and the algorithm is robust despite inherent uncertainties in the open-loop human arm joint model. A human arm joint simulator, capable of emulating tremorous motion of a human arm joint was used to evaluate the proposed suppression algorithm experimentally for two types of tremor, Parkinson and essential. Experimental results show 30-42 dB (97.5-99.2%) suppression of tremor with minimal effect on the intentional motion.", "title": "" }, { "docid": "98a65cca7217dfa720dd4ed2972c3bdd", "text": "Intramuscular fat percentage (IMF%) has been shown to have a positive influence on the eating quality of red meat. Selection of Australian lambs for increased lean tissue and reduced carcass fatness using Australian Sheep Breeding Values has been shown to decrease IMF% of the Muscularis longissimus lumborum. The impact this selection has on the IMF% of other muscle depots is unknown. This study examined IMF% in five different muscles from 400 lambs (M. longissimus lumborum, Muscularis semimembranosus, Muscularis semitendinosus, Muscularis supraspinatus, Muscularis infraspinatus). The sires of these lambs had a broad range in carcass breeding values for post-weaning weight, eye muscle depth and fat depth over the 12th rib (c-site fat depth). Results showed IMF% to be highest in the M. supraspinatus (4.87 ± 0.1, P<0.01) and lowest in the M. semimembranosus (3.58 ± 0.1, P<0.01). Hot carcass weight was positively associated with IMF% of all muscles. Selection for decreasing c-site fat depth reduced IMF% in the M. longissimus lumborum, M. semimembranosus and M. semitendinosus. Higher breeding values for post-weaning weight and eye muscle depth increased and decreased IMF%, respectively, but only in the lambs born as multiples and raised as singles. For each per cent increase in lean meat yield percentage (LMY%), there was a reduction in IMF% of 0.16 in all five muscles examined. Given the drive within the lamb industry to improve LMY%, our results indicate the importance of continued monitoring of IMF% throughout the different carcass regions, given its importance for eating quality.", "title": "" }, { "docid": "10a0f370ad3e9c3d652e397860114f90", "text": "Statistical data associated with geographic regions is nowadays globally available in large amounts and hence automated methods to visually display these data are in high demand. There are several well-established thematic map types for quantitative data on the ratio-scale associated with regions: choropleth maps, cartograms, and proportional symbol maps. However, all these maps suffer from limitations, especially if large data values are associated with small regions. To overcome these limitations, we propose a novel type of quantitative thematic map, the necklace map. In a necklace map, the regions of the underlying two-dimensional map are projected onto intervals on a one-dimensional curve (the necklace) that surrounds the map regions. Symbols are scaled such that their area corresponds to the data of their region and placed without overlap inside the corresponding interval on the necklace. Necklace maps appear clear and uncluttered and allow for comparatively large symbol sizes. They visualize data sets well which are not proportional to region sizes. The linear ordering of the symbols along the necklace facilitates an easy comparison of symbol sizes. One map can contain several nested or disjoint necklaces to visualize clustered data. The advantages of necklace maps come at a price: the association between a symbol and its region is weaker than with other types of maps. Interactivity can help to strengthen this association if necessary. We present an automated approach to generate necklace maps which allows the user to interactively control the final symbol placement. We validate our approach with experiments using various data sets and maps.", "title": "" }, { "docid": "619c905f7ef5fa0314177b109e0ec0e6", "text": "The aim of this review is to systematically summarise qualitative evidence about work-based learning in health care organisations as experienced by nursing staff. Work-based learning is understood as informal learning that occurs inside the work community in the interaction between employees. Studies for this review were searched for in the CINAHL, PubMed, Scopus and ABI Inform ProQuest databases for the period 2000-2015. Nine original studies met the inclusion criteria. After the critical appraisal by two researchers, all nine studies were selected for the review. The findings of the original studies were aggregated, and four statements were prepared, to be utilised in clinical work and decision-making. The statements concerned the following issues: (1) the culture of the work community; (2) the physical structures, spaces and duties of the work unit; (3) management; and (4) interpersonal relations. Understanding the nurses' experiences of work-based learning and factors behind these experiences provides an opportunity to influence the challenges of learning in the demanding context of health care organisations.", "title": "" }, { "docid": "d26ce319db7b1583347d34ff8251fbc0", "text": "The study of metacognition can shed light on some fundamental issues about consciousness and its role in behavior. Metacognition research concerns the processes by which people self reflect on their own cognitive and memory processes (monitoring), and how they put their metaknowledge to use in regulating their information processing and behavior (control). Experimental research on metacognition has addressed the following questions: First, what are the bases of metacognitive judgments that people make in monitoring their learning, remembering, and performance? Second, how valid are such judgments and what are the factors that affect the correspondence between subjective and objective indexes of knowing? Third, what are the processes that underlie the accuracy and inaccuracy of metacognitive judgments? Fourth, how does the output of metacognitive monitoring contribute to the strategic regulation of learning and remembering? Finally, how do the metacognitive processes of monitoring and control affect actual performance? Research addressing these questions is reviewed, emphasizing its implication for issues concerning consciousness, in particular, the genesis of subjective experience, the function of self-reflective consciousness, and the cause-and-effect relation between subjective experience and behavior.", "title": "" }, { "docid": "7cb1dd53d28575f36ef49cacd9d3fcf6", "text": "A base-station bandpass filter using compact stepped combline resonators is presented. The bandpass filter consists of 4 resonators, has a center-frequency of 2.0175 GHz, a bandwidth of 15 MHz and cross-coupling by a cascaded quadruplet for improved blocking performance. The combline resonators have different size. Therefore, different temperature compensation arrangements need to be applied to guarantee stable performance in the temperature range from -40deg C to 85deg C. The layout will be discussed. A novel cross coupling assembly is introduced. Furthermore, measurement results are shown.", "title": "" }, { "docid": "837d1ef60937df15afc320b2408ad7b0", "text": "Zero-shot learning has tremendous application value in complex computer vision tasks, e.g. image classification, localization, image captioning, etc., for its capability of transferring knowledge from seen data to unseen data. Many recent proposed methods have shown that the formulation of a compatibility function and its generalization are crucial for the success of a zero-shot learning model. In this paper, we formulate a softmax-based compatibility function, and more importantly, propose a regularized empirical risk minimization objective to optimize the function parameter which leads to a better model generalization. In comparison to eight baseline models on four benchmark datasets, our model achieved the highest average ranking. Our model was effective even when the training set size was small and significantly outperforming an alternative state-of-the-art model in generalized zero-shot recognition tasks.", "title": "" }, { "docid": "e797fbf7b53214df32d5694527ce5ba3", "text": "One key task of fine-grained sentiment analysis of product reviews is to extract product aspects or features that users have expressed opinions on. This paper focuses on supervised aspect extraction using deep learning. Unlike other highly sophisticated supervised deep learning models, this paper proposes a novel and yet simple CNN model 1 employing two types of pre-trained embeddings for aspect extraction: general-purpose embeddings and domain-specific embeddings. Without using any additional supervision, this model achieves surprisingly good results, outperforming state-of-the-art sophisticated existing methods. To our knowledge, this paper is the first to report such double embeddings based CNN model for aspect extraction and achieve very good results.", "title": "" }, { "docid": "1b100af2f1d2591d1e34a6be4245624c", "text": "Urbanisation has become a severe threat to pristine natural areas, causing habitat loss and affecting indigenous animals. Species occurring within an urban fragmented landscape must cope with changes in vegetation type as well as high degrees of anthropogenic disturbance, both of which are possible key mechanisms contributing to behavioural changes and perceived stressors. We attempted to elucidate the effects of urbanisation on the African lesser bushbaby, Galago moholi, by (1) recording activity budgets and body condition (body mass index, BMI) of individuals of urban and rural populations and (2) further determining adrenocortical activity in both populations as a measure of stress via faecal glucocorticoid metabolite (fGCM) levels, following successful validation of an appropriate enzyme immunoassay test system (adrenocorticotropic hormone (ACTH) challenge test). We found that both sexes of the urban population had significantly higher BMIs than their rural counterparts, while urban females had significantly higher fGCM concentrations than rural females. While individuals in the urban population fed mainly on provisioned anthropogenic food sources and spent comparatively more time resting and engaging in aggressive interactions, rural individuals fed almost exclusively on tree exudates and spent more time moving between food sources. Although interactions with humans are likely to be lower in nocturnal than in diurnal species, our findings show that the impact of urbanisation on nocturnal species is still considerable, affecting a range of ecological and physiological aspects.", "title": "" }, { "docid": "418fc1513e2b6fe479a6dc0f981afeb2", "text": "Multimedia content feeds an ever increasing fraction of the Internet traffic. Video streaming is one of the most important applications driving this trend. Adaptive video streaming is a relevant advancement with respect to classic progressive download streaming such as the one employed by YouTube. It consists in dynamically adapting the content bitrate in order to provide the maximum Quality of Experience, given the current available bandwidth, while ensuring a continuous reproduction. In this paper we propose a Quality Adaptation Controller (QAC) for live adaptive video streaming designed by employing feedback control theory. An experimental comparison with Akamai adaptive video streaming has been carried out. We have found the following main results: 1) QAC is able to throttle the video quality to match the available bandwidth with a transient of less than 30s while ensuring a continuous video reproduction; 2) QAC fairly shares the available bandwidth both in the cases of a concurrent TCP greedy connection or a concurrent video streaming flow; 3) Akamai underutilizes the available bandwidth due to the conservativeness of its heuristic algorithm; moreover, when abrupt available bandwidth reductions occur, the video reproduction is affected by interruptions.", "title": "" }, { "docid": "f93dac471e3d7fa79c740b35fbde0558", "text": "In settings where only unlabeled speech data is available, speech technology needs to be developed without transcriptions, pronunciation dictionaries, or language modelling text. A similar problem is faced when modeling infant language acquisition. In these cases, categorical linguistic structure needs to be discovered directly from speech audio. We present a novel unsu-pervised Bayesian model that segments unlabeled speech and clusters the segments into hypothesized word groupings. The result is a complete unsupervised tokenization of the input speech in terms of discovered word types. In our approach, a potential word segment (of arbitrary length) is embedded in a fixed-dimensional acoustic vector space. The model, implemented as a Gibbs sampler, then builds a whole-word acoustic model in this space while jointly performing segmentation. We report word error rates in a small-vocabulary connected digit recognition task by mapping the unsupervised decoded output to ground truth transcriptions. The model achieves around 20% error rate, outperforming a previous HMM-based system by about 10% absolute. Moreover, in contrast to the baseline, our model does not require a pre-specified vocabulary size.", "title": "" }, { "docid": "9097bf29a9ad2b33919e0667d20bf6d7", "text": "Object detection, though gaining popularity, has largely been limited to detection from the ground or from satellite imagery. Aerial images, where the target may be obfuscated from the environmental conditions, angle-of-attack, and zoom level, pose a more significant challenge to correctly detect targets in. This paper describes the implementation of a regional convolutional neural network to locate and classify objects across several categories in complex, aerial images. Our current results show promise in detecting and classifying objects. Further adjustments to the network and data input should increase the localization and classification accuracies.", "title": "" }, { "docid": "d050730d7a5bd591b805f1b9729b0f2d", "text": "In plant phenotyping, it has become important to be able to measure many features on large image sets in order to aid genetic discovery. The size of the datasets, now often captured robotically, often precludes manual inspection, hence the motivation for finding a fully automated approach. Deep learning is an emerging field that promises unparalleled results on many data analysis problems. Building on artificial neural networks, deep approaches have many more hidden layers in the network, and hence have greater discriminative and predictive power. We demonstrate the use of such approaches as part of a plant phenotyping pipeline. We show the success offered by such techniques when applied to the challenging problem of image-based plant phenotyping and demonstrate state-of-the-art results (>97% accuracy) for root and shoot feature identification and localization. We use fully automated trait identification using deep learning to identify quantitative trait loci in root architecture datasets. The majority (12 out of 14) of manually identified quantitative trait loci were also discovered using our automated approach based on deep learning detection to locate plant features. We have shown deep learning-based phenotyping to have very good detection and localization accuracy in validation and testing image sets. We have shown that such features can be used to derive meaningful biological traits, which in turn can be used in quantitative trait loci discovery pipelines. This process can be completely automated. We predict a paradigm shift in image-based phenotyping bought about by such deep learning approaches, given sufficient training sets.", "title": "" }, { "docid": "1eda9ea5678debcc886c996162fa475c", "text": "The main purpose of the study is to examine the impact of parent’s occupation and family income on children performance. For this study a survey was conducted in Southern Punjab. The sample of 15oo parents were collected through a questionnaire using probability sampling technique that is Simple Random Sampling. All the analysis has been carried out on SPSS (Statistical Package for the Social Sciences). Chisquare test is applied to test the effect of parent’s occupation and family income on children’s performance. The results of the study specify that parent’soccupation and family incomehave significant impact on children’s performance.Parents play an important role in child development. Parents with good economic status provide better facilities to their children, results in better performance of the children.", "title": "" }, { "docid": "539dc7f8657f83ac2ae9590a283c7321", "text": "This paper presents a review on Optical Character Recognition Techniques. Optical Character recognition (OCR) is a technology that allows machines to automatically recognize the characters through an optical mechanism. OCR can be described as Mechanical or electronic conversion of scanned images where images can be handwritten, typewritten or printed text. It converts the images into machine-encoded text that can be used in machine translation, text-to-speech and text mining. Various techniques are available for character recognition in optical character recognition system. This material can be useful for the researchers who wish to work in character recognition area.", "title": "" } ]
scidocsrr
a1819b45c35af9f9989a12d76b9258e2
Hyperspectral Image Classification with Convolutional Neural Networks
[ { "docid": "7655df3f32e6cf7a5545ae2231f71e7c", "text": "Many problems in information processing involve some form of dimensionality reduction. In this thesis, we introduce Locality Preserving Projections (LPP). These are linear projective maps that arise by solving a variational problem that optimally preserves the neighborhood structure of the data set. LPP should be seen as an alternative to Principal Component Analysis (PCA) – a classical linear technique that projects the data along the directions of maximal variance. When the high dimensional data lies on a low dimensional manifold embedded in the ambient space, the Locality Preserving Projections are obtained by finding the optimal linear approximations to the eigenfunctions of the Laplace Beltrami operator on the manifold. As a result, LPP shares many of the data representation properties of nonlinear techniques such as Laplacian Eigenmaps or Locally Linear Embedding. Yet LPP is linear and more crucially is defined everywhere in ambient space rather than just on the training data points. Theoretical analysis shows that PCA, LPP, and Linear Discriminant Analysis (LDA) can be obtained from different graph models. Central to this is a graph structure that is inferred on the data points. LPP finds a projection that respects this graph structure. We have applied our algorithms to several real world applications, e.g. face analysis and document representation.", "title": "" } ]
[ { "docid": "a26dd0133a66a8868d84ef418bcaf9f5", "text": "In performance display advertising a key metric of a campaign effectiveness is its conversion rate -- the proportion of users who take a predefined action on the advertiser website, such as a purchase. Predicting this conversion rate is thus essential for estimating the value of an impression and can be achieved via machine learning. One difficulty however is that the conversions can take place long after the impression -- up to a month -- and this delayed feedback hinders the conversion modeling. We tackle this issue by introducing an additional model that captures the conversion delay. Intuitively, this probabilistic model helps determining whether a user that has not converted should be treated as a negative sample -- when the elapsed time is larger than the predicted delay -- or should be discarded from the training set -- when it is too early to tell. We provide experimental results on real traffic logs that demonstrate the effectiveness of the proposed model.", "title": "" }, { "docid": "290869845a0ce3d1bf3722bfba7dd1c5", "text": "Supplier selection is an important and widely studied topic since it has significant impact on purchasing management in supply chain. Recently, support vector machine has received much more attention from researchers, while studies on supplier selection based on it are few. In this paper, a new support vector machine technology, potential support vector machine, is introduced and then combined with decision tree to address issues on supplier selection including feature selection, multiclass classification and so on. So, hierarchical potential support vector machine and hierarchical system of features are put forward in the paper, and experiments show the proposed methodology has much better generalization performance and less computation consumptions than standard support vector machine. 2008 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "e269585a133a138b2ba11c7fb2d025ec", "text": "Concept and design of a low cost two-axes MEMS scanning mirror with an aperture size of 7 millimetres for a compact automotive LIDAR sensor is presented. Hermetic vacuum encapsulation and stacked vertical comb drives are the key features to enable a large tilt angle of 15 degrees. A tripod MEMS mirror design provides an advantageous ratio of mirror aperture and chip size and allows circular laser scanning.", "title": "" }, { "docid": "6b136cbc8d65d0c1b02ce68bf9b7fd4c", "text": "High-throughput electrode arrays are required for advancing devices for testing the effect of drugs on cellular function. In this paper, we present design criteria for a potentiostat circuit that is capable of measuring transient amperometric oxidation currents at the surface of an electrode with submillisecond time resolution and picoampere current resolution. The potentiostat is a regulated cascode stage in which a high-gain amplifier maintains the electrode voltage through a negative feedback loop. The potentiostat uses a new shared amplifier structure in which all of the amplifiers in a given row of detectors share a common half circuit permitting us to use fewer transistors per detector. We also present measurements from a test chip that was fabricated in a 0.5-mum, 5-V CMOS process through MOSIS. Each detector occupied a layout area of 35 mumtimes15 mum and contained eight transistors and a 50-fF integrating capacitor. The rms current noise at 2-kHz bandwidth is ap110 fA. The maximum charge storage capacity at 2 kHz is 1.26times106 electrons", "title": "" }, { "docid": "6cd9df79a38656597b124b139746462e", "text": "Load balancing is a technique which allows efficient parallelization of irregular workloads, and a key component of many applications and parallelizing runtimes. Work-stealing is a popular technique for implementing load balancing, where each parallel thread maintains its own work set of items and occasionally steals items from the sets of other threads.\n The conventional semantics of work stealing guarantee that each inserted task is eventually extracted exactly once. However, correctness of a wide class of applications allows for relaxed semantics, because either: i) the application already explicitly checks that no work is repeated or ii) the application can tolerate repeated work.\n In this paper, we introduce idempotent work tealing, and present several new algorithms that exploit the relaxed semantics to deliver better performance. The semantics of the new algorithms guarantee that each inserted task is eventually extracted at least once-instead of exactly once.\n On mainstream processors, algorithms for conventional work stealing require special atomic instructions or store-load memory ordering fence instructions in the owner's critical path operations. In general, these instructions are substantially slower than regular memory access instructions. By exploiting the relaxed semantics, our algorithms avoid these instructions in the owner's operations.\n We evaluated our algorithms using common graph problems and micro-benchmarks and compared them to well-known conventional work stealing algorithms, the THE Cilk and Chase-Lev algorithms. We found that our best algorithm (with LIFO extraction) outperforms existing algorithms in nearly all cases, and often by significant margins.", "title": "" }, { "docid": "54ca6cb3e71574fc741c3181b8a4871c", "text": "Micro-expressions are brief spontaneous facial expressions that appear on a face when a person conceals an emotion, making them different to normal facial expressions in subtlety and duration. Currently, emotion classes within the CASME II dataset (Chinese Academy of Sciences Micro-expression II) are based on Action Units and self-reports, creating conflicts during machine learning training. We will show that classifying expressions using Action Units, instead of predicted emotion, removes the potential bias of human reporting. The proposed classes are tested using LBP-TOP (Local Binary Patterns from Three Orthogonal Planes), HOOF (Histograms of Oriented Optical Flow) and HOG 3D (3D Histogram of Oriented Gradient) feature descriptors. The experiments are evaluated on two benchmark FACS (Facial Action Coding System) coded datasets: CASME II and SAMM (A Spontaneous Micro-Facial Movement). The best result achieves 86.35% accuracy when classifying the proposed 5 classes on CASME II using HOG 3D, outperforming the result of the state-of-the-art 5-class emotional-based classification in CASME II. Results indicate that classification based on Action Units provides an objective method to improve micro-expression recognition.", "title": "" }, { "docid": "7f52cc4e9477147a7eb741222fb96637", "text": "This paper describes AquaOptical, an underwater optical communication system. Three optical modems have been developed: a long range system, a short range system, and a hybrid. We describe their hardware and software architectures and highlight trade-offs. We present pool and ocean experiments with each system. In clear water AquaOptical was tested to achieve a data rate of 1.2Mbit/sec at distances up to 30m. The system was not tested beyond 30m. In water with visibility estimated at 3m AquaOptical achieved communication at data rates of 0.6Mbit/sec at distances up to 9m.", "title": "" }, { "docid": "f00724247e49fcd372aec65e1b3c1855", "text": "Bioconversion of lignocellulose by microbial fermentation is typically preceded by an acidic thermochemical pretreatment step designed to facilitate enzymatic hydrolysis of cellulose. Substances formed during the pretreatment of the lignocellulosic feedstock inhibit enzymatic hydrolysis as well as microbial fermentation steps. This review focuses on inhibitors from lignocellulosic feedstocks and how conditioning of slurries and hydrolysates can be used to alleviate inhibition problems. Novel developments in the area include chemical in-situ detoxification by using reducing agents, and methods that improve the performance of both enzymatic and microbial biocatalysts.", "title": "" }, { "docid": "f5648e3bd38e876b53ee748021e165f2", "text": "The existing image captioning approaches typically train a one-stage sentence decoder, which is difficult to generate rich fine-grained descriptions. On the other hand, multi-stage image caption model is hard to train due to the vanishing gradient problem. In this paper, we propose a coarse-to-fine multi-stage prediction framework for image captioning, composed of multiple decoders each of which operates on the output of the previous stage, producing increasingly refined image descriptions. Our proposed learning approach addresses the difficulty of vanishing gradients during training by providing a learning objective function that enforces intermediate supervisions. Particularly, we optimize our model with a reinforcement learning approach which utilizes the output of each intermediate decoder’s test-time inference algorithm as well as the output of its preceding decoder to normalize the rewards, which simultaneously solves the well-known exposure bias problem and the loss-evaluation mismatch problem. We extensively evaluate the proposed approach on MSCOCO and show that our approach can achieve the state-of-the-art performance.", "title": "" }, { "docid": "00019172e1ef08f7ac9ebbfc6ed3d4f7", "text": "We introduce a set of new Markov chain Monte Carlo algorithms for Bayesian analysis of the multinomial probit model. Our Bayesian representation of the model places a new, and possibly improper, prior distribution directly on the identi0able parameters and thus is relatively easy to interpret and use. Our algorithms, which are based on the method of marginal data augmentation, involve only draws from standard distributions and dominate other available Bayesian methods in that they are as quick to converge as the fastest methods but with a more attractive prior speci0cation. C-code along with an R interface for our algorithms is publicly available. c © 2004 Elsevier B.V. All rights reserved. JEL classi$cation: C11; C25; C35", "title": "" }, { "docid": "59b928fab5d53519a0a020b7461690cf", "text": "Musical genres are categorical descriptions that are used to describe music. They are commonly used to structure the increasing amounts of music available in digital form on the Web and are important for music information retrieval. Genre categorization for audio has traditionally been performed manually. A particular musical genre is characterized by statistical properties related to the instrumentation, rhythmic structure and form of its members. In this work, algorithms for the automatic genre categorization of audio signals are described. More specifically, we propose a set of features for representing texture and instrumentation. In addition a novel set of features for representing rhythmic structure and strength is proposed. The performance of those feature sets has been evaluated by training statistical pattern recognition classifiers using real world audio collections. Based on the automatic hierarchical genre classification two graphical user interfaces for browsing and interacting with large audio collections have been developed.", "title": "" }, { "docid": "5a63b6385068fbc24d1d79f9a6363172", "text": "Big Data Analytics and Deep Learning are two high-focus of data science. Big Data has become important as many organizations both public and private have been collecting massive amounts of domain-specific information, which can contain useful information about problems such as national intelligence, cyber security, fraud detection, marketing, and medical informatics. Companies such as Google and Microsoft are analyzing large volumes of data for business analysis and decisions, impacting existing and future technology. Deep Learning algorithms extract high-level, complex abstractions as data representations through a hierarchical learning process. Complex abstractions are learnt at a given level based on relatively simpler abstractions formulated in the preceding level in the hierarchy. A key benefit of Deep Learning is the analysis and learning of massive amounts of unsupervised data, making it a valuable tool for Big Data Analytics where raw data is largely unlabeled and un-categorized. In the present study, we explore how Deep Learning can be utilized for addressing some important problems in Big Data Analytics, including extracting complex patterns from massive volumes of data, semantic indexing, data tagging, fast information retrieval, and simplifying discriminative tasks. We also investigate some aspects of Deep Learning research that need further exploration to incorporate specific challenges introduced by Big Data Analytics, including streaming data, high-dimensional data, scalability of models, and distributed computing. We conclude by presenting insights into relevant future works by posing some questions, including defining data sampling criteria, domain adaptation modeling, defining criteria for obtaining useful data abstractions, improving semantic indexing, semi-supervised learning, and active learning.", "title": "" }, { "docid": "7282b16c6a433c318a93e270125777ff", "text": "Background: Tooth extraction is associated with dimensional changes in the alveolar ridge. The aim was to examine the effect of single versus contiguous teeth extractions on the alveolar ridge remodeling. Material and Methods: Five female beagle dogs were randomly divided into three groups on the basis of location (anterior or posterior) and number of teeth extracted – exctraction socket classification: group 1 (one dog): single-tooth extraction; group 2 (two dogs): extraction of two teeth; and group 3 (two dogs): extraction of three teeth in four anterior sites and four posterior sites in both jaws. The dogs were sacrificed after 4 months. Sagittal sectioning of each extraction site was performed and evaluated using microcomputed tomography. Results: Buccolingual or palatal bone loss was observed 4 months after extraction in all three groups. The mean of the alveolar ridge width loss in group 1 (single-tooth extraction) was significantly less than those in groups 2 and 3 (p < .001) (multiple teeth extraction). Three-teeth extraction (group 3) had significantly more alveolar bone loss than two-teeth extraction (group 2) (p < .001). The three-teeth extraction group in the upper and lower showed more obvious resorption on the palatal/lingual side especially in the lower group posterior locations. Conclusion: Contiguous teeth extraction caused significantly more alveolar ridge bone loss as compared with when a single tooth is extracted.", "title": "" }, { "docid": "11a2882124e64bd6b2def197d9dc811a", "text": "1 Abstract— Clustering is the most acceptable technique to analyze the raw data. Clustering can help detect intrusions when our training data is unlabeled, as well as for detecting new and unknown types of intrusions. In this paper we are trying to analyze the NSL-KDD dataset using Simple K-Means clustering algorithm. We tried to cluster the dataset into normal and four of the major attack categories i.e. DoS, Probe, R2L, U2R. Experiments are performed in WEKA environment. Results are verified and validated using test dataset. Our main objective is to provide the complete analysis of NSL-KDD intrusion detection dataset.", "title": "" }, { "docid": "4552e4542db450e98f4aee2e5a019f0f", "text": "Time-series data is increasingly collected in many domains. One example is the smart electricity infrastructure, which generates huge volumes of such data from sources such as smart electricity meters. Although today these data are used for visualization and billing in mostly 15-min resolution, its original temporal resolution frequently is more fine-grained, e.g., seconds. This is useful for various analytical applications such as short-term forecasting, disaggregation and visualization. However, transmitting and storing huge amounts of such fine-grained data are prohibitively expensive in terms of storage space in many cases. In this article, we present a compression technique based on piecewise regression and two methods which describe the performance of the compression. Although our technique is a general approach for time-series compression, smart grids serve as our running example and as our evaluation scenario. Depending on the data and the use-case scenario, the technique compresses data by ratios of up to factor 5,000 while maintaining its usefulness for analytics. The proposed technique has outperformed related work and has been applied to three real-world energy datasets in different scenarios. Finally, we show that the proposed compression technique can be implemented in a state-of-the-art database management system.", "title": "" }, { "docid": "91f31bfb2e03ed098c0d5537d7f549a6", "text": "Coaches of different profiles influence athletes’ sports motivation differently. The aim of this paper was to investigate the coaches’ contribution to the motivational structure of athletes from team sports. Using the coaches’ self-evaluations of goal orientation and intrinsic motivation and the athletes’ evaluations of their coaches’ leadership styles, the two types of coaches were identified. Discriminant analysis showed the differences in motivational structure between athletes trained by the coaches from either one or the other group. The athletes who were trained by the more athlete-directed, low ego-oriented coaches showed a preferable motivational pattern; they perceived the mastery motivational climate in their teams, were higher on intrinsic motivation, their task goal orientation was high and ego goal orientation was elevated. The athletes trained by the less athlete-directed and high ego-oriented coaches perceived fewer signs of the mastery motivational climate in their teams, were less intrinsically motivated, and their task orientation and ego goal orientation were lower. The motivational structure profiles of the athletes from the second group and their coaches seem incongruent and this incompatibility might induce athletes’ lower motivation.", "title": "" }, { "docid": "324c0fe0d57734b54dd03e468b7b4603", "text": "This paper studies the use of received signal strength indicators (RSSI) applied to fingerprinting method in a Bluetooth network for indoor positioning. A Bayesian fusion (BF) method is proposed to combine the statistical information from the RSSI measurements and the prior information from a motion model. Indoor field tests are carried out to verify the effectiveness of the method. Test results show that the proposed BF algorithm achieves a horizontal positioning accuracy of about 4.7 m on the average, which is about 6 and 7 % improvement when compared with Bayesian static estimation and a point Kalman filter method, respectively.", "title": "" }, { "docid": "c3ee32ebe664e325ee29d0cee9130847", "text": "Many real-world brain–computer interface (BCI) applications rely on single-trial classification of event-related potentials (ERPs) in EEG signals. However, because different subjects have different neural responses to even the same stimulus, it is very difficult to build a generic ERP classifier whose parameters fit all subjects. The classifier needs to be calibrated for each individual subject, using some labeled subject-specific data. This paper proposes both online and offline weighted adaptation regularization (wAR) algorithms to reduce this calibration effort, i.e., to minimize the amount of labeled subject-specific EEG data required in BCI calibration, and hence to increase the utility of the BCI system. We demonstrate using a visually evoked potential oddball task and three different EEG headsets that both online and offline wAR algorithms significantly outperform several other algorithms. Moreover, through source domain selection, we can reduce their computational cost by about $\\text{50}\\%$, making them more suitable for real-time applications.", "title": "" }, { "docid": "c85bd1c2ffb6b53bfeec1ec69f871360", "text": "In this paper, we present a new design of a compact power divider based on the modification of the conventional Wilkinson power divider. In this new configuration, length reduction of the high-impedance arms is achieved through capacitive loading using open stubs. Radial configuration was adopted for bandwidth enhancement. Additionally, by insertion of the complex isolation network between the high-impedance transmission lines at an arbitrary phase angle other than 90 degrees, both electrical and physical isolation were achieved. Design equations as well as the synthesis procedure of the isolation network are demonstrated using an example centred at 1 GHz. The measurement results revealed a reduction of 60% in electrical length compared to the conventional Wilkinson power divider with a total length of only 30 degrees at the centre frequency of operation.", "title": "" }, { "docid": "1780eb245605582701c696781d75086a", "text": "The increasing popularity of social media encourages more and more users to participate in various online activities and produces data in an unprecedented rate. Social media data is big, linked, noisy, highly unstructured and in- complete, and differs from data in traditional data mining, which cultivates a new research field - social media mining. Social theories from social sciences are helpful to explain social phenomena. The scale and properties of social media data are very different from these of data social sciences use to develop social theories. As a new type of social data, social media data has a fundamental question - can we apply social theories to social media data? Recent advances in computer science provide necessary computational tools and techniques for us to verify social theories on large-scale social media data. Social theories have been applied to mining social media. In this article, we review some key social theories in mining social media, their verification approaches, interesting findings, and state-of-the-art algorithms. We also discuss some future directions in this active area of mining social media with social theories.", "title": "" } ]
scidocsrr
3deab786cc1b2e691452a35b3cf149c5
Spam Deobfuscation using a Hidden Markov Model
[ { "docid": "5301c9ab75519143c5657b9fa780cfcb", "text": "Although discriminatively trained classifiers are usually more accurate when labeled training data is abundant, previous work has sh own that when training data is limited, generative classifiers can ou t-perform them. This paper describes a hybrid model in which a high-dim ensional subset of the parameters are trained to maximize generative likelihood, and another, small, subset of parameters are discriminativ ely trained to maximize conditional likelihood. We give a sample complexi ty bound showing that in order to fit the discriminative parameters we ll, the number of training examples required depends only on the logari thm of the number of feature occurrences and feature set size. Experim ental results show that hybrid models can provide lower test error and can p roduce better accuracy/coverage curves than either their purely g nerative or purely discriminative counterparts. We also discuss sever al advantages of hybrid models, and advocate further work in this area.", "title": "" } ]
[ { "docid": "7ff2b5900aa1b7ca841f01985ad28fb9", "text": "Article history: Received 4 December 2016 Received in revised form 29 October 2017 Accepted 21 November 2017 Available online 2 December 2017 This paper presents a longitudinal interpretive case study of a UK bank's efforts to combat Money Laundering (ML) by expanding the scope of its profiling ofML behaviour. The concept of structural coupling, taken from systems theory, is used to reflect on the bank's approach to theorize about the nature of ML-profiling. The paper offers a practical contribution by laying a path towards the improvement of money laundering detection in an organizational context while a set of evaluation measures is extracted from the case study. Generalizing from the case of the bank, the paper presents a systems-oriented conceptual framework for ML monitoring. © 2017 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "7c89df8980ee72aa2aa2d094f97a0cc8", "text": "This paper presents a power factor correction (PFC)-based bridgeless canonical switching cell (BL-CSC) converter-fed brushless dc (BLDC) motor drive. The proposed BL-CSC converter operating in a discontinuous inductor current mode is used to achieve a unity power factor at the ac mains using a single voltage sensor. The speed of the BLDC motor is controlled by varying the dc bus voltage of the voltage source inverter (VSI) feeding the BLDC motor via a PFC converter. Therefore, the BLDC motor is electronically commutated such that the VSI operates in fundamental frequency switching for reduced switching losses. Moreover, the bridgeless configuration of the CSC converter offers low conduction losses due to partial elimination of diode bridge rectifier at the front end. The proposed configuration shows a considerable increase in efficiency as compared with the conventional scheme. The performance of the proposed drive is validated through experimental results obtained on a developed prototype. Improved power quality is achieved at the ac mains for a wide range of control speeds and supply voltages. The obtained power quality indices are within the acceptable limits of IEC 61000-3-2.", "title": "" }, { "docid": "a2c9c975788253957e6bbebc94eb5a4b", "text": "The implementation of Substrate Integrated Waveguide (SIW) structures in paper-based inkjet-printed technology is presented in this paper for the first time. SIW interconnects and components have been fabricated and tested on a multilayer paper substrate, which permits to implement low-cost and eco-friendly structures. A broadband and compact ridge substrate integrated slab waveguide covering the entire UWB frequency range is proposed and preliminarily verified. SIW structures appear particularly suitable for implementation on paper, due to the possibility to easily realize multilayered topologies and conformal geometries.", "title": "" }, { "docid": "e48e1a9b9a14e0ef3b2bcc78058089cc", "text": "Reading requires the orchestration of visual, attentional, language-related, and oculomotor processing constraints. This study replicates previous effects of frequency, predictability, and length of fixated words on fixation durations in natural reading and demonstrates new effects of these variables related to 144 sentences. Such evidence for distributed processing of words across fixation durations challenges psycholinguistic immediacy-of-processing and eye-mind assumptions. Most of the time the mind processes several words in parallel at different perceptual and cognitive levels. Eye movements can help to unravel these processes.", "title": "" }, { "docid": "cb147151678698565840e4979fa4cb41", "text": "This paper presents a comparative evaluation of silicon carbide power devices for the domestic induction heating (IH) application, which currently has a major industrial, economic and social impact. The compared technologies include MOSFETs, normally on and normally off JFETs, as well as BJTs. These devices have been compared according to different figure-of-merit evaluating conduction and switching performance, efficiency, impact of temperature, as well as other driving and protection issues. To perform the proposed evaluation, a versatile test platform has been developed. As a result of this study, several differential features are identified and discussed, taking into account the pursued induction heating application.", "title": "" }, { "docid": "a059b4908b2ffde33fcedfad999e9f6e", "text": "The use of a hull-climbing robot is proposed to assist hull surveyors in their inspection tasks, reducing cost and risk to personnel. A novel multisegmented hull-climbing robot with magnetic wheels is introduced where multiple two-wheeled modular segments are adjoined by flexible linkages. Compared to traditional rigid-body tracked magnetic robots that tend to detach easily in the presence of surface discontinuities, the segmented design adapts to such discontinuities with improved adhesion to the ferrous surface. Coordinated mobility is achieved with the use of a motion-control algorithm that estimates robot pose through position sensors located in each segment and linkage in order to optimally command each of the drive motors of the system. Self-powered segments and an onboard radio allow for wireless transmission of video and control data between the robot and its operator control unit. The modular-design approach of the system is highly suited for upgrading or adding segments as needed. For example, enhancing the system with a segment that supports an ultrasonic measurement device used to measure hull-thickness of corroded sites can help minimize the number of areas that a surveyor must personally visit for further inspection and repair. Future development efforts may lead to the design of autonomy segments that accept high-level commands from the operator and automatically execute wide-area inspections. It is also foreseeable that with several multi-segmented robots, a coordinated inspection task can take place in parallel, significantly reducing inspection time and cost. *aaron.burmeister@navy.mil The focus of this paper is on the development efforts of the prototype system that has taken place since 2012. Specifically, the tradeoffs of the magnetic-wheel and linkage designs are discussed and the motion-control algorithm presented. Overall system-performance results obtained from various tests and demonstrations are also reported.", "title": "" }, { "docid": "f074965ee3a1d6122f1e68f49fd11d84", "text": "Data mining is the extraction of knowledge from large databases. One of the popular data mining techniques is Classification in which different objects are classified into different classes depending on the common properties among them. Decision Trees are widely used in Classification. This paper proposes a tool which applies an enhanced Decision Tree Algorithm to detect the suspicious e-mails about the criminal activities. An improved ID3 Algorithm with enhanced feature selection method and attribute- importance factor is applied to generate a better and faster Decision Tree. The objective is to detect the suspicious criminal activities and minimize them. That's why the tool is named as “Z-Crime” depicting the “Zero Crime” in the society. This paper aims at highlighting the importance of data mining technology to design proactive application to detect the suspicious criminal activities.", "title": "" }, { "docid": "3b7c0a822c5937ac9e4d702bb23e3432", "text": "In a video surveillance system with static cameras, object segmentation often fails when part of the object has similar color with the background, resulting in poor performance of the subsequent object tracking. Multiple kernels have been utilized in object tracking to deal with occlusion, but the performance still highly depends on segmentation. This paper presents an innovative system, named Multiple-kernel Adaptive Segmentation and Tracking (MAST), which dynamically controls the decision thresholds of background subtraction and shadow removal around the adaptive kernel regions based on the preliminary tracking results. Then the objects are tracked for the second time according to the adaptively segmented foreground. Evaluations of both segmentation and tracking on benchmark datasets and our own recorded video sequences demonstrate that the proposed method can successfully track objects in similar-color background and/or shadow areas with favorable segmentation performance.", "title": "" }, { "docid": "9154228a5f1602e2fbebcac15959bd21", "text": "Evaluation metric plays a critical role in achieving the optimal classifier during the classification training. Thus, a selection of suitable evaluation metric is an important key for discriminating and obtaining the optimal classifier. This paper systematically reviewed the related evaluation metrics that are specifically designed as a discriminator for optimizing generative classifier. Generally, many generative classifiers employ accuracy as a measure to discriminate the optimal solution during the classification training. However, the accuracy has several weaknesses which are less distinctiveness, less discriminability, less informativeness and bias to majority class data. This paper also briefly discusses other metrics that are specifically designed for discriminating the optimal solution. The shortcomings of these alternative metrics are also discussed. Finally, this paper suggests five important aspects that must be taken into consideration in constructing a new discriminator metric.", "title": "" }, { "docid": "4d04debb13948f73e959929dbf82e139", "text": "DynaMIT is a simulation-based real-time system designed to estimate the current state of a transportation network, predict future tra c conditions, and provide consistent and unbiased information to travelers. To perform these tasks, e cient simulators have been designed to explicitly capture the interactions between transportation demand and supply. The demand re ects both the OD ow patterns and the combination of all the individual decisions of travelers while the supply re ects the transportation network in terms of infrastructure, tra c ow and tra c control. This paper describes the design and speci cation of these simulators, and discusses their interactions. Massachusetts Institute of Technology, Dpt of Civil and Environmental Engineering, Cambridge, Ma. Email: mba@mit.edu Ecole Polytechnique F ed erale de Lausanne, Dpt. of Mathematics, CH-1015 Lausanne, Switzerland. Email: michel.bierlaire@ep .ch Volpe National Transportation Systems Center, Dpt of Transportation, Cambridge, Ma. Email: koutsopoulos@volpe.dot.gov The Ohio State University, Columbus, Oh. Email: mishalani.1@osu.edu", "title": "" }, { "docid": "cf6eb57b4740d3e14a73fd6197769bf5", "text": "Microwave Materials such as Rogers RO3003 are subject to process-related fluctuations in terms of the relative permittivity. The behavior of high frequency circuits like patch-antenna arrays and their distribution networks is dependent on the effective wavelength. Therefore, fluctuations of the relative permittivity will influence the resonance frequency and antenna beam direction. This paper presents a grounded coplanar wave-guide based sensor, which can measure the relative permittivity at 77 GHz, as well as at other resonance frequencies, by applying it on top of the manufactured depaneling. In addition, the sensor is robust against floating ground metallizations on inner printed circuit board layers, which are typically distributed over the entire surface below antennas.", "title": "" }, { "docid": "b4eef9e3a95a00cefd3a947637f72329", "text": "Plants are considered as one of the greatest assets in the field of Indian Science of Medicine called Ayurveda. Some plants have its medicinal values apart from serving as the source of food. The innovation in the allopathic medicines has degraded the significance of these therapeutic plants. People failed to have their medications at their door step instead went behind the fastest cure unaware of its side effects. One among the reasons is the lack of knowledge about identifying medicinal plants among the normal ones. So, a Vision based approach is being employed to create an automated system which identifies the plants and provides its medicinal values thus helping even a common man to be aware of the medicinal plants around them. This paper discusses about the formation of the feature set which is the important step in recognizing any plant species.", "title": "" }, { "docid": "68278896a61e13705e5ffb113487cceb", "text": "Universal Language Model for Fine-tuning [6] (ULMFiT) is one of the first NLP methods for efficient inductive transfer learning. Unsupervised pretraining results in improvements on many NLP tasks for English. In this paper, we describe a new method that uses subword tokenization to adapt ULMFiT to languages with high inflection. Our approach results in a new state-of-the-art for the Polish language, taking first place in Task 3 of PolEval’18. After further training, our final model outperformed the second best model by 35%. We have open-sourced our pretrained models and code.", "title": "" }, { "docid": "5db336088113fbfdf93be6e057f97748", "text": "Unmanned Aerial Vehicles (UAVs) are an exciting new remote sensing tool capable of acquiring high resolution spatial data. Remote sensing with UAVs has the potential to provide imagery at an unprecedented spatial and temporal resolution. The small footprint of UAV imagery, however, makes it necessary to develop automated techniques to geometrically rectify and mosaic the imagery such that larger areas can be monitored. In this paper, we present a technique for geometric correction and mosaicking of UAV photography using feature matching and Structure from Motion (SfM) photogrammetric techniques. Images are processed to create three dimensional point clouds, initially in an arbitrary model space. The point clouds are transformed into a real-world coordinate system using either a direct georeferencing technique that uses estimated camera positions or via a Ground Control Point (GCP) technique that uses automatically identified GCPs within the point cloud. The point cloud is then used to generate a Digital Terrain Model (DTM) required for rectification of the images. Subsequent georeferenced images are then joined together to form a mosaic of the study area. The absolute spatial accuracy of the direct technique was found to be 65–120 cm whilst the GCP technique achieves an accuracy of approximately 10–15 cm.", "title": "" }, { "docid": "615ba820d06c9e5f7dd3e9130bf064bd", "text": "Recommender system has become an indispensable component in many e-commerce sites. One major challenge that largely remains open is the coldstart problem, which can be viewed as an ice barrier that keeps the cold-start users/items from the warm ones. In this paper, we propose a novel rating comparison strategy (RAPARE) to break this ice barrier. The center-piece of our RAPARE is to provide a fine-grained calibration on the latent profiles of cold-start users/items by exploring the differences between cold-start and warm users/items. We instantiate our RAPARE strategy on the prevalent method in recommender system, i.e., the matrix factorization based collaborative filtering. Experimental evaluations on two real data sets validate the superiority of our approach over the existing methods in cold-start scenarios.", "title": "" }, { "docid": "b2e7fc135ec3afa8e38f87a3c47fd5d9", "text": "Advances in 3D graphics technology have accelerated the con struction of dynamic 3D environments. Despite their promise for scientific and educational applications, much of this potential has gone unrealized because runtime c a era control software lacks user-sensitivity. Current environments rely on sequences of viewpoints that directly require the user’s control or are based primarily on actions and geom etry of the scene. Because of the complexity of rapidly changing environments, users typ ically cannot manipulate objects in environments while simultaneously issuing camera contr ol commands. To address these issues, we have developed UC AM , a realtime camera planner that employs cinematographic user models to render customized visualizations of dynamic 3D environments. After interviewing users to determine their preferred directorial sty e and pacing, UCAM examines the resulting cinematographic user model to plan camera sequen ces whose shot vantage points and cutting rates are tailored to the user in realtime. Evalu ations of UCAM in a dynamic 3D testbed are encouraging.", "title": "" }, { "docid": "bc166a431e35bc9b11801bcf1ff6c9fd", "text": "Outsourced storage has become more and more practical in recent years. Users can now store large amounts of data in multiple servers at a relatively low price. An important issue for outsourced storage systems is to design an efficient scheme to assure users that their data stored at remote servers has not been tampered with. This paper presents a general method and a practical prototype application for verifying the integrity of files in an untrusted network storage service. The verification process is managed by an application running in a trusted environment (typically on the client) that stores just one cryptographic hash value of constant size, corresponding to the \"digest\" of an authenticated data structure. The proposed integrity verification service can work with any storage service since it is transparent to the storage technology used. Experimental results show that our integrity verification method is efficient and practical for network storage systems.", "title": "" }, { "docid": "5353d9e123261783a5bcb02adaac09b2", "text": "This work presents a new digital control strategy of a three-phase PWM inverter for uninterruptible power supplies (UPS) systems. To achieve a fast transient response, a good voltage regulation, nearly zero steady state inverter output voltage error, and low total harmonic distortion (THD), the proposed control method consists of two discrete-time feedback controllers: a discrete-time optimal + sliding-mode voltage controller in outer loop and a discrete-time optimal current controller in inner loop. To prove the effectiveness of the proposed technique, various simulation results using Matlab/Simulink are shown under both linear and nonlinear loads.", "title": "" }, { "docid": "2a7983e91cd674d95524622e82c4ded7", "text": "• FC (fully-connected) layer takes the pooling results, produces features FROI, Fcontext, Fframe, and feeds them into two streams, inspired by [BV16]. • Classification stream produces a matrix of classification scores S = [FCcls(FROI1); . . . ;FCcls(FROIK)] ∈ RK×C • Localization stream implements the proposed context-aware guidance that uses FROIk, Fcontextk, Fframek to produce a localization score matrix L ∈ RK×C.", "title": "" }, { "docid": "a9ff593d6eea9f28aa1d2b41efddea9b", "text": "A central task in the study of evolution is the reconstruction of a phylogenetic tree from sequences of current-day taxa. A well supported approach to tree reconstruction performs maximum likelihood (ML) analysis. Unfortunately, searching for the maximum likelihood phylogenetic tree is computationally expensive. In this paper, we describe a new algorithm that uses Structural-EM for learning maximum likelihood trees. This algorithm is similar to the standard EM method for estimating branch lengths, except that during iterations of this algorithms the topology is improved as well as the branch length. The algorithm performs iterations of two steps. In the E-Step, we use the current tree topology and branch lengths to compute expected sufficient statistics, which summarize the data. In the M-Step, we search for a topology that maximizes the likelihood with respect to these expected sufficient statistics. As we show, searching for better topologies inside the M-step can be done efficiently, as opposed to standard search over topologies. We prove that each iteration of this procedure increases the likelihood of the topology, and thus the procedure must converge. We evaluate our new algorithm on both synthetic and real sequence data, and show that it is both dramatically faster and finds more plausible trees than standard search for maximum likelihood phylogenies.", "title": "" } ]
scidocsrr
e554268203677574146b4f38da03bc34
Surprise-Based Intrinsic Motivation for Deep Reinforcement Learning
[ { "docid": "c8b382852f445c6f05c905371330dd07", "text": "Novelty and surprise play significant roles in animal behavior and in attempts to understand the neural mechanisms underlying it. They also play important roles in technology, where detecting observations that are novel or surprising is central to many applications, such as medical diagnosis, text processing, surveillance, and security. Theories of motivation, particularly of intrinsic motivation, place novelty and surprise among the primary factors that arouse interest, motivate exploratory or avoidance behavior, and drive learning. In many of these studies, novelty and surprise are not distinguished from one another: the words are used more-or-less interchangeably. However, while undeniably closely related, novelty and surprise are very different. The purpose of this article is first to highlight the differences between novelty and surprise and to discuss how they are related by presenting an extensive review of mathematical and computational proposals related to them, and then to explore the implications of this for understanding behavioral and neuroscience data. We argue that opportunities for improved understanding of behavior and its neural basis are likely being missed by failing to distinguish between novelty and surprise.", "title": "" }, { "docid": "5ed1a40b933e44f0a7f7240bbca24ab4", "text": "We present new algorithms for reinforcement learning and prove that they have polynomial bounds on the resources required to achieve near-optimal return in general Markov decision processes. After observing that the number of actions required to approach the optimal return is lower bounded by the mixing time T of the optimal policy (in the undiscounted case) or by the horizon time T (in the discounted case), we then give algorithms requiring a number of actions and total computation time that are only polynomial in T and the number of states and actions, for both the undiscounted and discounted cases. An interesting aspect of our algorithms is their explicit handling of the Exploration-Exploitation trade-off.", "title": "" } ]
[ { "docid": "e6ff5af0a9d6105a60771a2c447fab5e", "text": "Object detection and classification in 3D is a key task in Automated Driving (AD). LiDAR sensors are employed to provide the 3D point cloud reconstruction of the surrounding environment, while the task of 3D object bounding box detection in real time remains a strong algorithmic challenge. In this paper, we build on the success of the oneshot regression meta-architecture in the 2D perspective image space and extend it to generate oriented 3D object bounding boxes from LiDAR point cloud. Our main contribution is in extending the loss function of YOLO v2 to include the yaw angle, the 3D box center in Cartesian coordinates and the height of the box as a direct regression problem. This formulation enables real-time performance, which is essential for automated driving. Our results are showing promising figures on KITTI benchmark, achieving real-time performance (40 fps) on Titan X GPU.", "title": "" }, { "docid": "1afc103a3878d859ec15929433f49077", "text": "Large-scale deep neural networks (DNNs) are both compute and memory intensive. As the size of DNNs continues to grow, it is critical to improve the energy efficiency and performance while maintaining accuracy. For DNNs, the model size is an important factor affecting performance, scalability and energy efficiency. Weight pruning achieves good compression ratios but suffers from three drawbacks: 1) the irregular network structure after pruning, which affects performance and throughput; 2) the increased training complexity; and 3) the lack of rigirous guarantee of compression ratio and inference accuracy.\n To overcome these limitations, this paper proposes CirCNN, a principled approach to represent weights and process neural networks using block-circulant matrices. CirCNN utilizes the Fast Fourier Transform (FFT)-based fast multiplication, simultaneously reducing the computational complexity (both in inference and training) from O(n2) to O(n log n) and the storage complexity from O(n2) to O(n), with negligible accuracy loss. Compared to other approaches, CirCNN is distinct due to its mathematical rigor: the DNNs based on CirCNN can converge to the same \"effectiveness\" as DNNs without compression. We propose the CirCNN architecture, a universal DNN inference engine that can be implemented in various hardware/software platforms with configurable network architecture (e.g., layer type, size, scales, etc.). In CirCNN architecture: 1) Due to the recursive property, FFT can be used as the key computing kernel, which ensures universal and small-footprint implementations. 2) The compressed but regular network structure avoids the pitfalls of the network pruning and facilitates high performance and throughput with highly pipelined and parallel design. To demonstrate the performance and energy efficiency, we test CirCNN in FPGA, ASIC and embedded processors. Our results show that CirCNN architecture achieves very high energy efficiency and performance with a small hardware footprint. Based on the FPGA implementation and ASIC synthesis results, CirCNN achieves 6 - 102X energy efficiency improvements compared with the best state-of-the-art results.", "title": "" }, { "docid": "be40c84b4bc9d5d6cd21e1e83b9c35ed", "text": "A short overview is given of many recent results in algorithmic graph theory that deal with the notions treewidth, and pathwidth. We discuss algorithms that nd tree-decompositions, algorithms that use tree-decompositions to solve hard problems eeciently, graph minor theory, and some applications. The paper contains an extensive bibliography.", "title": "" }, { "docid": "ecad37ad1097369fd03f0decff2d23dc", "text": "The unique musculoskeletal structure of the human hand brings in wider dexterous capabilities to grasp and manipulate a repertoire of objects than the non-human primates. It has been widely accepted that the orientation and the position of the thumb plays an important role in this characteristic behavior. There have been numerous attempts to develop anthropomorphic robotic hands with varying levels of success. Nevertheless, manipulation ability in those hands is to be ameliorated even though they can grasp objects successfully. An appropriate model of the thumb is important to manipulate the objects against the fingers and to maintain the stability. Modeling these complex interactions about the mechanical axes of the joints and how to incorporate these joints in robotic thumbs is a challenging task. This article presents a review of the biomechanics of the human thumb and the robotic thumb designs to identify opportunities for future anthropomorphic robotic hands.", "title": "" }, { "docid": "df6b1cb3efbababa8aa0a2c04b999cf0", "text": "A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.", "title": "" }, { "docid": "5284157f83c2fe578746b9ae3f6ad429", "text": "SLOWbot is a research project conducted via a collaboration between iaso health and FBK (Fondazione Bruno Kessler). There are now thousands of available healthy aging apps, but most don't deliver on their promise to support a healthy aging process in people that need it the most. The neediest include the over-fifties age group, particularly those wanting to prevent the diseases of aging or whom already have a chronic disease. Even the motivated \"quantified selfers\" discard their health apps after only a few months. Our research aims to identify new ways to ensure adherence to a healthy lifestyle program tailored for an over fifties audience which is delivered by a chatbot. The research covers the participant onboarding process and examines barriers and issues with gathering predictive data that might inform future improved uptake and adherence as well as an increase in health literacy by the participants. The healthy lifestyle program will ultimately be delivered by our \"SLOWbot\" which guides the participant to make informed and enhanced health decision making, specifically around food choices (a \"longevity eating plan\").", "title": "" }, { "docid": "ee045772d55000b6f2d3f7469a4161b1", "text": "Although prior research has addressed the influence of corporate social responsibility (CSR) on perceived customer responses, it is not clear whether CSR affects market value of the firm. This study develops and tests a conceptual framework, which predicts that (1) customer satisfaction partially mediates the relationship between CSR and firm market value (i.e., Tobin’s q and stock return), (2) corporate abilities (innovativeness capability and product quality) moderate the financial returns to CSR, and (3) these moderated relationships are mediated by customer satisfaction. Based on a large-scale secondary dataset, the results show support for this framework. Interestingly, it is found that in firms with low innovativeness capability, CSR actually reduces customer satisfaction levels and, through the lowered satisfaction, harms market value. The uncovered mediated and asymmetrically moderated results offer important implications for marketing theory and practice. In today’s competitive market environment, corporate social responsibility (CSR) represents a high-profile notion that has strategic importance to many companies. As many as 90% of the Fortune 500 companies now have explicit CSR initiatives (Kotler and Lee 2004; Lichtenstein et al. 2004). According to a recent special report by BusinessWeek (2005a, p.72), large companies disclosed substantial investments in CSR initiatives (i.e., Target’s donation of $107.8 million in CSR represents 3.6% of its pretax profits, with GM $51.2 million at 2.7%, General Mills $60.3 million at 3.2%, Merck $921million at 11.3%, HCA $926 million at 43.3%). By dedicating everincreasing amounts to cash donations, in-kind contributions, cause marketing, and employee volunteerism programs, companies are acting on the premise that CSR is not merely the “right thing to do,” but also “the smart thing to do” (Smith 2003). Importantly, along with increasing media coverage of CSR issues, companies themselves are also taking direct and visible steps to communicate their CSR initiatives to various stakeholders including consumers. A decade ago, Drumwright (1996) observed that advertising with a social dimension was on the rise. The trend seems to continue. Many companies, including the likes of Target and Walmart, have funded large national ad campaigns promoting their good works. The October 2005 issue of In Style magazine alone carried more than 25 “cause” ads. Indeed, consumers seem to be taking notice: whereas in 1993 only 26% of individuals surveyed by Cone Communications could name a company as a strong corporate citizen, by 2004, the percentage surged to as high as 80% (BusinessWeek 2005a). Motivated, in part, by this mounting importance of CSR in practice, several marketing studies have found that social responsibility programs have a significant influence on a number of customer-related outcomes (Bhattacharya and Sen 2004). More specifically, based on lab experiments, CSR is reported to directly or indirectly impact consumer product responses", "title": "" }, { "docid": "da0d17860604269378c8649e7353ba83", "text": "Responsive, implantable stimulation devices to treat epilepsy are now in clinical trials. New evidence suggests that these devices may be more effective when they deliver therapy before seizure onset. Despite years of effort, prospective seizure prediction, which could improve device performance, remains elusive. In large part, this is explained by lack of agreement on a statistical framework for modeling seizure generation and a method for validating algorithm performance. We present a novel stochastic framework based on a three-state hidden Markov model (HMM) (representing interictal, preictal, and seizure states) with the feature that periods of increased seizure probability can transition back to the interictal state. This notion reflects clinical experience and may enhance interpretation of published seizure prediction studies. Our model accommodates clipped EEG segments and formalizes intuitive notions regarding statistical validation. We derive equations for type I and type II errors as a function of the number of seizures, duration of interictal data, and prediction horizon length and we demonstrate the model's utility with a novel seizure detection algorithm that appeared to predicted seizure onset. We propose this framework as a vital tool for designing and validating prediction algorithms and for facilitating collaborative research in this area.", "title": "" }, { "docid": "11f47bb575a6e50c3d3ccef0e75ff3b9", "text": "Corporate social responsibility is incorporated into strategic management at the enterprise strategy level. This paper delineates the domain of enterprise strategy by focusing on how well a firm's social performance matches its competences and stakeholders rather than on the \"quantity\" of a firm's social responsibility. Enterprise strategy is defined and a classification of enterprise strategies is set forth.", "title": "" }, { "docid": "43184dfe77050618402900bc309203d5", "text": "A prototype of Air Gap RLSA has been designed and simulated using hybrid air gap and FR4 dielectric material. The 28% wide bandwidth has been recorded through this approach. A 12.35dBi directive gain also recorded from the simulation. The 13.3 degree beamwidth of the radiation pattern is sufficient for high directional application. Since the proposed application was for Point to Point Link, this study concluded the Air Gap RLSA is a new candidate for this application.", "title": "" }, { "docid": "e9c383d71839547d41829348bebaabcf", "text": "Receiver operating characteristic (ROC) analysis, which yields indices of accuracy such as the area under the curve (AUC), is increasingly being used to evaluate the performances of diagnostic tests that produce results on continuous scales. Both parametric and nonparametric ROC approaches are available to assess the discriminant capacity of such tests, but there are no clear guidelines as to the merits of each, particularly with non-binormal data. Investigators may worry that when data are non-Gaussian, estimates of diagnostic accuracy based on a binormal model may be distorted. The authors conducted a Monte Carlo simulation study to compare the bias and sampling variability in the estimates of the AUCs derived from parametric and nonparametric procedures. Each approach was assessed in data sets generated from various configurations of pairs of overlapping distributions; these included the binormal model and non-binormal pairs of distributions where one or both pair members were mixtures of Gaussian (MG) distributions with different degrees of departures from binormality. The biases in the estimates of the AUCs were found to be very small for both parametric and nonparametric procedures. The two approaches yielded very close estimates of the AUCs and the corresponding sampling variability even when data were generated from non-binormal models. Thus, for a wide range of distributions, concern about bias or imprecision of the estimates of the AUC should not be a major factor in choosing between the nonparametric and parametric approaches.", "title": "" }, { "docid": "17cb27030abc5054b8f51256bdee346a", "text": "Purpose – This paper seeks to define and describe agile project management using the Scrum methodology as a method for more effectively managing and completing projects. Design/methodology/approach – This paper provides a general overview and introduction to the concepts of agile project management and the Scrum methodology in particular. Findings – Agile project management using the Scrum methodology allows project teams to manage digital library projects more effectively by decreasing the amount of overhead dedicated to managing the project. Using an iterative process of continuous review and short-design time frames, the project team is better able to quickly adapt projects to rapidly evolving environments in which systems will be used. Originality/value – This paper fills a gap in the digital library project management literature by providing an overview of agile project management methods.", "title": "" }, { "docid": "5a9b5313575208b0bdf8ffdbd4e271f5", "text": "A new method for the design of predictive controllers for SISO systems is presented. The proposed technique allows uncertainties and constraints to be concluded in the design of the control law. The goal is to design, at each sample instant, a predictive feedback control law that minimizes a performance measure and guarantees of constraints are satisfied for a set of models that describes the system to be controlled. The predictive controller consists of a finite horizon parametric-optimization problem with an additional constraint over the manipulated variable behavior. This is an end-constraint based approach that ensures the exponential stability of the closed-loop system. The inclusion of this additional constraint, in the on-line optimization algorithm, enables robust stability properties to be demonstrated for the closedloop system. This is the case even though constraints and disturbances are present. Finally, simulation results are presented using a nonlinear continuous stirred tank reactor model.", "title": "" }, { "docid": "b3c83fc9495387f286ea83d00673b5b3", "text": "A new walk compensation method for a pulsed time-of-flight rangefinder is suggested. The receiver channel operates without gain control using leading edge timing discrimination principle. The generated walk error is compensated for by measuring the pulse length and knowing the relation between the walk error and pulse length. The walk compensation is possible also at the range where the signal is clipped and where the compensation method by amplitude measurement is impossible. Based on the simulations walk error can be compensated within the dynamic range of 1:30 000.", "title": "" }, { "docid": "9f40a57159a06ecd9d658b4d07a326b5", "text": "_____________________________________________________________________________ The aim of the present study was to investigate a cytotoxic oxidative cell stress related and the antioxidant profile of kaempferol, quercetin, and isoquercitrin. The flavonol compounds were able to act as scavengers of superoxide anion (but not hydrogen peroxide), hypochlorous acid, chloramine and nitric oxide. Although flavonoids are widely described as antioxidants and this activity is generally related to beneficial effects on human health, here we show important cytotoxic actions of three well known flavonoids. They were able to promote hemolysis which one was exacerbated on the presence of hypochlorous acid but not by AAPH radical. Therefore, WWW.SCIELO.BR/EQ VOLUME 36, NÚMERO 2, 2011", "title": "" }, { "docid": "2ae1dfeae3c6b8a1ca032198f2989aef", "text": "This study enhances the existing literature on online trust by integrating the consumers’ product evaluations model and technology adoption model in e-commerce environments. In this study, we investigate how perceived value influences the perceptions of online trust among online buyers and their willingness to repurchase from the same website. This study proposes a research model that compares the relative importance of perceived value and online trust to perceived usefulness in influencing consumers’ repurchase intention. The proposed model is tested using data collected from online consumers of e-commerce. The findings show that although trust and ecommerce adoption components are critical in influencing repurchase intention, product evaluation factors are also important in determining repurchase intention. Perceived quality is influenced by the perceptions of competitive price and website reputation, which in turn influences perceived value; and perceived value, website reputation, and perceived risk influence online trust, which in turn influence repurchase intention. The findings also indicate that the effect of perceived usefulness on repurchase intention is not significant whereas perceived value and online trust are the major determinants of repurchase intention. Major theoretical contributions and practical implications are discussed.", "title": "" }, { "docid": "ce55485a60213c7656eb804b89be36cc", "text": "In a previous article, we presented a systematic computational study of the extraction of semantic representations from the word-word co-occurrence statistics of large text corpora. The conclusion was that semantic vectors of pointwise mutual information values from very small co-occurrence windows, together with a cosine distance measure, consistently resulted in the best representations across a range of psychologically relevant semantic tasks. This article extends that study by investigating the use of three further factors--namely, the application of stop-lists, word stemming, and dimensionality reduction using singular value decomposition (SVD)--that have been used to provide improved performance elsewhere. It also introduces an additional semantic task and explores the advantages of using a much larger corpus. This leads to the discovery and analysis of improved SVD-based methods for generating semantic representations (that provide new state-of-the-art performance on a standard TOEFL task) and the identification and discussion of problems and misleading results that can arise without a full systematic study.", "title": "" }, { "docid": "bd0b233e4f19abaf97dcb85042114155", "text": "BACKGROUND/PURPOSE\nHair straighteners are very popular around the world, although they can cause great damage to the hair. Thus, the characterization of the mechanical properties of curly hair using advanced techniques is very important to clarify how hair straighteners act on hair fibers and to contribute to the development of effective products. On this basis, we chose two nonconventional hair straighteners (formaldehyde and glyoxylic acid) to investigate how hair straightening treatments affect the mechanical properties of curly hair.\n\n\nMETHODS\nThe mechanical properties of curly hair were evaluated using a tensile test, differential scanning calorimetry (DSC) measurements, scanning electronic microscopy (SEM), a torsion modulus, dynamic vapor sorption (DVS), and Fourier transform infrared spectroscopy (FTIR) analysis.\n\n\nRESULTS\nThe techniques used effectively helped the understanding of the influence of nonconventional hair straighteners on hair properties. For the break stress and the break extension tests, formaldehyde showed a marked decrease in these parameters, with great hair damage. Glyoxylic acid had a slight effect compared to formaldehyde treatment. Both treatments showed an increase in shear modulus, a decrease in water sorption and damage to the hair surface.\n\n\nCONCLUSIONS\nA combination of the techniques used in this study permitted a better understanding of nonconventional hair straightener treatments and also supported the choice of the better treatment, considering a good relationship between efficacy and safety. Thus, it is very important to determine the properties of hair for the development of cosmetics used to improve the beauty of curly hair.", "title": "" }, { "docid": "93f8ba979ea679d6b9be6f949f8ee6ed", "text": "This paper presents a method for Simultaneous Localization and Mapping (SLAM), relying on a monocular camera as the only sensor, which is able to build outdoor, closed-loop maps much larger than previously achieved with such input. Our system, based on the Hierarchical Map approach [1], builds independent local maps in real-time using the EKF-SLAM technique and the inverse depth representation proposed in [2]. The main novelty in the local mapping process is the use of a data association technique that greatly improves its robustness in dynamic and complex environments. A new visual map matching algorithm stitches these maps together and is able to detect large loops automatically, taking into account the unobservability of scale intrinsic to pure monocular SLAM. The loop closing constraint is applied at the upper level of the Hierarchical Map in near real-time. We present experimental results demonstrating monocular SLAM as a human carries a camera over long walked trajectories in outdoor areas with people and other clutter, even in the more difficult case of forward-looking camera, and show the closing of loops of several hundred meters.", "title": "" } ]
scidocsrr
f07651c61e702fa46a645f7517009d3f
Is There a Cost to Privacy Breaches? An Event Study
[ { "docid": "b62da3e709d2bd2c7605f3d0463eff2f", "text": "This study examines the economic effect of information security breaches reported in newspapers on publicly traded US corporations. We find limited evidence of an overall negative stock market reaction to public announcements of information security breaches. However, further investigation reveals that the nature of the breach affects this result. We find a highly significant negative market reaction for information security breaches involving unauthorized access to confidential data, but no significant reaction when the breach does not involve confidential information. Thus, stock market participants appear to discriminate across types of breaches when assessing their economic impact on affected firms. These findings are consistent with the argument that the economic consequences of information security breaches vary according to the nature of the underlying assets affected by the breach.", "title": "" } ]
[ { "docid": "17c987c76e3b77bd96e7b20eea0b7ed8", "text": "Due to the complexity of built environment, urban design patterns considerably affect the microclimate and outdoor thermal comfort in a given urban morphology. Variables such as building heights and orientations, spaces between buildings, plot coverage alter solar access, wind speed and direction at street level. To improve microclimate and comfort conditions urban design elements including vegetation and shading devices can be used. In warm-humid Dar es Salaam, the climate consideration in urban design has received little attention although the urban planning authorities try to develop the quality of planning and design. The main aim of this study is to investigate the relationship between urban design, urban microclimate, and outdoor comfort in four built-up areas with different morphologies including low-, medium-, and high-rise buildings. The study mainly concentrates on the warm season but a comparison with the thermal comfort conditions in the cool season is made for one of the areas. Air temperature, wind speed, mean radiant temperature (MRT), and the physiologically equivalent temperature (PET) are simulated using ENVI-met to highlight the strengths and weaknesses of the existing urban design. An analysis of the distribution of MRT in the areas showed that the area with low-rise buildings had the highest frequency of high MRTs and the lowest frequency of low MRTs. The study illustrates that areas with low-rise buildings lead to more stressful urban spaces than areas with high-rise buildings. It is also shown that the use of dense trees helps to enhance the thermal comfort conditions, i.e., reduce heat stress. However, vegetation might negatively affect the wind ventilation. Nevertheless, a sensitivity analysis shows that the provision of shade is a more efficient way to reduce PET than increases in wind speed, given the prevailing sun and wind conditions in Dar es Salaam. To mitigate heat stress in Dar es Salaam, a set of recommendations and guidelines on how to develop the existing situation from microclimate and thermal comfort perspectives is outlined. Such recommendations will help architects and urban designers to increase the quality of the outdoor environment and demonstrate the need to create better urban spaces in harmony with microclimate and thermal comfort.", "title": "" }, { "docid": "da414d5fce36272332a1a558e35e4b9a", "text": "IoT service in home domain needs common and effective ways to manage various appliances and devices. So, the home environment needs a gateway that provides dynamical device registration and discovery. In this paper, we propose the IoT Home Gateway that supports abstracted device data to remove heterogeneity, device discovery by DPWS, Auto-configuration for constrained devices such as Arduino. Also, the IoT Home Gateway provides lightweight information delivery using MQTT protocol. In addition, we show implementation results that access and control the device according to the home energy saving scenario.", "title": "" }, { "docid": "20966efc2278b0a2129b44c774331899", "text": "In current literature, grief play in Massively Multi-player Online Role-Playing Games (MMORPGs) refers to play styles where a player intentionally disrupts the gaming experience of other players. In our study, we have discovered that player experiences may be disrupted by others unintentionally, and under certain circumstances, some will believe they have been griefed. This paper explores the meaning of grief play, and suggests that some forms of unintentional grief play be called greed play. The paper suggests that greed play be treated as griefing, but a more subtle form. It also investigates the different types of griefing and establishes a taxonomy of terms in grief play.", "title": "" }, { "docid": "eabb50988aeb711995ff35833a47770d", "text": "Although chemistry is by far the largest scientific discipline according to any quantitative measure, it had, until recently, been virtually ignored by professional philosophers of science. They left both a vacuum and a one-sided picture of science tailored to physics. Since the early 1990s, the situation has changed drastically, such that philosophy of chemistry is now one of the most flourishing fields in the philosophy of science, like the philosophy of biology that emerged in the 1970s. This article narrates the development and provides a survey of the main topics and trends.", "title": "" }, { "docid": "409a45b65fdd9e85ae54265c44863db5", "text": "Use of leaf meters to provide an instantaneous assessment of leaf chlorophyll has become common, but calibration of meter output into direct units of leaf chlorophyll concentration has been difficult and an understanding of the relationship between these two parameters has remained elusive. We examined the correlation of soybean (Glycine max) and maize (Zea mays L.) leaf chlorophyll concentration, as measured by organic extraction and spectrophotometric analysis, with output (M) of the Minolta SPAD-502 leaf chlorophyll meter. The relationship is non-linear and can be described by the equation chlorophyll (μmol m−2)=10(M0.265), r 2=0.94. Use of such an exponential equation is theoretically justified and forces a more appropriate fit to a limited data set than polynomial equations. The exact relationship will vary from meter to meter, but will be similar and can be readily determined by empirical methods. The ability to rapidly determine leaf chlorophyll concentrations by use of the calibration method reported herein should be useful in studies on photosynthesis and crop physiology.", "title": "" }, { "docid": "4ecf150613d45ae0f92485b8faa0deef", "text": "Query optimizers in current database systems are designed to pick a single efficient plan for a given query based on current statistical properties of the data. However, different subsets of the data can sometimes have very different statistical properties. In such scenarios it can be more efficient to process different subsets of the data for a query using different plans. We propose a new query processing technique called content-based routing (CBR) that eliminates the single-plan restriction in current systems. We present low-overhead adaptive algorithms that partition input data based on statistical properties relevant to query execution strategies, and efficiently route individual tuples through customized plans based on their partition. We have implemented CBR as an extension to the Eddies query processor in the TelegraphCQ system, and we present an extensive experimental evaluation showing the significant performance benefits of CBR.", "title": "" }, { "docid": "d56e64ac41b4437a4c1409f17a6c7cf2", "text": "A high step-up forward flyback converter with nondissipative snubber for solar energy application is introduced here. High gain DC/DC converters are the key part of renewable energy systems .The designing of high gain DC/DC converters is imposed by severe demands. It produces high step-up voltage gain by using a forward flyback converter. The energy in the coupled inductor leakage inductance can be recycled via a nondissipative snubber on the primary side. It consists of a combination of forward and flyback converter on the secondary side. It is a hybrid type of forward and flyback converter, sharing the transformer for increasing the utilization factor. By stacking the outputs of them, extremely high voltage gain can be obtained with small volume and high efficiency even with a galvanic isolation. The separated secondary windings in low turn-ratio reduce the voltage stress of the secondary rectifiers, contributing to achievement of high efficiency. Here presents a high step-up topology employing a series connected forward flyback converter, which has a series connected output for high boosting voltage-transfer gain. A MATLAB/Simulink model of the Photo Voltaic (PV) system using Maximum Power Point Tracking (MPPT) has been implimented along with a DC/DC hardware prototype.", "title": "" }, { "docid": "0997c292d6518b17991ce95839d9cc78", "text": "A word's sentiment depends on the domain in which it is used. Computational social science research thus requires sentiment lexicons that are specific to the domains being studied. We combine domain-specific word embeddings with a label propagation framework to induce accurate domain-specific sentiment lexicons using small sets of seed words. We show that our approach achieves state-of-the-art performance on inducing sentiment lexicons from domain-specific corpora and that our purely corpus-based approach outperforms methods that rely on hand-curated resources (e.g., WordNet). Using our framework, we induce and release historical sentiment lexicons for 150 years of English and community-specific sentiment lexicons for 250 online communities from the social media forum Reddit. The historical lexicons we induce show that more than 5% of sentiment-bearing (non-neutral) English words completely switched polarity during the last 150 years, and the community-specific lexicons highlight how sentiment varies drastically between different communities.", "title": "" }, { "docid": "0f72c9034647612097c2096d1f31c980", "text": "We tackle a fundamental problem to detect and estimate just noticeable blur (JNB) caused by defocus that spans a small number of pixels in images. This type of blur is common during photo taking. Although it is not strong, the slight edge blurriness contains informative clues related to depth. We found existing blur descriptors based on local information cannot distinguish this type of small blur reliably from unblurred structures. We propose a simple yet effective blur feature via sparse representation and image decomposition. It directly establishes correspondence between sparse edge representation and blur strength estimation. Extensive experiments manifest the generality and robustness of this feature.", "title": "" }, { "docid": "4737fe7f718f79c74595de40f8778da2", "text": "In this paper we describe a method of procedurally generating maps using Markov chains. This method learns statistical patterns from human-authored maps, which are assumed to be of high quality. Our method then uses those learned patterns to generate new maps. We present a collection of strategies both for training the Markov chains, and for generating maps from such Markov chains. We then validate our approach using the game Super Mario Bros., by evaluating the quality of the produced maps based on different configurations for training and generation.", "title": "" }, { "docid": "af2dbbec77616bed893d964e6a822db0", "text": "Most existing APL implementations are interpretive in nature,that is, each time an APL statement is encountered it is executedby a body of code that is perfectly general, i.e. capable ofevaluating any APL expression, and is in no way tailored to thestatement on hand. This costly generality is said to be justifiedbecause APL variables are typeless and thus can vary arbitrarily intype, shape, and size during the execution of a program. What thisargument overlooks is that the operational semantics of an APLstatement are not modified by the varying storage requirements ofits variables.\nThe first proposal for a non fully interpretive implementationwas the thesis of P. Abrams [1], in which a high level interpretercan defer performing certain operations by compiling code which alow level interpreter must later be called upon to execute. Thebenefit thus gained is that intelligence gathered from a widercontext can be brought to bear on the evaluation of asubexpression. Thus on evaluating (A+B)[I],only the addition A[I]+B[I] will beperformed. More recently, A. Perlis and several of his students atYale [9,10] have presented a scheme by which a full-fledged APLcompiler can be written. The compiled code generated can then bevery efficiently executed on a specialized hardware processor. Asimilar scheme is used in the newly released HP/3000 APL [12].\nThis paper builds on and extends the above ideas in severaldirections. We start by studying in some depth the two key notionsall this work has in common, namely compilation anddelayed evaluation in the context of APL. By delayedevaluation we mean the strategy of deferring the computation ofintermediate results until the moment they are needed. Thus largeintermediate expressions are not built in storage; instead theirelements are \"streamed\" in time. Delayed evaluation for APL wasprobably first proposed by Barton (see [8]).\nMany APL operators do not correspond to any real dataoperations. Instead their effect is to rename the elements of thearray they act upon. A wide class of such operators, which we willcall the grid selectors, can be handled by essentiallypushing them down the expression tree and incorporating theireffect into the leaf accessors. Semantically this is equivalent tothe drag-along transformations described by Abrams.Performing this optimization will be shown to be an integral partof delayed evaluation.\nIn order to focus our attention on the above issues, we make anumber of simplifying assumptions. We confine our attention to codecompilation for single APL expressions, such as might occur in an\"APL Calculator\", where user defined functions are not allowed. Ofcourse we will be critically concerned with the re-usability of thecompiled code for future evaluations. We also ignore thedistinctions among the various APL primitive types and assume thatall our arrays are of one uniform numeric type. We have studied thesituation without these simplifying assumptions, but plan to reporton this elsewhere.\nThe following is a list of the main contributions of thispaper.\n\" We present an algorithm for incorporating the selectoroperators into the accessors for the leaves of the expression tree.The algorithm runs in time proportional to the size of the tree, asopposed to its path length (which is the case for the algorithms of[10] and [12]).\nAlthough arbitrary reshapes cannot be handled by the abovealgorithm, an especially important case can: that of aconforming reshape. The reshape AñB iscalled conforming if ñB is a suffix of A.\n\" By using conforming reshapes we can eliminate inner and outerproducts from the expression tree and replace them with scalaroperators and reductions along the last dimension. We do this byintroducing appropriate selectors on the product arguments, theneventually absorbing these selectors into the leaf accessors. Thesame mechanism handles scalar extension, the convention ofmaking scalar operands of scalar operators conform to arbitraryarrays.\n\" Once products, scalar extensions, and selectors have beeneliminated, what is left is an expression tree consisting entirelyof scalar operators and reductions along the last dimension. As aconsequence, during execution, the dimension currently being workedon obeys a strict stack-like discipline. This implies that we cangenerate extremely efficient code that is independent of theranks of the arguments.\nSeveral APL operators use the elements of their operands severaltimes. A pure delayed evaluation strategy would require multiplereevaluations.\n\" We introduce a general buffering mechanism, calledslicing, which allows portions of a subexpression that willbe repeatedly needed to be saved, to avoid future recomputation.Slicing is well integrated with the evaluation on demand mechanism.For example, when operators that break the streaming areencountered, slicing is used to determine the minimum size bufferrequired between the order in which a subexpression can deliver itsresult, and the order in which the full expression needs it.\n\" The compiled code is very efficient. A minimal number of loopvariables is maintained and accessors are shared among as manyexpression atoms as possible. Finally, the code generated is wellsuited for execution by an ordinary minicomputer, such as a PDP-11,or a Data General Nova. We have implemented this compiler on theAlto computer at Xerox PARC.\nThe plan of the paper is this: We start with a generaldiscussion of compilation and delayed evaluation. Then we motivatethe structures and algorithms we need to introduce by showing howto handle a wider and wider class of the primitive APL operators.We discuss various ways of tailoring an evaluator for a particularexpression. Some of this tailoring is possible based only on theexpression itself, while other optimizations require knowledge ofthe (sizes of) the atom bindings in the expression. The readershould always be alert to the kind of knowledge being used, forthis affects the validity of the compiled code across reexecutionsof a statement.", "title": "" }, { "docid": "6d285e0e8450791f03f95f58792c8f3c", "text": "Basic psychology research suggests the possibility that confessions-a potent form of incrimination-may taint other evidence, thereby creating an appearance of corroboration. To determine if this laboratory-based phenomenon is supported in the high-stakes world of actual cases, we conducted an archival analysis of DNA exoneration cases from the Innocence Project case files. Results were consistent with the corruption hypothesis: Multiple evidence errors were significantly more likely to exist in false-confession cases than in eyewitness cases; in order of frequency, false confessions were accompanied by invalid or improper forensic science, eyewitness identifications, and snitches and informants; and in cases containing multiple errors, confessions were most likely to have been obtained first. We believe that these findings underestimate the problem and have important implications for the law concerning pretrial corroboration requirements and the principle of \"harmless error\" on appeal.", "title": "" }, { "docid": "19f1f1156ca9464759169dd2d4005bf6", "text": "We first consider the problem of partitioning the edges of a graph ~ into bipartite cliques such that the total order of the cliques is minimized, where the order of a clique is the number of vertices in it. It is shown that the problem is NP-complete. We then prove the existence of a partition of small total order in a sufficiently dense graph and devise an efilcient algorithm to compute such a partition. It turns out that our algorithm exhibits a trade-off between the total order of the partition and the running time. Next, we define the notion of a compression of a graph ~ and use the result on graph partitioning to efficiently compute an optimal compression for graphs of a given size. An interesting application of the graph compression result arises from the fact that several graph algorithms can be adapted to work with the compressed rep~esentation of the input graph, thereby improving the bound on their running times particularly on dense graphs. This makes use of the trade-off result we obtain from our partitioning algorithm. The algorithms analyzed include those for matchings, vertex connectivity, edge connectivity and shortest paths. In each case, we improve upon the running times of the best-known algorithms for these problems.", "title": "" }, { "docid": "d48bb823b5d4c6105b95f54f65ba3634", "text": "When the terms “intelligence” or “intelligent” are used by scientists, they are referring to a large collection of human cognitive behaviors— people thinking. When life scientists speak of the intelligence of animals, they are asking us to call to mind a set of human behaviors that they are asserting the animals are (or are not) capable of. When computer scientists speak of artificial intelligence, machine intelligence, intelligent agents, or (as I chose to do in the title of this essay) computational intelligence, we are also referring to that set of human behaviors. Although intelligence meanspeople thinking, we might be able to replicate the same set of behaviors using computation. Indeed, one branch of modern cognitive psychology is based on the model that the human mind and brain are complex computational “engines,” that is, we ourselves are examples of computational intelligence.", "title": "" }, { "docid": "d44dfc7e6ff28390f2dd9445641d664e", "text": "A formal framework is presented for the characterization of cache allocation models in Information-Centric Networks (ICN). The framework is used to compare the performance of optimal caching everywhere in an ICN with opportunistic caching of content only near its consumers. This comparison is made using the independent reference model adopted in all prior studies, as well as a new model that captures non-stationary reference locality in space and time. The results obtained analytically and from simulations show that optimal caching throughout an ICN and opportunistic caching at the edge routers of an ICN perform comparably the same. In addition caching content opportunistically only near its consumers is shown to outperform the traditional on-path caching approach assumed in most ICN architectures in an unstructured network with arbitrary topology represented as a random geometric graph.", "title": "" }, { "docid": "2c8061cf1c9b6e157bdebf9126b2f15c", "text": "Recently, the concept of olfaction-enhanced multimedia applications has gained traction as a step toward further enhancing user quality of experience. The next generation of rich media services will be immersive and multisensory, with olfaction playing a key role. This survey reviews current olfactory-related research from a number of perspectives. It introduces and explains relevant olfactory psychophysical terminology, knowledge of which is necessary for working with olfaction as a media component. In addition, it reviews and highlights the use of, and potential for, olfaction across a number of application domains, namely health, tourism, education, and training. A taxonomy of research and development of olfactory displays is provided in terms of display type, scent generation mechanism, application area, and strengths/weaknesses. State of the art research works involving olfaction are discussed and associated research challenges are proposed.", "title": "" }, { "docid": "8c80129507b138d1254e39acfa9300fc", "text": "Motivation\nText mining has become an important tool for biomedical research. The most fundamental text-mining task is the recognition of biomedical named entities (NER), such as genes, chemicals and diseases. Current NER methods rely on pre-defined features which try to capture the specific surface properties of entity types, properties of the typical local context, background knowledge, and linguistic information. State-of-the-art tools are entity-specific, as dictionaries and empirically optimal feature sets differ between entity types, which makes their development costly. Furthermore, features are often optimized for a specific gold standard corpus, which makes extrapolation of quality measures difficult.\n\n\nResults\nWe show that a completely generic method based on deep learning and statistical word embeddings [called long short-term memory network-conditional random field (LSTM-CRF)] outperforms state-of-the-art entity-specific NER tools, and often by a large margin. To this end, we compared the performance of LSTM-CRF on 33 data sets covering five different entity classes with that of best-of-class NER tools and an entity-agnostic CRF implementation. On average, F1-score of LSTM-CRF is 5% above that of the baselines, mostly due to a sharp increase in recall.\n\n\nAvailability and implementation\nThe source code for LSTM-CRF is available at https://github.com/glample/tagger and the links to the corpora are available at https://corposaurus.github.io/corpora/ .\n\n\nContact\nhabibima@informatik.hu-berlin.de.", "title": "" }, { "docid": "92f1979e78058acab3a634efa7ca9cf1", "text": "This paper is an overview of current gyroscopes and their roles based on their applications. The considered gyroscopes include mechanical gyroscopes and optical gyroscopes at macro- and micro-scale. Particularly, gyroscope technologies commercially available, such as Mechanical Gyroscopes, silicon MEMS Gyroscopes, Ring Laser Gyroscopes (RLGs) and Fiber-Optic Gyroscopes (FOGs), are discussed. The main features of these gyroscopes and their technologies are linked to their performance.", "title": "" }, { "docid": "718e61017414bb08616dd274cd1cdf02", "text": "This paper focuses on the parameter estimation of transmission lines which is an essential prerequisite for system studies and relay settings. Synchrophasor measurements have shown promising potentials for the transmission line parameter estimation. Majority of existing techniques entail existence of phasor measurement units (PMUs) at both ends of a given transmission line; however, this assumption rarely holds true in nowadays power networks with few installed PMUs. In this paper, a practical technique is proposed for the estimation of transmission line parameters while the required data are phasor measurements at one end of a given line and conventional magnitude measurements at the other end. The proposed method is thus on the basis of joint PMU and supervisory control and data acquisition (SCADA) measurements. A non-linear weighted least-square error (NWLSE) algorithm is employed for the maximum-likelihood estimation of parameters. The approach is initially devised for simple transmission lines with two terminals; then, it is extended for three-terminal lines. Numerical studies encompassing two- and three-terminal lines are conducted through software and hardware simulations. The results demonstrate the effectiveness of new technique and verify its applicability in present power networks.", "title": "" }, { "docid": "4f2a8e505a70c4204a2f36c4d8989713", "text": "In our previous research, we examined whether minimally trained crowd workers could find, categorize, and assess sidewalk accessibility problems using Google Street View (GSV) images. This poster paper presents a first step towards combining automated methods (e.g., machine visionbased curb ramp detectors) in concert with human computation to improve the overall scalability of our approach.", "title": "" } ]
scidocsrr
f6ba599531145aefa5a2855802d2d833
Troubling Trends in Machine Learning Scholarship
[ { "docid": "2f4a4c223c13c4a779ddb546b3e3518c", "text": "Machine learning systems trained on user-provided data are susceptible to data poisoning attacks, whereby malicious users inject false training data with the aim of corrupting the learned model. While recent work has proposed a number of attacks and defenses, little is understood about the worst-case loss of a defense in the face of a determined attacker. We address this by constructing approximate upper bounds on the loss across a broad family of attacks, for defenders that first perform outlier removal followed by empirical risk minimization. Our approximation relies on two assumptions: (1) that the dataset is large enough for statistical concentration between train and test error to hold, and (2) that outliers within the clean (nonpoisoned) data do not have a strong effect on the model. Our bound comes paired with a candidate attack that often nearly matches the upper bound, giving us a powerful tool for quickly assessing defenses on a given dataset. Empirically, we find that even under a simple defense, the MNIST-1-7 and Dogfish datasets are resilient to attack, while in contrast the IMDB sentiment dataset can be driven from 12% to 23% test error by adding only 3% poisoned data.", "title": "" }, { "docid": "16915e2da37f8cd6fa1ce3a4506223ff", "text": "In recent years, significant progress has been made in solving challenging problems across various domains using deep reinforcement learning (RL). Reproducing existing work and accurately judging the improvements offered by novel methods is vital to sustaining this progress. Unfortunately, reproducing results for state-of-the-art deep RL methods is seldom straightforward. In particular, non-determinism in standard benchmark environments, combined with variance intrinsic to the methods, can make reported results tough to interpret. Without significance metrics and tighter standardization of experimental reporting, it is difficult to determine whether improvements over the prior state-of-the-art are meaningful. In this paper, we investigate challenges posed by reproducibility, proper experimental techniques, and reporting procedures. We illustrate the variability in reported metrics and results when comparing against common baselines and suggest guidelines to make future results in deep RL more reproducible. We aim to spur discussion about how to ensure continued progress in the field by minimizing wasted effort stemming from results that are non-reproducible and easily misinterpreted.", "title": "" } ]
[ { "docid": "673fea40e5cb12b54cc296b1a2c98ddb", "text": "Matrix completion is a rank minimization problem to recover a low-rank data matrix from a small subset of its entries. Since the matrix rank is nonconvex and discrete, many existing approaches approximate the matrix rank as the nuclear norm. However, the truncated nuclear norm is known to be a better approximation to the matrix rank than the nuclear norm, exploiting a priori target rank information about the problem in rank minimization. In this paper, we propose a computationally efficient truncated nuclear norm minimization algorithm for matrix completion, which we call TNNM-ALM. We reformulate the original optimization problem by introducing slack variables and considering noise in the observation. The central contribution of this paper is to solve it efficiently via the augmented Lagrange multiplier (ALM) method, where the optimization variables are updated by closed-form solutions. We apply the proposed TNNM-ALM algorithm to ghost-free high dynamic range imaging by exploiting the low-rank structure of irradiance maps from low dynamic range images. Experimental results on both synthetic and real visual data show that the proposed algorithm achieves significantly lower reconstruction errors and superior robustness against noise than the conventional approaches, while providing substantial improvement in speed, thereby applicable to a wide range of imaging applications.", "title": "" }, { "docid": "b42bc73311ca98129bfb4e436d3f8553", "text": "Diabetic retinopathy has been an important cause of blindness in young and middle age adults in the United States. Epidemiologic studies have quantitated the risk and have described potentially causal factors associated with many ocular complications of diabetes and other facets of this disease. A review of recent advances in diagnosis, treatment, temporal trends, and health care for diabetic retinopathy was conducted. Since the early 1980's, there have been studies of the variability of diabetic retinopathy in populations around the world and subpopulations in the United States which have demonstrated the high prevalences and incidences of this condition. Observational studies and clinical trials have documented the importance of glycemic and blood pressure control in the development and progression of this disease. There are some differences in the importance of confounders in different populations. Epidemiologic data have helped understand the importance of health care and health education in prevention and treatment of this condition. Observational studies have documented the importance of this disease on quality of life. Although there have been advances in understanding the distribution, causes, and severity of diabetic retinopathy, this is ever changing and requires continued monitoring. This is important because the increasing burden of diabetes will place a greater burden on the population and the medical care systems that will be caring for them.", "title": "" }, { "docid": "d5549bfefa6b881b4cc1ed487b946b98", "text": "Introduction and purpose In preparing these guidelines the Committee established by the European Society of Hypertension (ESH) and the European Society of Cardiology (ESC) has aimed at offering the best available and most balanced information to all those involved in the management of arterial hypertension. The Committee is aware that it is easier to prepare guidelines on a medical condition in general than to deal with the individual patients with that condition requiring medical advice and intervention. Because of this awareness, the Committee has tried to avoid giving rigid rules that would constrain judgement on the management of individual patients differing in their personal, medical and cultural characteristics.", "title": "" }, { "docid": "f6b49f33720ef789cf085a5ab8154ed4", "text": "Several artificial neural network (ANN) models with a feed-forward, back-propagation network structure and various training algorithms, are developed to forecast daily and monthly river flow discharges in Manwan Reservoir. In order to test the applicability of these models, they are compared with a conventional time series flow prediction model. Results indicate that the ANN models provide better accuracy in forecasting river flow than does the auto-regression time series model. In particular, the scaled conjugate gradient algorithm furnishes the highest correlation coefficient and the smallest root mean square error. This ANN model is finally employed in the advanced water resource project of Yunnan Power Group.", "title": "" }, { "docid": "14111f3c7d802e346a823c85b64478d4", "text": "This study examines the effect of an increase in product quality information to consumers on Žrms’ choices of product quality. In 1998 Los Angeles County introduced hygiene quality grade cards to be displayed in restaurant windows. We show that the grade cards cause (i) restaurant health inspection scores to increase, (ii) consumer demand to become sensitive to changes in restaurants’ hygiene quality, and (iii) the number of foodborne illness hospitalizations to decrease. We also provide evidence that this improvement in health outcomes is not fully explained by consumers substituting from poor hygiene restaurants to good hygiene restaurants. These results imply that the grade cards cause restaurants to make hygiene quality improvements.", "title": "" }, { "docid": "122e3e4c10e4e5f2779773bde106d068", "text": "In recent years, research on image generation methods has been developing fast. The auto-encoding variational Bayes method (VAEs) was proposed in 2013, which uses variational inference to learn a latent space from the image database and then generates images using the decoder. The generative adversarial networks (GANs) came out as a promising framework, which uses adversarial training to improve the generative ability of the generator. However, the generated pictures by GANs are generally blurry. The deep convolutional generative adversarial networks (DCGANs) were then proposed to leverage the quality of generated images. Since the input noise vectors are randomly sampled from a Gaussian distribution, the generator has to map from a whole normal distribution to the images. This makes DCGANs unable to reflect the inherent structure of the training data. In this paper, we propose a novel deep model, called generative adversarial networks with decoder-encoder output noise (DE-GANs), which takes advantage of both the adversarial training and the variational Bayesain inference to improve the performance of image generation. DE-GANs use a pre-trained decoder-encoder architecture to map the random Gaussian noise vectors to informative ones and pass them to the generator of the adversarial networks. Since the decoder-encoder architecture is trained by the same images as the generators, the output vectors could carry the intrinsic distribution information of the original images. Moreover, the loss function of DE-GANs is different from GANs and DCGANs. A hidden-space loss function is added to the adversarial loss function to enhance the robustness of the model. Extensive empirical results show that DE-GANs can accelerate the convergence of the adversarial training process and improve the quality of the generated images.", "title": "" }, { "docid": "72d4f389f791584229409fdb93186d66", "text": "INTRODUCTION\nThe sphincteric and supportive functions of the pelvic floor are fairly well understood, and pelvic floor rehabilitation, a specialized field within the scope and practice of physical therapy, has demonstrated effectiveness in the treatment of urinary and fecal incontinence. The role of the pelvic floor in the promotion of optimal sexual function has not been clearly elucidated.\n\n\nAIM\nTo review the role of the pelvic floor in the promotion of optimal sexual function and examine the role of pelvic floor rehabilitation in treating sexual dysfunction.\n\n\nMAIN OUTCOME MEASURE\nReview of peer-reviewed literature.\n\n\nRESULTS\nIt has been proposed that the pelvic floor muscles are active in both male and female genital arousal and orgasm, and that pelvic floor muscle hypotonus may impact negatively on these phases of function. Hypertonus of the pelvic floor is a significant component of sexual pain disorders in women and men. Furthermore, conditions related to pelvic floor dysfunction, such as pelvic pain, pelvic organ prolapse, and lower urinary tract symptoms, are correlated with sexual dysfunction.\n\n\nCONCLUSIONS\nThe involvement of the pelvic floor in sexual function and dysfunction is examined, as well as the potential role of pelvic floor rehabilitation in treatment. Further research validating physical therapy intervention is necessary.", "title": "" }, { "docid": "9b42c1b58bb7b74bdcf09c7556800ad5", "text": "In this paper, we propose a method to find the safest path between two locations, based on the geographical model of crime intensities. We consider the police records and news articles for finding crime density of different areas of the city. It is essential to consider news articles as there is a significant delay in updating police crime records. We address this problem by updating the crime intensities based on current news feeds. Based on the updated crime intensities, we identify the safest path. It is this real time updation of crime intensities which makes our model way better than the models that are presently in use. Our model would also inform the user of crime sprees in a particular area thereby ensuring that user avoids these crime hot spots.", "title": "" }, { "docid": "57b079b84febe0b12d35618d9f802d78", "text": "Geodesic Polar Coordinates (GPCs) on a smooth surface S are local surface coordinates that relates a surface point to a planar parameter point by the length and direction of a corresponding geodesic curve on S. They are intrinsic to the surface and represent a natural local parameterization with useful properties. We present a simple and efficient algorithm to approximate GPCs on both triangle and general polygonal meshes. Our approach, named DGPC, is based on extending an existing algorithm for computing geodesic distance. We compare our approach with previous methods, both with respect to efficiency, accuracy and visual qualities when used for local mesh texturing. As a further application we show how the resulting coordinates can be used for vector space methods like local remeshing at interactive frame-rates even for large meshes.", "title": "" }, { "docid": "6997284b9a3b8c8e7af639e92399db46", "text": "Research into rehabilitation robotics has grown rapidly and the number of therapeutic rehabilitation robots has expanded dramatically during the last two decades. Robotic rehabilitation therapy can deliver high-dosage and high-intensity training, making it useful for patients with motor disorders caused by stroke or spinal cord disease. Robotic devices used for motor rehabilitation include end-effector and exoskeleton types; herein, we review the clinical use of both types. One application of robot-assisted therapy is improvement of gait function in patients with stroke. Both end-effector and the exoskeleton devices have proven to be effective complements to conventional physiotherapy in patients with subacute stroke, but there is no clear evidence that robotic gait training is superior to conventional physiotherapy in patients with chronic stroke or when delivered alone. In another application, upper limb motor function training in patients recovering from stroke, robot-assisted therapy was comparable or superior to conventional therapy in patients with subacute stroke. With end-effector devices, the intensity of therapy was the most important determinant of upper limb motor recovery. However, there is insufficient evidence for the use of exoskeleton devices for upper limb motor function in patients with stroke. For rehabilitation of hand motor function, either end-effector and exoskeleton devices showed similar or additive effects relative to conventional therapy in patients with chronic stroke. The present evidence supports the use of robot-assisted therapy for improving motor function in stroke patients as an additional therapeutic intervention in combination with the conventional rehabilitation therapies. Nevertheless, there will be substantial opportunities for technical development in near future.", "title": "" }, { "docid": "b35fb062626cad2c2f4b3c18fb64394a", "text": "A 3-YEAR-OLD BOY PREsented with focal seizures for 3 months. He had severe headache associated with nonprojectile vomiting. There was no history of altered sensorium or diminished vision. He was developmentally normal. Family history was unremarkable. The patient was irritable. There was a giant congenital nevus in “bathing-trunk” distribution with multiple satellite nevi (Figure 1A). There was atrophy of the left leg. There were no focal motor or sensory deficits. Muscle stretch reflexes were normal. The rest of the neurological and systemic examination was unremarkable. Magnetic resonance imaging of the brain (Figure 1B and C) showed a focal lesion with characteristics of melanocytic tumor in the left temporal lobe and another diffuse lesion in the pons. Magnetic resonance imaging of the spine was normal. The patient underwent left temporal craniectomy with excision of the temporal lobe lesion. Histopathologic examination of the surgical specimen (Figure 2) was consistent with an infiltrative melanocytic tumor. Follow-up radiotherapy was planned.", "title": "" }, { "docid": "0a414cd886ebf2a311d27b17c53e535f", "text": "We consider the problem of classifying documents not by topic, but by overall sentiment. Previous approaches to sentiment classification have favored domain-specific, supervised machine learning (Naive Bayes, maximum entropy classification, and support vector machines). Inherent in these methodologies is the need for annotated training data. Building on previous work, we examine an unsupervised system of iteratively extracting positive and negative sentiment items which can be used to classify documents. Our method is completely unsupervised and only requires linguistic insight into the semantic orientation of sentiment.", "title": "" }, { "docid": "071b46c04389b6fe3830989a31991d0d", "text": "Direct slicing of CAD models to generate process planning instructions for solid freeform fabrication may overcome inherent disadvantages of using stereolithography format in terms of the process accuracy, ease of file management, and incorporation of multiple materials. This paper will present the results of our development of a direct slicing algorithm for layered freeform fabrication. The direct slicing algorithm was based on a neutral, international standard (ISO 10303) STEP-formatted non-uniform rational B-spline (NURBS) geometric representation and is intended to be independent of any commercial CAD software. The following aspects of the development effort will be presented: (1) determination of optimal build direction based upon STEP-based NURBS models; (2) adaptive subdivision of NURBS data for geometric refinement; and (3) ray-casting slice generation into sets of raster patterns. The development also provides for multi-material slicing and will provide an effective tool in heterogeneous slicing processes. q 2004 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "78ba417cf2cb6a809414feefe163b710", "text": "The product bundling problem is a challenging task in the e-Commerce domain. We propose a generative engine in order to find the bundle of products that best satisfies user requirements and, at the same time, seller needs such as the minimization of the dead stocks and the maximization of net income. The proposed system named Intelligent Bundle Suggestion and Generation (IBSAG) is designed in order to satisfy these requirements. Market Basket Analysis supports the system in user requirement elicitation task. Experimental results prove the ability of system in finding the optimal tradeoff between different and conflicting constraints.", "title": "" }, { "docid": "94bb6c5e5ac8ea6338f2b9eb35b9dcf3", "text": "We provide a comparative study between neural word representations and traditional vector spaces based on cooccurrence counts, in a number of compositional tasks. We use three different semantic spaces and implement seven tensor-based compositional models, which we then test (together with simpler additive and multiplicative approaches) in tasks involving verb disambiguation and sentence similarity. To check their scalability, we additionally evaluate the spaces using simple compositional methods on larger-scale tasks with less constrained language: paraphrase detection and dialogue act tagging. In the more constrained tasks, co-occurrence vectors are competitive, although choice of compositional method is important; on the largerscale tasks, they are outperformed by neural word embeddings, which show robust, stable performance across the tasks.", "title": "" }, { "docid": "6d5e80293931396556cf5fbe64e9c2d2", "text": "Rotors of electrical high speed machines are subject to high stress, limiting the rated power of the machines. This paper describes the design process of a high-speed rotor of a Permanent Magnet Synchronous Machine (PMSM) for a rated power of 10kW at 100,000 rpm. Therefore, at the initial design the impact of the rotor radius to critical parameters is analyzed analytically. In particular, critical parameters are mechanical stress due to high centrifugal forces and natural bending frequencies. Furthermore, air friction losses, heating the rotor and the stator additionally, are no longer negligible compared to conventional machines and must be considered in the design process. These mechanical attributes are controversial to the electromagnetic design, increasing the effective magnetic air gap, for example. Thus, investigations are performed to achieve sufficient mechanical strength without a significant reduction of air gap flux density or causing thermal problems. After initial design by means of analytical estimations, an optimization of rotor geometry and materials is performed by means of the finite element method (FEM).", "title": "" }, { "docid": "abdf1edfb2b93b3991d04d5f6d3d63d3", "text": "With the rapid growing of internet and networks applications, data security becomes more important than ever before. Encryption algorithms play a crucial role in information security systems. In this paper, we have a study of the two popular encryption algorithms: DES and Blowfish. We overviewed the base functions and analyzed the security for both algorithms. We also evaluated performance in execution speed based on different memory sizes and compared them. The experimental results show the relationship between function run speed and memory size.", "title": "" }, { "docid": "2e7513624eed605a4e0da539162dd715", "text": "In the domain of Internet of Things (IoT), applications are modeled to understand and react based on existing contextual and situational parameters. This work implements a management flow for the abstraction of real world objects and virtual composition of those objects to provide IoT services. We also present a real world knowledge model that aggregates constraints defining a situation, which is then used to detect and anticipate future potential situations. It is implemented based on reasoning and machine learning mechanisms. This work showcases a prototype implementation of the architectural framework in a smart home scenario, targeting two functionalities: actuation and automation based on the imposed constraints and thereby responding to situations and also adapting to the user preferences. It thus provides a productive integration of heterogeneous devices, IoT platforms, and cognitive technologies to improve the services provided to the user.", "title": "" }, { "docid": "83ed2dfe4456bc3cc8052747e7df7bfc", "text": "Dietary restriction has been shown to have several health benefits including increased insulin sensitivity, stress resistance, reduced morbidity, and increased life span. The mechanism remains unknown, but the need for a long-term reduction in caloric intake to achieve these benefits has been assumed. We report that when C57BL6 mice are maintained on an intermittent fasting (alternate-day fasting) dietary-restriction regimen their overall food intake is not decreased and their body weight is maintained. Nevertheless, intermittent fasting resulted in beneficial effects that met or exceeded those of caloric restriction including reduced serum glucose and insulin levels and increased resistance of neurons in the brain to excitotoxic stress. Intermittent fasting therefore has beneficial effects on glucose regulation and neuronal resistance to injury in these mice that are independent of caloric intake.", "title": "" }, { "docid": "9893c96ba10b62e3bc7ddea726252468", "text": "Classical hormone receptors reversibly and non-covalently bind active hormone molecules, which are generated by biosynthetic enzymes, to trigger signal transduction. The α/β hydrolase DWARF14 (D14), which hydrolyses the plant branching hormone strigolactone and interacts with the F-box protein D3/MAX2, is probably involved in strigolactone detection. However, the active form of strigolactone has yet to be identified and it is unclear which protein directly binds the active form of strigolactone, and in which manner, to act as the genuine strigolactone receptor. Here we report the crystal structure of the strigolactone-induced AtD14–D3–ASK1 complex, reveal that Arabidopsis thaliana (At)D14 undergoes an open-to-closed state transition to trigger strigolactone signalling, and demonstrate that strigolactone is hydrolysed into a covalently linked intermediate molecule (CLIM) to initiate a conformational change of AtD14 to facilitate interaction with D3. Notably, analyses of a highly branched Arabidopsis mutant d14-5 show that the AtD14(G158E) mutant maintains enzyme activity to hydrolyse strigolactone, but fails to efficiently interact with D3/MAX2 and loses the ability to act as a receptor that triggers strigolactone signalling in planta. These findings uncover a mechanism underlying the allosteric activation of AtD14 by strigolactone hydrolysis into CLIM, and define AtD14 as a non-canonical hormone receptor with dual functions to generate and sense the active form of strigolactone.", "title": "" } ]
scidocsrr
1783fd0daca4dc366ed654f1aaaa2b31
DC Microgrid for Wind and Solar Power Integration
[ { "docid": "6af7f70f0c9b752d3dbbe701cb9ede2a", "text": "This paper addresses real and reactive power management strategies of electronically interfaced distributed generation (DG) units in the context of a multiple-DG microgrid system. The emphasis is primarily on electronically interfaced DG (EI-DG) units. DG controls and power management strategies are based on locally measured signals without communications. Based on the reactive power controls adopted, three power management strategies are identified and investigated. These strategies are based on 1) voltage-droop characteristic, 2) voltage regulation, and 3) load reactive power compensation. The real power of each DG unit is controlled based on a frequency-droop characteristic and a complimentary frequency restoration strategy. A systematic approach to develop a small-signal dynamic model of a multiple-DG microgrid, including real and reactive power management strategies, is also presented. The microgrid eigen structure, based on the developed model, is used to 1) investigate the microgrid dynamic behavior, 2) select control parameters of DG units, and 3) incorporate power management strategies in the DG controllers. The model is also used to investigate sensitivity of the design to changes of parameters and operating point and to optimize performance of the microgrid system. The results are used to discuss applications of the proposed power management strategies under various microgrid operating conditions", "title": "" }, { "docid": "b51957c386d3d03bc32f1cca75ce4aea", "text": "This paper reviews the trends in wind turbine generator systems. After discussing some important requirements and basic relations, it describes the currently used systems: the constant speed system with squirrel-cage induction generator, and the three variable speed systems with doubly fed induction generator (DFIG), with gearbox and fully rated converter, and direct drive (DD). Then, possible future generator systems are reviewed. Hydraulic transmissions are significantly lighter than gearboxes and enable continuously variable transmission, but their efficiency is lower. A brushless DFIG is a medium speed generator without brushes and with improved low-voltage ride-through characteristics compared with the DFIG. Magnetic pseudo DDs are smaller and lighter than DD generators, but need a sufficiently low and stable magnet price to be successful. In addition, superconducting generators can be smaller and lighter than normal DD generators, but both cost and reliability need experimental demonstration. In power electronics, there is a trend toward reliable modular multilevel topologies.", "title": "" } ]
[ { "docid": "24a164e7d6392b052f8a36e20e9c4f69", "text": "The initial vision of the Internet of Things was of a world in which all physical objects are tagged and uniquely identified by RFID transponders. However, the concept has grown into multiple dimensions, encompassing sensor networks able to provide real-world intelligence and goal-oriented collaboration of distributed smart objects via local networks or global interconnections such as the Internet. Despite significant technological advances, difficulties associated with the evaluation of IoT solutions under realistic conditions in real-world experimental deployments still hamper their maturation and significant rollout. In this article we identify requirements for the next generation of IoT experimental facilities. While providing a taxonomy, we also survey currently available research testbeds, identify existing gaps, and suggest new directions based on experience from recent efforts in this field.", "title": "" }, { "docid": "b9965956c3b1807b1b6e09fa2b329c71", "text": "A serial link transmitter fabricated in a large-scale integrated 0.4m CMOS process uses multilevel signaling (4PAM) and a three-tap pre-emphasis filter to reduce intersymbol interference (ISI) caused by channel low-pass effects. Due to the process-limited on-chip frequency, the transmitter output driver is designed as a 5 : 1 multiplexer to reduce the required clock frequency to one-fifth the symbol rate, or 1 GHz. At 5 Gsym/s (10 Gb/s), a data eye opening with a height >350 mV and a width >100 ps is achieved at the source. After 10 m of a copper coaxial cable (PE142LL), the eye opening is reduced to 200 mV and 90 ps with pre-emphasis, and to zero without filtering. The chip dissipates 1 W with a 3.3-V supply and occupies 1.5 2.0 mm2 of die area.", "title": "" }, { "docid": "78f1b3a8b9aeff9fb860b46d6a2d8eab", "text": "We study the possibility to extend the concept of linguistic data summaries employing the notion of bipolarity. Yager's linguistic summaries may be derived using a fuzzy linguistic querying interface. We look for a similar analogy between bipolar queries and the extended form of linguistic summaries. The general concept of bipolar query, and its special interpretation are recalled, which turns out to be applicable to accomplish our goal. Some preliminary results are presented and possible directions of further research are pointed out.", "title": "" }, { "docid": "395fc8e1c25be4f1809c77a0088dfa91", "text": "The recently released Stanford Question Answering Dataset (SQuAD) provides a unique version of the question-answer problem that more closely relates to the complex structure of natural language, and thus lends itself to the expressive power of neural networks. We explore combining tested techniques within an encoder-decoder architecture in an attempt to achieve a model that is both accurate and efficient. We ultimately propose a model that utlizes bidirectional LSTM’s fed into a coattention layer, and a fairly simple decoder consisting of an LSTM with two hidden layers. We find through our experimentation that the model performs better than combinations of coattention with both our simpler and more complex decoders. We also find that it excels at answering questions where the answer can rely on marker words or structural context rather than abstract context.", "title": "" }, { "docid": "44d91cf148317ba2b38465cd5b3cd178", "text": "In this paper we propose a joint approach on virtual city reconstruction and dynamic scene analysis based on point cloud sequences of a single car-mounted Rotating Multi-Beam (RMB) Lidar sensor. The aim of the addressed work is to create 4D spatio-temporal models of large dynamic urban scenes containing various moving and static objects. Standalone RMB Lidar devices have been frequently applied in robot navigation tasks and proved to be efficient in moving object detection and recognition. However, they have not been widely exploited yet for geometric approximation of ground surfaces and building facades due to the sparseness and inhomogeneous density of the individual point cloud scans. In our approach we propose an automatic registration method of the consecutive scans without any additional sensor information such as IMU, and introduce a process for simultaneously extracting reconstructed surfaces, motion information and objects from the registered dense point cloud completed with point time stamp information.", "title": "" }, { "docid": "bfba2d1f26b3ac66630d81ab5bf10347", "text": "Authcoin is an alternative approach to the commonly used public key infrastructures such as central authorities and the PGP web of trust. It combines a challenge response-based validation and authentication process for domains, certificates, email accounts and public keys with the advantages of a block chain-based storage system. As a result, Authcoin does not suffer from the downsides of existing solutions and is much more resilient to sybil attacks.", "title": "" }, { "docid": "a8ff2ea9e15569de375c34ef252d0dad", "text": "BIM (Building Information Modeling) has been recently implemented by many Architecture, Engineering, and Construction firms due to its productivity gains and long term benefits. This paper presents the development and implementation of a sustainability assessment framework for an architectural design using BIM technology in extracting data from the digital building model needed for determining the level of sustainability. The sustainability assessment is based on the LEED (Leadership in Energy and Environmental Design) Green Building Rating System, a widely accepted national standards for sustainable building design in the United States. The architectural design of a hotel project is used as a case study to verify the applicability of the framework.", "title": "" }, { "docid": "159297c7f6e174923fc169bfb3bc5fe6", "text": "A bewildering variety of devices for communication from humans to computers now exists on the market. In order to make sense of this variety, and to aid in the design of new input devices, we propose a framework for describing and analyzing input devices. Following Mackinlay's semantic analysis of the design space for graphical presentations, our goal is to provide tools for the generation and test of input device designs. The descriptive tools we have created allow us to describe the semantics of a device and measure its expressiveness. Using these tools, we have built a taxonomy of input devices that goes beyond earlier taxonomies of Buxton & Baecker and Foley, Wallace, & Chan. In this paper, we build on these descriptive tools, and proceed to the use of human performance theories and data for evaluation of the effectiveness of points in this design space. We focus on two figures of merit, footprint and bandwidth, to illustrate this evaluation. The result is the systematic integration of methods for both generating and testing the design space of input devices.", "title": "" }, { "docid": "7fbb593d2a1ad935cab676503849044b", "text": "The aim of this paper is to give an overview on 50 years of research in electromyography in the four competitive swimming strokes (crawl, breaststroke, butterfly, and backstroke). A systematic search of the existing literature was conducted using the combined keywords \"swimming\" and \"EMG\" on studies published before August 2013, in the electronic databases PubMed, ISI Web of Knowledge, SPORT discus, Academic Search Elite, Embase, CINAHL and Cochrane Library. The quality of each publication was assessed by two independent reviewers using a custom made checklist. Frequency of topics, muscles studied, swimming activities, populations, types of equipment and data treatment were determined from all selected papers and, when possible, results were compared and contrasted. In the first 20 years of EMG studies in swimming, most papers were published as congress proceedings. The methodological quality was low. Crawl stroke was most often studied. There was no standardized manner of defining swimming phases, normalizing the data or of presenting the results. Furthermore, the variability around the mean muscle activation patterns is large which makes it difficult to define a single pattern applicable to all swimmers in any activity examined.", "title": "" }, { "docid": "de007bc4c5fc33e82c91177e0798cc3b", "text": "Current knowledge delivery methods in education should move away from memory based learning to more motivated and creative education. This paper will emphasize on the advantages tangible interaction can bring to education. Augmented Chemistry provides an efficient way for designing and interacting with the molecules to understand the spatial relations between molecules. For Students it is very informative to see actual molecules representation 3D environment, inspect molecules from multiple viewpoints and control the interaction of molecules. We present in this paper an Augmented Reality system for teaching spatial relationships and chemical-reaction problem-solving skills to school-level students based on the VSEPR theory. Our system is based on inexpensive webcams and open-source software. We hope this willgenerate more ideas for educators and researcher to explore Augmented Reality", "title": "" }, { "docid": "f80dedfb0d0f7e5ba068e582517ac6f8", "text": "We present a physically-based approach to grasping and manipulation of virtual objects that produces visually realistic results, addresses the problem of visual interpenetration of hand and object models, and performs force rendering for force-feedback gloves in a single framework. Our approach couples tracked hand configuration to a simulation-controlled articulated hand model using a system of linear and torsional spring-dampers. We discuss an implementation of our approach that uses a widely-available simulation tool for collision detection and response. We illustrate the resulting behavior of the virtual hand model and of grasped objects, and we show that the simulation rate is sufficient for control of current force-feedback glove designs. We also present a prototype of a system we are developing to support natural whole-hand interactions in a desktop-sized workspace.", "title": "" }, { "docid": "eb7141d335de519e3324ee08a52064d9", "text": "Out-of-vocabulary name errors in speech recognition create significant problems for downstream language processing, but the fact that they are rare poses challenges for automatic detection, particularly in an open-domain scenario. To address this problem, a multi-task recurrent neural network language model for sentence-level name detection is proposed for use in combination with out-of-vocabulary word detection. The sentence-level model is also effective for leveraging external text data. Experiments show a 26% improvement in name-error detection F-score over a system using n-gram lexical features.", "title": "" }, { "docid": "479fbdcd776904e9ba20fd95b4acb267", "text": "Tall building developments have been rapidly increasing worldwide. This paper reviews the evolution of tall building’s structural systems and the technological driving force behind tall building developments. For the primary structural systems, a new classification – interior structures and exterior structures – is presented. While most representative structural systems for tall buildings are discussed, the emphasis in this review paper is on current trends such as outrigger systems and diagrid structures. Auxiliary damping systems controlling building motion are also discussed. Further, contemporary “out-of-the-box” architectural design trends, such as aerodynamic and twisted forms, which directly or indirectly affect the structural performance of tall buildings, are reviewed. Finally, the future of structural developments in tall buildings is envisioned briefly.", "title": "" }, { "docid": "b8a98eccec1e26ae195463d9754e1278", "text": "Social sensing is a new big data application paradigm for Cyber-Physical Systems (CPS), where a group of individuals volunteer (or are recruited) to report measurements or observations about the physical world at scale. A fundamental challenge in social sensing applications lies in discovering the correctness of reported observations and reliability of data sources without prior knowledge on either of them. We refer to this problem as truth discovery. While prior studies have made progress on addressing this challenge, two important limitations exist: (i) current solutions did not fully explore the uncertainty aspect of human reported data, which leads to sub-optimal truth discovery results; (ii) current truth discovery solutions are mostly designed as sequential algorithms that do not scale well to large-scale social sensing events. In this paper, we develop a Scalable Uncertainty-Aware Truth Discovery (SUTD) scheme to address the above limitations. The SUTD scheme solves a constraint estimation problem to jointly estimate the correctness of reported data and the reliability of data sources while explicitly considering the uncertainty on the reported data. To address the scalability challenge, the SUTD is designed to run a Graphic Processing Unit (GPU) with thousands of cores, which is shown to run two to three orders of magnitude faster than the sequential truth discovery solutions. In evaluation, we compare our SUTD scheme to the state-of-the-art solutions using three real world datasets collected from Twitter: Paris Attack, Oregon Shooting, and Baltimore Riots, all in 2015. The evaluation results show that our new scheme significantly outperforms the baselines in terms of both truth discovery accuracy and execution time.", "title": "" }, { "docid": "b7dd7ad186b55f02724e89f1d29dd285", "text": "The Web of Linked Data is built upon the idea that data items on the Web are connected by RDF links. Sadly, the reality on the Web shows that Linked Data sources set some RDF links pointing at data items in related data sources, but they clearly do not set RDF links to all data sources that provide related data. In this paper, we present Silk Server, an identity resolution component, which can be used within Linked Data application architectures to augment Web data with additional RDF links. Silk Server is designed to be used with an incoming stream of RDF instances, produced for example by a Linked Data crawler. Silk Server matches the RDF descriptions of incoming instances against a local set of known instances and discovers missing links between them. Based on this assessment, an application can store data about newly discovered instances in its repository or fuse data that is already known about an entity with additional data about the entity from the Web. Afterwards, we report on the results of an experiment in which Silk Server was used to generate RDF links between authors and publications from the Semantic Web Dog Food Corpus and a stream of FOAF profiles that were crawled from the Web.", "title": "" }, { "docid": "5f0157139bff33057625686b7081a0c8", "text": "A novel MIC/MMIC compatible microstrip to waveguide transition for X band is presented. The transition has realized on novel low cost substrate and its main features are: wideband operation, low insertion loss and feeding without a balun directly by the microstrip line.", "title": "" }, { "docid": "fc421a5ef2556b86c34d6f2bb4dc018e", "text": "It's been over a decade now. We've forgotten how slow the adoption of consumer Internet commerce has been compared to other Internet growth metrics. And we're surprised when security scares like spyware and phishing result in lurches in consumer use.This paper re-visits an old theme, and finds that consumer marketing is still characterised by aggression and dominance, not sensitivity to customer needs. This conclusion is based on an examination of terms and privacy policy statements, which shows that businesses are confronting the people who buy from them with fixed, unyielding interfaces. Instead of generating trust, marketers prefer to wield power.These hard-headed approaches can work in a number of circumstances. Compelling content is one, but not everyone sells sex, gambling services, short-shelf-life news, and even shorter-shelf-life fashion goods. And, after decades of mass-media-conditioned consumer psychology research and experimentation, it's far from clear that advertising can convert everyone into salivating consumers who 'just have to have' products and services brand-linked to every new trend, especially if what you sell is groceries or handyman supplies.The thesis of this paper is that the one-dimensional, aggressive concept of B2C has long passed its use-by date. Trading is two-way -- consumers' attention, money and loyalty, in return for marketers' products and services, and vice versa.So B2C is conceptually wrong, and needs to be replaced by some buzzphrase that better conveys 'B-with-C' rather than 'to-C' and 'at-C'. Implementations of 'customised' services through 'portals' have to mature beyond data-mining-based manipulation to support two-sided relationships, and customer-managed profiles.It's all been said before, but now it's time to listen.", "title": "" }, { "docid": "bf7679eedfe88210b70105d50ae8acf4", "text": "Figure 1: Latent space of unsupervised VGAE model trained on Cora citation network dataset [1]. Grey lines denote citation links. Colors denote document class (not provided during training). Best viewed on screen. We introduce the variational graph autoencoder (VGAE), a framework for unsupervised learning on graph-structured data based on the variational auto-encoder (VAE) [2, 3]. This model makes use of latent variables and is capable of learning interpretable latent representations for undirected graphs (see Figure 1).", "title": "" }, { "docid": "69dc1947a79cf56d049dea434bdcb540", "text": "ASCE Standard 7, ‘‘Minimum Design Loads for Buildings and Other Structures,’’ has contained provisions for load combinations and load factors suitable for load and resistance factor design since its 1982 edition. Research in wind engineering in the intervening years has raised questions regarding the wind load factor 1.3 and load combinations in which the wind load appears in ASCE 7-95. This paper presents revised statistical models of wind load parameters based on more recent research and a Delphi, and reassesses the wind load combinations in ASCE Standard 7 probabilistically. The current approach to specifying wind loads in ASCE 7 does not lead to uniform reliability in inland and hurricane-prone regions of the country. It is recommended that the factor accounting for wind directionality effects should be separated from the load factor and presented in a separate table in the wind load section, that the wind load factor should be increased from 1.3 to approximately 1.5 or 1.6 to achieve reliability consistent with designs governed by gravity load combinations, and that the exposure classification procedure in ASCE Standard 7 should be revised to reduce the current high error rate in assigning exposures.", "title": "" }, { "docid": "9e6f69cb83422d756909104f2c1c8887", "text": "We introduce a novel method for approximate alignment of point-based surfaces. Our approach is based on detecting a set of salient feature points using a scale-space representation. For each feature point we compute a signature vector that is approximately invariant under rigid transformations. We use the extracted signed feature set in order to obtain approximate alignment of two surfaces. We apply our method for the automatic alignment of multiple scans using both scan-to-scan and scan-to-model matching capabilities.", "title": "" } ]
scidocsrr
cb2abb4eac56c80a1bdb963082ba4938
Rapid Manufacture of Novel Variable Impedance Robots
[ { "docid": "59f29d3795e747bb9cee8fcbf87cb86f", "text": "This paper introduces the development of a semi-active friction based variable physical damping actuator (VPDA) unit. The realization of this unit aims to facilitate the control of compliant robotic joints by providing physical variable damping on demand assisting on the regulation of the oscillations induced by the introduction of compliance. The mechatronics details and the dynamic model of the damper are introduced. The proposed variable damper mechanism is evaluated on a simple 1-DOF compliant joint linked to the ground through a torsion spring. This flexible connection emulates a compliant joint, generating oscillations when the link is perturbed. Preliminary results are presented to show that the unit and the proposed control scheme are capable of replicating simulated relative damping values with good fidelity.", "title": "" } ]
[ { "docid": "a4d294547c92296a2ea3222dc8d92afe", "text": "Energy theft is a very common problem in countries like India where consumers of energy are increasing consistently as the population increases. Utilities in electricity system are destroying the amounts of revenue each year due to energy theft. The newly designed AMR used for energy measurements reveal the concept and working of new automated power metering system but this increased the Electricity theft forms administrative losses because of not regular interval checkout at the consumer's residence. It is quite impossible to check and solve out theft by going every customer's door to door. In this paper, a new procedure is followed based on MICROCONTROLLER Atmega328P to detect and control the energy meter from power theft and solve it by remotely disconnect and reconnecting the service (line) of a particular consumer. An SMS will be sent automatically to the utility central server through GSM module whenever unauthorized activities detected and a separate message will send back to the microcontroller in order to disconnect the unauthorized supply. A unique method is implemented by interspersed the GSM feature into smart meters with Solid state relay to deal with the non-technical losses, billing difficulties, and voltage fluctuation complication.", "title": "" }, { "docid": "5779057b8db7eb79dd5ca5332a76dd16", "text": "Memory encoding and recall involving complex, effortful cognitive processes are impaired by alcohol primarily due to impairment of a select few, but crucial, cortical areas. This review shows how alcohol affects some, but not all, aspects of eyewitnesses' oral free recall performance. The principal results, so far, are that: a) free recall reports by intoxicated witnesses (at the investigated BAC-levels) may contain less, but as accurate, information as reports by sober witnesses; b) immediate reports given by intoxicated witnesses may yield more information compared to reports by sober witnesses given after a one week delay; c) an immediate interview may enhance both intoxicated and sober witnesses' ability to report information in a later interview; and d) reminiscence seems to occur over repeated interviews and the new information seems to be as accurate as the previously reported information. Based on this, recommendations are given for future research to enhance understanding of the multifaceted impact of alcohol on witnesses' oral free recall of violent crimes.", "title": "" }, { "docid": "fcc092e71c7a0b38edb23e4eb92dfb21", "text": "In this work, we focus on semantic parsing of natural language conversations. Most existing methods for semantic parsing are based on understanding the semantics of a single sentence at a time. However, understanding conversations also requires an understanding of conversational context and discourse structure across sentences. We formulate semantic parsing of conversations as a structured prediction task, incorporating structural features that model the ‘flow of discourse’ across sequences of utterances. We create a dataset for semantic parsing of conversations, consisting of 113 real-life sequences of interactions of human users with an automated email assistant. The data contains 4759 natural language statements paired with annotated logical forms. Our approach yields significant gains in performance over traditional semantic parsing.", "title": "" }, { "docid": "f37fb443aaa8194ee9fa8ba496e6772a", "text": "Current Light Field (LF) cameras offer fixed resolution in space, time and angle which is decided a-priori and is independent of the scene. These cameras either trade-off spatial resolution to capture single-shot LF or tradeoff temporal resolution by assuming a static scene to capture high spatial resolution LF. Thus, capturing high spatial resolution LF video for dynamic scenes remains an open and challenging problem. We present the concept, design and implementation of a LF video camera that allows capturing high resolution LF video. The spatial, angular and temporal resolution are not fixed a-priori and we exploit the scene-specific redundancy in space, time and angle. Our reconstruction is motion-aware and offers a continuum of resolution tradeoff with increasing motion in the scene. The key idea is (a) to design efficient multiplexing matrices that allow resolution tradeoffs, (b) use dictionary learning and sparse representations for robust reconstruction, and (c) perform local motion-aware adaptive reconstruction. We perform extensive analysis and characterize the performance of our motion-aware reconstruction algorithm. We show realistic simulations using a graphics simulator as well as real results using a LCoS based programmable camera. We demonstrate novel results such as high resolution digital refocusing for dynamic moving objects.", "title": "" }, { "docid": "6330bfa6be0361e2c0d2985372db9f0a", "text": "The increasing pervasiveness of the internet, broadband connections and the emergence of digital compression technologies have dramatically changed the face of digital music piracy. Digitally compressed music files are essentially a perfect public economic good, and illegal copying of these files has increasingly become rampant. This paper presents a study on the behavioral dynamics which impact the piracy of digital audio files, and provides a contrast with software piracy. Our results indicate that the general ethical model of software piracy is also broadly applicable to audio piracy. However, significant enough differences with software underscore the unique dynamics of audio piracy. Practical implications that can help the recording industry to effectively combat piracy, and future research directions are highlighted.", "title": "" }, { "docid": "58d4b95cc0ce39126c962e88b1bd6ba1", "text": "The quality of image encryption is commonly measured by the Shannon entropy over the ciphertext image. However, this measurement does not consider to the randomness of local image blocks and is inappropriate for scrambling based image encryption methods. In this paper, a new information entropy-based randomness measurement for image encryption is introduced which, for the first time, answers the question of whether a given ciphertext image is sufficiently random-like. It measures the randomness over the ciphertext in a fairer way by calculating the averaged entropy of a series of small image blocks within the entire test image. In order to fulfill both quantitative and qualitative measurement, the expectation and the variance of this averaged block entropy for a true-random image are strictly derived and corresponding numerical reference tables are also provided. Moreover, a hypothesis test at significance α-level is given to help accept or reject the hypothesis that the test image is ideally encrypted/random-like. Simulation results show that the proposed test is able to give both effectively quantitative and qualitative results for image encryption. The same idea can also be applied to measure other digital data, like audio and video.", "title": "" }, { "docid": "c346820b43f99aa6714900c5b110db13", "text": "BACKGROUND\nDiabetes Mellitus (DM) is a chronic disease that is considered a global public health problem. Education and self-monitoring by diabetic patients help to optimize and make possible a satisfactory metabolic control enabling improved management and reduced morbidity and mortality. The global growth in the use of mobile phones makes them a powerful platform to help provide tailored health, delivered conveniently to patients through health apps.\n\n\nOBJECTIVE\nThe aim of our study was to evaluate the efficacy of mobile apps through a systematic review and meta-analysis to assist DM patients in treatment.\n\n\nMETHODS\nWe conducted searches in the electronic databases MEDLINE (Pubmed), Cochrane Register of Controlled Trials (CENTRAL), and LILACS (Latin American and Caribbean Health Sciences Literature), including manual search in references of publications that included systematic reviews, specialized journals, and gray literature. We considered eligible randomized controlled trials (RCTs) conducted after 2008 with participants of all ages, patients with DM, and users of apps to help manage the disease. The meta-analysis of glycated hemoglobin (HbA1c) was performed in Review Manager software version 5.3.\n\n\nRESULTS\nThe literature search identified 1236 publications. Of these, 13 studies were included that evaluated 1263 patients. In 6 RCTs, there were a statistical significant reduction (P<.05) of HbA1c at the end of studies in the intervention group. The HbA1c data were evaluated by meta-analysis with the following results (mean difference, MD -0.44; CI: -0.59 to -0.29; P<.001; I²=32%).The evaluation favored the treatment in patients who used apps without significant heterogeneity.\n\n\nCONCLUSIONS\nThe use of apps by diabetic patients could help improve the control of HbA1c. In addition, the apps seem to strengthen the perception of self-care by contributing better information and health education to patients. Patients also become more self-confident to deal with their diabetes, mainly by reducing their fear of not knowing how to deal with potential hypoglycemic episodes that may occur.", "title": "" }, { "docid": "00e60176eca7d86261c614196849a946", "text": "This paper proposes a novel low-profile dual polarized antenna for 2.4 GHz application. The proposed antenna consists of a circular patch with four curved T-stubs and a differential feeding network. Due to the parasitic loading of the curved T-stubs, the bandwidth has been improved. Good impedance matching and dual-polarization with low cross polarization have been achieved within 2.4–2.5 GHz, which is sufficient for WLAN application. The total thickness of the antenna is only 0.031A,o, which is low-profile when compared with its counterparts.", "title": "" }, { "docid": "a41444799f295e5fc325626fd663d77d", "text": "Lexicon-based approaches to Twitter sentiment analysis are gaining much popularity due to their simplicity, domain independence, and relatively good performance. These approaches rely on sentiment lexicons, where a collection of words are marked with fixed sentiment polarities. However, words’ sentiment orientation (positive, neural, negative) and/or sentiment strengths could change depending on context and targeted entities. In this paper we present SentiCircle; a novel lexicon-based approach that takes into account the contextual and conceptual semantics of words when calculating their sentiment orientation and strength in Twitter. We evaluate our approach on three Twitter datasets using three different sentiment lexicons. Results show that our approach significantly outperforms two lexicon baselines. Results are competitive but inconclusive when comparing to state-of-art SentiStrength, and vary from one dataset to another. SentiCircle outperforms SentiStrength in accuracy on average, but falls marginally behind in F-measure.", "title": "" }, { "docid": "1dbff7292f9578337781616d4a1bb96a", "text": "This paper proposes a novel approach and a new benchmark for video summarization. Thereby we focus on user videos, which are raw videos containing a set of interesting events. Our method starts by segmenting the video by using a novel “superframe” segmentation, tailored to raw videos. Then, we estimate visual interestingness per superframe using a set of low-, midand high-level features. Based on this scoring, we select an optimal subset of superframes to create an informative and interesting summary. The introduced benchmark comes with multiple human created summaries, which were acquired in a controlled psychological experiment. This data paves the way to evaluate summarization methods objectively and to get new insights in video summarization. When evaluating our method, we find that it generates high-quality results, comparable to manual, human-created summaries.", "title": "" }, { "docid": "368c769f4427c213c68d1b1d7a0e4ca9", "text": "The goal of this paper is to perform 3D object detection in the context of autonomous driving. Our method aims at generating a set of high-quality 3D object proposals by exploiting stereo imagery. We formulate the problem as minimizing an energy function that encodes object size priors, placement of objects on the ground plane as well as several depth informed features that reason about free space, point cloud densities and distance to the ground. We then exploit a CNN on top of these proposals to perform object detection. In particular, we employ a convolutional neural net (CNN) that exploits context and depth information to jointly regress to 3D bounding box coordinates and object pose. Our experiments show significant performance gains over existing RGB and RGB-D object proposal methods on the challenging KITTI benchmark. When combined with the CNN, our approach outperforms all existing results in object detection and orientation estimation tasks for all three KITTI object classes. Furthermore, we experiment also with the setting where LIDAR information is available, and show that using both LIDAR and stereo leads to the best result.", "title": "" }, { "docid": "78d88298e0b0e197f44939ee96210778", "text": "Cyber-security research and development for SCADA is being inhibited by the lack of available SCADA attack datasets. This paper presents a modular dataset generation framework for SCADA cyber-attacks, to aid the development of attack datasets. The presented framework is based on requirements derived from related prior research, and is applicable to any standardised or proprietary SCADA protocol. We instantiate our framework and validate the requirements using a Python implementation. This paper provides experiments of the framework's usage on a state-of-the-art DNP3 critical infrastructure test-bed, thus proving framework's ability to generate SCADA cyber-attack datasets.", "title": "" }, { "docid": "73be556cf24bfe8362363c8a0b835533", "text": "This paper presents a low cost solution for energy harvester based on a bistable clamped-clamped PET (PolyEthyleneTerephthalate) beam and two piezoelectric transducers. The beam switching is activated by environmental vibrations. The mechanical-to-electrical energy conversion is performed by two piezoelectric transducers laterally installed to experience beam impacts each time the device switches from one stable state to the other one. Main advantages of the proposed approach are related to the wide frequency band assuring high device efficiency and the adopted low cost technology.", "title": "" }, { "docid": "f6266e5c4adb4fa24cc353dccccaf6db", "text": "Clustering plays an important role in many large-scale data analyses providing users with an overall understanding of their data. Nonetheless, clustering is not an easy task due to noisy features and outliers existing in the data, and thus the clustering results obtained from automatic algorithms often do not make clear sense. To remedy this problem, automatic clustering should be complemented with interactive visualization strategies. This paper proposes an interactive visual analytics system for document clustering, called iVisClustering, based on a widelyused topic modeling method, latent Dirichlet allocation (LDA). iVisClustering provides a summary of each cluster in terms of its most representative keywords and visualizes soft clustering results in parallel coordinates. The main view of the system provides a 2D plot that visualizes cluster similarities and the relation among data items with a graph-based representation. iVisClustering provides several other views, which contain useful interaction methods. With help of these visualization modules, we can interactively refine the clustering results in various ways.", "title": "" }, { "docid": "ce22073b8dbc3a910fa8811a2a8e5c87", "text": "Ethernet is going to play a major role in automotive communications, thus representing a significant paradigm shift in automotive networking. Ethernet technology will allow for multiple in-vehicle systems (such as, multimedia/infotainment, camera-based advanced driver assistance and on-board diagnostics) to simultaneously access information over a single unshielded twisted pair cable. The leading technology for automotive applications is the IEEE Audio Video Bridging (AVB), which offers several advantages, such as open specification, multiple sources of electronic components, high bandwidth, the compliance with the challenging EMC/EMI automotive requirements, and significant savings on cabling costs, thickness and weight. This paper surveys the state of the art on Ethernet-based automotive communications and especially on the IEEE AVB, with a particular focus on the way to provide support to the so-called scheduled traffic, that is a class of time-sensitive traffic (e.g., control traffic) that is transmitted according to a time schedule.", "title": "" }, { "docid": "4ad3c199ad1ba51372e9f314fc1158be", "text": "Inner lead bonding (ILB) is used to thermomechanically join the Cu inner leads on a flexible film tape and Au bumps on a driver IC chip to form electrical paths. With the newly developed film carrier assembly technology, called chip on film (COF), the bumps are prepared separately on a film tape substrate and bonded on the finger lead ends beforehand; therefore, the assembly of IC chips can be made much simpler and cheaper. In this paper, three kinds of COF samples, namely forming, wrinkle, and flat samples, were prepared using conventional gang bonder. The peeling test was used to examine the bondability of ILB in terms of the adhesion strength between the inner leads and the bumps. According to the peeling test results, flat samples have competent strength, less variation, and better appearance than when using flip-chip bonder.", "title": "" }, { "docid": "152c11ef8449d53072bbdb28432641fa", "text": "Flexible intelligent electronic devices (IEDs) are highly desirable to support free allocation of function to IED by means of software reconfiguration without any change of hardware. The application of generic hardware platforms and component-based software technology seems to be a good solution. Due to the advent of IEC 61850, generic hardware platforms with a standard communication interface can be used to implement different kinds of functions with high flexibility. The remaining challenge is the unified function model that specifies various software components with appropriate granularity and provides a framework to integrate them efficiently. This paper proposes the function-block (FB)-based function model for flexible IEDs. The standard FBs are established by combining the IEC 61850 model and the IEC 61499 model. The design of a simplified distance protection IED using standard FBs is described and investigated. The testing results of the prototype system in MATLAB/Simulink demonstrate the feasibility and flexibility of FB-based IEDs.", "title": "" }, { "docid": "5686b87484f2e78da2c33ed03b1a536c", "text": "Although an automated flexible production cell is an intriguing prospect for small to median enterprises (SMEs) in current global market conditions, the complexity of programming remains one of the major hurdles preventing automation using industrial robots for SMEs. This paper provides a comprehensive review of the recent research progresses on the programming methods for industrial robots, including online programming, offline programming (OLP), and programming using Augmented Reality (AR). With the development of more powerful 3D CAD/PLM software, computer vision, sensor technology, etc. new programming methods suitable for SMEs are expected to grow in years to come. (C) 2011 Elsevier Ltd. All rights reserved.\"", "title": "" }, { "docid": "061fc82fbb5325a8a590b1480734861d", "text": "Introduction More than 24 million cases of human papillomavirus (HPV) infection occur in adults in the United States, with an estimated 1 million new cases developing each year. The number of outpatient visits for adults who have venereal warts (condyloma acuminata) increased fivefold from 1966 to 1981. (1) HPV infections in children may present as common skin warts, anogenital warts (AGW), oral and laryngeal papillomas, and subclinical infections. The increased incidence of AGW in children has paralleled that of adults. AGW in children present a unique diagnostic challenge: Is the HPV infection a result of child sexual abuse (CSA), which requires reporting to Child Protective Services (CPS), or acquired through an otherwise innocuous mechanism? Practitioners must balance “missing” a case of CSA if they do not report to CPS against reporting to CPS and having parents or other caregivers potentially suffer false accusation and its potential ramifications, which may include losing custody of children. In the past, simply identifying AGW in a young child was considered indicative of CSA by some experts. However, there is no defined national standard beyond the limited guidance provided in the 2005 American Academy of Pediatrics (AAP) Policy Statement, which states that AGW are suspicious for CSA if not perinatally acquired and the rare vertical, nonsexual means of infection have been excluded. (2) Guidance in determining perinatal acquisition or nonsexual transmission is not provided. This review examines the pathophysiology of HPV causing AGW in children and adolescents, diagnostic challenges, treatment options, and a clinical pathway for the evaluation of young children who have AGW when CSA is of concern.", "title": "" }, { "docid": "b38939ec3c6f8e10553f934ceab401ff", "text": "According to recent work in the new field of lexical pragmatics, the meanings of words are frequently pragmatically adjusted and fine-tuned in context, so that their contribution to the proposition expressed is different from their lexically encoded sense. Well-known examples include lexical narrowing (e.g. ‘drink’ used to mean ALCOHOLIC DRINK), approximation (or loosening) (e.g. ‘flat’ used to mean RELATIVELY FLAT) and metaphorical extension (e.g. ‘bulldozer’ used to mean FORCEFUL PERSON). These three phenomena are often studied in isolation from each other and given quite distinct kinds of explanation. In this chapter, we will propose a more unified account. We will try to show that narrowing, loosening and metaphorical extension are simply different outcomes of a single interpretive process which creates an ad hoc concept, or occasion-specific sense, based on interaction among encoded concepts, contextual information and pragmatic expectations or principles. We will outline an inferential account of the lexical adjustment process using the framework of relevance theory, and compare it with some alternative accounts. * This work is part of an AHRC-funded project ‘A Unified Theory of Lexical Pragmatics’ (AR16356). We are grateful to our research assistants, Patricia Kolaiti, Tim Wharton and, in particular, Rosa Vega Moreno, whose PhD work on metaphor we draw on in this paper, and to Vladimir Žegarac, François Recanati, Nausicaa Pouscoulous, Paula Rubio Fernandez and Hanna Stoever, for helpful discussions. We would also like to thank Dan Sperber for sharing with us many valuable insights on metaphor and on lexical pragmatics more generally.", "title": "" } ]
scidocsrr
fb09a2ee30dab464632f395e45a61300
Anticipation and next action forecasting in video: an end-to-end model with memory
[ { "docid": "6a72b09ce61635254acb0affb1d5496e", "text": "We introduce a new large-scale video dataset designed to assess the performance of diverse visual event recognition algorithms with a focus on continuous visual event recognition (CVER) in outdoor areas with wide coverage. Previous datasets for action recognition are unrealistic for real-world surveillance because they consist of short clips showing one action by one individual [15, 8]. Datasets have been developed for movies [11] and sports [12], but, these actions and scene conditions do not apply effectively to surveillance videos. Our dataset consists of many outdoor scenes with actions occurring naturally by non-actors in continuously captured videos of the real world. The dataset includes large numbers of instances for 23 event types distributed throughout 29 hours of video. This data is accompanied by detailed annotations which include both moving object tracks and event examples, which will provide solid basis for large-scale evaluation. Additionally, we propose different types of evaluation modes for visual recognition tasks and evaluation metrics along with our preliminary experimental results. We believe that this dataset will stimulate diverse aspects of computer vision research and help us to advance the CVER tasks in the years ahead.", "title": "" } ]
[ { "docid": "9f6fb1de80f4500384097978c3712c68", "text": "Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage reflection to subvert the malware detection by static analyzers. Reflection initializes the class, invokes any method of class, or accesses any field of class. But, instead of utilizing usual programming language syntax, reflection passes classes/methods etc. as parameters to reflective APIs. As a consequence, these parameters can be constructed dynamically or can be encrypted by malware. These cannot be detected by state-of-the-art static tools. We propose EspyDroid, a system that combines dynamic analysis with code instrumentation for a more precise and automated detection of malware employing reflection. We evaluate EspyDroid on 28 benchmark apps employing major reflection categories. Our technique show improved results over FlowDroid via detection of additional undetected flows. These flows have potential to leak sensitive and private information of the users, through various sinks.", "title": "" }, { "docid": "bb2e7ee3a447fd5bad57f2acd0f6a259", "text": "A new cavity arrangement, namely, the generalized TM dual-mode cavity, is presented in this paper. In contrast with the previous contributions on TM dual-mode filters, the generalized TM dual-mode cavity allows the realization of both symmetric and asymmetric filtering functions, simultaneously exploiting the maximum number of finite frequency transmission zeros. The high design flexibility in terms of number and position of transmission zeros is obtained by exciting and exploiting a set of nonresonating modes. Five structure parameters are used to fully control its equivalent transversal topology. The relationship between structure parameters and filtering function realized is extensively discussed. The design of multiple cavity filters is presented along with the experimental results of a sixth-order filter having six asymmetrically located transmission zeros.", "title": "" }, { "docid": "e8a69f68bc1647c69431ce88a0728777", "text": "Contrary to popular perception, qualitative research can produce vast amounts of data. These may include verbatim notes or transcribed recordings of interviews or focus groups, jotted notes and more detailed “fieldnotes” of observational research, a diary or chronological account, and the researcher’s reflective notes made during the research. These data are not necessarily small scale: transcribing a typical single interview takes several hours and can generate 20-40 pages of single spaced text. Transcripts and notes are the raw data of the research. They provide a descriptive record of the research, but they cannot provide explanations. The researcher has to make sense of the data by sifting and interpreting them.", "title": "" }, { "docid": "1f0fd314cdc4afe7b7716ca4bd681c16", "text": "Automatic speech recognition can potentially benefit from the lip motion patterns, complementing acoustic speech to improve the overall recognition performance, particularly in noise. In this paper we propose an audio-visual fusion strategy that goes beyond simple feature concatenation and learns to automatically align the two modalities, leading to enhanced representations which increase the recognition accuracy in both clean and noisy conditions. We test our strategy on the TCD-TIMIT and LRS2 datasets, designed for large vocabulary continuous speech recognition, applying three types of noise at different power ratios. We also exploit state of the art Sequence-to-Sequence architectures, showing that our method can be easily integrated. Results show relative improvements from 7% up to 30% on TCD-TIMIT over the acoustic modality alone, depending on the acoustic noise level. We anticipate that the fusion strategy can easily generalise to many other multimodal tasks which involve correlated modalities.", "title": "" }, { "docid": "ed28faf2ff89ac4da642593e1b7eef9c", "text": "Massive MIMO, also known as very-large MIMO or large-scale antenna systems, is a new technique that potentially can offer large network capacities in multi-user scenarios. With a massive MIMO system, we consider the case where a base station equipped with a large number of antenna elements simultaneously serves multiple single-antenna users in the same time-frequency resource. So far, investigations are mostly based on theoretical channels with independent and identically distributed (i.i.d.) complex Gaussian coefficients, i.e., i.i.d. Rayleigh channels. Here, we investigate how massive MIMO performs in channels measured in real propagation environments. Channel measurements were performed at 2.6 GHz using a virtual uniform linear array (ULA), which has a physically large aperture, and a practical uniform cylindrical array (UCA), which is more compact in size, both having 128 antenna ports. Based on measurement data, we illustrate channel behavior of massive MIMO in three representative propagation conditions, and evaluate the corresponding performance. The investigation shows that the measured channels, for both array types, allow us to achieve performance close to that in i.i.d. Rayleigh channels. It is concluded that in real propagation environments we have characteristics that can allow for efficient use of massive MIMO, i.e., the theoretical advantages of this new technology can also be harvested in real channels.", "title": "" }, { "docid": "3e5312f6d3c02d8df2903ea80c1bbae5", "text": "Stroke has now become the leading cause of severe disability. Rehabilitation robots are gradually becoming popular for stroke rehabilitation to improve motor recovery, as robotic technology can assist, enhance, and further quantify rehabilitation training for stroke patients. However, most of the available rehabilitation robots are complex and involve multiple degrees-of-freedom (DOFs) causing it to be very expensive and huge in size. Rehabilitation robots should be useful but also need to be affordable and portable enabling more patients to afford and train independently at home. This paper presents a development of an affordable, portable and compact rehabilitation robot that implements different rehabilitation strategies for stroke patient to train forearm and wrist movement in an enhanced virtual reality environment with haptic feedback.", "title": "" }, { "docid": "691f5f53582ceedaa51812307778b4db", "text": "This paper looks at how a vulnerability management (VM) process could be designed & implemented within an organization. Articles and studies about VM usually focus mainly on the technology aspects of vulnerability scanning. The goal of this study is to call attention to something that is often overlooked: a basic VM process which could be easily adapted and implemented in any part of the organization. Implementing a vulnerability management process 2 Tom Palmaers", "title": "" }, { "docid": "423d15bbe1c47bc6225030307fc8e379", "text": "In a secret sharing scheme, a datumd is broken into shadows which are shared by a set of trustees. The family {P′⊆P:P′ can reconstructd} is called the access structure of the scheme. A (k, n)-threshold scheme is a secret sharing scheme having the access structure {P′⊆P: |P′|≥k}. In this paper, by observing a simple set-theoretic property of an access structure, we propose its mathematical definition. Then we verify the definition by proving that every family satisfying the definition is realized by assigning two more shadows of a threshold scheme to trustees.", "title": "" }, { "docid": "84307c2dd94ebe89c46a535b31b4b51b", "text": "Building systems that autonomously create temporal abstractions from data is a key challenge in scaling learning and planning in reinforcement learning. One popular approach for addressing this challenge is the options framework [41]. However, only recently in [1] was a policy gradient theorem derived for online learning of general purpose options in an end to end fashion. In this work, we extend previous work on this topic that only focuses on learning a two-level hierarchy including options and primitive actions to enable learning simultaneously at multiple resolutions in time. We achieve this by considering an arbitrarily deep hierarchy of options where high level temporally extended options are composed of lower level options with finer resolutions in time. We extend results from [1] and derive policy gradient theorems for a deep hierarchy of options. Our proposed hierarchical option-critic architecture is capable of learning internal policies, termination conditions, and hierarchical compositions over options without the need for any intrinsic rewards or subgoals. Our empirical results in both discrete and continuous environments demonstrate the efficiency of our framework.", "title": "" }, { "docid": "9c780c4d37326ce2a5e2838481f48456", "text": "A maximum power point tracker has been previously developed for the single high performance triple junction solar cell for hybrid and electric vehicle applications. The maximum power point tracking (MPPT) control method is based on the incremental conductance (IncCond) but removes the need for current sensors. This paper presents the hardware implementation of the maximum power point tracker. Significant efforts have been made to reduce the size to 18 mm times 21 mm (0.71 in times 0.83 in) and the cost to close to $5 US. This allows the MPPT hardware to be integrable with a single solar cell. Precision calorimetry measurements are employed to establish the converter power loss and confirm that an efficiency of 96.2% has been achieved for the 650-mW converter with 20-kHz switching frequency. Finally, both the static and the dynamic tests are conducted to evaluate the tracking performances of the MPPT hardware. The experimental results verify a tracking efficiency higher than 95% under three different insolation levels and a power loss less than 5% of the available cell power under instantaneous step changes between three insolation levels.", "title": "" }, { "docid": "6abc9ea6e1d5183e589194db8520172c", "text": "Smart decision making at the tactical level is important for Artificial Intelligence (AI) agents to perform well in the domain of real-time strategy (RTS) games. This paper presents a Bayesian model that can be used to predict the outcomes of isolated battles, as well as predict what units are needed to defeat a given army. Model parameters are learned from simulated battles, in order to minimize the dependency on player skill. We apply our model to the game of StarCraft, with the end-goal of using the predictor as a module for making high-level combat decisions, and show that the model is capable of making accurate predictions.", "title": "" }, { "docid": "3255b89b7234595e7078a012d4e62fa7", "text": "Virtual assistants such as IFTTT and Almond support complex tasks that combine open web APIs for devices and web services. In this work, we explore semantic parsing to understand natural language commands for these tasks and their compositions. We present the ThingTalk dataset, which consists of 22,362 commands, corresponding to 2,681 distinct programs in ThingTalk, a language for compound virtual assistant tasks. To improve compositionality of multiple APIs, we propose SEQ2TT, a Seq2Seq extension using a bottom-up encoding of grammar productions for programs and a maxmargin loss. On the ThingTalk dataset, SEQ2TT obtains 84% accuracy on trained programs and 67% on unseen combinations, an improvement of 12% over a basic sequence-to-sequence model with attention.", "title": "" }, { "docid": "ac2e1a27ae05819d213efe7d51d1b988", "text": "Gigantic rates of data production in the era of Big Data, Internet of Thing (IoT) / Internet of Everything (IoE), and Cyber Physical Systems (CSP) pose incessantly escalating demands for massive data processing, storage, and transmission while continuously interacting with the physical world under unpredictable, harsh, and energy-/power-constrained scenarios. Therefore, such systems need to support not only the high performance capabilities at tight power/energy envelop, but also need to be intelligent/cognitive, self-learning, and robust. As a result, a hype in the artificial intelligence research (e.g., deep learning and other machine learning techniques) has surfaced in numerous communities. This paper discusses the challenges and opportunities for building energy-efficient and adaptive architectures for machine learning. In particular, we focus on brain-inspired emerging computing paradigms, such as approximate computing; that can further reduce the energy requirements of the system. First, we guide through an approximate computing based methodology for development of energy-efficient accelerators, specifically for convolutional Deep Neural Networks (DNNs). We show that in-depth analysis of datapaths of a DNN allows better selection of Approximate Computing modules for energy-efficient accelerators. Further, we show that a multi-objective evolutionary algorithm can be used to develop an adaptive machine learning system in hardware. At the end, we summarize the challenges and the associated research roadmap that can aid in developing energy-efficient and adaptable hardware accelerators for machine learning.", "title": "" }, { "docid": "6e198119c72a796bc0b56280503fec18", "text": "Therapeutic activities of drugs are often influenced by co-administration of drugs that may cause inevitable drug-drug interactions (DDIs) and inadvertent side effects. Prediction and identification of DDIs are extremely vital for the patient safety and success of treatment modalities. A number of computational methods have been employed for the prediction of DDIs based on drugs structures and/or functions. Here, we report on a computational method for DDIs prediction based on functional similarity of drugs. The model was set based on key biological elements including carriers, transporters, enzymes and targets (CTET). The model was applied for 2189 approved drugs. For each drug, all the associated CTETs were collected, and the corresponding binary vectors were constructed to determine the DDIs. Various similarity measures were conducted to detect DDIs. Of the examined similarity methods, the inner product-based similarity measures (IPSMs) were found to provide improved prediction values. Altogether, 2,394,766 potential drug pairs interactions were studied. The model was able to predict over 250,000 unknown potential DDIs. Upon our findings, we propose the current method as a robust, yet simple and fast, universal in silico approach for identification of DDIs. We envision that this proposed method can be used as a practical technique for the detection of possible DDIs based on the functional similarities of drugs.", "title": "" }, { "docid": "0cce6366df945f079dbb0b90d79b790e", "text": "Fourier ptychographic microscopy (FPM) is a recently developed imaging modality that uses angularly varying illumination to extend a system's performance beyond the limit defined by its optical components. The FPM technique applies a novel phase-retrieval procedure to achieve resolution enhancement and complex image recovery. In this Letter, we compare FPM data to theoretical prediction and phase-shifting digital holography measurement to show that its acquired phase maps are quantitative and artifact-free. We additionally explore the relationship between the achievable spatial and optical thickness resolution offered by a reconstructed FPM phase image. We conclude by demonstrating enhanced visualization and the collection of otherwise unobservable sample information using FPM's quantitative phase.", "title": "" }, { "docid": "6de3aca18d6c68f0250c8090ee042a4e", "text": "JavaScript is widely used by web developers and the complexity of JavaScript programs has increased over the last year. Therefore, the need for program analysis for JavaScript is evident. Points-to analysis for JavaScript is to determine the set of objects to which a reference variable or an object property may point. Points-to analysis for JavaScript is a basis for further program analyses for JavaScript. It has a wide range of applications in code optimization and software engineering tools. However, points-to analysis for JavaScript has not yet been developed.\n JavaScript has dynamic features such as the runtime modification of objects through addition of properties or updating of methods. We propose a points-to analysis for JavaScript which precisely handles the dynamic features of JavaScript. Our work is the first attempt to analyze the points-to behavior of JavaScript. We evaluate the analysis on a set of JavaScript programs. We also apply the analysis to a code optimization technique to show that the analysis can be practically useful.", "title": "" }, { "docid": "a3b3380940613a5fb704727e41e9907a", "text": "Stackelberg Security Games (SSG) have been widely applied for solving real-world security problems - with a significant research emphasis on modeling attackers' behaviors to handle their bounded rationality. However, access to real-world data (used for learning an accurate behavioral model) is often limited, leading to uncertainty in attacker's behaviors while modeling. This paper therefore focuses on addressing behavioral uncertainty in SSG with the following main contributions: 1) we present a new uncertainty game model that integrates uncertainty intervals into a behavioral model to capture behavioral uncertainty, and 2) based on this game model, we propose a novel robust algorithm that approximately computes the defender's optimal strategy in the worst-case scenario of uncertainty. We show that our algorithm guarantees an additive bound on its solution quality.", "title": "" }, { "docid": "5998ce035f4027c6713f20f8125ec483", "text": "As the use of automotive radar increases, performance limitations associated with radar-to-radar interference will become more significant. In this paper, we employ tools from stochastic geometry to characterize the statistics of radar interference. Specifically, using two different models for the spatial distributions of vehicles, namely, a Poisson point process and a Bernoulli lattice process, we calculate for each case the interference statistics and obtain analytical expressions for the probability of successful range estimation. This paper shows that the regularity of the geometrical model appears to have limited effect on the interference statistics, and so it is possible to obtain tractable tight bounds for the worst case performance. A technique is proposed for designing the duty cycle for the random spectrum access, which optimizes the total performance. This analytical framework is verified using Monte Carlo simulations.", "title": "" }, { "docid": "de5fd8ae40a2d078101d5bb1859f689b", "text": "The number and variety of mobile multicast applications are growing at an unprecedented and unanticipated pace. Mobile network providers are in front of a dramatic increase in multicast traffic load, and this growth is forecasted to continue in fifth-generation (5G) networks. The major challenges come from the fact that multicast traffic not only targets groups of end-user devices; it also involves machine-type communications (MTC) for the Internet of Things (IoT). The increase in the MTC load, predicted for 5G, calls into question the effectiveness of the current multimedia broadcast multicast service (MBMS). The aim of this paper is to provide a survey of 5G challenges in the view of effective management of multicast applications, and to identify how to enhance the mobile network architecture to enable multicast applications in future 5G scenarios. By accounting for the presence of both human and machine-related traffic, strengths and weaknesses of the state-of-the-art achievements in multicasting are critically analyzed to provide guidelines for future research on 5G networks and more conscious design choices.", "title": "" }, { "docid": "109838175d109002e022115d84cae0fa", "text": "We present a probabilistic variant of the recently introduced maxout unit. The success of deep neural networks utilizing maxout can partly be attributed to favorable performance under dropout, when compared to rectified linear units. It however also depends on the fact that each maxout unit performs a pooling operation over a group of linear transformations and is thus partially invariant to changes in its input. Starting from this observation we ask the question: Can the desirable properties of maxout units be preserved while improving their invariance properties ? We argue that our probabilistic maxout (probout) units successfully achieve this balance. We quantitatively verify this claim and report classification performance matching or exceeding the current state of the art on three challenging image classification benchmarks (CIFAR-10, CIFAR-100 and SVHN).", "title": "" } ]
scidocsrr
69f416d273d3a55a81632dcf5ccbca85
Survey on Evaluation of Student's Performance in Educational Data Mining
[ { "docid": "33e5a3619a6f7d831146c399ff55f5ff", "text": "With the continuous development of online learning platforms, educational data analytics and prediction have become a promising research field, which are helpful for the development of personalized learning system. However, the indicator's selection process does not combine with the whole learning process, which may affect the accuracy of prediction results. In this paper, we induce 19 behavior indicators in the online learning platform, proposing a student performance prediction model which combines with the whole learning process. The model consists of four parts: data collection and pre-processing, learning behavior analytics, algorithm model building and prediction. Moreover, we apply an optimized Logistic Regression algorithm, taking a case to analyze students' behavior and to predict their performance. Experimental results demonstrate that these eigenvalues can effectively predict whether a student was probably to have an excellent grade.", "title": "" }, { "docid": "86f5c3e7b238656ae5f680db6ce0b7f5", "text": "It is important to study and analyse educational data especially students’ performance. Educational Data Mining (EDM) is the field of study concerned with mining educational data to find out interesting patterns and knowledge in educational organizations. This study is equally concerned with this subject, specifically, the students’ performance. This study explores multiple factors theoretically assumed to affect students’ performance in higher education, and finds a qualitative model which best classifies and predicts the students’ performance based on related personal and social factors. Keywords—Data Mining; Education; Students; Performance; Patterns", "title": "" } ]
[ { "docid": "bd4d6e83ccf5da959dac5bbc174d9d6f", "text": "This paper addresses the structure-and-motion problem, that requires to find camera motion and 3D structure from point matches. A new pipeline, dubbed Samantha, is presented, that departs from the prevailing sequential paradigm and embraces instead a hierarchical approach. This method has several advantages, like a provably lower computational complexity, which is necessary to achieve true scalability, and better error containment, leading to more stability and less drift. Moreover, a practical autocalibration procedure allows to process images without ancillary information. Experiments with real data assess the accuracy and the computational efficiency of the method.", "title": "" }, { "docid": "c88f5359fc6dc0cac2c0bd53cea989ee", "text": "Automatic detection and monitoring of oil spills and illegal oil discharges is of fundamental importance in ensuring compliance with marine legislation and protection of the coastal environments, which are under considerable threat from intentional or accidental oil spills, uncontrolled sewage and wastewater discharged. In this paper the level set based image segmentation was evaluated for the real-time detection and tracking of oil spills from SAR imagery. The developed processing scheme consists of a preprocessing step, in which an advanced image simplification is taking place, followed by a geometric level set segmentation for the detection of the possible oil spills. Finally a classification was performed, for the separation of lookalikes, leading to oil spill extraction. Experimental results demonstrate that the level set segmentation is a robust tool for the detection of possible oil spills, copes well with abrupt shape deformations and splits and outperforms earlier efforts which were based on different types of threshold or edge detection techniques. The developed algorithm’s efficiency for real-time oil spill detection and monitoring was also tested.", "title": "" }, { "docid": "0f92bd13b589f0f5328620681547b3ea", "text": "By integrating the perspectives of social presence, interactivity, and peer motivation, this study developed a theoretical model to examine the factors affecting members' purchase intention in the context of social media brand community. Data collected from members of a fan page brand community on Facebook in Taiwan was used to test the model. The results also show that peer extrinsic motivation and peer intrinsic motivation have positive influences on purchase intention. The results also reveal that human-message interaction exerts significant influence on peer extrinsic motivation and peer intrinsic motivation, while human-human interaction has a positive effect on human-message interaction. Finally, the results report that awareness impacts human-message interaction significantly, whereas awareness, affective social presence, and cognitive social presence influence human-human interaction significantly.", "title": "" }, { "docid": "d967d6525cf88d498ecc872a9eef1c7c", "text": "Historical Chinese character recognition has been suffering from the problem of lacking sufficient labeled training samples. A transfer learning method based on Convolutional Neural Network (CNN) for historical Chinese character recognition is proposed in this paper. A CNN model L is trained by printed Chinese character samples in the source domain. The network structure and weights of model L are used to initialize another CNN model T, which is regarded as the feature extractor and classifier in the target domain. The model T is then fine-tuned by a few labeled historical or handwritten Chinese character samples, and used for final evaluation in the target domain. Several experiments regarding essential factors of the CNNbased transfer learning method are conducted, showing that the proposed method is effective.", "title": "" }, { "docid": "8854917dff531c706f0234c1e45a496d", "text": "A new equivalent circuit model of an electrical size-reduced coupled line radio frequency Marchand balun is proposed and investigated in this paper. It consists of two parts of coupled lines with significantly reduced electrical length. Compared with the conventional Marchand balun, a short-circuit ending is applied instead of the open-circuit ending, and a capacitive feeding is introduced. The electrical length of the proposed balun is reduced to around 1/3 compared with that of the conventional Marchand balun. Detailed mathematical analysis for this design is included in this paper. Groups of circuit simulation results are shown to verify the conclusions. A sample balun is fabricated in microstrip line type on the Teflon substrate, with low dielectric constant of 2.54. It has a dimension of $0.189\\lambda _{g} \\times 0.066 \\lambda _{g}$ with amplitude imbalance of 0.1 dB and phase imbalance of 179.09° ± 0.14°. The simulation and experiment results are in good agreement.", "title": "" }, { "docid": "799ccd75d6781e38cf5e2faee5784cae", "text": "Recurrent neural networks (RNNs) form an important class of architectures among neural networks useful for language modeling and sequential prediction. However, optimizing RNNs is known to be harder compared to feed-forward neural networks. A number of techniques have been proposed in literature to address this problem. In this paper we propose a simple technique called fraternal dropout that takes advantage of dropout to achieve this goal. Specifically, we propose to train two identical copies of an RNN (that share parameters) with different dropout masks while minimizing the difference between their (pre-softmax) predictions. In this way our regularization encourages the representations of RNNs to be invariant to dropout mask, thus being robust. We show that our regularization term is upper bounded by the expectation-linear dropout objective which has been shown to address the gap due to the difference between the train and inference phases of dropout. We evaluate our model and achieve state-of-the-art results in sequence modeling tasks on two benchmark datasets – Penn Treebank and Wikitext-2. We also show that our approach leads to performance improvement by a significant margin in image captioning (Microsoft COCO) and semi-supervised (CIFAR-10) tasks.", "title": "" }, { "docid": "2e40cdb0416198c1ec986e0d3da47fd1", "text": "The slotted-page structure is a database page format commonly used for managing variable-length records. In this work, we develop a novel \"failure-atomic slotted page structure\" for persistent memory that leverages byte addressability and durability of persistent memory to minimize redundant write operations used to maintain consistency in traditional database systems. Failure-atomic slotted paging consists of two key elements: (i) in-place commit per page using hardware transactional memory and (ii) slot header logging that logs the commit mark of each page. The proposed scheme is implemented in SQLite and compared against NVWAL, the current state-of-the-art scheme. Our performance study shows that our failure-atomic slotted paging shows optimal performance for database transactions that insert a single record. For transactions that touch more than one database page, our proposed slot-header logging scheme minimizes the logging overhead by avoiding duplicating pages and logging only the metadata of the dirty pages. Overall, we find that our failure-atomic slotted-page management scheme reduces database logging overhead to 1/6 and improves query response time by up to 33% compared to NVWAL.", "title": "" }, { "docid": "ba3636b17e9a5d1cb3d8755afb1b3500", "text": "Anabolic-androgenic steroids (AAS) are used as ergogenic aids by athletes and non-athletes to enhance performance by augmenting muscular development and strength. AAS administration is often associated with various adverse effects that are generally dose related. High and multi-doses of AAS used for athletic enhancement can lead to serious and irreversible organ damage. Among the most common adverse effects of AAS are some degree of reduced fertility and gynecomastia in males and masculinization in women and children. Other adverse effects include hypertension and atherosclerosis, blood clotting, jaundice, hepatic neoplasms and carcinoma, tendon damage, psychiatric and behavioral disorders. More specifically, this article reviews the reproductive, hepatic, cardiovascular, hematological, cerebrovascular, musculoskeletal, endocrine, renal, immunologic and psychologic effects. Drug-prevention counseling to athletes is highlighted and the use of anabolic steroids is must be avoided, emphasizing that sports goals may be met within the framework of honest competition, free of doping substances.", "title": "" }, { "docid": "a118ef8ac178113e9bb06a4196a58bcf", "text": "Clustering is a task of assigning a set of objects into groups called clusters. In general the clustering algorithms can be classified into two categories. One is hard clustering; another one is soft (fuzzy) clustering. Hard clustering, the data’s are divided into distinct clusters, where each data element belongs to exactly one cluster. In soft clustering, data elements belong to more than one cluster, and associated with each element is a set of membership levels. In this paper we represent a survey on fuzzy c means clustering algorithm. These algorithms have recently been shown to produce good results in a wide variety of real world applications.", "title": "" }, { "docid": "b47535d86f17047ff04ceb01d0133163", "text": "Segmentation of femurs in Anterior-Posterior x-ray images is very important for fracture detection, computer-aided surgery and surgical planning. Existing methods do not perform well in segmenting bones in x-ray images due to the presence of large amount of spurious edges. This paper presents an atlas-based approach for automatic segmentation of femurs in x-ray images. A robust global alignment method based on consistent sets of edge segments registers the whole atlas to the image under joint constraints. After global alignment, the femur models undergo local refinement to extract detailed contours of the femurs. Test results show that the proposed algorithm is robust and accurate in segmenting the femur contours of different patients.", "title": "" }, { "docid": "ec5d110ea0267fc3e72e4fa2cb4f186e", "text": "We present a secure Internet of Things (IoT) architecture for Smart Cities. The large-scale deployment of IoT technologies within a city promises to make city operations efficient while improving quality of life for city inhabitants. Mission-critical Smart City data, captured from and carried over IoT networks, must be secured to prevent cyber attacks that might cripple city functions, steal personal data and inflict catastrophic harm. We present an architecture containing four basic IoT architectural blocks for secure Smart Cities: Black Network, Trusted SDN Controller, Unified Registry and Key Management System. Together, these basic IoT-centric blocks enable a secure Smart City that mitigates cyber attacks beginning at the IoT nodes themselves.", "title": "" }, { "docid": "99d5eab7b0dfcb59f7111614714ddf95", "text": "To prevent interference problems due to existing nearby communication systems within an ultrawideband (UWB) operating frequency, the significance of an efficient band-notched design is increased. Here, the band-notches are realized by adding independent controllable strips in terms of the notch frequency and the width of the band-notches to the fork shape of the UWB antenna. The size of the flat type band-notched UWB antenna is etched on 24 times 36 mm2 substrate. Two novel antennas are presented. One antenna is designed for single band-notch with a separated strip to cover the 5.15-5.825 GHz band. The second antenna is designed for dual band-notches using two separated strips to cover the 5.15-5.35 GHz band and 5.725-5.825 GHz band. The simulation and measurement show that the proposed antenna achieves a wide bandwidth from 3 to 12 GHz with the dual band-notches successfully.", "title": "" }, { "docid": "14e75e14ba61e01ae905cbf0ba0879b3", "text": "A new Kalman-filter based active contour model is proposed for tracking of nonrigid objects in combined spatio-velocity space. The model employs measurements of gradient-based image potential and of optical-flow along the contour as system measurements. In order to improve robustness to image clutter and to occlusions an optical-flow based detection mechanism is proposed. The method detects and rejects spurious measurements which are not consistent with previous estimation of image motion.", "title": "" }, { "docid": "dc2ea774fb11bc09e80b9de3acd7d5a6", "text": "The Hough transform is a well-known straight line detection algorithm and it has been widely used for many lane detection algorithms. However, its real-time operation is not guaranteed due to its high computational complexity. In this paper, we designed a Hough transform hardware accelerator on FPGA to process it in real time. Its FPGA logic area usage was reduced by limiting the angles of the lines to (-20, 20) degrees which are enough for lane detection applications, and its arithmetic computations were performed in parallel to speed up the processing time. As a result of FPGA synthesis using Xilinx Vertex-5 XC5VLX330 device, it occupies 4,521 slices and 25.6Kbyte block memory giving performance of 10,000fps in VGA images(5000 edge points). The proposed hardware on FPGA (0.1ms) is 450 times faster than the software implementation on ARM Cortex-A9 1.4GHz (45ms). Our Hough transform hardware was verified by applying it to the newly developed LDWS (lane departure warning system).", "title": "" }, { "docid": "70a7aa831b2036a50de1751ed1ace6d9", "text": "Short stature and later maturation of youth artistic gymnasts are often attributed to the effects of intensive training from a young age. Given limitations of available data, inadequate specification of training, failure to consider other factors affecting growth and maturation, and failure to address epidemiological criteria for causality, it has not been possible thus far to establish cause-effect relationships between training and the growth and maturation of young artistic gymnasts. In response to this ongoing debate, the Scientific Commission of the International Gymnastics Federation (FIG) convened a committee to review the current literature and address four questions: (1) Is there a negative effect of training on attained adult stature? (2) Is there a negative effect of training on growth of body segments? (3) Does training attenuate pubertal growth and maturation, specifically, the rate of growth and/or the timing and tempo of maturation? (4) Does training negatively influence the endocrine system, specifically hormones related to growth and pubertal maturation? The basic information for the review was derived from the active involvement of committee members in research on normal variation and clinical aspects of growth and maturation, and on the growth and maturation of artistic gymnasts and other youth athletes. The committee was thus thoroughly familiar with the literature on growth and maturation in general and of gymnasts and young athletes. Relevant data were more available for females than males. Youth who persisted in the sport were a highly select sample, who tended to be shorter for chronological age but who had appropriate weight-for-height. Data for secondary sex characteristics, skeletal age and age at peak height velocity indicated later maturation, but the maturity status of gymnasts overlapped the normal range of variability observed in the general population. Gymnasts as a group demonstrated a pattern of growth and maturation similar to that observed among short-, normal-, late-maturing individuals who were not athletes. Evidence for endocrine changes in gymnasts was inadequate for inferences relative to potential training effects. Allowing for noted limitations, the following conclusions were deemed acceptable: (1) Adult height or near adult height of female and male artistic gymnasts is not compromised by intensive gymnastics training. (2) Gymnastics training does not appear to attenuate growth of upper (sitting height) or lower (legs) body segment lengths. (3) Gymnastics training does not appear to attenuate pubertal growth and maturation, neither rate of growth nor the timing and tempo of the growth spurt. (4) Available data are inadequate to address the issue of intensive gymnastics training and alterations within the endocrine system.", "title": "" }, { "docid": "2ba975af095effcbbc4e98d7dc2172ec", "text": "People have strong intuitions about the influence objects exert upon one another when they collide. Because people's judgments appear to deviate from Newtonian mechanics, psychologists have suggested that people depend on a variety of task-specific heuristics. This leaves open the question of how these heuristics could be chosen, and how to integrate them into a unified model that can explain human judgments across a wide range of physical reasoning tasks. We propose an alternative framework, in which people's judgments are based on optimal statistical inference over a Newtonian physical model that incorporates sensory noise and intrinsic uncertainty about the physical properties of the objects being viewed. This noisy Newton framework can be applied to a multitude of judgments, with people's answers determined by the uncertainty they have for physical variables and the constraints of Newtonian mechanics. We investigate a range of effects in mass judgments that have been taken as strong evidence for heuristic use and show that they are well explained by the interplay between Newtonian constraints and sensory uncertainty. We also consider an extended model that handles causality judgments, and obtain good quantitative agreement with human judgments across tasks that involve different judgment types with a single consistent set of parameters.", "title": "" }, { "docid": "5b4fd88e33a6422c70f0d7150bb62627", "text": "To enable real-time, person-independent 3D registration from 2D video, we developed a 3D cascade regression approach in which facial landmarks remain invariant across pose over a range of approximately 60 degrees. From a single 2D image of a person's face, a dense 3D shape is registered in real time for each frame. The algorithm utilizes a fast cascade regression framework trained on high-resolution 3D face-scans of posed and spontaneous emotion expression. The algorithm first estimates the location of a dense set of landmarks and their visibility, then reconstructs face shapes by fitting a part-based 3D model. Because no assumptions are required about illumination or surface properties, the method can be applied to a wide range of imaging conditions that include 2D video and uncalibrated multi-view video. The method has been validated in a battery of experiments that evaluate its precision of 3D reconstruction, extension to multi-view reconstruction, temporal integration for videos and 3D head-pose estimation. Experimental findings strongly support the validity of real-time, 3D registration and reconstruction from 2D video. The software is available online at http://zface.org.", "title": "" }, { "docid": "362779d2c9686e9cfe2dc3c38dd80d50", "text": "We use neuroimaging to predict cultural popularity — something that is popular in the broadest sense and appeals to a large number of individuals. Neuroeconomic research suggests that activity in reward-related regions of the brain, notably the orbitofrontal cortex and ventral striatum, is predictive of future purchasing decisions, but it is unknown whether the neural signals of a small group of individuals are predictive of the purchasing decisions of the population at large. For neuroimaging to be useful as a measure of widespread popularity, these neural responses would have to generalize to a much larger population that is not the direct subject of the brain imaging itself. Here, we test the possibility of using functional magnetic resonance imaging (fMRI) to predict the relative popularity of a common good: music. We used fMRI to measure the brain responses of a relatively small group of adolescents while listening to songs of largely unknown artists. As a measure of popularity, the sales of these songs were totaled for the three years following scanning, and brain responses were then correlated with these “future” earnings. Although subjective likability of the songs was not predictive of sales, activity within the ventral striatum was significantly correlated with the number of units sold. These results suggest that the neural responses to goods are not only predictive of purchase decisions for those individuals actually scanned, but such responses generalize to the population at large and may be used to predict cultural popularity. © 2011 Published by Elsevier Inc. on behalf of Society for Consumer Psychology.", "title": "" }, { "docid": "2316e37df8796758c86881aaeed51636", "text": "Physical activity recognition using embedded sensors has enabled many context-aware applications in different areas, such as healthcare. Initially, one or more dedicated wearable sensors were used for such applications. However, recently, many researchers started using mobile phones for this purpose, since these ubiquitous devices are equipped with various sensors, ranging from accelerometers to magnetic field sensors. In most of the current studies, sensor data collected for activity recognition are analyzed offline using machine learning tools. However, there is now a trend towards implementing activity recognition systems on these devices in an online manner, since modern mobile phones have become more powerful in terms of available resources, such as CPU, memory and battery. The research on offline activity recognition has been reviewed in several earlier studies in detail. However, work done on online activity recognition is still in its infancy and is yet to be reviewed. In this paper, we review the studies done so far that implement activity recognition systems on mobile phones and use only their on-board sensors. We discuss various aspects of these studies. Moreover, we discuss their limitations and present various recommendations for future research.", "title": "" } ]
scidocsrr
a3d1cd53f93a7a984ba2727e0b104340
Generative Model for Material Experiments Based on Prior Knowledge and Attention Mechanism
[ { "docid": "ec90e30c0ae657f25600378721b82427", "text": "We use deep max-pooling convolutional neural networks to detect mitosis in breast histology images. The networks are trained to classify each pixel in the images, using as context a patch centered on the pixel. Simple postprocessing is then applied to the network output. Our approach won the ICPR 2012 mitosis detection competition, outperforming other contestants by a significant margin.", "title": "" } ]
[ { "docid": "050679bfbeba42b30f19f1a824ec518a", "text": "Principles of cognitive science hold the promise of helping children to study more effectively, yet they do not always make successful transitions from the laboratory to applied settings and have rarely been tested in such settings. For example, self-generation of answers to questions should help children to remember. But what if children cannot generate anything? And what if they make an error? Do these deviations from the laboratory norm of perfect generation hurt, and, if so, do they hurt enough that one should, in practice, spurn generation? Can feedback compensate, or are errors catastrophic? The studies reviewed here address three interlocking questions in an effort to better implement a computer-based study program to help children learn: (1) Does generation help? (2) Do errors hurt if they are corrected? And (3) what is the effect of feedback? The answers to these questions are: Yes, generation helps; no, surprisingly, errors that are corrected do not hurt; and, finally, feedback is beneficial in verbal learning. These answers may help put cognitive scientists in a better position to put their well-established principles in the service of children's learning.", "title": "" }, { "docid": "b4721bd92f399a32799b474539a2f6e6", "text": "Neural networks have been shown to be vulnerable to adversarial perturbations. Although adversarially crafted examples look visually similar to the unaltered original image, neural networks behave abnormally on these modified images. Image attribution methods highlight regions of input image important for the model’s prediction. We believe that the domains of adversarial generation and attribution are closely related and we support this claim by carrying out various experiments. By using the attribution of images, we train a second neural network classifier as a detector for adversarial examples. Our method of detection differs from other works in the domain of adversarial detection [10, 13, 4, 3] in the sense that we don’t use adversarial examples during our training procedure. Our detection methodology thus is independent of the adversarial attack generation methods. We have validated our detection technique on MNIST and CIFAR-10, achieving a high success rate for various adversarial attacks including FGSM, DeepFool, CW, PGD. We also show that training the detector model with attribution of adversarial examples generated even from a simple attack like FGSM further increases the detection accuracy over several different attacks.", "title": "" }, { "docid": "38c5aff507ab3b626b48faadb07b3fea", "text": "In real world applications, more and more data, for example, image/video data, are high dimensional and repre-sented by multiple views which describe different perspectives of the data. Efficiently clustering such data is a challenge. To address this problem, this paper proposes a novel multi-view clustering method called Discriminatively Embedded K-Means (DEKM), which embeds the synchronous learning of multiple discriminative subspaces into multi-view K-Means clustering to construct a unified framework, and adaptively control the intercoordinations between these subspaces simultaneously. In this framework, we firstly design a weighted multi-view Linear Discriminant Analysis (LDA), and then develop an unsupervised optimization scheme to alternatively learn the common clustering indicator, multiple discriminative subspaces and weights for heterogeneous features with convergence. Comprehensive evaluations on three benchmark datasets and comparisons with several state-of-the-art multi-view clustering algorithms demonstrate the superiority of the proposed work.", "title": "" }, { "docid": "82866d253fda63fd7a1e70e9a0f4252e", "text": "We introduce a new class of maximization-expectation (ME) algorithms where we maximize over hidden variables but marginalize over random parameters. This reverses the roles of expectation and maximization in the classical expectation-maximization algorithm. In the context of clustering, we argue that these hard assignments open the door to very fast implementations based on data structures such as kd-trees and conga lines. The marginalization over parameters ensures that we retain the ability to infer model structure (i.e., number of clusters). As an important example, we discuss a top-down Bayesian k-means algorithm and a bottom-up agglomerative clustering algorithm. In experiments, we compare these algorithms against a number of alternative algorithms that have recently appeared in the literature.", "title": "" }, { "docid": "fff85feeef18f7fa99819711e47e2d39", "text": "This paper presents a robotic vehicle that can be operated by the voice commands given from the user. Here, we use the speech recognition system for giving &processing voice commands. The speech recognition system use an I.C called HM2007, which can store and recognize up to 20 voice commands. The R.F transmitter and receiver are used here, for the wireless transmission purpose. The micro controller used is AT89S52, to give the instructions to the robot for its operation. This robotic car can be able to avoid vehicle collision , obstacle collision and it is very secure and more accurate. Physically disabled persons can use these robotic cars and they can be used in many industries and for many applications Keywords—SpeechRecognitionSystem,AT89S52 micro controller, R. F. Transmitter and Receiver.", "title": "" }, { "docid": "a97d6be18e2cc9272318b7f3c48345e6", "text": "Recently, we are witnessing the progressive increase in the occurrence of largescale disasters, characterized by an overwhelming scale and number of causalities. After 72 hours from the disaster occurrence, the damaged area is interested by assessment, reconstruction and recovery actions from several heterogeneous organizations, which need to collaborate and being orchestrated by a centralized authority. This situation requires an effective data sharing by means of a proper middleware platform able to let such organizations to interoperate despite of their differences. Although international organizations have defined collaboration frameworks at the higher level, there is no ICT supporting platform at operational level able to realize the data sharing demanded by such collaborative frameworks. This work proposes a layered architecture and a preliminary implementation of such a middleware for messaging, data and knowledge management. We also illustrate a demonstration of the usability of such an implementation, so as to show the achievable interoperability.", "title": "" }, { "docid": "d72cc46845f546e6b4d7ef42a14a0ea3", "text": "It is well known that parsing accuracies drop significantly on out-of-domain data. What is less known is that some parsers suffer more from domain shifts than others. We show that dependency parsers have more difficulty parsing questions than constituency parsers. In particular, deterministic shift-reduce dependency parsers, which are of highest interest for practical applications because of their linear running time, drop to 60% labeled accuracy on a question test set. We propose an uptraining procedure in which a deterministic parser is trained on the output of a more accurate, but slower, latent variable constituency parser (converted to dependencies). Uptraining with 100K unlabeled questions achieves results comparable to having 2K labeled questions for training. With 100K unlabeled and 2K labeled questions, uptraining is able to improve parsing accuracy to 84%, closing the gap between in-domain and out-of-domain performance.", "title": "" }, { "docid": "fcf1d5d56f52d814f0df3b02643ef71b", "text": "The research work deals with an approach to perform texture and morphological based retrieval on a corpus of food grain images. The work has been carried out using Image Warping and Image analysis approach. The method has been employed to normalize food grain images and hence eliminating the effects of orientation using image warping technique with proper scaling. The images have been properly enhanced to reduce noise and blurring in image. Finally image has segmented applying proper segmentation methods so that edges may be detected effectively and thus rectification of the image has been done. The approach has been tested on sufficient number of food grain images of rice based on intensity, position and orientation. A digital image analysis algorithm based on color, morphological and textural features was developed to identify the six varieties rice seeds which are widely planted in Chhattisgarh region. Nine color and nine morphological and textural features were used for discriminant analysis. A back propagation neural network-based classifier was developed to identify the unknown grain types. The color and textural features were presented to the neural network for training purposes. The trained network was then used to identify the unknown grain types.", "title": "" }, { "docid": "496bdd85a0aebb64d2f2b36c2050eb3a", "text": "This research derives, implements, tunes and compares selected path tracking methods for controlling a car-like robot along a predetermined path. The scope includes commonly used m ethods found in practice as well as some theoretical methods found in various literature from other areas of rese arch. This work reviews literature and identifies important path tracking models and control algorithms from the vast back ground and resources. This paper augments the literature with a comprehensive collection of important path tracking idea s, a guide to their implementations and, most importantly, an independent and realistic comparison of the perfor mance of these various approaches. This document does not catalog all of the work in vehicle modeling and control; only a selection that is perceived to be important ideas when considering practical system identification, ease of implementation/tuning and computational efficiency. There are several other methods that meet this criteria, ho wever they are deemed similar to one or more of the approaches presented and are not included. The performance r esults, analysis and comparison of tracking methods ultimately reveal that none of the approaches work well in all applications a nd that they have some complementary characteristics. These complementary characteristics lead to an idea that a combination of methods may be useful for more general applications. Additionally, applications for which the methods in this paper do not provide adequate solutions are identified.", "title": "" }, { "docid": "83e16c6a186d04b4de71ce8cec872b05", "text": "In this paper, we propose a unified framework to analyze the performance of dense small cell networks (SCNs) in terms of the coverage probability and the area spectral efficiency (ASE). In our analysis, we consider a practical path loss model that accounts for both non-line-of-sight (NLOS) and line-of-sight (LOS) transmissions. Furthermore, we adopt a generalized fading model, in which Rayleigh fading, Rician fading and Nakagami-m fading can be treated in a unified framework. The analytical results of the coverage probability and the ASE are derived, using a generalized stochastic geometry analysis. Different from existing work that does not differentiate NLOS and LOS transmissions, our results show that NLOS and LOS transmissions have a significant impact on the coverage probability and the ASE performance, particularly when the SCNs grow dense. Furthermore, our results establish for the first time that the performance of the SCNs can be divided into four regimes, according to the intensity (aka density) of BSs, where in each regime the performance is dominated by different factors.", "title": "" }, { "docid": "8fd269218b8bafbe2912c46726dd8533", "text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` ' ,:% $E $@ < \"U M,: #% M #! ' ,.D8& 0 1 +/I/ E M,:! H:H>I ,: % \" ,: E+< # M15L ,: = 1 $ 1 $@ \" 1 %[,: 1X ' aD8& I<$ H. 4 %^ D8& ,> + )8Ib ' 4!#& \" H:1 +\\QMR? 9 \"U M,: 4 K;a1 KI/$@ #% 1 0 1 $ %#c< ' P %C d+/ 1 $ %X 0 ! ,.1 1 0 ' d & $ H: #%a,. E+/1 0 % ' ,:1 e6 E+ ' % #!\"1 E+f+/ 1 $ %g & $ H: #%9) % +A1 A ' h,: M$@1 !# 31 0 ' #,> !\"1 8 # 8 Q[RV O + + #% %W ' X$ 1 ) H: # M%71 0 + \" \" M,: ,. ];=' # 9H:1N + % ' + +/,: ,:%i # +/ +\\6 ;=' \" =,: 9 ' =D8& I4$ H. 9 1 ,: % \" _ 1 $ %#6 E+b' 1 ;j g& ! ' 1 0 ' TH:1N +?% ' 1 & H.+-)@ 4% ' +' $@1 ,: <,. ' k$ H. \\Q-R? k$ #% # 8 g A H. 1 ,> ' 0 1 M !\"!#1 M$ H.,:% ' ,. ' ,:% E+9 \"U/$@ \" ,: M # 8 H #L ,.+ # !# X 'E 5 a,> i! M !\" XD8& ,:! l H:Ig +9! )/ ,: g ' <%CI/%C # m)E ! lk,: 8 1g ' <& % 0 & He1 $@ \" ,: 9 Q 1. INTRODUCTION n \";o $ $ H:,.!# ,:1 %4 'E 5 T g& %C T+/ H_;=,> 'VL %C T /& g)@ \" % 1 0 ,: ( $ & i%C M%i d)@ #!#1 M,: M1 X!\"1 M M1 \\Q ` ' #% ],: !#H:&E+ d $ ( $ H:,.!# ,:1 %T ' T$ 18!# \"% %4+ 0 1 % k H:H_ # g)@ #+ + #+b% \" % 1 %#6 $ $ H.,:! 5 ,:1 %[ ' ^ g& %C e!#1 #H. aP E !#,. H + 0 # #+ %#6 E+ $ ( $ H:,.!# ,:1 %^ 'E 5 [ g& %C \\ k E _,: $ &/ 0 1] p XLN \" I Hq 5 i /& g)@ \" 1 0 #1 (J$@1 % ,> ,.1 ,: 4+ \"L/,:!# \"%#QW F \";r!#H. % %i1 0 + 5 < k \" M # 8 %CI/%C # s,:%X # M \" ,: 4,: k #% $@1 % 1T ' #% < $ $ H.,:! 5 ,:1 %#Q ` ' #% %CI/%C # M%]$ 15L ,.+ ' T% M l ,: E+ 1 0 ,: 0 %C & ! & 13%C 9( ) % +M $ $ H.,:! 5 ,:1 %i 'E a+ 5 ) % = k \" M # 8 i%CI/%C # M%W' 5L $/ 15L/,.+/ + 0 1 h+ b$ 18!# \"% % ,. V $ $ H:,:! 5 ,.1 %#Qr m%C t+ k E \" -& % \"%b $ $ H:,.!# ,:1 /(JH: #L #Hg% # k 8 ,.!\"% 1u k l ?,: 8 #H:H.,>( # 8 + \"!#,:% ,.1 % )@1 &/ < #% 1 &/ !# 9 H:H.18!# ,:1 \\Q ` I/$ ,:! H:H>I86v ' \"( % 1 & !# \"%3,: wD8& #%C ,:1 F,: !#H:&E+/ %C 1 6]$ 18!# \"% % 1 3!\"I/!#H: #%#6] E+ ) +/;=,.+/ '\\Q x &/ X+/ #% ,: %X' LN ])@ \" # 3,: /yE& \" !# +M' L/,:H>IM)8IM% #L \" H@% $@ #!\",:P ! $ $ H:,:! ,:1 %#QTzK b$E 5 ,:!#& H. 6v;a g'E LN T%C &E+/,: +b $ $ H:,:! ,:1 'E 5 $@ \" 0 1 M%< # M1 4 ,q M15LN \" )E 5 H. PE #H.+{ ,:LN # { \" 1 K;a # 8 KI3) ,:1 (*% # % 1 %d # g)@ #+ + #+3,: ! ' % 1 Hq+/,: \" | % & , 0 1 QiRV 'E LN a H:% 1];a1 lN #+ ;=,> '4 4 $ $ H:,.!# ,:1 g ' ^!#1 H:H: #!\" %7 #!#1 ,:%C( % !# d+ 5 0 1 s M +/L !# #+g ,> $ Hq d )@1 & W ' a$@1 % ,> ,:1 %i1 0 # # 4I & ,> % E+ ' <,:%<!\"1 !\" \" + ;=,> 'b ' T,. 8 #H:H:,: # 8 +/,:%C( % # M,: E 5 ,:1 k1 0 ' ,:%O,: 0 1 k 5 ,.1 M 1g % \" ,: #%X1 0 1 & +M%C ,:1 % ! ' ;=,> ' +/,:}v # 8 d #D & ,> # M # 8 %#QWRV T H.% 1k)@ # ,: ,: k \"U/$@ \" ,: M # 8 HX }v1 M 1? k E P % 'f #% $ ,> 1 Ir+ ? %h ,: E+/,.!# 1 ]1 0 ' <$/ #% # !\" 1 0 1 U/,. %X,: 4 #% \" L 1 ,> Q ]H:H71 0 ' \"% 9 $ $ H:,:! ,:1 % 4! ' !\" \" ,:~# +-) I hH. 9 & 9( )@ \" W1 0 $ & % ' (*)E % + + ]% 1 & !\" #%7,: 4;=' ,:! '4 ' O+ 5 < ,:L H8 ! 9)@ X' ,: '9 E+4& $/ + ,:!\" ) H: Q[i ! 'M1 0 ' #% = $ $ H:,:! 5 ,.1 %_,:% #% $@1 % ,:) H: 0 1 d M1 ,> 1 ,. 4 ' ,.%O+ T 19+ #!\" X!\" ,> ,:! He% ,> &E 5( ,:1 %#Qi & ,: ' #% #LN # 8 %#68 ' <+ #%X!# ,: !\" % 6E E+ ,> <,:%< 4& ! ' M1 ,: M$@1 d 'E 5 #H: #L 8 + 5 k \" +/ #H:,.L \" + ,: B ,: M #H>I 0 % ' ,:1 eQ zK { ' M€ €]€o%CI/%C # 67 V \"U/$ \"% % ,.1 B1 0 ' h #H. ,:LN ,: M$@1 !# 31 0 1 & $ & 9 \"LN # 8 %9,:%k! $/ & +f %k G 18 g% $@ \"!#,>PE! 5 ,.1 eQ ` ' d%CI/%C # j 4& %C i H>;X #I/%W Ig 1 k U/,: M,:~# ' k 1 H=+ #H:,:LN \" #+rG 1N vQ7 & ,: ,: M #%g1 0 %C #% %#6a ' h,: $ & \"%M! A \"U/!# # #+A ' 3%CI/%C # ! $ !#,> KI8QAzJ B ' #% 3! % #%#6i ' 1 H>IM;X #IM 141 $@ \" ];=,: ' ,: h ' <G 1N k)@1 & E+/%a,:%O 1T% ' +k% 1 M 1 0 ' 4H:1N +\\Q] I/ E M,.!# H:H>I ! ' 181 % ,. h;=' \" 1h)@ \"%C <% ' #+ H.1 + + ' 1 ;‚ 4& ! ' H:1N +b 1k% ' #+ ,.% M! ' H:H: # ,. 3$/ 1 ) H. \" Q ` ' ,:% $E $@ \" 9 U $ H:1 #%4% ! H. ) H: H:1N +A% ' #+ + ,: #! ' ,.D8& #% 0 1 9H. $ 18!\" #% % ,: M K;O1 l %#Q RV g)@ #H:,. \"LN g 'E 5 4G 18 ,:%T% $@ \"!#,>PE +-% #$E 5 #H>I 0 1 T ! '? $ $ H:,>( ! 5 ,.1 eQkz* T+ #% !\" ,:)@ #% ' 4 #H. ,:1 % ' ,:$V)@ \" J;O # # {L 5 ,:1 & % ! 'E 5 ( ! \" ,:%C ,.!\"%g1 0 B %C;O 9 E+{ ' 9& % 0 & H: \"% %3 , Q Q:67& ,:H:,> KI <1 0 'E 5 i %C;a \" Q ` '/& %#6N;O = M1 +/ #HEG 1N g %a <% \" _1 0v0 & !\" ,:1 %W 'E #H. < 4$E 5 M \" X1 0 ' 1 & $ & a 14,> %O& ,:H:,> KI8Q_ƒ 1 X \"U M$ H. 6 ,: F k 8Ir $ $ H:,:! ,:1 %#6 %C;a \" %3 b1 H:Ir& % 0 & H], 0 ' \"Ir ,: M #H>I8Q ` ' \" 0 1 6 ' X&/ ,.H:,> KIg1 0 k %C;a \" O! M)@ d 0 & !\" ,:1 1 0 ' =Hq 5 # ! Ig,: LN1 H:LN #+g,: 9,> %i!\" # ,:1 \\Q_ ]H:% 1 68 ' X& ,:H:,: JIg1 0 %C;O \" ! b)@ T 0 & !\" ,:1 1 0 ' 1 &/ $ & ]L H:& Q] 1 M L H:& #% M1 <,: 8 \" #%C ,: 9 ' 1 ' \" %#Q „ ,:LN # b%C ,:%C ,:!#% )@1 & ] ' T!#1 %C 1 0 ! 'b$ 18!# \"% % ,. %C #$E+ ,> %9 % % 18!#,. +A% #H: #!\" ,:L ,> KI867,> 9,:%T$@1 % % ,:) H: k 1b!#1 M$ & M L H:& 0 1 ' U $@ \"!\" +FL H:& 0 1 1 H G 18 r;=' # F ' b%CI/%C # …,:% 1 $@ ,: f)@ #H:1 ;†,> % ! $E !\",: JI8Q x L \" H:1N +S,:% +/ \" #!\" #+S;=' # ' =1 ) % \" LN #+3G 1N 9+/ 1 $ %a% ,: ,>PE! 8 H:I9)@ #H:15;r ' ,:%aL H:& QW‡e1 + % ' #+ + ,: T,:%O,: LN1 lN +k %X ;X #I9 14+/ ,:LN = ' d%CI/%C # o) ! lg 14 !\"!# #$ ) H: 4G 18 @Q zJ O% ' 1 & H.+3)@ < 1 +M 'E 5 X;=' ,:H: +/ 1 $ $ ,: & $ H: #%O;=,:H.H\\!# \" ,: H>I", "title": "" }, { "docid": "63de507f7bbf289c3e53e2c73660d3e5", "text": "Stylistic dialogue response generation, with valuable applications in personality-based conversational agents, is a challenging task because the response needs to be fluent, contextually-relevant, as well as paralinguistically accurate. Moreover, parallel datasets for regular-to-stylistic pairs are usually unavailable. We present three weakly-supervised models that can generate diverse, polite (or rude) dialogue responses without parallel data. Our late fusion model (Fusion) merges the decoder of an encoder-attention-decoder dialogue model with a language model trained on stand-alone polite utterances. Our label-finetuning (LFT) model prepends to each source sequence a politeness-score scaled label (predicted by our state-of-the-art politeness classifier) during training, and at test time is able to generate polite, neutral, and rude responses by simply scaling the label embedding by the corresponding score. Our reinforcement learning model (Polite-RL) encourages politeness generation by assigning rewards proportional to the politeness classifier score of the sampled response. We also present two retrievalbased, polite dialogue model baselines. Human evaluation validates that while the Fusion and the retrieval-based models achieve politeness with poorer context-relevance, the LFT and Polite-RL models can produce significantly more polite responses without sacrificing dialogue quality.", "title": "" }, { "docid": "2122697f764fbffc588f9a407105c5ba", "text": "Very rare cases of human T cell acute lymphoblastic leukemia (T-ALL) harbor chromosomal translocations that involve NOTCH1, a gene encoding a transmembrane receptor that regulates normal T cell development. Here, we report that more than 50% of human T-ALLs, including tumors from all major molecular oncogenic subtypes, have activating mutations that involve the extracellular heterodimerization domain and/or the C-terminal PEST domain of NOTCH1. These findings greatly expand the role of activated NOTCH1 in the molecular pathogenesis of human T-ALL and provide a strong rationale for targeted therapies that interfere with NOTCH signaling.", "title": "" }, { "docid": "479fe61e0b738cb0a0284da1bda7c36d", "text": "In urban areas, congestion creates a substantial variation in travel speeds during peak morning and evening hours. This research presents a new solution approach, an iterative route construction and improvement algorithm (IRCI), for the time dependent vehicle routing problem (TDVRP) with hard or soft time windows. Improvements are obtained at a route level; hence the proposed approach does not rely on any type of local improvement procedure. Further, the solution algorithms can tackle constant speed or time-dependent speed problems without any alteration in their structure. A new formulation for the TDVRP with soft and hard time windows is presented. Leveraging on the well known Solomon instances, new test problems that capture the typical speed variations of congested urban settings are proposed. Results in terms of solution quality as well as computational time are presented and discussed. The computational complexity of the IRCI is analyzed and experimental results indicate that average computational time increases proportionally to the square of the number of customers.", "title": "" }, { "docid": "617189999dd72a73f5097f87d9874ae5", "text": "In this study, we present a novel ranking model based on learning the nearest neighbor relationships embedded in the index space. Given a query point, a conventional nearest neighbor search approach calculates the distances to the cluster centroids, before ranking the clusters from near to far based on the distances. The data indexed in the top-ranked clusters are retrieved and treated as the nearest neighbor candidates for the query. However, the loss of quantization between the data and cluster centroids will inevitably harm the search accuracy. To address this problem, the proposed model ranks clusters based on their nearest neighbor probabilities rather than the query-centroid distances to the query. The nearest neighbor probabilities are estimated by employing neural networks to characterize the neighborhood relationships as a nonlinear function, i.e., the density distribution of nearest neighbors with respect to the query. The proposed probability-based ranking model can replace the conventional distance-based ranking model as a coarse filter for candidate clusters, and the nearest neighbor probability can be used to determine the data quantity to be retrieved from the candidate cluster. Our experimental results demonstrated that implementation of the proposed ranking model for two state-of-the-art nearest neighbor quantization and search methods could boost the search performance effectively in billion-scale datasets.", "title": "" }, { "docid": "93cec060a420f2ffc3e67eb532186f8e", "text": "This paper presents an efficient approach to identify tabular structures within either electronic or paper documents. The resulting T—Recs system takes word bounding box information as input, and outputs the corresponding logical text block units (e.g. the cells within a table environment). Starting with an arbitrary word as block seed the algorithm recursively expands this block to all words that interleave with their vertical (north and south) neighbors. Since even smallest gaps of table columns prevent their words from mutual interleaving, this initial segmentation is able to identify and isolate such columns. In order to deal with some inherent segmentation errors caused by isolated lines (e.g. headers), overhanging words, or cells spawning more than one column, a series of postprocessing steps is added. These steps benefit from a very simple distinction between type 1 and type 2 blocks: type 1 blocks are those of at most one word per line, all others are of type 2. This distinction allows the selective application of heuristics to each group of blocks. The conjoint decomposition of column blocks into subsets of table cells leads to the final block segmentation of a homogeneous abstraction level. These segments serve the final layout analysis which identifies table environments and cells that are stretching over several rows and/or columns.", "title": "" }, { "docid": "e67a7ba82594e024f96fc1deb4ff7498", "text": "The software industry is more than ever facing the challenge of delivering WYGIWYW software (what you get is what you want). A well-structured document specifying adequate, complete, consistent, precise, and measurable requirements is a critical prerequisite for such software. Goals have been recognized to be among the driving forces for requirements elicitation, elaboration, organization, analysis, negotiation, documentation, and evolution. Growing experience with goal-oriented requirements engineering suggests synergistic links between research in this area and good practice. We discuss one journey along this road from influencing ideas and research results to tool developments to good practice in industrial projects. On the way, we discuss some lessons learnt, obstacles to technology transfer, and challenges for better requirements engineering research and practice.", "title": "" }, { "docid": "3137bb7ba1b33d873acaa8b4079f6e30", "text": "Accurate estimation of spatial gait characteristics is critical to assess motor impairments resulting from neurological or musculoskeletal disease. Currently, however, methodological constraints limit clinical applicability of state-of-the-art double integration approaches to gait patterns with a clear zero-velocity phase. We describe a novel approach to stride length estimation that uses deep convolutional neural networks to map stride-specific inertial sensor data to the resulting stride length. The model is trained on a publicly available and clinically relevant benchmark dataset consisting of 1220 strides from 101 geriatric patients. Evaluation is done in a 10-fold cross validation and for three different stride definitions. Even though best results are achieved with strides defined from mid-stance to mid-stance with average accuracy and precision of 0.01 ± 5.37 cm, performance does not strongly depend on stride definition. The achieved precision outperforms state-of-the-art methods evaluated on this benchmark dataset by 3.0 cm (36%). Due to the independence of stride definition, the proposed method is not subject to the methodological constrains that limit applicability of state-of-the-art double integration methods. Furthermore, precision on the benchmark dataset could be improved. With more precise mobile stride length estimation, new insights to the progression of neurological disease or early indications might be gained. Due to the independence of stride definition, previously uncharted diseases in terms of mobile gait analysis can now be investigated by re-training and applying the proposed method.", "title": "" }, { "docid": "70710daefe747da7d341577947b6b8ff", "text": "This paper describes an automated lane centering/changing control algorithm that was developed at General Motors Research and Development. Over the past few decades, there have been numerous studies in the autonomous vehicle motion control. These studies typically focused on improving the control accuracy of the autonomous driving vehicles. In addition to the control accuracy, driver/passenger comfort is also an important performance measure of the system. As an extension of authors' prior study, this paper further considers vehicle motion control to provide driver/passenger comfort based on the adjustment of the lane change maneuvering time in various traffic situations. While defining the driver/passenger comfort level is a human factor study topic, this paper proposes a framework to integrate the motion smoothness into the existing lane centering/changing control problem. The proposed algorithm is capable of providing smooth and aggressive lane change maneuvers according to traffic situation and driver preference. Several simulation results as well as on-road vehicle test results confirm the effectiveness of the proposed algorithm.", "title": "" }, { "docid": "0c479abc72634e6d76b787f130a8ea1f", "text": "While intelligent transportation systems come in many shapes and sizes, arguably the most transformational realization will be the autonomous vehicle. As such vehicles become commercially available in the coming years, first on dedicated roads and under specific conditions, and later on all public roads at all times, a phase transition will occur. Once a sufficient number of autonomous vehicles is deployed, the opportunity for explicit coordination appears. This article treats this challenging network control problem, which lies at the intersection of control theory, signal processing, and wireless communication. We provide an overview of the state of the art, while at the same time highlighting key research directions for the coming decades.", "title": "" } ]
scidocsrr
cf6f80403f06d4bb848d729b36bc4e19
Trajectory Planning Design Equations and Control of a 4 - axes Stationary Robotic Arm
[ { "docid": "53b43126d066f5e91d7514f5da754ef3", "text": "This paper describes a computationally inexpensive, yet high performance trajectory generation algorithm for omnidirectional vehicles. It is shown that the associated nonlinear control problem can be made tractable by restricting the set of admissible control functions. The resulting problem is linear with coupled control efforts and a near-optimal control strategy is shown to be piecewise constant (bang-bang type). A very favorable trade-off between optimality and computational efficiency is achieved. The proposed algorithm is based on a small number of evaluations of simple closed-form expressions and is thus extremely efficient. The low computational cost makes this method ideal for path planning in dynamic environments.", "title": "" } ]
[ { "docid": "261e3c6f2826473d9128d4c763ffaa41", "text": "Since remote sensing provides more and more sensors and techniques to accumulate data on urban regions, three-dimensional representations of these complex environments gained much interest for various applications. In order to obtain three-dimensional representations, one of the most practical ways is to generate Digital Surface Models (DSMs) using very high resolution remotely sensed images from two or more viewing directions, or by using LIDAR sensors. Due to occlusions, matching errors and interpolation techniques these DSMs do not exhibit completely steep walls, and in order to obtain real three-dimensional urban models including objects like buildings from these DSMs, advanced methods are needed. A novel approach based on building shape detection, height estimation, and rooftop reconstruction is proposed to achieve realistic three-dimensional building representations. Our automatic approach consists of three main modules as; detection of complex building shapes, understanding rooftop type, and three-dimensional building model reconstruction based on detected shape and rooftop type. Besides the development of the methodology, the goal is to investigate the applicability and accuracy which can be accomplished in this context for different stereo sensor data. We use DSMs of Munich city which are obtained from different satellite (Cartosat-1, Ikonos, WorldView-2) and airborne sensors (3K camera, HRSC, and LIDAR). The paper later focuses on a quantitative comparisons of the outputs from the different multi-view sensors for a better understanding of qualities, capabilities and possibilities for applications. Results look very promising even for the DSMs derived from satellite data.", "title": "" }, { "docid": "693c29b040bb37142d95201589b24d0d", "text": "We are overwhelmed by the response to IJEIS. This response reflects the importance of the subject of enterprise information systems in global market and enterprise environments. We have some exciting special issues forthcoming in 2006. The first two issues will feature: (i) information and knowledge based approaches to improving performance in organizations, and (ii) hard and soft modeling tools and approaches to data and information management in real life projects and systems. IJEIS encourages researchers and practitioners to share their new ideas and results in enterprise information systems design and implementation, and also share relevant technical issues related to the development of such systems. This issue of IJEIS contains five articles dealing with an approach to evaluating ERP software within the acquisition process, uncertainty in ERP-controlled manufacturing systems, a review on IT business value research , methodologies for evaluating investment in electronic data interchange, and an ERP implementation model. An overview of the papers follows. The first paper, A Three-Dimensional Approach in Evaluating ERP Software within the Acquisition Process is authored by Verville, Bernadas and Halingten. This paper is based on an extensive study of the evaluation process of the acquisition of an ERP software of four organizations. Three distinct process types and activities were found: vendor's evaluation, functional evaluation , and technical evaluation. This paper provides a perspective on evaluation and sets it apart as modality for action, whose intent is to investigate and uncover by means of specific defined evaluative activities all issues pertinent to ERP software that an organization can use in its decision to acquire a solution that will meet its needs. The use of ERP is becoming increasingly prevalent in many modern manufacturing enterprises. However, knowledge of their performance when perturbed by several significant uncertainties simultaneously is not as widespread as it should have been. Koh, Gunasekaran, Saad and Arunachalam authored Uncertainty in ERP-Controlled Manufacturing Systems. The paper presents a developmental and experimental work on modeling uncertainty within an ERP multi-product, multi-level dependent demand manufacturing planning and scheduling system in a simulation model developed using ARENA/ SIMAN. To enumerate how uncertainty af", "title": "" }, { "docid": "b1c6d95b297409a7b47d8fa7e6da6831", "text": "~I \"e have modified the original model of selective attention, which was previmtsly proposed by Fukushima, and e~tended its ability to recognize attd segment connected characters in cmwive handwriting. Although the or~¢inal model q/'sdective attention ah'ead)' /tad the abilio' to recognize and segment patterns, it did not alwa)w work well when too many patterns were presented simuhaneousl): In order to restrict the nttmher q/patterns to be processed simultaneousO; a search controller has been added to the original model. Tlw new mode/mainly processes the patterns contained in a small \"search area, \" which is mo~vd b)' the search controller A ptvliminao' ev~eriment with compltter simttlatiott has shown that this approach is promisittg. The recogttition arid segmentation q[k'haracters can be sttcces~[itl even thottgh each character itt a handwritten word changes its .shape h)\" the e[]'ect o./the charactetw", "title": "" }, { "docid": "102bec350390b46415ae07128cb4e77f", "text": "We capitalize on large amounts of unlabeled video in order to learn a model of scene dynamics for both video recognition tasks (e.g. action classification) and video generation tasks (e.g. future prediction). We propose a generative adversarial network for video with a spatio-temporal convolutional architecture that untangles the scene’s foreground from the background. Experiments suggest this model can generate tiny videos up to a second at full frame rate better than simple baselines, and we show its utility at predicting plausible futures of static images. Moreover, experiments and visualizations show the model internally learns useful features for recognizing actions with minimal supervision, suggesting scene dynamics are a promising signal for representation learning. We believe generative video models can impact many applications in video understanding and simulation.", "title": "" }, { "docid": "8296954ffde770f611d86773f72fb1b4", "text": "Group and async. commit? Better I/O performance But contention unchanged It reduces buffer contention, but...  Log space partitioning: by page or xct? – Impacts locality, recovery strategy  Dependency tracking: before commit, T4 must persist log records written by: – itself – direct xct deps: T4  T2 – direct page deps: T4  T3 – transitive deps: T4  {T3, T2}  T1  Storage is slow – T4 flushes all four logs upon commit (instead of one) Log work (20%) Log contention (46%) Other work (21%) CPU cycles: Lock manager Other contention", "title": "" }, { "docid": "91e8516d2e7e1e9de918251ac694ee08", "text": "High performance 3D integration Systems need a higher interconnect density between the die than traditional μbump interconnects can offer. For ultra-fine pitches interconnect pitches below 5μm a different solution is required. This paper describes a hybrid wafer-to-wafer (W2W) bonding approach that uses Cu damascene patterned surface bonding, allowing to scale down the interconnection pitch below 5 μm, potentially even down to 1μm, depending on the achievable W2W bonding accuracy. The bonding method is referred to as hybrid bonding since the bonding of the Cu/dielectric damascene surfaces leads simultaneously to metallic and dielectric bonding. In this paper, the integration flow for 300mm hybrid wafer bonding at 3.6μm and 1.8μm pitch will be described using a novel, alternative, non-oxide Cu/dielectric damascene process. Optimization of the surface preparation before bonding will be discussed. Of particular importance is the wafer chemical-mechanical-polishing (CMP) process and the pre-bonding wafer treatment. Using proper surface activation and very low roughness dielectrics, void-free room temperature bonding can be achieved. High bonding strengths are obtained, even using low temperature anneal (250°C). The process flow also integrates the use of a 5μm diameter, 50μm deep via-middle through-silicon-vias (TSV) to connect the wafer interfaces to the external wafer backside.", "title": "" }, { "docid": "700191eaaaf0bdd293fc3bbd24467a32", "text": "SMART (Semantic web information Management with automated Reasoning Tool) is an open-source project, which aims to provide intuitive tools for life scientists for represent, integrate, manage and query heterogeneous and distributed biological knowledge. SMART was designed with interoperability and extensibility in mind and uses AJAX, SVG and JSF technologies, RDF, OWL, SPARQL semantic web languages, triple stores (i.e. Jena) and DL reasoners (i.e. Pellet) for the automated reasoning. Features include semantic query composition and validation using DL reasoners, a graphical representation of the query, a mapping of DL queries to SPARQL, and the retrieval of pre-computed inferences from an RDF triple store. With a use case scenario, we illustrate how a biological scientist can intuitively query the yeast knowledge base and navigate the results. Continued development of this web-based resource for the biological semantic web will enable new information retrieval opportunities for the life sciences.", "title": "" }, { "docid": "07c34b068cc1217de2e623122a22d2b0", "text": "Rheumatoid arthritis (RA) is a bone destructive autoimmune disease. Many patients with RA recognize fluctuations of their joint synovitis according to changes of air pressure, but the correlations between them have never been addressed in large-scale association studies. To address this point we recruited large-scale assessments of RA activity in a Japanese population, and performed an association analysis. Here, a total of 23,064 assessments of RA activity from 2,131 patients were obtained from the KURAMA (Kyoto University Rheumatoid Arthritis Management Alliance) database. Detailed correlations between air pressure and joint swelling or tenderness were analyzed separately for each of the 326 patients with more than 20 assessments to regulate intra-patient correlations. Association studies were also performed for seven consecutive days to identify the strongest correlations. Standardized multiple linear regression analysis was performed to evaluate independent influences from other meteorological factors. As a result, components of composite measures for RA disease activity revealed suggestive negative associations with air pressure. The 326 patients displayed significant negative mean correlations between air pressure and swellings or the sum of swellings and tenderness (p = 0.00068 and 0.00011, respectively). Among the seven consecutive days, the most significant mean negative correlations were observed for air pressure three days before evaluations of RA synovitis (p = 1.7 × 10(-7), 0.00027, and 8.3 × 10(-8), for swellings, tenderness and the sum of them, respectively). Standardized multiple linear regression analysis revealed these associations were independent from humidity and temperature. Our findings suggest that air pressure is inversely associated with synovitis in patients with RA.", "title": "" }, { "docid": "f1e0565fbc19791ed636c146a9c2dfcc", "text": "It is well established that value stocks outperform glamour stocks, yet considerable debate exists about whether the return differential reflects compensation for risk or mispricing. Under mispricing explanations, prices of glamour (value) firms reflect systematically optimistic (pessimistic) expectations; thus, the value/glamour effect should be concentrated (absent) among firms with (without) ex ante identifiable expectation errors. Classifying firms based upon whether expectations implied by current pricing multiples are congruent with the strength of their fundamentals, we document that value/glamour returns and ex post revisions to market expectations are predictably concentrated (absent) among firms with ex ante biased (unbiased) market expectations.", "title": "" }, { "docid": "ad7f49832562d27534f11b162e28f51b", "text": "Gaze is an important component of social interaction. The function, evolution and neurobiology of gaze processing are therefore of interest to a number of researchers. This review discusses the evolutionary role of social gaze in vertebrates (focusing on primates), and a hypothesis that this role has changed substantially for primates compared to other animals. This change may have been driven by morphological changes to the face and eyes of primates, limitations in the facial anatomy of other vertebrates, changes in the ecology of the environment in which primates live, and a necessity to communicate information about the environment, emotional and mental states. The eyes represent different levels of signal value depending on the status, disposition and emotional state of the sender and receiver of such signals. There are regions in the monkey and human brain which contain neurons that respond selectively to faces, bodies and eye gaze. The ability to follow another individual's gaze direction is affected in individuals with autism and other psychopathological disorders, and after particular localized brain lesions. The hypothesis that gaze following is \"hard-wired\" in the brain, and may be localized within a circuit linking the superior temporal sulcus, amygdala and orbitofrontal cortex is discussed.", "title": "" }, { "docid": "a2013a7c9212829187fff9bfa42665e5", "text": "As companies increase their efforts in retaining customers, being able to predict accurately ahead of time, whether a customer will churn in the foreseeable future is an extremely powerful tool for any marketing team. The paper describes in depth the application of Deep Learning in the problem of churn prediction. Using abstract feature vectors, that can generated on any subscription based company’s user event logs, the paper proves that through the use of the intrinsic property of Deep Neural Networks (learning secondary features in an unsupervised manner), the complete pipeline can be applied to any subscription based company with extremely good churn predictive performance. Furthermore the research documented in the paper was performed for Framed Data (a company that sells churn prediction as a service for other companies) in conjunction with the Data Science Institute at Lancaster University, UK. This paper is the intellectual property of Framed Data.", "title": "" }, { "docid": "93a2d7072ab88ad77c23f7c1dc5a129c", "text": "In recent decades, the need for efficient and effective image search from large databases has increased. In this paper, we present a novel shape matching framework based on structures common to similar shapes. After representing shapes as medial axis graphs, in which nodes show skeleton points and edges connect nearby points, we determine the critical nodes connecting or representing a shape’s different parts. By using the shortest path distance from each skeleton (node) to each of the critical nodes, we effectively retrieve shapes similar to a given query through a transportation-based distance function. To improve the effectiveness of the proposed approach, we employ a unified framework that takes advantage of the feature representation of the proposed algorithm and the classification capability of a supervised machine learning algorithm. A set of shape retrieval experiments including a comparison with several well-known approaches demonstrate the proposed algorithm’s efficacy and perturbation experiments show its robustness.", "title": "" }, { "docid": "4e4e65f9ee3555f2b3ee134f3ab5ca7d", "text": "Conventional wisdom has regarded low self-esteem as an important cause of violence, but the opposite view is theoretically viable. An interdisciplinary review of evidence about aggression, crime, and violence contradicted the view that low self-esteem is an important cause. Instead, violence appears to be most commonly a result of threatened egotism--that is, highly favorable views of self that are disputed by some person or circumstance. Inflated, unstable, or tentative beliefs in the self's superiority may be most prone to encountering threats and hence to causing violence. The mediating process may involve directing anger outward as a way of avoiding a downward revision of the self-concept.", "title": "" }, { "docid": "36bee0642c30a3ecab2c9a8996084b61", "text": "Many works related learning from examples to regularization techniques for inverse problems, emphasizing the strong algorithmic and conceptual analogy of certain learning algorithms with regularization algorithms. In particular it is well known that regularization schemes such as Tikhonov regularization can be effectively used in the context of learning and are closely related to algorithms such as support vector machines. Nevertheless the connection with inverse problem was considered only for the discrete (finite sample) problem which is solved in practice and the probabilistic aspects of learning from examples were not taken into account. In this paper we provide a natural extension of such analysis to the continuous (population) case and analyse the interplay between the discrete and continuous problems. From a theoretical point of view, this allows to draw a clear connection between the consistency approach imposed in learning theory, and the stability convergence property used in ill-posed inverse problems. The main mathematical result of the paper is a new probabilistic bound for the regularized least-squares algorithm. By means of standard results on the approximation term, the consistency of the algorithm easily follows.", "title": "" }, { "docid": "6c15a9ec021ec38cf65532d06472be9d", "text": "The aim of this article is to present a case study of usage of one of the data mining methods, neural network, in knowledge discovery from databases in the banking industry. Data mining is automated process of analysing, organization or grouping a large set of data from different perspectives and summarizing it into useful information using special algorithms. Data mining can help to resolve banking problems by finding some regularity, causality and correlation to business information which are not visible at first sight because they are hidden in large amounts of data. In this paper, we used one of the data mining methods, neural network, within the software package Alyuda NeuroInteligence to predict customer churn in bank. The focus on customer churn is to determinate the customers who are at risk of leaving and analysing whether those customers are worth retaining. Neural network is statistical learning model inspired by biological neural and it is used to estimate or approximate functions that can depend on a large number of inputs which are generally unknown. Although the method itself is complicated, there are tools that enable the use of neural networks without much prior knowledge of how they operate. The results show that clients who use more bank services (products) are more loyal, so bank should focus on those clients who use less than three products, and offer them products according to their needs. Similar results are obtained for different network topologies.", "title": "" }, { "docid": "fe42cf28ff020c35d3a3013bb249c7d8", "text": "Sensors and actuators are the core components of all mechatronic systems used in a broad range of diverse applications. A relatively new and rapidly evolving area is the one of rehabilitation and assistive devices that comes to support and improve the quality of human life. Novel exoskeletons have to address many functional and cost-sensitive issues such as safety, adaptability, customization, modularity, scalability, and maintenance. Therefore, a smart variable stiffness actuator was developed. The described approach was to integrate in one modular unit a compliant actuator with all sensors and electronics required for real-time communications and control. This paper also introduces a new method to estimate and control the actuator's torques without using dedicated expensive torque sensors in conditions where the actuator's torsional stiffness can be adjusted by the user. A 6-degrees-of-freedom exoskeleton was assembled and tested using the technology described in this paper, and is introduced as a real-life case study for the mechatronic design, modularity, and integration of the proposed smart actuators, suitable for human–robot interaction. The advantages are discussed together with possible improvements and the possibility of extending the presented technology to other areas of mechatronics.", "title": "" }, { "docid": "db6e3742a0413ad5f44647ab1826b796", "text": "Endometrial stromal sarcoma is a rare tumor and has unique histopathologic features. Most tumors of this kind occur in the uterus; thus, the vagina is an extremely rare site. A 34-year-old woman presented with endometrial stromal sarcoma arising in the vagina. No correlative endometriosis was found. Because of the uncommon location, this tumor was differentiated from other more common neoplasms of the vagina, particularly embryonal rhabdomyosarcoma and other smooth muscle tumors. Although the pathogenesis of endometrial stromal tumors remains controversial, the most common theory of its origin is heterotopic Müllerian tissue such as endometriosis tissue. Primitive cells of the pelvis and retroperitoneum are an alternative possible origin for the tumor if endometriosis is not present. According to the literature, the tumor has a fairly good prognosis compared with other vaginal sarcomas. Surgery combined with adjuvant radiotherapy appears to be an adequate treatment.", "title": "" }, { "docid": "80ca2b3737895e9222346109ac092637", "text": "The common ground between figurative language and humour (in the form of jokes) is what Koestler (1964) termed the bisociation of ideas. In both jokes and metaphors, two disparate concepts are brought together, but the nature and the purpose of this conjunction is different in each case. This paper focuses on this notion of boundaries and attempts to go further by asking the question “when does a metaphor become a joke?”. More specifically, the main research questions of the paper are: (a) How do speakers use metaphor in discourse for humorous purposes? (b) What are the (metaphoric) cognitive processes that relate to the creation of humour in discourse? (c) What does the study of humour in discourse reveal about the nature of metaphoricity? This paper answers these questions by examining examples taken from a three-hour conversation, and considers how linguistic theories of humour (Raskin, 1985; Attardo and Raskin, 1991; Attardo, 1994; 2001) and cognitive theories of metaphor and blending (Lakoff and Johnson, 1980; Fauconnier and Turner, 2002) can benefit from each other. Boundaries in Humour and Metaphor The goal of this paper is to explore the relationship between metaphor (and, more generally, blending) and humour, in order to attain a better understanding of the cognitive processes that are involved or even contribute to laughter in discourse. This section will present briefly research in both areas and will identify possible common ground between the two. More specifically, the notion of boundaries will be explored in both areas. The following section explores how metaphor can be used for humorous purposes in discourse by applying relevant theories of humour and metaphor to conversational data. Linguistic theories of humour highlight the importance of duality and tension in humorous texts. Koestler (1964: 51) in discussing comic creativity notes that: The sudden bisociation of an idea or event with two habitually incompatible matrices will produce a comic effect, provided that the narrative, the semantic pipeline, carries the right kind of emotional tension. When the pipe is punctured, and our expectations are fooled, the now redundant tension gushes out in laughter, or is spilled in the gentler form of the sou-rire [my emphasis]. This oft-quoted passage introduces the basic themes and mechanisms that later were explored extensively within contemporary theories of humour: a humorous text must relate to two different and opposing in some way scenarios; this duality is not", "title": "" }, { "docid": "78c54496ada5e4997c72adfeaae3e41f", "text": "In the past decade, online music streaming services (MSS), e.g. Pandora and Spotify, experienced exponential growth. The sheer volume of music collection makes music recommendation increasingly important and the related algorithms are well-documented. In prior studies, most algorithms employed content-based model (CBM) and/or collaborative filtering (CF) [3]. The former one focuses on acoustic/signal features extracted from audio content, and the latter one investigates music rating and user listening history. Actually, MSS generated user data present significant heterogeneity. Taking user-music relationship as an example, comment, bookmark, and listening history may potentially contribute to music recommendation in very different ways. Furthermore, user and music can be implicitly related via more complex relationships, e.g., user-play-artist-perform-music. From this viewpoint, user-user, music-music or user-music relationship can be much more complex than the classical CF approach assumes. For these reasons, we model music metadata and MSS generated user data in the form of a heterogeneous graph, where 6 different types of nodes interact through 16 types of relationships. We can propose many recommendation hypotheses based on the ways users and songs are connected on this graph, in the form of meta paths. The recommendation problem, then, becomes a (supervised) random walk problem on the heterogeneous graph [2]. Unlike previous heterogeneous graph mining studies, the constructed heterogeneous graph in our case is more complex, and manually formulated meta-path based hypotheses cannot guarantee good performance. In the pilot study [2], we proposed to automatically extract all the potential meta paths within a given length on the heterogeneous graph scheme, evaluate their recommendation performance on the training data, and build a learning to rank model with the best ones. Results show that the new method can significantly enhance the recommendation performance. However, there are two problems with this approach: 1. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). WSDM 2016 February 22-25, 2016, San Francisco, CA, USA c © 2016 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-3716-8/16/02. DOI: http://dx.doi.org/10.1145/2835776.2855088 including the individually best performing meta paths in the learning to rank model neglects the dependency between features; 2. it is very time consuming to calculate graph based features. Traditional feature selection methods would only work if all feature values are readily available, which would make this recommendation approach highly inefficient. In this proposal, we attempt to address these two problems by adapting the feature selection for ranking method (FSR) proposed by Geng, Liu, Qin, and Li [1]. This feature selection method developed specifically for learning to rank tasks evaluates features based on their importance when used alone, and their similarity between each other. Applying this method on the whole set of meta-path based features would be very costly. Alternatively, we use it on sub meta paths that are shared components of multiple full meta paths. We start from sub meta paths of length=1 and only the ones selected by FSR have the chance to grow to sub meta paths of length=2. Then we repeat this process until the selected sub meta paths grow to full ones. During each step, we drop some meta paths because they contain unselected sub meta paths. Finally, we will derive a subset of the original meta paths and save time by extracting values for fewer features. In our preliminary experiment, the proposed method outperforms the original FSR algorithm in both efficiency and effectiveness.", "title": "" }, { "docid": "265e9de6c65996e639fd265be170e039", "text": "Topical crawling is a young and creative area of research that holds the promise of benefiting from several sophisticated data mining techniques. The use of classification algorithms to guide topical crawlers has been sporadically suggested in the literature. No systematic study, however, has been done on their relative merits. Using the lessons learned from our previous crawler evaluation studies, we experiment with multiple versions of different classification schemes. The crawling process is modeled as a parallel best-first search over a graph defined by the Web. The classifiers provide heuristics to the crawler thus biasing it towards certain portions of the Web graph. Our results show that Naive Bayes is a weak choice for guiding a topical crawler when compared with Support Vector Machine or Neural Network. Further, the weak performance of Naive Bayes can be partly explained by extreme skewness of posterior probabilities generated by it. We also observe that despite similar performances, different topical crawlers cover subspaces on the Web with low overlap.", "title": "" } ]
scidocsrr
f527c8398bc78304f0ae646ea9babf34
A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics
[ { "docid": "68810ad35e71ea7d080e7433e227e40e", "text": "Mobile devices, ubiquitous in modern lifestyle, embody and provide convenient access to our digital lives. Being small and mobile, they are easily lost or stole, therefore require strong authentication to mitigate the risk of unauthorized access. Common knowledge-based mechanism like PIN or pattern, however, fail to scale with the high frequency but short duration of device interactions and ever increasing number of mobile devices carried simultaneously. To overcome these limitations, we present CORMORANT, an extensible framework for risk-aware multi-modal biometric authentication across multiple mobile devices that offers increased security and requires less user interaction.", "title": "" }, { "docid": "58b2ee3d0a4f61d4db883bc0a896f8f4", "text": "While applications for mobile devices have become extremely important in the last few years, little public information exists on mobile application usage behavior. We describe a large-scale deployment-based research study that logged detailed application usage information from over 4,100 users of Android-powered mobile devices. We present two types of results from analyzing this data: basic descriptive statistics and contextual descriptive statistics. In the case of the former, we find that the average session with an application lasts less than a minute, even though users spend almost an hour a day using their phones. Our contextual findings include those related to time of day and location. For instance, we show that news applications are most popular in the morning and games are at night, but communication applications dominate through most of the day. We also find that despite the variety of apps available, communication applications are almost always the first used upon a device's waking from sleep. In addition, we discuss the notion of a virtual application sensor, which we used to collect the data.", "title": "" } ]
[ { "docid": "2af524d484b7bb82db2dd92727a49fff", "text": "Computer-based multimedia learning environments — consisting of pictures (such as animation) and words (such as narration) — offer a potentially powerful venue for improving student understanding. How can we use words and pictures to help people understand how scientific systems work, such as how a lightning storm develops, how the human respiratory system operates, or how a bicycle tire pump works? This paper presents a cognitive theory of multimedia learning which draws on dual coding theory, cognitive load theory, and constructivist learning theory. Based on the theory, principles of instructional design for fostering multimedia learning are derived and tested. The multiple representation principle states that it is better to present an explanation in words and pictures than solely in words. The contiguity principle is that it is better to present corresponding words and pictures simultaneously rather than separately when giving a multimedia explanation. The coherence principle is that multimedia explanations are better understood when they include few rather than many extraneous words and sounds. The modality principle is that it is better to present words as auditory narration than as visual on-screen text. The redundancy principle is that it is better to present animation and narration than to present animation, narration, and on-screen text. By beginning with a cognitive theory of how learners process multimedia information, we have been able to conduct focused research that yields some preliminary principles of instructional design for multimedia messages.  2001 Elsevier Science Ltd. All rights reserved.", "title": "" }, { "docid": "2321029b1866a5bdcbee740a31cc2f8b", "text": "In this article we present and discuss the process of developing and implementing a PBL-based course entitled Moving Images in Teaching and Learning that was held at the University of Lapland, Finland. In the course of the project, this fairly traditional face-to-face course was redesigned into a blended PBL course by integrating Web 2.0 applications into the course. The pedagogical rationale was to support students’ meaningful learning in various phases of the PBL process, and to enable easy storage and sharing of the ideas produced by the students. In addition, the rationale was to create more opportunities for students to report on their process during their independent knowledge acquisition phase and for the teacher to monitor and support students’ information searching processes. We focus mainly on students’ experiences of the implementation and conclude with ideas about our next steps.", "title": "" }, { "docid": "704598402da135b6b7e3251de4c6edf8", "text": "Almost every complex software system today is configurable. While configurability has many benefits, it challenges performance prediction, optimization, and debugging. Often, the influences of individual configuration options on performance are unknown. Worse, configuration options may interact, giving rise to a configuration space of possibly exponential size. Addressing this challenge, we propose an approach that derives a performance-influence model for a given configurable system, describing all relevant influences of configuration options and their interactions. Our approach combines machine-learning and sampling heuristics in a novel way. It improves over standard techniques in that it (1) represents influences of options and their interactions explicitly (which eases debugging), (2) smoothly integrates binary and numeric configuration options for the first time, (3) incorporates domain knowledge, if available (which eases learning and increases accuracy), (4) considers complex constraints among options, and (5) systematically reduces the solution space to a tractable size. A series of experiments demonstrates the feasibility of our approach in terms of the accuracy of the models learned as well as the accuracy of the performance predictions one can make with them.", "title": "" }, { "docid": "6fb4a8b65261d64ac489aa3033ec5309", "text": "In this letter we sketch a brief introduction to budget feasible mechanism design. This framework captures scenarios where the goal is to buy items or services from strategic agents under budget. The setting introduces interesting challenges that arise from the tension between incentive compatibility and the budget constraint, and leaves many interesting open questions. We will discuss several application domains that include crowdsourcing, information dissemination in social networks, and privacy-preserving recommendation systems.", "title": "" }, { "docid": "c96f916b35b5b4d3e323fde41244d650", "text": "Muscularly prominent calves, caused mainly by hypertrophy of the gastrocnemius muscle (GCM), are prevalent among Asian women, and this condition can be a significant factor leading to psychological stress. The authors have devised a method for contouring the calf using radiofrequency (RF) applications to the GCMs to correct thick, muscular legs. This study was performed to investigate the effects of RF energy in reducing enlarged GCMs for 250 patients (249 women and 1 man) who sought aesthetic consultation for problems such as thick, muscular, asymmetric, or bowed calves. The operations were performed from June 2004 to April 2006. The patients first received a local anesthetic and sedation. After application of RF current, the prominent muscular contours improved, and the GCMs were contoured to an appropriate proportional volume. The range of the reductions in the calf circumferences at their thickest levels was 1 to 6 cm (mean, 2.5 cm) during the follow-up visits 6 months after the procedures. Most of the patients could return to their activities of daily living, except for exercise, after 1 to 7 days, and they were satisfied with the improved aesthetic contour lines of their lower legs. Clinical photography and ultrasonic examination were performed, and the leg circumferences were measured. Radiofrequency-induced coagulation tissue necrosis of the muscles caused no functional disabilities, and the clinical improvement was well maintained after the treatments for up to 17 months of follow-up evaluation.", "title": "" }, { "docid": "50d71ef71ee86af740ca9b8629e824e3", "text": "This paper presents the probability hypothesis density (PHD) filter for sets of trajectories: the trajectory probability density (TPHD) filter. The TPHD filter is capable of estimating trajectories in a principled way without requiring to evaluate all measurement-to-target association hypotheses. The TPHD filter is based on recursively obtaining the best Poisson approximation to the multitrajectory filtering density in the sense of minimising the Kullback-Leibler divergence. We also propose a Gaussian mixture implementation of the TPHD recursion. Finally, we include simulation results to show the performance of the proposed algorithm.", "title": "" }, { "docid": "f9aae8fda6d94f5060835e9bf0d2ac8a", "text": "Image retrieval is an active area of research, which is growing very rapidly. Indeed, stimulated by the rapid growth in storage capacity and processing speed, the number of images in electronic collections and the World Wide Web has considerably increased over the last few years. However, with this abundance of information, people are continuously looking for tools that help them find the image(s) they are looking for within a reasonable amount of time. These tools are image retrieval engines. When using an image retrieval engine, the user is continuously interacting with the machine. First, he1 uses the system’s interface to formulate a query that expresses his needs. Second, he provides feedback about the retrieved results at each search iteration. This allows the engine to provide more accurate results by using relevance feedback (RF) techniques. Third, he may be asked to assign a goodness score or weight to each image retrieved, which helps evaluating the system’s performance. In this chapter, we will review the main interactions between human and the machine in the context of image retrieval. We will address several issues, including: Query formulation: • How the user expresses his needs and what he is looking for • The different ways the query can be formulated: keywords-based, sentence-based, query by example image, query by sketch, query by feature values, composite queries, etc. • Query by region of interest (ROI) vs. global query. • Queries with positive example only vs. queries with both positive and negative examples. • Page zero problem: finding a good image to initiate a retrieval session. Relevance feedback: we will try to answer questions like: • Why do systems use relevance feedback? • How can the user express his needs during the relevance feedback process • How this information is exploited by the system to perform operations like feature selection or the identification of the sought image. 1 Note that the masculine gender has been used strictly to facilitate reading, and is to be understood to include the feminine.", "title": "" }, { "docid": "d647410661f83652e2a1be51c7ec878b", "text": "The objective of this study was to assess the effect of the probiotic Lactobacillus murinus native strain (LbP2) on general clinical parameters of dogs with distemper-associated diarrhea. Two groups of dogs over 60 d of age with distemper and diarrhea were used in the study, which was done at the Animal Hospital of the Veterinary Faculty of the University of Uruguay, Montevideo, Uruguay. The dogs were treated orally each day for 5 d with the probiotic or with a placebo (vehicle without bacteria). Clinical parameters were assessed and scored according to a system specially designed for this study. Blood parameters were also measured. Administration of the probiotic significantly improved the clinical score of the patients, whereas administration of the placebo did not. Stool output, fecal consistency, mental status, and appetite all improved in the probiotic-treated dogs. These results support previous findings of beneficial effects with the probiotic L. murinus LbP2 in dogs. Thus, combined with other therapeutic measures, probiotic treatment appears to be promising for the management of canine distemper-associated diarrhea.", "title": "" }, { "docid": "4e0e6ca2f4e145c17743c42944da4cc8", "text": "We demonstrate that, by using a recently proposed leveled homomorphic encryption scheme, it is possible to delegate the execution of a machine learning algorithm to a computing service while retaining confidentiality of the training and test data. Since the computational complexity of the homomorphic encryption scheme depends primarily on the number of levels of multiplications to be carried out on the encrypted data, we define a new class of machine learning algorithms in which the algorithm’s predictions, viewed as functions of the input data, can be expressed as polynomials of bounded degree. We propose confidential algorithms for binary classification based on polynomial approximations to least-squares solutions obtained by a small number of gradient descent steps. We present experimental validation of the confidential machine learning pipeline and discuss the trade-offs regarding computational complexity, prediction accuracy and cryptographic security.", "title": "" }, { "docid": "98b603ed5be37165cc22da7650023d7d", "text": "One reason that word learning presents a challenge for children is because pairings between word forms and meanings are arbitrary conventions that children must learn via observation - e.g., the fact that \"shovel\" labels shovels. The present studies explore cases in which children might bypass observational learning and spontaneously infer new word meanings: By exploiting the fact that many words are flexible and systematically encode multiple, related meanings. For example, words like shovel and hammer are nouns for instruments, and verbs for activities involving those instruments. The present studies explored whether 3- to 5-year-old children possess semantic generalizations about lexical flexibility, and can use these generalizations to infer new word meanings: Upon learning that dax labels an activity involving an instrument, do children spontaneously infer that dax can also label the instrument itself? Across four studies, we show that at least by age four, children spontaneously generalize instrument-activity flexibility to new words. Together, our findings point to a powerful way in which children may build their vocabulary, by leveraging the fact that words are linked to multiple meanings in systematic ways.", "title": "" }, { "docid": "e29eb914db494aadd140b7b75298f1ef", "text": "AbstractThe Ainu, a minority ethnic group from the northernmost island of Japan, was investigated for DNA polymorphisms both from maternal (mitochondrial DNA) and paternal (Y chromosome) lineages extensively. Other Asian populations inhabiting North, East, and Southeast Asia were also examined for detailed phylogeographic analyses at the mtDNA sequence type as well as Y-haplogroup levels. The maternal and paternal gene pools of the Ainu contained 25 mtDNA sequence types and three Y-haplogroups, respectively. Eleven of the 25 mtDNA sequence types were unique to the Ainu and accounted for over 50% of the population, whereas 14 were widely distributed among other Asian populations. Of the 14 shared types, the most frequently shared type was found in common among the Ainu, Nivkhi in northern Sakhalin, and Koryaks in the Kamchatka Peninsula. Moreover, analysis of genetic distances calculated from the mtDNA data revealed that the Ainu seemed to be related to both the Nivkhi and other Japanese populations (such as mainland Japanese and Okinawans) at the population level. On the paternal side, the vast majority (87.5%) of the Ainu exhibited the Asian-specific YAP+ lineages (Y-haplogroups D-M55* and D-M125), which were distributed only in the Japanese Archipelago in this analysis. On the other hand, the Ainu exhibited no other Y-haplogroups (C-M8, O-M175*, and O-M122*) common in mainland Japanese and Okinawans. It is noteworthy that the rest of the Ainu gene pool was occupied by the paternal lineage (Y-haplogroup C-M217*) from North Asia including Sakhalin. Thus, the present findings suggest that the Ainu retain a certain degree of their own genetic uniqueness, while having higher genetic affinities with other regional populations in Japan and the Nivkhi among Asian populations.", "title": "" }, { "docid": "0afde87c9fb4fb21c6bad3196ef433d0", "text": "Blockchain and verifiable identities have a lot of potential in future distributed software applications e.g. smart cities, eHealth, autonomous vehicles, networks, etc. In this paper, we proposed a novel technique, namely VeidBlock, to generate verifiable identities by following a reliable authentication process. These entities are managed by using the concepts of blockchain ledger and distributed through an advance mechanism to protect them against tampering. All identities created using VeidBlock approach are verifiable and anonymous therefore it preserves user's privacy in verification and authentication phase. As a proof of concept, we implemented and tested the VeidBlock protocols by integrating it in a SDN based infrastructure. Analysis of the test results yield that all components successfully and autonomously performed initial authentication and locally verified all the identities of connected components.", "title": "" }, { "docid": "47a484d75b1635139f899d2e1875d8f4", "text": "This work presents the concept and methodology as well as the architecture and physical implementation of an integrated node for smart-city applications. The presented integrated node lies on active RFID technology whereas the use case illustrated, with results from a small-scale verification of the presented node, refers to common-type waste-bins. The sensing units deployed for the use case are ultrasonic sensors that provide ranging information which is translated to fill-level estimations; however the use of a versatile active RFID tag within the node is able to afford multiple sensors for a variety of smart-city applications. The most important benefits of the presented node are power minimization, utilization of low-cost components and accurate fill-level estimation with a tiny data-load fingerprint, regarding the specific use case on waste-bins, whereas the node has to be deployed on public means of transportation or similar standard route vehicles within an urban or suburban context.", "title": "" }, { "docid": "70b62dfeab05d3bc4c64199a5cea3b1a", "text": "Sleep timing undergoes profound changes during adolescence, often resulting in inadequate sleep duration. The present study examines the relationship of sleep duration with positive attitude toward life and academic achievement in a sample of 2716 adolescents in Switzerland (mean age: 15.4 years, SD = 0.8), and whether this relationship is mediated by increased daytime tiredness and lower self-discipline/behavioral persistence. Further, we address the question whether adolescents who start school modestly later (20 min; n = 343) receive more sleep and report better functioning. Sleeping less than an average of 8 h per night was related to more tiredness, inferior behavioral persistence, less positive attitude toward life, and lower school grades, as compared to longer sleep duration. Daytime tiredness and behavioral persistence mediated the relationship between short sleep duration and positive attitude toward life and school grades. Students who started school 20 min later received reliably more sleep and reported less tiredness.", "title": "" }, { "docid": "cf48a139219a096a5e75e5462ed492d1", "text": "Games generalize the single-objective optimization paradigm by introducing different objective functions for different players. Differentiable games often proceed by simultaneous or alternating gradient updates. In machine learning, games are gaining new importance through formulations like generative adversarial networks (GANs) and actorcritic systems. However, compared to singleobjective optimization, game dynamics are more complex and less understood. In this paper, we analyze gradient-based methods with momentum on simple games. We prove that alternating updates are more stable than simultaneous updates. Next, we show both theoretically and empirically that alternating gradient updates with a negative momentum term achieves convergence in a difficult toy adversarial problem, but also on the notoriously difficult to train saturating GANs.", "title": "" }, { "docid": "55b0aa1d04907d6f91740fa366abd4e8", "text": "BACKGROUND\nAlthough the term paraclival carotid pervades recent skull base literature, no clear consensus exists regarding boundaries or anatomical segments.\n\n\nOBJECTIVE\nTo reconcile various internal carotid artery (ICA) nomenclatures for transcranial and endoscopic-endonasal perspectives, we reexamined the transition between lacerum (C3) and cavernous (C4) segments using a C1-C7 segments schema. In this cadaveric study, we obtained a 360°-circumferential view integrating histological, microsurgical, endoscopic, and neuroradiological analyses of this C3-C4 region and identified a distinct transitional segment.\n\n\nMETHODS\nIn 13 adult, silicone-injected, formalin-fixed cadaveric heads (26 sides), transcranial-extradural-subtemporal and endoscopic-endonasal CT-guided dissections were performed. A quadrilateral area was noted medial to Meckel's cave between cranial nerve VI, anterolateral and posterolateral borders of the lateral-paratrigeminal aspect of the precavernous ICA, and posterior longitudinal ligament. Endoscopically, a medial-paraclival aspect was defined. Anatomical correlations were made with histological and neuroradiological slides.\n\n\nRESULTS\nWe identified a distinct precavernous C3-C4 transitional segment. In 18 (69%) specimens, venous channels were absent at the quadrilateral area, on the paratrigeminal border of the precavernous ICA. A trigeminal membrane, seen consistently on the superior border of V2, defined the lateral aspect of the cavernous sinus floor. The medial aspect of the precavernous ICA corresponded with the paraclival ICA.\n\n\nCONCLUSION\nOur study revealing the juncture of 2 complementary borders of the ICA, endoscopic endonasal (paraclival) and transcranial (paratrigeminal), reconciles various nomenclature. A precavernous segment may clarify controversies about the paraclival ICA and support the concept of a \"safe door\" for lesions involving Meckel's cave, cavernous sinus, and petrous apex.", "title": "" }, { "docid": "41fdf1b9313d4b0510e2d7ebe0a16c62", "text": "With the development of Internet technology, online job-hunting plays an increasingly important role in job-searching. It is difficult for job hunters to solely rely on keywords retrieving to find positions which meet their needs. To solve this issue, we adopted item-based collaborative filtering algorithm for job recommendations. In this paper, we optimized the algorithm by combining position descriptions and resume information. Specifically, job preference prediction formula is optimized by historical delivery weight calculated by position descriptions and similar user weight calculated by resume information. The experiments tested on real data set have shown that our methods have a significant improvement on job recommendation results.", "title": "" }, { "docid": "be5419a2175c5b21c8b7b1930a5a23f5", "text": "Disambiguation to Wikipedia (D2W) is the task of linking mentions of concepts in text to their corresponding Wikipedia entries. Most previous work has focused on linking terms in formal texts (e.g. newswire) to Wikipedia. Linking terms in short informal texts (e.g. tweets) is difficult for systems and humans alike as they lack a rich disambiguation context. We first evaluate an existing Twitter dataset as well as the D2W task in general. We then test the effects of two tweet context expansion methods, based on tweet authorship and topic-based clustering, on a state-of-the-art D2W system and evaluate the results. TITLE AND ABSTRACT IN BASQUE Testuinguruaren Hedapenaren Analisia eta Hobekuntza Mikroblogak Wikifikatzeko Esanahia Wikipediarekiko Argitzea (D2W) deritzo testuetan aurkitutako kontzeptuen aipamenak Wikipedian dagozkien sarrerei lotzeari. Aurreko lan gehienek testu formalak (newswire, esate baterako) lotu dituzte Wikipediarekin. Testu informalak (tweet-ak, esate baterako) lotzea, ordea, zaila da bai sistementzat eta baita gizakiontzat ere, argipena erraztuko luketen testuingururik ez dutelako. Lehenik eta behin, Twitter-en gainean sortutako datu-sorta bat, eta D2W ataza bera ebaluatzen ditugu. Ondoren, egungo D2W sistema baten gainean testuingurua hedatzeko bi teknika aztertu eta ebaluatzen ditugu. Bi teknika hauek tweet-aren egilean eta gaikako multzokatze metodo batean oinarritzen dira.", "title": "" }, { "docid": "2f7862142f2c948db2be11bdaf8abc0b", "text": "Interoperability is the capability of multiple parties and systems to collaborate and exchange information and matter to obtain their objectives. Interoperability challenges call for a model-based systems engineering approach. This paper describes a conceptual modeling framework for model-based interoperability engineering (MoBIE) for systems of systems, which integrates multilayered interoperability specification, modeling, architecting, design, and testing. Treating interoperability infrastructure as a system in its own right, MoBIE facilitates interoperability among agents, processes, systems, services, and interfaces. MoBIE is founded on ISO 19450 standard—object-process methodology, a holistic paradigm for modeling and architecting complex, dynamic, and multidisciplinary systems—and allows for synergistic integration of the interoperability model with system-centric models. We also discuss the implementation of MoBIE with the unified modeling language. We discuss the importance of interoperability in the civil aviation domain, and apply MoBIE to analyze the passenger departure process in an airport terminal as a case-in-point. The resulting model enables architectural and operational decision making and analysis at the system-of-systems level and adds significant value at the interoperability engineering program level.", "title": "" }, { "docid": "2a422c6047bca5a997d5c3d0ee080437", "text": "Connecting mathematical logic and computation, it ensures that some aspects of programming are absolute.", "title": "" } ]
scidocsrr
38aa4a2252a57fe8fe8569d4e884f89b
Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations
[ { "docid": "cf43e30eab17189715b085a6e438ea7d", "text": "This paper presents our investigation of non-orthogonal multiple access (NOMA) as a novel and promising power-domain user multiplexing scheme for future radio access. Based on information theory, we can expect that NOMA with a successive interference canceller (SIC) applied to the receiver side will offer a better tradeoff between system efficiency and user fairness than orthogonal multiple access (OMA), which is widely used in 3.9 and 4G mobile communication systems. This improvement becomes especially significant when the channel conditions among the non-orthogonally multiplexed users are significantly different. Thus, NOMA can be expected to efficiently exploit the near-far effect experienced in cellular environments. In this paper, we describe the basic principle of NOMA in both the downlink and uplink and then present our proposed NOMA scheme for the scenario where the base station is equipped with multiple antennas. Simulation results show the potential system-level throughput gains of NOMA relative to OMA. key words: cellular system, non-orthogonal multiple access, superposition coding, successive interference cancellation", "title": "" } ]
[ { "docid": "ae593e6c1ea6e01093d8226ef219320f", "text": "Trajectory basis Non-Rigid Structure from Motion (NRSfM) refers to the process of reconstructing the 3D trajectory of each point of a non-rigid object from just their 2D projected trajectories. Reconstruction relies on two factors: (i) the condition of the composed camera & trajectory basis matrix, and (ii) whether the trajectory basis has enough degrees of freedom to model the 3D point trajectory. These two factors are inherently conflicting. Employing a trajectory basis with small capacity has the positive characteristic of reducing the likelihood of an ill-conditioned system (when composed with the camera) during reconstruction. However, this has the negative characteristic of increasing the likelihood that the basis will not be able to fully model the object's “true” 3D point trajectories. In this paper we draw upon a well known result centering around the Reduced Isometry Property (RIP) condition for sparse signal reconstruction. RIP allow us to relax the requirement that the full trajectory basis composed with the camera matrix must be well conditioned. Further, we propose a strategy for learning an over-complete basis using convolutional sparse coding from naturally occurring point trajectory corpora to increase the likelihood that the RIP condition holds for a broad class of point trajectories and camera motions. Finally, we propose an 21 inspired objective for trajectory reconstruction that is able to “adaptively” select the smallest sub-matrix from an over-complete trajectory basis that balances (i) and (ii). We present more practical 3D reconstruction results compared to current state of the art in trajectory basis NRSfM.", "title": "" }, { "docid": "eeac967209e931538e0b7a035c876446", "text": "INTRODUCTION\nThis is the first of seven articles from a preterm birth and stillbirth report. Presented here is an overview of the burden, an assessment of the quality of current estimates, review of trends, and recommendations to improve data.\n\n\nPRETERM BIRTH\nFew countries have reliable national preterm birth prevalence data. Globally, an estimated 13 million babies are born before 37 completed weeks of gestation annually. Rates are generally highest in low- and middle-income countries, and increasing in some middle- and high-income countries, particularly the Americas. Preterm birth is the leading direct cause of neonatal death (27%); more than one million preterm newborns die annually. Preterm birth is also the dominant risk factor for neonatal mortality, particularly for deaths due to infections. Long-term impairment is an increasing issue.\n\n\nSTILLBIRTH\nStillbirths are currently not included in Millennium Development Goal tracking and remain invisible in global policies. For international comparisons, stillbirths include late fetal deaths weighing more than 1000g or occurring after 28 weeks gestation. Only about 2% of all stillbirths are counted through vital registration and global estimates are based on household surveys or modelling. Two global estimation exercises reached a similar estimate of around three million annually; 99% occur in low- and middle-income countries. One million stillbirths occur during birth. Global stillbirth cause-of-death estimates are impeded by multiple, complex classification systems.\n\n\nRECOMMENDATIONS TO IMPROVE DATA\n(1) increase the capture and quality of pregnancy outcome data through household surveys, the main data source for countries with 75% of the global burden; (2) increase compliance with standard definitions of gestational age and stillbirth in routine data collection systems; (3) strengthen existing data collection mechanisms--especially vital registration and facility data--by instituting a standard death certificate for stillbirth and neonatal death linked to revised International Classification of Diseases coding; (4) validate a simple, standardized classification system for stillbirth cause-of-death; and (5) improve systems and tools to capture acute morbidity and long-term impairment outcomes following preterm birth.\n\n\nCONCLUSION\nLack of adequate data hampers visibility, effective policies, and research. Immediate opportunities exist to improve data tracking and reduce the burden of preterm birth and stillbirth.", "title": "" }, { "docid": "800dc3e6a3f58d2af1ed7cd526074d54", "text": "The number of parameters in a deep neural network is usually very large, which helps with its learning capacity but also hinders its scalability and practicality due to memory/time inefficiency and overfitting. To resolve this issue, we propose a sparsity regularization method that exploits both positive and negative correlations among the features to enforce the network to be sparse, and at the same time remove any redundancies among the features to fully utilize the capacity of the network. Specifically, we propose to use an exclusive sparsity regularization based on (1, 2)-norm, which promotes competition for features between different weights, thus enforcing them to fit to disjoint sets of features. We further combine the exclusive sparsity with the group sparsity based on (2, 1)-norm, to promote both sharing and competition for features in training of a deep neural network. We validate our method on multiple public datasets, and the results show that our method can obtain more compact and efficient networks while also improving the performance over the base networks with full weights, as opposed to existing sparsity regularizations that often obtain efficiency at the expense of prediction accuracy.", "title": "" }, { "docid": "35e33ddfa05149dea9b0aef4983c8cc1", "text": "We propose a fast approximation method of a softmax function with a very large vocabulary using singular value decomposition (SVD). SVD-softmax targets fast and accurate probability estimation of the topmost probable words during inference of neural network language models. The proposed method transforms the weight matrix used in the calculation of the output vector by using SVD. The approximate probability of each word can be estimated with only a small part of the weight matrix by using a few large singular values and the corresponding elements for most of the words. We applied the technique to language modeling and neural machine translation and present a guideline for good approximation. The algorithm requires only approximately 20% of arithmetic operations for an 800K vocabulary case and shows more than a three-fold speedup on a GPU.", "title": "" }, { "docid": "6f94fd155f3689ab1a6b242243b13e09", "text": "Personalized medicine performs diagnoses and treatments according to the DNA information of the patients. The new paradigm will change the health care model in the future. A doctor will perform the DNA sequence matching instead of the regular clinical laboratory tests to diagnose and medicate the diseases. Additionally, with the help of the affordable personal genomics services such as 23andMe, personalized medicine will be applied to a great population. Cloud computing will be the perfect computing model as the volume of the DNA data and the computation over it are often immense. However, due to the sensitivity, the DNA data should be encrypted before being outsourced into the cloud. In this paper, we start from a practical system model of the personalize medicine and present a solution for the secure DNA sequence matching problem in cloud computing. Comparing with the existing solutions, our scheme protects the DNA data privacy as well as the search pattern to provide a better privacy guarantee. We have proved that our scheme is secure under the well-defined cryptographic assumption, i.e., the sub-group decision assumption over a bilinear group. Unlike the existing interactive schemes, our scheme requires only one round of communication, which is critical in practical application scenarios. We also carry out a simulation study using the real-world DNA data to evaluate the performance of our scheme. The simulation results show that the computation overhead for real world problems is practical, and the communication cost is small. Furthermore, our scheme is not limited to the genome matching problem but it applies to general privacy preserving pattern matching problems which is widely used in real world.", "title": "" }, { "docid": "1790c02ba32f15048da0f6f4d783aeda", "text": "In this paper, resource allocation for energy efficient communication in orthogonal frequency division multiple access (OFDMA) downlink networks with large numbers of base station (BS) antennas is studied. Assuming perfect channel state information at the transmitter (CSIT), the resource allocation algorithm design is modeled as a non-convex optimization problem for maximizing the energy efficiency of data transmission (bit/Joule delivered to the users), where the circuit power consumption and a minimum required data rate are taken into consideration. Subsequently, by exploiting the properties of fractional programming, an efficient iterative resource allocation algorithm is proposed to solve the problem. In particular, the power allocation, subcarrier allocation, and antenna allocation policies for each iteration are derived. Simulation results illustrate that the proposed iterative resource allocation algorithm converges in a small number of iterations and unveil the trade-off between energy efficiency and the number of antennas.", "title": "" }, { "docid": "6e9810c78c6923f720b6b088138db904", "text": "The integration of microgrids that depend on the renewable distributed energy resources with the current power systems is a critical issue in the smart grid. In this paper, we propose a non-cooperative game-theoretic framework to study the strategic behavior of distributed microgrids that generate renewable energies and characterize the power generation solutions by using the Nash equilibrium concept. Our framework not only incorporates economic factors but also takes into account the stability and efficiency of the microgrids, including the power flow constraints and voltage angle regulations. We develop two decentralized update schemes for microgrids and show their convergence to a unique Nash equilibrium. Also, we propose a novel fully distributed PMU-enabled algorithm which only needs the information of voltage angle at the bus. To show the resiliency of the distributed algorithm, we introduce two failure models of the smart grid. Case studies based on the IEEE 14-bus system are used to corroborate the effectiveness and resiliency of the proposed algorithms.", "title": "" }, { "docid": "df09cf0e7c323b6deda69d64f3af507a", "text": "We propose a new multistage procedure for a real-time brain-machine/computer interface (BCI). The developed system allows a BCI user to navigate a small car (or any other object) on the computer screen in real time, in any of the four directions, and to stop it if necessary. Extensive experiments with five young healthy subjects confirmed the high performance of the proposed online BCI system. The modular structure, high speed, and the optimal frequency band characteristics of the BCI platform are features which allow an extension to a substantially higher number of commands in the near future.", "title": "" }, { "docid": "6a72468ebba00563adc8a5f5d24d0ea6", "text": "Denoising algorithms are well developed for grayscale and color images, but not as well for color filter array (CFA) data. Consequently, the common color imaging pipeline demosaics CFA data before denoising. In this paper we explore the noise-related properties of the imaging pipeline that demosaics CFA data before denoising. We then propose and explore a way to transform CFA data to a form that is amenable to existing grayscale and color denoising schemes. Since CFA data are a third as many as demosaicked data, we can expect to reduce processing time and power requirements to about a third of current requirements.", "title": "" }, { "docid": "07cd406cead1a086f61f363269de1aac", "text": "Tolerating and recovering from link and switch failures are fundamental requirements of most networks, including Software-Defined Networks (SDNs). However, instead of traditional behaviors such as network-wide routing re-convergence, failure recovery in an SDN is determined by the specific software logic running at the controller. While this admits more freedom to respond to a failure event, it ultimately means that each controller application must include its own recovery logic, which makes the code more difficult to write and potentially more error-prone.\n In this paper, we propose a runtime system that automates failure recovery and enables network developers to write simpler, failure-agnostic code. To this end, upon detecting a failure, our approach first spawns a new controller instance that runs in an emulated environment consisting of the network topology excluding the failed elements. Then, it quickly replays inputs observed by the controller before the failure occurred, leading the emulated network into the forwarding state that accounts for the failed elements. Finally, it recovers the network by installing the difference ruleset between emulated and current forwarding states.", "title": "" }, { "docid": "b9b267cc96e2cb8b31ac63a278757dec", "text": "Evolutionary considerations suggest aging is caused not by active gene programming but by evolved limitations in somatic maintenance, resulting in a build-up of damage. Ecological factors such as hazard rates and food availability influence the trade-offs between investing in growth, reproduction, and somatic survival, explaining why species evolved different life spans and why aging rate can sometimes be altered, for example, by dietary restriction. To understand the cell and molecular basis of aging is to unravel the multiplicity of mechanisms causing damage to accumulate and the complex array of systems working to keep damage at bay.", "title": "" }, { "docid": "bf04d5a87fbac1157261fac7652b9177", "text": "We consider the partitioning of a society into coalitions in purely hedonic settings; i.e., where each player's payo is completely determined by the identity of other members of her coalition. We rst discuss how hedonic and non-hedonic settings di er and some su cient conditions for the existence of core stable coalition partitions in hedonic settings. We then focus on a weaker stability condition: individual stability, where no player can bene t from moving to another coalition while not hurting the members of that new coalition. We show that if coalitions can be ordered according to some characteristic over which players have single-peaked preferences, or where players have symmetric and additively separable preferences, then there exists an individually stable coalition partition. Examples show that without these conditions, individually stable coalition partitions may not exist. We also discuss some other stability concepts, and the incompatibility of stability with other normative properties.", "title": "" }, { "docid": "b8e8404c061350aeba92f6ed1ecea1f1", "text": "We consider a single-product revenue management problem where, given an initial inventory, the objective is to dynamically adjust prices over a finite sales horizon to maximize expected revenues. Realized demand is observed over time, but the underlying functional relationship between price and mean demand rate that governs these observations (otherwise known as the demand function or demand curve) is not known. We consider two instances of this problem: (i) a setting where the demand function is assumed to belong to a known parametric family with unknown parameter values; and (ii) a setting where the demand function is assumed to belong to a broad class of functions that need not admit any parametric representation. In each case we develop policies that learn the demand function “on the fly,” and optimize prices based on that. The performance of these algorithms is measured in terms of the regret: the revenue loss relative to the maximal revenues that can be extracted when the demand function is known prior to the start of the selling season. We derive lower bounds on the regret that hold for any admissible pricing policy, and then show that our proposed algorithms achieve a regret that is “close” to this lower bound. The magnitude of the regret can be interpreted as the economic value of prior knowledge on the demand function, manifested as the revenue loss due to model uncertainty.", "title": "" }, { "docid": "7e0c6afa66f21d1469ca6d889d69a3f5", "text": "In this paper, we propose and validate a novel design for a double-gate tunnel field-effect transistor (DG tunnel FET), for which the simulations show significant improvements compared with single-gate devices using a gate dielectric. For the first time, DG tunnel FET devices, which are using a high-gate dielectric, are explored using realistic design parameters, showing an on-current as high as 0.23 mA for a gate voltage of 1.8 V, an off-current of less than 1 fA (neglecting gate leakage), an improved average subthreshold swing of 57 mV/dec, and a minimum point slope of 11 mV/dec. The 2D nature of tunnel FET current flow is studied, demonstrating that the current is not confined to a channel at the gate-dielectric surface. When varying temperature, tunnel FETs with a high-kappa gate dielectric have a smaller threshold voltage shift than those using SiO2, while the subthreshold slope for fixed values of Vg remains nearly unchanged, in contrast with the traditional MOSFET. Moreover, an Ion/Ioff ratio of more than 2 times 1011 is shown for simulated devices with a gate length (over the intrinsic region) of 50 nm, which indicates that the tunnel FET is a promising candidate to achieve better-than-ITRS low-standby-power switch performance.", "title": "" }, { "docid": "a669bebcbb6406549b78f365cf352008", "text": "Digital currencies have emerged as a new fascinating phenomenon in the financial markets. Recent events on the most popular of the digital currencies--BitCoin--have risen crucial questions about behavior of its exchange rates and they offer a field to study dynamics of the market which consists practically only of speculative traders with no fundamentalists as there is no fundamental value to the currency. In the paper, we connect two phenomena of the latest years--digital currencies, namely BitCoin, and search queries on Google Trends and Wikipedia--and study their relationship. We show that not only are the search queries and the prices connected but there also exists a pronounced asymmetry between the effect of an increased interest in the currency while being above or below its trend value.", "title": "" }, { "docid": "548be1a1c55ad27e47dba3fb1f20e404", "text": "The proportional odds (PO) assumption for ordinal regression analysis is often violated because it is strongly affected by sample size and the number of covariate patterns. To address this issue, the partial proportional odds (PPO) model and the generalized ordinal logit model were developed. However, these models are not typically used in research. One likely reason for this is the restriction of current statistical software packages: SPSS cannot perform the generalized ordinal logit model analysis and SAS requires data restructuring. This article illustrates the use of generalized ordinal logistic regression models to predict mathematics proficiency levels using Stata and compares the results from fitting PO models and generalized ordinal logistic regression models.", "title": "" }, { "docid": "68689ad05be3bf004120141f0534fd2b", "text": "A group of 156 first year medical students completed measures of emotional intelligence (EI) and physician empathy, and a scale assessing their feelings about a communications skills course component. Females scored significantly higher than males on EI. Exam performance in the autumn term on a course component (Health and Society) covering general issues in medicine was positively and significantly related to EI score but there was no association between EI and exam performance later in the year. High EI students reported more positive feelings about the communication skills exercise. Females scored higher than males on the Health and Society component in autumn, spring and summer exams. Structural equation modelling showed direct effects of gender and EI on autumn term exam performance, but no direct effects other than previous exam performance on spring and summer term performance. EI also partially mediated the effect of gender on autumn term exam performance. These findings provide limited evidence for a link between EI and academic performance for this student group. More extensive work on associations between EI, academic success and adjustment throughout medical training would clearly be of interest. 2005 Elsevier Ltd. All rights reserved. 0191-8869/$ see front matter 2005 Elsevier Ltd. All rights reserved. doi:10.1016/j.paid.2005.04.014 q Ethical approval from the College of Medicine and Veterinary Medicine was sought and received for this investigation. Student information was gathered and used in accordance with the Data Protection Act. * Corresponding author. Tel.: +44 131 65", "title": "" }, { "docid": "ada6153aeeddcc385de538062f2f7e4c", "text": "As analysts attempt to make sense of a collection of documents, such as intelligence analysis reports, they need to “connect the dots” between pieces of information that may initially seem unrelated. We conducted a user study to analyze the cognitive process by which users connect pairs of documents and how they spatialize connections. Users created conceptual stories that connected the dots using a range of organizational strategies and spatial representations. Insights from our study can drive the design of data mining algorithms and visual analytic tools to support analysts' complex cognitive processes.", "title": "" }, { "docid": "2e87c4fbb42424f3beb07e685c856487", "text": "Conventional wisdom ties the origin and early evolution of the genus Homo to environmental changes that occurred near the end of the Pliocene. The basic idea is that changing habitats led to new diets emphasizing savanna resources, such as herd mammals or underground storage organs. Fossil teeth provide the most direct evidence available for evaluating this theory. In this paper, we present a comprehensive study of dental microwear in Plio-Pleistocene Homo from Africa. We examined all available cheek teeth from Ethiopia, Kenya, Tanzania, Malawi, and South Africa and found 18 that preserved antemortem microwear. Microwear features were measured and compared for these specimens and a baseline series of five extant primate species (Cebus apella, Gorilla gorilla, Lophocebus albigena, Pan troglodytes, and Papio ursinus) and two protohistoric human foraging groups (Aleut and Arikara) with documented differences in diet and subsistence strategies. Results confirmed that dental microwear reflects diet, such that hard-object specialists tend to have more large microwear pits, whereas tough food eaters usually have more striations and smaller microwear features. Early Homo specimens clustered with baseline groups that do not prefer fracture resistant foods. Still, Homo erectus and individuals from Swartkrans Member 1 had more small pits than Homo habilis and specimens from Sterkfontein Member 5C. These results suggest that none of the early Homo groups specialized on very hard or tough foods, but that H. erectus and Swartkrans Member 1 individuals ate, at least occasionally, more brittle or tough items than other fossil hominins studied.", "title": "" }, { "docid": "931b8f97d86902f984338285e62c8ef8", "text": "One of the goals of Artificial intelligence (AI) is the realization of natural dialogue between humans and machines. in recent years, the dialogue systems, also known as interactive conversational systems are the fastest growing area in AI. Many companies have used the dialogue systems technology to establish various kinds of Virtual Personal Assistants(VPAs) based on their applications and areas, such as Microsoft's Cortana, Apple's Siri, Amazon Alexa, Google Assistant, and Facebook's M. However, in this proposal, we have used the multi-modal dialogue systems which process two or more combined user input modes, such as speech, image, video, touch, manual gestures, gaze, and head and body movement in order to design the Next-Generation of VPAs model. The new model of VPAs will be used to increase the interaction between humans and the machines by using different technologies, such as gesture recognition, image/video recognition, speech recognition, the vast dialogue and conversational knowledge base, and the general knowledge base. Moreover, the new VPAs system can be used in other different areas of applications, including education assistance, medical assistance, robotics and vehicles, disabilities systems, home automation, and security access control.", "title": "" } ]
scidocsrr
0bd8336f3987f98ed58c0bd38f1ea973
Ranking Wily People Who Rank Each Other
[ { "docid": "8300897859310ad4ee6aff55d84f31da", "text": "We study an important crowdsourcing setting where agents evaluate one another and, based on these evaluations, a subset of agents are selected. This setting is ubiquitous when peer review is used for distributing awards in a team, allocating funding to scientists, and selecting publications for conferences. The fundamental challenge when applying crowdsourcing in these settings is that agents may misreport their reviews of others to increase their chances of being selected. We propose a new strategyproof (impartial) mechanism called Dollar Partition that satisfies desirable axiomatic properties. We then show, using a detailed experiment with parameter values derived from target real world domains, that our mechanism performs better on average, and in the worst case, than other strategyproof mechanisms in the literature.", "title": "" }, { "docid": "bd76b8e1e57f4e38618cf56f4b8d33e2", "text": "For impartial division, each participant reports only her opinion about the fair relative shares of the other participants, and this report has no effect on her own share. If a specific division is compatible with all reports, it is implemented. We propose a natural method meeting these requirements, for a division among four or more participants. No such method exists for a division among three participants.", "title": "" } ]
[ { "docid": "b41f25d30ac88dcc1e1ba8a2a9fead33", "text": "Due to the growing interest in data mining and the educational system, educational data mining is the emerging topic for research community. The various techniques of data mining like classification and clustering can be applied to bring out hidden knowledge from the educational data. Web video mining is retrieving the content using data mining techniques from World Wide Web. There are two approaches for web video mining using traditional image processing (signal processing) and metadata based approach. In this paper, we focus on the education data mining and precisely MOOCs which constitute a new modality of e-learning and clustering techniques. We present a methodology that can be used for mining Moocs videos using metadata as leading contribution for knowledge discovery.", "title": "" }, { "docid": "42d5712d781140edbc6a35703d786e15", "text": "This paper considers control and estimation problems where the sensor signals and the actuator signals are transmitted to various subsystems over a network. In contrast to traditional control and estimation problems, here the observation and control packets may be lost or delayed. The unreliability of the underlying communication network is modeled stochastically by assigning probabilities to the successful transmission of packets. This requires a novel theory which generalizes classical control/estimation paradigms. The paper offers the foundations of such a novel theory. The central contribution is to characterize the impact of the network reliability on the performance of the feedback loop. Specifically, it is shown that for network protocols where successful transmissions of packets is acknowledged at the receiver (e.g., TCP-like protocols), there exists a critical threshold of network reliability (i.e., critical probabilities for the successful delivery of packets), below which the optimal controller fails to stabilize the system. Further, for these protocols, the separation principle holds and the optimal LQG controller is a linear function of the estimated state. In stark contrast, it is shown that when there is no acknowledgement of successful delivery of control packets (e.g., UDP-like protocols), the LQG optimal controller is in general nonlinear. Consequently, the separation principle does not hold in this circumstance", "title": "" }, { "docid": "3cdd640f48c1713c3d360da00c634883", "text": "Hate speech detection in social media texts is an important Natural language Processing task, which has several crucial applications like sentiment analysis, investigating cyber bullying and examining socio-political controversies. While relevant research has been done independently on code-mixed social media texts and hate speech detection, our work is the first attempt in detecting hate speech in HindiEnglish code-mixed social media text. In this paper, we analyze the problem of hate speech detection in code-mixed texts and present a Hindi-English code-mixed dataset consisting of tweets posted online on Twitter. The tweets are annotated with the language at word level and the class they belong to (Hate Speech or Normal Speech). We also propose a supervised classification system for detecting hate speech in the text using various character level, word level, and lexicon based features.", "title": "" }, { "docid": "497fcf32281c8e9555ac975a3de45a6a", "text": "This paper presents the framework, rules, games, controllers, and results of the first General Video Game Playing Competition, held at the IEEE Conference on Computational Intelligence and Games in 2014. The competition proposes the challenge of creating controllers for general video game play, where a single agent must be able to play many different games, some of them unknown to the participants at the time of submitting their entries. This test can be seen as an approximation of general artificial intelligence, as the amount of game-dependent heuristics needs to be severely limited. The games employed are stochastic real-time scenarios (where the time budget to provide the next action is measured in milliseconds) with different winning conditions, scoring mechanisms, sprite types, and available actions for the player. It is a responsibility of the agents to discover the mechanics of each game, the requirements to obtain a high score and the requisites to finally achieve victory. This paper describes all controllers submitted to the competition, with an in-depth description of four of them by their authors, including the winner and the runner-up entries of the contest. The paper also analyzes the performance of the different approaches submitted, and finally proposes future tracks for the competition.", "title": "" }, { "docid": "a3a260159a6509670c4ac3547cfc9ef0", "text": "The advent of near infrared imagery and it's applications in face recognition has instigated research in cross spectral (visible to near infrared) matching. Existing research has focused on extracting textural features including variants of histogram of oriented gradients. This paper focuses on studying the effectiveness of these features for cross spectral face recognition. On NIR-VIS-2.0 cross spectral face database, three HOG variants are analyzed along with dimensionality reduction approaches and linear discriminant analysis. The results demonstrate that DSIFT with subspace LDA outperforms a commercial matcher and other HOG variants by at least 15%. We also observe that histogram of oriented gradient features are able to encode similar facial features across spectrums.", "title": "" }, { "docid": "cf219b9093dc55f09d067954d8049aeb", "text": "In this work we explore a straightforward variational Bayes scheme for Recurrent Neural Networks. Firstly, we show that a simple adaptation of truncated backpropagation through time can yield good quality uncertainty estimates and superior regularisation at only a small extra computational cost during training, also reducing the amount of parameters by 80%. Secondly, we demonstrate how a novel kind of posterior approximation yields further improvements to the performance of Bayesian RNNs. We incorporate local gradient information into the approximate posterior to sharpen it around the current batch statistics. We show how this technique is not exclusive to recurrent neural networks and can be applied more widely to train Bayesian neural networks. We also empirically demonstrate how Bayesian RNNs are superior to traditional RNNs on a language modelling benchmark and an image captioning task, as well as showing how each of these methods improve our model over a variety of other schemes for training them. We also introduce a new benchmark for studying uncertainty for language models so future methods can be easily compared.", "title": "" }, { "docid": "6c8151eee3fcfaec7da724c2a6899e8f", "text": "Classic work on interruptions by Zeigarnik showed that tasks that were interrupted were more likely to be recalled after a delay than tasks that were not interrupted. Much of the literature on interruptions has been devoted to examining this effect, although more recently interruptions have been used to choose between competing designs for interfaces to complex devices. However, none of this work looks at what makes some interruptions disruptive and some not. This series of experiments uses a novel computer-based adventure-game methodology to investigate the effects of the length of the interruption, the similarity of the interruption to the main task, and the complexity of processing demanded by the interruption. It is concluded that subjects make use of some form of nonarticulatory memory which is not affected by the length of the interruption. It is affected by processing similar material however, and by a complex mentalarithmetic task which makes large demands on working memory.", "title": "" }, { "docid": "dc83a0826e509d9d4be6b4b58550b20e", "text": "This review describes historical iodine deficiency in the U.K., gives current information on dietary sources of iodine and summarises recent evidence of iodine deficiency and its association with child neurodevelopment. Iodine is required for the production of thyroid hormones that are needed for brain development, particularly during pregnancy. Iodine deficiency is a leading cause of preventable brain damage worldwide and is associated with impaired cognitive function. Despite a global focus on the elimination of iodine deficiency, iodine is a largely overlooked nutrient in the U.K., a situation we have endeavoured to address through a series of studies. Although the U.K. has been considered iodine-sufficient for many years, there is now concern that iodine deficiency may be prevalent, particularly in pregnant women and women of childbearing age; indeed we found mild-to-moderate iodine deficiency in pregnant women in Surrey. As the major dietary source of iodine in the U.K. is milk and dairy produce, it is relevant to note that we have found the iodine concentration of organic milk to be over 40% lower than that of conventional milk. In contrast to many countries, iodised table salt is unlikely to contribute to U.K. iodine intake as we have shown that its availability is low in grocery stores. This situation is of concern as the level of U.K. iodine deficiency is such that it is associated with adverse effects on offspring neurological development; we demonstrated a higher risk of low IQ and poorer reading-accuracy scores in U.K. children born to mothers who were iodine-deficient during pregnancy. Given our findings and those of others, iodine status in the U.K. population should be monitored, particularly in vulnerable subgroups such as pregnant women and children.", "title": "" }, { "docid": "7e91815398915670fadba3c60e772d14", "text": "Online reviews are valuable resources not only for consumers to make decisions before purchase, but also for providers to get feedbacks for their services or commodities. In Aspect Based Sentiment Analysis (ABSA), it is critical to identify aspect categories and extract aspect terms from the sentences of user-generated reviews. However, the two tasks are often treated independently, even though they are closely related. Intuitively, the learned knowledge of one task should inform the other learning task. In this paper, we propose a multi-task learning model based on neural networks to solve them together. We demonstrate the improved performance of our multi-task learning model over the models trained separately on three public dataset released by SemEval work-", "title": "" }, { "docid": "2e4a3f77d0b8c31600fca0f1af82feb5", "text": "Forwarding data in scenarios where devices have sporadic connectivity is a challenge. An example scenario is a disaster area, where forwarding information generated in the incident location, like victims’ medical data, to a coordination point is critical for quick, accurate and coordinated intervention. New applications are being developed based on mobile devices and wireless opportunistic networks as a solution to destroyed or overused communication networks. But the performance of opportunistic routing methods applied to emergency scenarios is unknown today. In this paper, we compare and contrast the efficiency of the most significant opportunistic routing protocols through simulations in realistic disaster scenarios in order to show how the different characteristics of an emergency scenario impact in the behaviour of each one of them. & 2012 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "40a96dfd399c27ca8b2966693732b975", "text": "Graph matching problems of varying types are important in a wide array of application areas. A graph matching problem is a problem involving some form of comparison between graphs. Some of the many application areas of such problems include information retrieval, sub-circuit identification, chemical structure classification, and networks. Problems of efficient graph matching arise in any field that may be modeled with graphs. For example, any problem that can be modeled with binary relations between entities in the domain is such a problem. The individual entities in the problem domain become nodes in the graph. And each binary relation becomes an edge between the appropriate nodes. Although it is possible to formulate such a large array of problems as graph matching problems, it is not necessarily a good idea to do so. Graph matching is a very difficult problem. The graph isomorphism problem is to determine if there exists a one-to-one mapping from the nodes of one graph to the nodes of a second graph that preserves adjacency. Similarly, the subgraph isomorphism problem is to determine if there exists a one-to-one mapping from the", "title": "" }, { "docid": "c5033a414493aa367ea9af5602471f49", "text": "We present the Height Optimized Trie (HOT), a fast and space-efficient in-memory index structure. The core algorithmic idea of HOT is to dynamically vary the number of bits considered at each node, which enables a consistently high fanout and thereby good cache efficiency. The layout of each node is carefully engineered for compactness and fast search using SIMD instructions. Our experimental results, which use a wide variety of workloads and data sets, show that HOT outperforms other state-of-the-art index structures for string keys both in terms of search performance and memory footprint, while being competitive for integer keys. We believe that these properties make HOT highly useful as a general-purpose index structure for main-memory databases.", "title": "" }, { "docid": "3655e688c58a719076f3605d5a9c9893", "text": "The performance of a generic pedestrian detector may drop significantly when it is applied to a specific scene due to mismatch between the source dataset used to train the detector and samples in the target scene. In this paper, we investigate how to automatically train a scene-specific pedestrian detector starting with a generic detector in video surveillance without further manually labeling any samples under a novel transfer learning framework. It tackles the problem from three aspects. (1) With a graphical representation and through exploring the indegrees from target samples to source samples, the source samples are properly re-weighted. The indegrees detect the boundary between the distributions of the source dataset and the target dataset. The re-weighted source dataset better matches the target scene. (2) It takes the context information from motions, scene structures and scene geometry as the confidence scores of samples from the target scene to guide transfer learning. (3) The confidence scores propagate among samples on a graph according to the underlying visual structures of samples. All these considerations are formulated under a single objective function called Confidence-Encoded SVM. At the test stage, only the appearance-based detector is used without the context cues. The effectiveness of the proposed framework is demonstrated through experiments on two video surveillance datasets. Compared with a generic pedestrian detector, it significantly improves the detection rate by 48% and 36% at one false positive per image on the two datasets respectively.", "title": "" }, { "docid": "c30e938b57863772e8c7bc0085d22f71", "text": "Game theory is a set of tools developed to model interactions between agents with conflicting interests, and is thus well-suited to address some problems in communications systems. In this paper we present some of the basic concepts of game theory and show why it is an appropriate tool for analyzing some communication problems and providing insights into how communication systems should be designed. We then provided a detailed example in which game theory is applied to the power control problem in a", "title": "" }, { "docid": "bb3cb573c5b9727d7a9b22cca0039a64", "text": "The control objectives for information and related technology (COBIT) is a \"trusted\" open standard that is being used increasingly by a diverse range of organizations throughout the world. COBIT is arguably the most appropriate control framework to help an organization ensure alignment between use of information technology (IT) and its business goals, as it places emphasis on the business need that is satisfied by each control objective by J. Colbert, and P. Bowen (1996). This paper reports on the use of a simple classification of the published literature on COBIT, to highlight some of the features of that literature. The appropriate alignment between use of IT and the business goals of a organization is fundamental to efficient and effective IT governance. IT governance \"...is the structure of relationships and processes to develop, direct and control IS/IT resources in order to achieve the enterprise's goals\". IT governance has been recognized as a critical success factor in the achievement of corporate success by deploying information through the application of technology by N. Korac-Kakabadse and A. Kakabadse (2001). The importance of IT governance can be appreciated in light of the Gartner Group's finding that large organizations spend over 50% of their capital investment on IT by C. Koch (2002). However, research has suggested that the contribution of IT governance varies in its effectiveness. IT control frameworks are designed to promote effective IT governance. Recent pressures, including the failure of organizations such as Enron, have led to an increased focus on corporate accountability. For example, the Sarbanes-Oxley Act of 2002 introduced legislation that imposed new governance requirements by G. Coppin (2003). These and other changes have resulted in a new corporate governance model with an increased emphasis on IT governance, which goes beyond the traditional focus of corporate governance on financial aspects by R. Roussey (2003).", "title": "" }, { "docid": "f60048d9803f2d3ae0178a14d7b03536", "text": "Forking is the creation of a new software repository by copying another repository. Though forking is controversial in traditional open source software (OSS) community, it is encouraged and is a built-in feature in GitHub. Developers freely fork repositories, use codes as their own and make changes. A deep understanding of repository forking can provide important insights for OSS community and GitHub. In this paper, we explore why and how developers fork what from whom in GitHub. We collect a dataset containing 236,344 developers and 1,841,324 forks. We make surveys, and analyze programming languages and owners of forked repositories. Our main observations are: (1) Developers fork repositories to submit pull requests, fix bugs, add new features and keep copies etc. Developers find repositories to fork from various sources: search engines, external sites (e.g., Twitter, Reddit), social relationships, etc. More than 42 % of developers that we have surveyed agree that an automated recommendation tool is useful to help them pick repositories to fork, while more than 44.4 % of developers do not value a recommendation tool. Developers care about repository owners when they fork repositories. (2) A repository written in a developer’s preferred programming language is more likely to be forked. (3) Developers mostly fork repositories from creators. In comparison with unattractive repository owners, attractive repository owners have higher percentage of organizations, more followers and earlier registration in GitHub. Our results show that forking is mainly used for making contributions of original repositories, and it is beneficial for OSS community. Moreover, our results show the value of recommendation and provide important insights for GitHub to recommend repositories.", "title": "" }, { "docid": "0acf9ef6e025805a76279d1c6c6c55e7", "text": "Android mobile devices are enjoying a lion's market share in smartphones and mobile devices. This also attracts malware writers to target the Android platform. Recently, we have discovered a new Android malware distribution channel: releasing malicious firmwares with pre-installed malware to the wild. This poses significant risk since users of mobile devices cannot change the content of the malicious firmwares. Furthermore, pre-installed applications have \" more permissions\" (i.e., silent installation) than other legitimate mobile apps, so they can download more malware or access users' confidential information. To understand and address this new form of malware distribution channel, we design and implement \"DroidRay\": a security evaluation system for customized Android firmwares. DroidRay uses both static and dynamic analyses to evaluate the firmware security on both the application and system levels. To understand the impact of this new malware distribution channel, we analyze 250 Android firmwares and 24,009 pre-installed applications. We reveal how the malicious firmware and pre-installed malware are injected, and discovered 1,947 (8.1%) pre-installed applications have signature vulnerability and 19 (7.6%) firmwares contain pre-installed malware. In addition, 142 (56.8%) firmwares have the default signature vulnerability, five (2.0%) firmwares contain malicious hosts file, at most 40 (16.0%) firmwares have the native level privilege escalation vulnerability and at least 249 (99.6%) firmwares have the Java level privilege escalation vulnerability. Lastly, we investigate a real-world case of a pre-installed zero-day malware known as CEPlugnew, which involves 348,018 infected Android smartphones, and we show its degree and geographical penetration. This shows the significance of this new malware distribution channel, and DroidRay is an effective tool to combat this new form of malware spreading.", "title": "" }, { "docid": "9868b4d1c4ab5eb92b9d8fbe2f1715a1", "text": "The work presented in this paper focuses on the design of a novel flexure-based mechanism capable of delivering planar motion with three degrees of freedom (3-DOF). Pseudo rigid body modeling (PRBM) and kinematic analysis of the mechanism are used to predict the motion of the mechanism in the X-, Y- and θ-directions. Lever based amplification is used to enhance the displacement of the mechanism. The presented design is small and compact in size (about 142mm by 110mm). The presented 3-DOF flexure-based miniature micro/nano mechanism delivers smooth motion in X, Y and θ, with maximum displacements of 142.09 μm in X-direction, 120.36 μm in Y-direction and 6.026 mrad in θ-rotation.", "title": "" }, { "docid": "33cf6c26de09c7772a529905d9fa6b5c", "text": "Phase Change Memory (PCM) is a promising technology for building future main memory systems. A prominent characteristic of PCM is that it has write latency much higher than read latency. Servicing such slow writes causes significant contention for read requests. For our baseline PCM system, the slow writes increase the effective read latency by almost 2X, causing significant performance degradation.\n This paper alleviates the problem of slow writes by exploiting the fundamental property of PCM devices that writes are slow only in one direction (SET operation) and are almost as fast as reads in the other direction (RESET operation). Therefore, a write operation to a line in which all memory cells have been SET prior to the write, will incur much lower latency. We propose PreSET, an architectural technique that leverages this property to pro-actively SET all the bits in a given memory line well in advance of the anticipated write to that memory line. Our proposed design initiates a PreSET request for a memory line as soon as that line becomes dirty in the cache, thereby allowing a large window of time for the PreSET operation to complete. Our evaluations show that PreSET is more effective and incurs lower storage overhead than previously proposed write cancellation techniques. We also describe static and dynamic throttling schemes to limit the rate of PreSET operations. Our proposal reduces effective read latency from 982 cycles to 594 cycles and increases system performance by 34%, while improving the energy-delay-product by 25%.", "title": "" } ]
scidocsrr
d854ef98196d90f2aef56af49982a74c
A flexible approach for extracting metadata from bibliographic citations
[ { "docid": "bdbbe079493bbfec7fb3cb577c926997", "text": "A large amount of information on the Web is contained in regularly structured objects, which we call data records. Such data records are important because they often present the essential information of their host pages, e.g., lists of products or services. It is useful to mine such data records in order to extract information from them to provide value-added services. Existing automatic techniques are not satisfactory because of their poor accuracies. In this paper, we propose a more effective technique to perform the task. The technique is based on two observations about data records on the Web and a string matching algorithm. The proposed technique is able to mine both contiguous and non-contiguous data records. Our experimental results show that the proposed technique outperforms existing techniques substantially.", "title": "" } ]
[ { "docid": "cafa33bb8996d393063e2744f12045b1", "text": "Latent Semantic Analysis is used as a technique for measuring the coherence of texts. By comparing the vectors for two adjoining segments of text in a highdimensional semantic space, the method provides a characterization of the degree of semantic relatedness between the segments. We illustrate the approach for predicting coherence through re-analyzing sets of texts from two studies that manipulated the coherence of texts and assessed readers' comprehension. The results indicate that the method is able to predict the effect of text coherence on comprehension and is more effective than simple term-term overlap measures. In this manner, LSA can be applied as an automated method that produces coherence predictions similar to propositional modeling. We describe additional studies investigating the application of LSA to analyzing discourse structure and examine the potential of LSA as a psychological model of coherence effects in text comprehension. Measuring Coherence 3 The Measurement of Textual Coherence with Latent Semantic Analysis. In order to comprehend a text, a reader must create a well connected representation of the information in it. This connected representation is based on linking related pieces of textual information that occur throughout the text. The linking of information is a process of determining and maintaining coherence. Because coherence is a central issue to text comprehension, a large number of studies have investigated the process readers use to maintain coherence and to model the readers' representation of the textual information as well as of their previous knowledge (e.g., Lorch & O'Brien, 1995) There are many aspects of a discourse that contribute to coherence, including, coreference, causal relationships, connectives, and signals. For example, Kintsch and van Dijk (Kintsch, 1988; Kintsch & van Dijk, 1978) have emphasized the effect of coreference in coherence through propositional modeling of texts. While coreference captures one aspect of coherence, it is highly correlated with other coherence factors such as causal relationships found in the text (Fletcher, Chrysler, van den Broek, Deaton, & Bloom, 1995; Trabasso, Secco & van den Broek, 1984). Although a propositional model of a text can predict readers' comprehension, a problem with the approach is that in-depth propositional analysis is time consuming and requires a considerable amount of training. Semi-automatic methods of propositional coding (e.g., Turner, 1987) still require a large amount of effort. This degree of effort limits the size of the text that can be analyzed. Thus, most texts analyzed and used in reading comprehension experiments have been small, typically from 50 to 500 words, and almost all are under 1000 words. Automated methods such as readability measures (e.g., Flesch, 1948; Klare, 1963) provide another characterization of the text, however, they do not correlate well with comprehension measures (Britton & Gulgoz, 1991; Kintsch & Vipond, 1979). Thus, while the coherence of a text can be measured, it can often involve considerable effort. In this study, we use Latent Semantic Analysis (LSA) to determine the coherence of texts. A more complete description of the method and approach to using LSA may be found in Deerwester, Dumais, Furnas, Landauer and Harshman, (1990), Landauer and Dumais, (1997), as well as in the preceding article by Landauer, Foltz and Laham (this issue). LSA provides a fully automatic method for comparing units of textual information to each other in order to determine their semantic relatedness. These units of text are compared to each other using a derived measure of their similarity of meaning. This measure is based on a Measuring Coherence 4 powerful mathematical analysis of direct and indirect relations among words and passages in a large training corpus. Semantic relatedness so measured, should correspond to a measure of coherence since it captures the extent to which two text units are discussing semantically related information. Unlike methods which rely on counting literal word overlap between units of text, LSA's comparisons are based on a derived semantic relatedness measure which reflects semantic similarity among synonyms, antonyms, hyponyms, compounds, and other words that tend to be used in similar contexts. In this way, it can reflect coherence due to automatic inferences made by readers as well as to literal surface coreference. In addition, since LSA is automatic, there are no constraints on the size of the text analyzed. This permits analyses of much larger texts to examine aspects of their discourse structure. In order for LSA to be considered an appropriate approach for modeling text coherence, we first establish how well LSA captures elements of coherence that are similar to modeling methods such as propositional models. A re-analysis of two studies that examined the role of coherence in readers' comprehension is described. This re-analysis of the texts produces automatic predictions of the coherence of texts which are then compared to measures of the readers' comprehension. We next describe the application of the method to investigating other features of the discourse structure of texts. Finally, we illustrate how the approach applies both as a tool for text researchers and as a theoretical model of text coherence. General approach for using LSA to measure coherence The primary method for using LSA to make coherence predictions is to compare some unit of text to an adjoining unit of text in order to determine the degree to which the two are semantically related. These units could be sentences, paragraphs or even individual words or whole books. This analysis can then be performed for all pairs of adjoining text units in order to characterize the overall coherence of the text. Coherence predictions have typically been performed at a propositional level, in which a set of propositions all contained within working memory are compared or connected to each other (e.g., Kintsch, 1988, In press). For LSA coherence analyses, using sentences as the basic unit of text appears to be an appropriate corresponding level that can be easily parsed by automated methods. Sentences serve as a good level in that they represent a small set of textual information (e.g., typically 3-7 propositions) and thus would be approximately consistent with the amount of information that is held in short term memory. Measuring Coherence 5 As discussed in the preceding article by Landauer, et al. (this issue), the power of computing semantic relatedness with LSA comes from analyzing a large number of text examples. Thus, for computing the coherence of a target text, it may first be necessary to have another set of texts that contain a large proportion of the terms used in the target text and that have occurrences in many contexts. One approach is to use a large number of encyclopedia articles on similar topics as the target text. A singular value decomposition (SVD) is then performed on the term by article matrix, thereby generating a high dimensional semantic space which contains most of the terms used in the target text. Individual terms, as well as larger text units such as sentences, can be represented as vectors in this space. Each text unit is represented as the weighted average of vectors of the terms it contains. Typically the weighting is by the log entropy transform of each term (see Landauer, et al., this issue). This weighting helps account for both the term's importance in the particular unit as well as the degree to which the term carries information in the domain of discourse in general. The semantic relatedness of two text units can then be compared by determining the cosine between the vectors for the two units. Thus, to find the coherence between the first and second sentence of a text, the cosine between the vectors for the two sentences would be determined. For instance, two sentences that use exactly the same terms with the same frequencies will have a cosine of 1, while two sentences that use no terms that are semantically related, will tend to have cosines near 0 or below. At intermediate levels, sentences containing terms of related meaning, even if none are the same terms or roots will have more moderate cosines. (It is even possible, although in practice very rare, that two sentences with no words of obvious similarity will have similar overall meanings as indicated by similar LSA vectors in the high dimensional semantic space.) Coherence and text comprehension This paper illustrates a complementary approach to propositional modeling for determining coherence, using LSA, and comparing the predicted coherence to measures of the readers' comprehension. For these analyses, the texts and comprehension measures are taken from two previous studies by Britton and Gulgoz (1988), and, McNamara, et al. (1996). In the first study, the text coherence was manipulated primarily by varying the amount of sentence to sentence repetition of particular important content words through analyzing propositional overlap. Simulating its results with LSA demonstrates the degree to which coherence is carried, or at least reflected, in the Measuring Coherence 6 continuity of lexical semantics, and shows that LSA correctly captures these effects. However, for these texts, a simpler literal word overlap measure, absent any explicit propositional or LSA analysis, also predicts comprehension very well. The second set of texts, those from McNamara et al. (1996), manipulates coherence in much subtler ways; often by substituting words and phrases of related meaning but containing different lexical items to provide the conceptual bridges between one sentence and the next. These materials provide a much more rigorous and interesting test of the LSA technique by requiring it to detect underlying meaning similarities in the absence of literal word repetition. The success of this simulation, and its superiority to d", "title": "" }, { "docid": "f34e256296571f9ec1ae25671a7974f0", "text": "In this paper, we propose a balanced multi-label propagation algorithm (BMLPA) for overlapping community detection in social networks. As well as its fast speed, another important advantage of our method is good stability, which other multi-label propagation algorithms, such as COPRA, lack. In BMLPA, we propose a new update strategy, which requires that community identifiers of one vertex should have balanced belonging coefficients. The advantage of this strategy is that it allows vertices to belong to any number of communities without a global limit on the largest number of community memberships, which is needed for COPRA. Also, we propose a fast method to generate “rough cores”, which can be used to initialize labels for multi-label propagation algorithms, and are able to improve the quality and stability of results. Experimental results on synthetic and real social networks show that BMLPA is very efficient and effective for uncovering overlapping communities.", "title": "" }, { "docid": "afddd19cb7c08820cf6f190d07bed8eb", "text": "This paper presents a method for stand-still identification of parameters in a permanent magnet synchronous motor (PMSM) fed from an inverter equipped with an three-phase LCtype output filter. Using a special random modulation strategy, the method uses the inverter for broad-band excitation of the PMSM fed through an LC-filter. Based on the measured current response, model parameters for both the filter (L, R, C) and the PMSM (L and R) are estimated: First, the frequency response of the system is estimated using Welch Modified Periodogram method and then an optimization algorithm is used to find the parameters in an analytical reference model that minimize the model error. To demonstrate the practical feasibility of the method, a fully functional drive including an embedded real-time controller has been built. In addition to modulation, data acquisition and control the whole parameter identification method is also implemented on the real-time controller. Based on laboratory experiments on a 22 kW drive, it it concluded that the embedded identification method can estimate the five parameters in less than ten seconds.", "title": "" }, { "docid": "3f015f42359b6fe38302bc13e923d27d", "text": "Recently, a rapid growth in the population in urban regions demands the provision of services and infrastructure. These needs can be come up wit the use of Internet of Things (IoT) devices, such as sensors, actuators, smartphones and smart systems. This leans to building Smart City towards the next generation Super City planning. However, as thousands of IoT devices are interconnecting and communicating with each other over the Internet to establish smart systems, a huge amount of data, termed as Big Data, is being generated. It is a challenging task to integrate IoT services and to process Big Data in an efficient way when aimed at decision making for future Super City. Therefore, to meet such requirements, this paper presents an IoT-based system for next generation Super City planning using Big Data Analytics. Authors have proposed a complete system that includes various types of IoT-based smart systems like smart home, vehicular networking, weather and water system, smart parking, and surveillance objects, etc., for dada generation. An architecture is proposed that includes four tiers/layers i.e., 1) Bottom Tier-1, 2) Intermediate Tier-1, 3) Intermediate Tier 2, and 4) Top Tier that handle data generation and collections, communication, data administration and processing, and data interpretation, respectively. The system implementation model is presented from the generation and collection of data to the decision making. The proposed system is implemented using Hadoop ecosystem with MapReduce programming. The throughput and processing time results show that the proposed Super City planning system is more efficient and scalable. KeyWoRDS Big Data, Hadoop, IoT, Smart City, Super City", "title": "" }, { "docid": "a89e43a3371f1a4bd9cc7d2d71a363b9", "text": "Waste management is one of the primary problem that the world faces irrespective of the case of developed or developing country. The key issue in the waste management is that the garbage bin at public places gets overflowed well in advance before the commencement of the next cleaning process. It in turn leads to various hazards such as bad odor & ugliness to that place which may be the root cause for spread of various diseases. To avoid all such hazardous scenario and maintain public cleanliness and health this work is mounted on a smart garbage system. The main theme of the work is to develop a smart intelligent garbage alert system for a proper garbage management. This paper proposes a smart alert system for garbage clearance by giving an alert signal to the municipal web server for instant cleaning of dustbin with proper verification based on level of garbage filling. This process is aided by the ultrasonic sensor which is interfaced with Arduino UNO to check the level of garbage filled in the dustbin and sends the alert to the municipal web server once if garbage is filled. After cleaning the dustbin, the driver confirms the task of emptying the garbage with the aid of RFID Tag. RFID is a computing technology that is used for verification process and in addition, it also enhances the smart garbage alert system by providing automatic identification of garbage filled in the dustbin and sends the status of clean-up to the server affirming that the work is done. The whole process is upheld by an embedded module integrated with RF ID and IOT Facilitation. The real time status of how waste collection is being done could be monitored and followed up by the municipality authority with the aid of this system. In addition to this the necessary remedial / alternate measures could be adapted. An Android application is developed and linked to a web server to intimate the alerts from the microcontroller to the urban office and to perform the remote monitoring of the cleaning process, done by the workers, thereby reducing the manual process of monitoring and verification. The notifications are sent to the Android application using Wi-Fi module.", "title": "" }, { "docid": "323113ab2bed4b8012f3a6df5aae63be", "text": "Clustering data generally involves some input parameters or heuristics that are usually unknown at the time they are needed. We discuss the general problem of parameters in clustering and present a new approach, TURN, based on boundary detection and apply it to the clustering of web log data. We also present the use of di erent lters on the web log data to focus the clustering results and discuss di erent coeÆcients for de ning similarity in a non-Euclidean space.", "title": "" }, { "docid": "7f14c41cc6ca21e90517961cf12c3c9a", "text": "Probiotic microorganisms have been documented over the past two decades to play a role in cholesterol-lowering properties via various clinical trials. Several mechanisms have also been proposed and the ability of these microorganisms to deconjugate bile via production of bile salt hydrolase (BSH) has been widely associated with their cholesterol lowering potentials in prevention of hypercholesterolemia. Deconjugated bile salts are more hydrophobic than their conjugated counterparts, thus are less reabsorbed through the intestines resulting in higher excretion into the feces. Replacement of new bile salts from cholesterol as a precursor subsequently leads to decreased serum cholesterol levels. However, some controversies have risen attributed to the activities of deconjugated bile acids that repress the synthesis of bile acids from cholesterol. Deconjugated bile acids have higher binding affinity towards some orphan nuclear receptors namely the farsenoid X receptor (FXR), leading to a suppressed transcription of the enzyme cholesterol 7-alpha hydroxylase (7AH), which is responsible in bile acid synthesis from cholesterol. This notion was further corroborated by our current docking data, which indicated that deconjugated bile acids have higher propensities to bind with the FXR receptor as compared to conjugated bile acids. Bile acids-activated FXR also induces transcription of the IBABP gene, leading to enhanced recycling of bile acids from the intestine back to the liver, which subsequently reduces the need for new bile formation from cholesterol. Possible detrimental effects due to increased deconjugation of bile salts such as malabsorption of lipids, colon carcinogenesis, gallstones formation and altered gut microbial populations, which contribute to other varying gut diseases, were also included in this review. Our current findings and review substantiate the need to look beyond BSH deconjugation as a single factor/mechanism in strain selection for hypercholesterolemia, and/or as a sole mean to justify a cholesterol-lowering property of probiotic strains.", "title": "" }, { "docid": "4f0b28ded91c48913a13bde141a3637f", "text": "This paper presents our work in mapping the design space of techniques for temporal graph visualisation. We identify two independent dimensions upon which the techniques can be classified: graph structural encoding and temporal encoding. Based on these dimensions, we create a matrix into which we organise existing techniques. We identify gaps in this design space which may prove interesting opportunities for the development of novel techniques. We also consider additional dimensions upon which further useful classification could be made. In organising the disparate existing approaches from a wide range of domains, our classification will assist those new to the research area, and designers and evaluators developing systems for temporal graph data by raising awareness of the range of possible approaches available, and highlighting possible directions for further research.", "title": "" }, { "docid": "de6e139d0b5dc295769b5ddb9abcc4c6", "text": "1 Abd El-Moniem M. Bayoumi is a graduate TA at the Department of Computer Engineering, Cairo University. He received his BS degree in from Cairo University in 2009. He is currently an RA, working for a research project on developing an innovative revenue management system for the hotel business. He was awarded the IEEE CIS Egypt Chapter’s special award for his graduation project in 2009. Bayoumi is interested to research in machine learning and business analytics; and he is currently working on his MS on stock market prediction.", "title": "" }, { "docid": "4bf3d64ed814ee9b20c66924901183c9", "text": "In this paper, we introduce GTID, a technique that can actively and passively fingerprint wireless devices and their types using wire-side observations in a local network. GTID exploits information that is leaked as a result of heterogeneity in devices, which is a function of different device hardware compositions and variations in devices' clock skew. We apply statistical techniques on network traffic to create unique, reproducible device and device type signatures, and use artificial neural networks (ANNs) for classification. We demonstrate the efficacy of our technique on both an isolated testbed and a live campus network (during peak hours) using a corpus of 37 devices representing a wide range of device classes (e.g., iPads, iPhones, Google Phones, etc.) and traffic types (e.g., Skype, SCP, ICMP, etc.). Our experiments provided more than 300 GB of traffic captures which we used for ANN training and performance evaluation. In order for any fingerprinting technique to be practical, it must be able to detect previously unseen devices (i.e., devices for which no stored signature is available) and must be able to withstand various attacks. GTID is a fingerprinting technique to detect previously unseen devices and to illustrate its resilience under various attacker models. We measure the performance of GTID by considering accuracy, recall, and processing time and also illustrate how it can be used to complement existing security mechanisms (e.g., authentication systems) and to detect counterfeit devices.", "title": "" }, { "docid": "c68729167831b81a2d694664a4cfa90b", "text": "Micro aerial vehicles (MAV) pose a challenge in designing sensory systems and algorithms due to their size and weight constraints and limited computing power. We present an efficient 3D multi-resolution map that we use to aggregate measurements from a lightweight continuously rotating laser scanner. We estimate the robot's motion by means of visual odometry and scan registration, aligning consecutive 3D scans with an incrementally built map. By using local multi-resolution, we gain computational efficiency by having a high resolution in the near vicinity of the robot and a lower resolution with increasing distance from the robot, which correlates with the sensor's characteristics in relative distance accuracy and measurement density. Compared to uniform grids, local multi-resolution leads to the use of fewer grid cells without loosing information and consequently results in lower computational costs. We efficiently and accurately register new 3D scans with the map in order to estimate the motion of the MAV and update the map in-flight. In experiments, we demonstrate superior accuracy and efficiency of our registration approach compared to state-of-the-art methods such as GICP. Our approach builds an accurate 3D obstacle map and estimates the vehicle's trajectory in real-time.", "title": "" }, { "docid": "b56a6ce08cf00fefa1a1b303ebf21de9", "text": "Freesound is an online collaborative sound database where people with diverse interests share recorded sound samples under Creative Commons licenses. It was started in 2005 and it is being maintained to support diverse research projects and as a service to the overall research and artistic community. In this demo we want to introduce Freesound to the multimedia community and show its potential as a research resource. We begin by describing some general aspects of Freesound, its architecture and functionalities, and then explain potential usages that this framework has for research applications.", "title": "" }, { "docid": "f89b282f58ac28975285a24194c209f2", "text": "Creating pixel art is a laborious process that requires artists to place individual pixels by hand. Although many image editors provide vector-to-raster conversions, the results produced do not meet the standards of pixel art: artifacts such as jaggies or broken lines frequently occur. We describe a novel Pixelation algorithm that rasterizes vector line art while adhering to established conventions used by pixel artists. We compare our results through a user study to those generated by Adobe Illustrator and Photoshop, as well as hand-drawn samples by both amateur and professional pixel artists.", "title": "" }, { "docid": "819de9493806b5baed90d68ebb71bb90", "text": "ING AND INDEXING SERVICES OR SPECIALIST BIBLIOGRAPHIC DATABASES Major subject A&Is – e.g. Scopus, PubMed, Web of Science, focus on structured access to the highest quality information within a discipline. They typically cover all the key literature but not necessarily all the literature in a discipline. Their utility flows from the perceived certainty and reassurance that they offer to users in providing the authoritative source of search results within a discipline. However, they cannot boast universal coverage of the literature – they provide good coverage of a defined subject niche, but reduce the serendipitous discovery of peripheral material. Also, many A&Is are sold at a premium, which in itself is a barrier to their use. Examples from a wide range of subjects were given in the survey questions to help surveyees understand this classification.", "title": "" }, { "docid": "2ce90f045706cf98f3a0d624828b99b8", "text": "A promising class of generative models maps points from a simple distribution to a complex distribution through an invertible neural network. Likelihood-based training of these models requires restricting their architectures to allow cheap computation of Jacobian determinants. Alternatively, the Jacobian trace can be used if the transformation is specified by an ordinary differential equation. In this paper, we use Hutchinson’s trace estimator to give a scalable unbiased estimate of the log-density. The result is a continuous-time invertible generative model with unbiased density estimation and one-pass sampling, while allowing unrestricted neural network architectures. We demonstrate our approach on high-dimensional density estimation, image generation, and variational inference, achieving the state-of-the-art among exact likelihood methods with efficient sampling.", "title": "" }, { "docid": "b3c81ac4411c2461dcec7be210ce809c", "text": "The rapid proliferation of the Internet and the cost-effective growth of its key enabling technologies are revolutionizing information technology and creating unprecedented opportunities for developing largescale distributed applications. At the same time, there is a growing concern over the security of Web-based applications, which are rapidly being deployed over the Internet [4]. For example, e-commerce—the leading Web-based application—is projected to have a market exceeding $1 trillion over the next several years. However, this application has already become a security nightmare for both customers and business enterprises as indicated by the recent episodes involving unauthorized access to credit card information. Other leading Web-based applications with considerable information security and privacy issues include telemedicine-based health-care services and online services or businesses involving both public and private sectors. Many of these applications are supported by workflow management systems (WFMSs) [1]. A large number of public and private enterprises are in the forefront of adopting Internetbased WFMSs and finding ways to improve their services and decision-making processes, hence we are faced with the daunting challenge of ensuring the security and privacy of information in such Web-based applications [4]. Typically, a Web-based application can be represented as a three-tier architecture, depicted in the figure, which includes a Web client, network servers, and a back-end information system supported by a suite of databases. For transaction-oriented applications, such as e-commerce, middleware is usually provided between the network servers and back-end systems to ensure proper interoperability. Considerable security challenges and vulnerabilities exist within each component of this architecture. Existing public-key infrastructures (PKIs) provide encryption mechanisms for ensuring information confidentiality, as well as digital signature techniques for authentication, data integrity and non-repudiation [11]. As no access authorization services are provided in this approach, it has a rather limited scope for Web-based applications. The strong need for information security on the Internet is attributable to several factors, including the massive interconnection of heterogeneous and distributed systems, the availability of high volumes of sensitive information at the end systems maintained by corporations and government agencies, easy distribution of automated malicious software by malfeasors, the ease with which computer crimes can be committed anonymously from across geographic boundaries, and the lack of forensic evidence in computer crimes, which makes the detection and prosecution of criminals extremely difficult. Two classes of services are crucial for a secure Internet infrastructure. These include access control services and communication security services. Access James B.D. Joshi,", "title": "" }, { "docid": "67733befe230741c69665218dd256dc0", "text": "Model reduction of the Markov process is a basic problem in modeling statetransition systems. Motivated by the state aggregation approach rooted in control theory, we study the statistical state compression of a finite-state Markov chain from empirical trajectories. Through the lens of spectral decomposition, we study the rank and features of Markov processes, as well as properties like representability, aggregatability and lumpability. We develop a class of spectral state compression methods for three tasks: (1) estimate the transition matrix of a low-rank Markov model, (2) estimate the leading subspace spanned by Markov features, and (3) recover latent structures of the state space like state aggregation and lumpable partition. The proposed methods provide an unsupervised learning framework for identifying Markov features and clustering states. We provide upper bounds for the estimation errors and nearly matching minimax lower bounds. Numerical studies are performed on synthetic data and a dataset of New York City taxi trips. ∗Anru Zhang is with the Department of Statistics, University of Wisconsin-Madison, Madison, WI 53706, E-mail: anruzhang@stat.wisc.edu; Mengdi Wang is with the Department of Operations Research and Financial Engineering, Princeton University, Princeton, NJ 08544, E-mail: mengdiw@princeton.edu. †", "title": "" }, { "docid": "02bc5f32c3a0abdd88d035836de479c9", "text": "Deep learning has shown to be effective for robust and real-time monocular image relocalisation. In particular, PoseNet [22] is a deep convolutional neural network which learns to regress the 6-DOF camera pose from a single image. It learns to localize using high level features and is robust to difficult lighting, motion blur and unknown camera intrinsics, where point based SIFT registration fails. However, it was trained using a naive loss function, with hyper-parameters which require expensive tuning. In this paper, we give the problem a more fundamental theoretical treatment. We explore a number of novel loss functions for learning camera pose which are based on geometry and scene reprojection error. Additionally we show how to automatically learn an optimal weighting to simultaneously regress position and orientation. By leveraging geometry, we demonstrate that our technique significantly improves PoseNets performance across datasets ranging from indoor rooms to a small city.", "title": "" }, { "docid": "27ba6cfdebdedc58ab44b75a15bbca05", "text": "OBJECTIVES\nTo assess the influence of material/technique selection (direct vs. CAD/CAM inlays) for large MOD composite adhesive restorations and its effect on the crack propensity and in vitro accelerated fatigue resistance.\n\n\nMETHODS\nA standardized MOD slot-type tooth preparation was applied to 32 extracted maxillary molars (5mm depth and 5mm bucco-palatal width) including immediately sealed dentin for the inlay group. Fifteen teeth were restored with direct composite resin restoration (Miris2) and 17 teeth received milled inlays using Paradigm MZ100 block in the CEREC machine. All inlays were adhesively luted with a light curing composite resin (Filtek Z100). Enamel shrinkage-induced cracks were tracked with photography and transillumination. Cyclic isometric chewing (5 Hz) was simulated, starting with a load of 200 N (5000 cycles), followed by stages of 400, 600, 800, 1000, 1200 and 1400 N at a maximum of 30,000 cycles each. Samples were loaded until fracture or to a maximum of 185,000 cycles.\n\n\nRESULTS\nTeeth restored with the direct technique fractured at an average load of 1213 N and two of them withstood all loading cycles (survival=13%); with inlays, the survival rate was 100%. Most failures with Miris2 occurred above the CEJ and were re-restorable (67%), but generated more shrinkage-induced cracks (47% of the specimen vs. 7% for inlays).\n\n\nSIGNIFICANCE\nCAD/CAM MZ100 inlays increased the accelerated fatigue resistance and decreased the crack propensity of large MOD restorations when compared to direct restorations. While both restorative techniques yielded excellent fatigue results at physiological masticatory loads, CAD/CAM inlays seem more indicated for high-load patients.", "title": "" } ]
scidocsrr
3d0d06dd7f672dd75ea1f28a8515c757
Fast and Accurate Annotation of Short Texts with Wikipedia Pages
[ { "docid": "0b59b6f7e24a4c647ae656a0dc8cc3ab", "text": "Wikipedia is a goldmine of information; not just for its many readers, but also for the growing community of researchers who recognize it as a resource of exceptional scale and utility. It represents a vast investment of manual effort and judgment: a huge, constantly evolving tapestry of concepts and relations that is being applied to a host of tasks. This article provides a comprehensive description of this work. It focuses on research that extracts and makes use of the concepts, relations, facts and descriptions found in Wikipedia, and organizes the work into four broad categories: applying Wikipedia to natural language processing; using it to facilitate information retrieval and information extraction; and as a resource for ontology building. The article addresses how Wikipedia is being used as is, how it is being improved and adapted, and how it is being combined with other structures to create entirely new resources. We identify the research groups and individuals involved, and how their work has developed in the last few years. We provide a comprehensive list of the open-source software they have produced. r 2009 Elsevier Ltd. All rights reserved.", "title": "" } ]
[ { "docid": "ede0e47ee50f11096ce457adea6b4600", "text": "Recent advances in hardware, software, and communication technologies are enabling the design and implementation of a whole range of different types of networks that are being deployed in various environments. One such network that has received a lot of interest in the last couple of S. Zeadally ( ) Network Systems Laboratory, Department of Computer Science and Information Technology, University of the District of Columbia, 4200, Connecticut Avenue, N.W., Washington, DC 20008, USA e-mail: szeadally@udc.edu R. Hunt Department of Computer Science and Software Engineering, College of Engineering, University of Canterbury, Private Bag 4800, Christchurch, New Zealand e-mail: ray.hunt@canterbury.ac.nz Y.-S. Chen Department of Computer Science and Information Engineering, National Taipei University, 151, University Rd., San Shia, Taipei County, Taiwan e-mail: yschen@mail.ntpu.edu.tw Y.-S. Chen e-mail: yschen@csie.ntpu.edu.tw Y.-S. Chen e-mail: yschen.iet@gmail.com A. Irwin School of Computer and Information Science, University of South Australia, Room F2-22a, Mawson Lakes, South Australia 5095, Australia e-mail: angela.irwin@unisa.edu.au A. Hassan School of Information Science, Computer and Electrical Engineering, Halmstad University, Kristian IV:s väg 3, 301 18 Halmstad, Sweden e-mail: aamhas06@student.hh.se years is the Vehicular Ad-Hoc Network (VANET). VANET has become an active area of research, standardization, and development because it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. Recent research efforts have placed a strong emphasis on novel VANET design architectures and implementations. A lot of VANET research work have focused on specific areas including routing, broadcasting, Quality of Service (QoS), and security. We survey some of the recent research results in these areas. We present a review of wireless access standards for VANETs, and describe some of the recent VANET trials and deployments in the US, Japan, and the European Union. In addition, we also briefly present some of the simulators currently available to VANET researchers for VANET simulations and we assess their benefits and limitations. Finally, we outline some of the VANET research challenges that still need to be addressed to enable the ubiquitous deployment and widespead adoption of scalable, reliable, robust, and secure VANET architectures, protocols, technologies, and services.", "title": "" }, { "docid": "9002cefa8b062c49858439d54c460472", "text": "In heterogeneous or shared clusters, distributed learning processes are slowed down by straggling workers. In this work, we propose LB-BSP, a new synchronization scheme that eliminates stragglers by adapting each worker's training load (batch size) to its processing capability. For training in shared production clusters, a prerequisite for deciding the workers' batch sizes is to know their processing speeds before each iteration starts. To this end, we adopt NARX, an extended recurrent neural network that accounts for both the historical speeds and the driving factors such as CPU and memory in prediction.", "title": "" }, { "docid": "01ccb35abf3eed71191dc8638e58f257", "text": "In this paper we describe several fault attacks on the Advanced Encryption Standard (AES). First, using optical fault induction attacks as recently publicly presented by Skorobogatov and Anderson [SA], we present an implementation independent fault attack on AES. This attack is able to determine the complete 128-bit secret key of a sealed tamper-proof smartcard by generating 128 faulty cipher texts. Second, we present several implementationdependent fault attacks on AES. These attacks rely on the observation that due to the AES's known timing analysis vulnerability (as pointed out by Koeune and Quisquater [KQ]), any implementation of the AES must ensure a data independent timing behavior for the so called AES's xtime operation. We present fault attacks on AES based on various timing analysis resistant implementations of the xtime-operation. Our strongest attack in this direction uses a very liberal fault model and requires only 256 faulty encryptions to determine a 128-bit key.", "title": "" }, { "docid": "d57072f4ffa05618ebf055824e7ae058", "text": "Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. In this study we survey a representative sample of the members of the Facebook (a social network for colleges and high schools) at a US academic institution, and compare the survey data to information retrieved from the network itself. We look for underlying demographic or behavioral differences between the communities of the network’s members and non-members; we analyze the impact of privacy concerns on members’ behavior; we compare members’ stated attitudes with actual behavior; and we document the changes in behavior subsequent to privacy-related information exposure. We find that an individual’s privacy concerns are only a weak predictor of his membership to the network. Also privacy concerned individuals join the network and reveal great amounts of personal information. Some manage their privacy concerns by trusting their ability to control the information they provide and the external access to it. However, we also find evidence of members’ misconceptions about the online community’s actual size and composition, and about the visibility of members’ profiles.", "title": "" }, { "docid": "f3a89c01dbbd40663811817ef7ba4be3", "text": "In order to address the mental health disparities that exist for Latino adolescents in the United States, psychologists must understand specific factors that contribute to the high risk of mental health problems in Latino youth. Given the significant percentage of Latino youth who are immigrants or the children of immigrants, acculturation is a key factor in understanding mental health among this population. However, limitations in the conceptualization and measurement of acculturation have led to conflicting findings in the literature. Thus, the goal of the current review is to examine and critique research linking acculturation and mental health outcomes for Latino youth, as well as to integrate individual, environmental, and family influences of this relationship. An integrated theoretical model is presented and implications for clinical practice and future directions are discussed.", "title": "" }, { "docid": "936048690fb043434c3ee0060c5bf7a5", "text": "This paper asks whether case-based reasoning is an artificial intelligence (AI) technology like rule-based reasoning, neural networks or genetic algorithms or whether it is better described as a methodology for problem solving, that may use any appropriate technology. By describing four applications of case-based reasoning (CBR), that variously use: nearest neighbour, induction, fuzzy logic and SQL, the author shows that CBR is a methodology and not a technology. The implications of this are discussed. q 1999 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "9090999f7fdaad88943f4dc4dca414d6", "text": "Collaborative reasoning for understanding each image-question pair is very critical but underexplored for an interpretable visual question answering system. Although very recent works also attempted to use explicit compositional processes to assemble multiple subtasks embedded in the questions, their models heavily rely on annotations or handcrafted rules to obtain valid reasoning processes, leading to either heavy workloads or poor performance on composition reasoning. In this paper, to better align image and language domains in diverse and unrestricted cases, we propose a novel neural network model that performs global reasoning on a dependency tree parsed from the question, and we thus phrase our model as parse-tree-guided reasoning network (PTGRN). This network consists of three collaborative modules: i) an attention module to exploit the local visual evidence for each word parsed from the question, ii) a gated residual composition module to compose the previously mined evidence, and iii) a parse-tree-guided propagation module to pass the mined evidence along the parse tree. Our PTGRN is thus capable of building an interpretable VQA system that gradually derives the image cues following a question-driven parse-tree reasoning route. Experiments on relational datasets demonstrate the superiority of our PTGRN over current state-of-the-art VQA methods, and the visualization results highlight the explainable capability of our reasoning system.", "title": "" }, { "docid": "5e95d54ef979a11ad18ec774210eb175", "text": "Recently, neural network based sentence modeling methods have achieved great progress. Among these methods, the recursive neural networks (RecNNs) can effectively model the combination of the words in sentence. However, RecNNs need a given external topological structure, like syntactic tree. In this paper, we propose a gated recursive neural network (GRNN) to model sentences, which employs a full binary tree (FBT) structure to control the combinations in recursive structure. By introducing two kinds of gates, our model can better model the complicated combinations of features. Experiments on three text classification datasets show the effectiveness of our model.", "title": "" }, { "docid": "f388ad2a0ee9bcd5126b1cea7f527541", "text": "Our team provided a security analysis of the edX platform. At MIT, the edX platform is used by a wide variety of classes through MITx, and is starting to be used by many other organizations, making it of great interest to us. In our security analysis, we first provide an overview of the modules of edX, as well as how the different users are intended to interact with these modules. We then outline the vulnerabilities we found in the platform and how users may exploit them. We conclude with possible changes to their system to protect against the given attacks, and where we believe there may exist other vulnerabilities worth future investigation.", "title": "" }, { "docid": "e6300989e5925d38d09446b3e43092e5", "text": "Cloud computing provides resources as services in pay-as-you-go mode to customers by using virtualization technology. As virtual machine (VM) is hosted on physical server, great energy is consumed by maintaining the servers in data center. More physical servers means more energy consumption and more money cost. Therefore, the VM placement (VMP) problem is significant in cloud computing. This paper proposes an approach based on ant colony optimization (ACO) to solve the VMP problem, named as ACO-VMP, so as to effectively use the physical resources and to reduce the number of running physical servers. The number of physical servers is the same as the number of the VMs at the beginning. Then the ACO approach tries to reduce the physical server one by one. We evaluate the performance of the proposed ACO-VMP approach in solving VMP with the number of VMs being up to 600. Experimental results compared with the ones obtained by the first-fit decreasing (FFD) algorithm show that ACO-VMP can solve VMP more efficiently to reduce the number of physical servers significantly, especially when the number of VMs is large.", "title": "" }, { "docid": "c207f2c0dfc1ecee332df70ec5810459", "text": "Hierarchical organization-the recursive composition of sub-modules-is ubiquitous in biological networks, including neural, metabolic, ecological, and genetic regulatory networks, and in human-made systems, such as large organizations and the Internet. To date, most research on hierarchy in networks has been limited to quantifying this property. However, an open, important question in evolutionary biology is why hierarchical organization evolves in the first place. It has recently been shown that modularity evolves because of the presence of a cost for network connections. Here we investigate whether such connection costs also tend to cause a hierarchical organization of such modules. In computational simulations, we find that networks without a connection cost do not evolve to be hierarchical, even when the task has a hierarchical structure. However, with a connection cost, networks evolve to be both modular and hierarchical, and these networks exhibit higher overall performance and evolvability (i.e. faster adaptation to new environments). Additional analyses confirm that hierarchy independently improves adaptability after controlling for modularity. Overall, our results suggest that the same force-the cost of connections-promotes the evolution of both hierarchy and modularity, and that these properties are important drivers of network performance and adaptability. In addition to shedding light on the emergence of hierarchy across the many domains in which it appears, these findings will also accelerate future research into evolving more complex, intelligent computational brains in the fields of artificial intelligence and robotics.", "title": "" }, { "docid": "b9bf838263410114ec85c783d26d92aa", "text": "We give a denotational framework (a “meta model”) within which certain properties of models of computation can be compared. It describes concurrent processes in general terms as sets of possible behaviors. A process is determinate if, given the constraints imposed by the inputs, there are exactly one or exactly zero behaviors. Compositions of processes are processes with behaviors in the intersection of the behaviors of the component processes. The interaction between processes is through signals, which are collections of events. Each event is a value-tag pair, where the tags can come from a partially ordered or totally ordered set. Timed models are where the set of tags is totally ordered. Synchronous events share the same tag, and synchronous signals contain events with the same set of tags. Synchronous processes have only synchronous signals as behaviors. Strict causality (in timed tag systems) and continuity (in untimed tag systems) ensure determinacy under certain technical conditions. The framework is used to compare certain essential features of various models of computation, including Kahn process networks, dataflow, sequential processes, concurrent sequential processes with rendezvous, Petri nets, and discrete-event systems.", "title": "" }, { "docid": "a3b680c8c9eb00b6cc66ec24aeadaa66", "text": "With the application of Internet of Things and services to manufacturing, the fourth stage of industrialization, referred to as Industrie 4.0, is believed to be approaching. For Industrie 4.0 to come true, it is essential to implement the horizontal integration of inter-corporation value network, the end-to-end integration of engineering value chain, and the vertical integration of factory inside. In this paper, we focus on the vertical integration to implement flexible and reconfigurable smart factory. We first propose a brief framework that incorporates industrial wireless networks, cloud, and fixed or mobile terminals with smart artifacts such as machines, products, and conveyors.Then,we elaborate the operationalmechanism from the perspective of control engineering, that is, the smart artifacts form a self-organized systemwhich is assistedwith the feedback and coordination blocks that are implemented on the cloud and based on the big data analytics. In addition, we outline the main technical features and beneficial outcomes and present a detailed design scheme. We conclude that the smart factory of Industrie 4.0 is achievable by extensively applying the existing enabling technologies while actively coping with the technical challenges.", "title": "" }, { "docid": "5a8f926b76eb4ad9cb7eb6c21196097d", "text": "This paper presents a model based on Deep Learning algorithms of LSTM and GRU for facilitating an anomaly detection in Large Hadron Collider superconducting magnets. We used high resolution data available in Post Mortem database to train a set of models and chose the best possible set of their hyper-parameters. Using Deep Learning approach allowed to examine a vast body of data and extract the fragments which require further experts examination and are regarded as anomalies. The presented method does not require tedious manual threshold setting and operator attention at the stage of the system setup. Instead, the automatic approach is proposed, which achieves according to our experiments accuracy of 99 %. This is reached for the largest dataset of 302 MB and the following architecture of the network: single layer LSTM, 128 cells, 20 epochs of training, look_back=16, look_ahead=128, grid=100 and optimizer Adam. All the experiments were run on GPU Nvidia Tesla K80.", "title": "" }, { "docid": "b0c5c8e88e9988b6548acb1c8ebb5edd", "text": "We present a bottom-up aggregation approach to image segmentation. Beginning with an image, we execute a sequence of steps in which pixels are gradually merged to produce larger and larger regions. In each step, we consider pairs of adjacent regions and provide a probability measure to assess whether or not they should be included in the same segment. Our probabilistic formulation takes into account intensity and texture distributions in a local area around each region. It further incorporates priors based on the geometry of the regions. Finally, posteriors based on intensity and texture cues are combined using “ a mixture of experts” formulation. This probabilistic approach is integrated into a graph coarsening scheme, providing a complete hierarchical segmentation of the image. The algorithm complexity is linear in the number of the image pixels and it requires almost no user-tuned parameters. In addition, we provide a novel evaluation scheme for image segmentation algorithms, attempting to avoid human semantic considerations that are out of scope for segmentation algorithms. Using this novel evaluation scheme, we test our method and provide a comparison to several existing segmentation algorithms.", "title": "" }, { "docid": "21b9b7995cabde4656c73e9e278b2bf5", "text": "Topic modeling techniques have been recently applied to analyze and model source code. Such techniques exploit the textual content of source code to provide automated support for several basic software engineering activities. Despite these advances, applications of topic modeling in software engineering are frequently suboptimal. This can be attributed to the fact that current state-of-the-art topic modeling techniques tend to be data intensive. However, the textual content of source code, embedded in its identifiers, comments, and string literals, tends to be sparse in nature. This prevents classical topic modeling techniques, typically used to model natural language texts, to generate proper models when applied to source code. Furthermore, the operational complexity and multi-parameter calibration often associated with conventional topic modeling techniques raise important concerns about their feasibility as data analysis models in software engineering. Motivated by these observations, in this paper we propose a novel approach for topic modeling designed for source code. The proposed approach exploits the basic assumptions of the cluster hypothesis and information theory to discover semantically coherent topics in software systems. Ten software systems from different application domains are used to empirically calibrate and configure the proposed approach. The usefulness of generated topics is empirically validated using human judgment. Furthermore, a case study that demonstrates thet operation of the proposed approach in analyzing code evolution is reported. The results show that our approach produces stable, more interpretable, and more expressive topics than classical topic modeling techniques without the necessity for extensive parameter calibration.", "title": "" }, { "docid": "02da733cc5d5c2070e00820afc20e285", "text": "Service-oriented computing has brought special attention to service description, especially in connection with semantic technologies. The expected proliferation of publicly accessible services can benefit greatly from tool support and automation, both ofwhich are the focus of SemanticWebService (SWS) frameworks that especially address service discovery, composition and execution. As the first SWS standard, in 2007 the World Wide Web Consortium produced a lightweight bottom-up specification called SAWSDL for adding semantic annotations to WSDL service descriptions. Building on SAWSDL, this article presents WSMO-Lite, a lightweight ontology of Web service semantics that distinguishes four semantic aspects of services: function, behavior, information model, and nonfunctional properties, which together form a basis for semantic automation. With the WSMO-Lite ontology, SAWSDL descriptions enable semantic automation beyond simple input/output matchmaking that is supported by SAWSDL itself. Further, to broaden the reach of WSMO-Lite and SAWSDL tools to the increasingly common RESTful services, the article adds hRESTS and MicroWSMO, two HTML microformats that mirror WSDL and SAWSDL in the documentation of RESTful services, enabling combiningRESTful serviceswithWSDL-based ones in a single semantic framework. To demonstrate the feasibility and versatility of this approach, the article presents common algorithms for Web service discovery and composition adapted to WSMO-Lite. © 2014 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "f53d13eeccff0048fc96e532a52a2154", "text": "The physical principles underlying some current biomedical applications of magnetic nanoparticles are reviewed. Starting from well-known basic concepts, and drawing on examples from biology and biomedicine, the relevant physics of magnetic materials and their responses to applied magnetic fields are surveyed. The way these properties are controlled and used is illustrated with reference to (i) magnetic separation of labelled cells and other biological entities; (ii) therapeutic drug, gene and radionuclide delivery; (iii) radio frequency methods for the catabolism of tumours via hyperthermia; and (iv) contrast enhancement agents for magnetic resonance imaging applications. Future prospects are also discussed.", "title": "" }, { "docid": "92d04ad5a9fa32c2ad91003213b1b86d", "text": "You're being asked to quantify usability improvements with statistics. But even with a background in statistics, you are hesitant to statistically analyze the data, as you may be unsure about which statistical tests to...", "title": "" }, { "docid": "1deb1d0705685ddab6d7009da397532f", "text": "It is unclear whether disseminated tumour cells detected in bone marrow in early stages of solid cancers indicate a subclinical systemic disease component determining the patient's fate or simply represent mainly irrelevant shed cells. Moreover, characteristics differentiating high and low metastatic potential of disseminated tumour cells are not defined. We performed repeated serial bone marrow biopsies during follow–up in operated gastric cancer patients. Most patients with later tumour relapse revealed either an increase or a constantly high number of tumour cells. In contrast, in patients without recurrence, either clearance of tumour cells or negative or low cell counts were seen. Urokinase plasminogen activator (uPA)–receptor expression on disseminated tumour cells was significantly correlated with increasing tumour cell counts and clinical prognosis. These results demonstrate a systemic component in early solid cancer, indicated by early systemically disseminated tumour cells, which may predict individual disease development.", "title": "" } ]
scidocsrr
0a35fd72a697dbf1713858c1861dce7a
A Survey of Data Mining and Deep Learning in Bioinformatics
[ { "docid": "5d8f33b7f28e6a8d25d7a02c1f081af1", "text": "Background The life sciences, biomedicine and health care are increasingly turning into a data intensive science [2-4]. Particularly in bioinformatics and computational biology we face not only increased volume and a diversity of highly complex, multi-dimensional and often weaklystructured and noisy data [5-8], but also the growing need for integrative analysis and modeling [9-14]. Due to the increasing trend towards personalized and precision medicine (P4 medicine: Predictive, Preventive, Participatory, Personalized [15]), biomedical data today results from various sources in different structural dimensions, ranging from the microscopic world, and in particular from the omics world (e.g., from genomics, proteomics, metabolomics, lipidomics, transcriptomics, epigenetics, microbiomics, fluxomics, phenomics, etc.) to the macroscopic world (e.g., disease spreading data of populations in public health informatics), see Figure 1[16]. Just for rapid orientation in terms of size: the Glucose molecule has a size of 900 pm = 900× 10−12m and the Carbon atom approx. 300 pm . A hepatitis virus is relatively large with 45nm = 45× 10−9m and the X-Chromosome much bigger with 7μm = 7× 10−6m . We produce most of the “Big Data” in the omics world, we estimate many Terabytes ( 1TB = 1× 10 Byte = 1000 GByte) of genomics data in each individual, consequently, the fusion of these with Petabytes of proteomics data for personalized medicine results in Exabytes of data (1 EB = 1× 1018 Byte ). Last but not least, this “natural” data is then fused together with “produced” data, e.g., the unstructured information (text) in the patient records, wellness data, the data from physiological sensors, laboratory data etc. these data are also rapidly increasing in size and complexity. Besides the problem of heterogeneous and distributed data, we are confronted with noisy, missing and inconsistent data. This leaves a large gap between the available “dirty” data [17] and the machinery to effectively process the data for the application purposes; moreover, the procedures of data integration and information extraction may themselves introduce errors and artifacts in the data [18]. Although, one may argue that “Big Data” is a buzz word, systematic and comprehensive exploration of all these data is often seen as the fourth paradigm in the investigation of nature after empiricism, theory and computation [19], and provides a mechanism for data driven hypotheses generation, optimized experiment planning, precision medicine and evidence-based medicine. The challenge is not only to extract meaningful information from this data, but to gain knowledge, to discover previously unknown insight, look for patterns, and to make sense of the data [20], [21]. Many different approaches, including statistical and graph theoretical methods, data mining, and machine learning methods, have been applied in the past however with partly unsatisfactory success [22,23] especially in terms of performance [24]. The grand challenge is to make data useful to and useable by the end user [25]. Maybe, the key challenge is interaction, due to the fact that it is the human end user who possesses the problem solving intelligence [26], hence the ability to ask intelligent questions about the data. The problem in the life sciences is that (biomedical) data models are characterized by significant complexity [27], [28], making manual analysis by the end users difficult and often impossible [29]. At the same time, human * Correspondence: a.holzinger@tugraz.at Research Unit Human-Computer Interaction, Austrian IBM Watson Think Group, Institute for Medical Informatics, Statistics & Documentation, Medical University Graz, Austria Full list of author information is available at the end of the article Holzinger et al. BMC Bioinformatics 2014, 15(Suppl 6):I1 http://www.biomedcentral.com/1471-2105/15/S6/I1", "title": "" }, { "docid": "447bbce2f595af07c8d784d422e7f826", "text": "MOTIVATION\nRNA-seq technology has been widely adopted as an attractive alternative to microarray-based methods to study global gene expression. However, robust statistical tools to analyze these complex datasets are still lacking. By grouping genes with similar expression profiles across treatments, cluster analysis provides insight into gene functions and networks, and hence is an important technique for RNA-seq data analysis.\n\n\nRESULTS\nIn this manuscript, we derive clustering algorithms based on appropriate probability models for RNA-seq data. An expectation-maximization algorithm and another two stochastic versions of expectation-maximization algorithms are described. In addition, a strategy for initialization based on likelihood is proposed to improve the clustering algorithms. Moreover, we present a model-based hybrid-hierarchical clustering method to generate a tree structure that allows visualization of relationships among clusters as well as flexibility of choosing the number of clusters. Results from both simulation studies and analysis of a maize RNA-seq dataset show that our proposed methods provide better clustering results than alternative methods such as the K-means algorithm and hierarchical clustering methods that are not based on probability models.\n\n\nAVAILABILITY AND IMPLEMENTATION\nAn R package, MBCluster.Seq, has been developed to implement our proposed algorithms. This R package provides fast computation and is publicly available at http://www.r-project.org", "title": "" }, { "docid": "1e4ea38a187881d304ea417f98a608d1", "text": "Breast cancer represents the second leading cause of cancer deaths in women today and it is the most common type of cancer in women. This paper presents some experiments for tumour detection in digital mammography. We investigate the use of different data mining techniques, neural networks and association rule mining, for anomaly detection and classification. The results show that the two approaches performed well, obtaining a classification accuracy reaching over 70% percent for both techniques. Moreover, the experiments we conducted demonstrate the use and effectiveness of association rule mining in image categorization.", "title": "" } ]
[ { "docid": "4285d9b4b9f63f22033ce9a82eec2c76", "text": "To ease large-scale realization of agent applications there is an urgent need for frameworks, methodologies and toolkits that support the effective development of agent systems. Moreover, since one of the main tasks for which agent systems were invented is the integration between heterogeneous software, independently developed agents should be able to interact successfully. In this paper, we present JADE (Java Agent Development Environment), a software framework to build agent systems for the management of networked information resources in compliance with the FIPA specifications for inter-operable intelligent multi-agent systems. The goal of JADE is to simplify development while ensuring standard compliance through a comprehensive set of system services and agents. JADE can then be considered to be an agent middle-ware that implements an efficient agent platform and supports the development of multi-agent systems. It deals with all the aspects that are not peculiar to agent internals and that are independent of the applications, such as message transport, encoding and parsing, or agent life-cycle management. Copyright  2001 John Wiley & Sons, Ltd.", "title": "" }, { "docid": "5923cd462b5b09a3aabd0fbf5c36f00c", "text": "Exoskeleton robots are used as assistive limbs for elderly persons, rehabilitation for paralyzed persons or power augmentation purposes for healthy persons. The similarity of the exoskeleton robots and human body neuro-muscular system maximizes the device performance. Human body neuro-muscular system provides a flexible and safe movement capability with minimum energy consumption by varying the stiffness of the human joints regularly. Similar to human body, variable stiffness actuators should be used to provide a flexible and safe movement capability in exoskeletons. In the present day, different types of variable stiffness actuator designs are used, and the studies on these actuators are still continuing rapidly. As exoskeleton robots are mobile devices working with the equipment such as batteries, the motors used in the design are expected to have minimal power requirements. In this study, antagonistic, pre-tension and controllable transmission ratio type variable stiffness actuators are compared in terms of energy efficiency and power requirement at an optimal (medium) walking speed for ankle joint. In the case of variable stiffness, the results show that the controllable transmission ratio type actuator compared with the antagonistic design is more efficient in terms of energy consumption and power requirement.", "title": "" }, { "docid": "d60b1a9a23fe37813a24533104a74d70", "text": "Online display advertising is a multi-billion dollar industry where advertisers promote their products to users by having publishers display their advertisements on popular Web pages. An important problem in online advertising is how to forecast the number of user visits for a Web page during a particular period of time. Prior research addressed the problem by using traditional time-series forecasting techniques on historical data of user visits; (e.g., via a single regression model built for forecasting based on historical data for all Web pages) and did not fully explore the fact that different types of Web pages and different time stamps have different patterns of user visits. In this paper, we propose a series of probabilistic latent class models to automatically learn the underlying user visit patterns among multiple Web pages and multiple time stamps. The last (and the most effective) proposed model identifies latent groups/classes of (i) Web pages and (ii) time stamps with similar user visit patterns, and learns a specialized forecast model for each latent Web page and time stamp class. Compared with a single regression model as well as several other baselines, the proposed latent class model approach has the capability of differentiating the importance of different types of information across different classes of Web pages and time stamps, and therefore has much better modeling flexibility. An extensive set of experiments along with detailed analysis carried out on real-world data from Yahoo! demonstrates the advantage of the proposed latent class models in forecasting online user visits in online display advertising.", "title": "" }, { "docid": "72e4d7729031d63f96b686444c9b446e", "text": "In this paper we describe the fundamentals of affective gaming from a physiological point of view, covering some of the origins of the genre, how affective videogames operate and current conceptual and technological capabilities. We ground this overview of the ongoing research by taking an in-depth look at one of our own early biofeedback-based affective games. Based on our analysis of existing videogames and our own experience with affective videogames, we propose a new approach to game design based on several high-level design heuristics: assist me, challenge me and emote me (ACE), a series of gameplay \"tweaks\" made possible through affective videogames.", "title": "" }, { "docid": "258c90fe18f120a24d8132550ed85a6e", "text": "Based on the thorough analysis of the literature, Chap. 1 introduces readers with challenges of STEM-driven education in general and those challenges caused by the use of this paradigm in computer science (CS) education in particular. This analysis enables to motivate our approach we discuss throughout the book. Chapter 1 also formulates objectives, research agenda and topics this book addresses. The objectives of the book are to discuss the concepts and approaches enabling to transform the current CS education paradigm into the STEM-driven one at the school and, to some extent, at the university. We seek to implement this transformation through the integration of the STEM pedagogy, the smart content and smart devices and educational robots into the smart STEM-driven environment, using reuse-based approaches taken from software engineering and CS.", "title": "" }, { "docid": "fcc092e71c7a0b38edb23e4eb92dfb21", "text": "In this work, we focus on semantic parsing of natural language conversations. Most existing methods for semantic parsing are based on understanding the semantics of a single sentence at a time. However, understanding conversations also requires an understanding of conversational context and discourse structure across sentences. We formulate semantic parsing of conversations as a structured prediction task, incorporating structural features that model the ‘flow of discourse’ across sequences of utterances. We create a dataset for semantic parsing of conversations, consisting of 113 real-life sequences of interactions of human users with an automated email assistant. The data contains 4759 natural language statements paired with annotated logical forms. Our approach yields significant gains in performance over traditional semantic parsing.", "title": "" }, { "docid": "e464cde1434026c17b06716c6a416b7a", "text": "Three experiments supported the hypothesis that people are more willing to express attitudes that could be viewed as prejudiced when their past behavior has established their credentials as nonprejudiced persons. In Study 1, participants given the opportunity to disagree with blatantly sexist statements were later more willing to favor a man for a stereotypically male job. In Study 2, participants who first had the opportunity to select a member of a stereotyped group (a woman or an African American) for a category-neutral job were more likely to reject a member of that group for a job stereotypically suited for majority members. In Study 3, participants who had established credentials as nonprejudiced persons revealed a greater willingness to express a politically incorrect opinion even when the audience was unaware of their credentials. The general conditions under which people feel licensed to act on illicit motives are discussed.", "title": "" }, { "docid": "314e1b8bbcc0a5735d86bb751d524a93", "text": "Ubiquinone (coenzyme Q), in addition to its function as an electron and proton carrier in mitochondrial and bacterial electron transport linked to ATP synthesis, acts in its reduced form (ubiquinol) as an antioxidant, preventing the initiation and/or propagation of lipid peroxidation in biological membranes and in serum low-density lipoprotein. The antioxidant activity of ubiquinol is independent of the effect of vitamin E, which acts as a chain-breaking antioxidant inhibiting the propagation of lipid peroxidation. In addition, ubiquinol can efficiently sustain the effect of vitamin E by regenerating the vitamin from the tocopheroxyl radical, which otherwise must rely on water-soluble agents such as ascorbate (vitamin C). Ubiquinol is the only known lipid-soluble antioxidant that animal cells can synthesize de novo, and for which there exist enzymic mechanisms that can regenerate the antioxidant from its oxidized form resulting from its inhibitory effect of lipid peroxidation. These features, together with its high degree of hydrophobicity and its widespread occurrence in biological membranes and in low-density lipoprotein, suggest an important role of ubiquinol in cellular defense against oxidative damage. Degenerative diseases and aging may bc 1 manifestations of a decreased capacity to maintain adequate ubiquinol levels.", "title": "" }, { "docid": "e39494d730b0ad81bf950b68dc4a7854", "text": "G4LTL-ST automatically synthesizes control code for industrial Programmable Logic Controls (PLC) from timed behavioral specifications of inputoutput signals. These specifications are expressed in a linear temporal logic (LTL) extended with non-linear arithmetic constraints and timing constraints on signals. G4LTL-ST generates code in IEC 61131-3-compatible Structured Text, which is compiled into executable code for a large number of industrial field-level devices. The synthesis algorithm of G4LTL-ST implements pseudo-Boolean abstraction of data constraints and the compilation of timing constraints into LTL, together with a counterstrategy-guided abstraction-refinement synthesis loop. Since temporal logic specifications are notoriously difficult to use in practice, G4LTL-ST supports engineers in specifying realizable control problems by suggesting suitable restrictions on the behavior of the control environment from failed synthesis attempts.", "title": "" }, { "docid": "58bfe45d6f2e8bdb2f641290ee6f0b86", "text": "Intimate partner violence (IPV) is a common phenomenon worldwide. However, there is a relative dearth of qualitative research exploring IPV in which men are the victims of their female partners. The present study used a qualitative approach to explore how Portuguese men experience IPV. Ten male victims (aged 35–75) who had sought help from domestic violence agencies or from the police were interviewed. Transcripts were analyzed using QSR NVivo10 and coded following thematic analysis. The results enhance our understanding of both the nature and dynamics of the violence that men experience as well as the negative impact of violence on their lives. This study revealed the difficulties that men face in the process of seeking help, namely differences in treatment of men versus women victims. It also highlights that help seeking had a negative emotional impact for most of these men. Finally, this study has important implications for practitioners and underlines macro-level social recommendations for raising awareness about this phenomenon, including the need for changes in victims’ services and advocacy for gender-inclusive campaigns and responses.", "title": "" }, { "docid": "288383c6a6d382b6794448796803699f", "text": "A transresistance instrumentation amplifier (dual-input transresistance amplifier) was designed, and a prototype was fabricated and tested in a gamma-ray dosimeter. The circuit, explained in this letter, is a differential amplifier which is suitable for amplification of signals from current-source transducers. In the dosimeter application, the amplifier proved superior to a regular (single) transresistance amplifier, giving better temperature stability and better common-mode rejection.", "title": "" }, { "docid": "7476bbec4720e04223d56a71e6bab03e", "text": "We consider the performance analysis and design optimization of low-density parity check (LDPC) coded multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) systems for high data rate wireless transmission. The tools of density evolution with mixture Gaussian approximations are used to optimize irregular LDPC codes and to compute minimum operational signal-to-noise ratios (SNRs) for ergodic MIMO OFDM channels. In particular, the optimization is done for various MIMO OFDM system configurations, which include a different number of antennas, different channel models, and different demodulation schemes; the optimized performance is compared with the corresponding channel capacity. It is shown that along with the optimized irregular LDPC codes, a turbo iterative receiver that consists of a soft maximum a posteriori (MAP) demodulator and a belief-propagation LDPC decoder can perform within 1 dB from the ergodic capacity of the MIMO OFDM systems under consideration. It is also shown that compared with the optimal MAP demodulator-based receivers, the receivers employing a low-complexity linear minimum mean-square-error soft-interference-cancellation (LMMSE-SIC) demodulator have a small performance loss (< 1dB) in spatially uncorrelated MIMO channels but suffer extra performance loss in MIMO channels with spatial correlation. Finally, from the LDPC profiles that already are optimized for ergodic channels, we heuristically construct small block-size irregular LDPC codes for outage MIMO OFDM channels; as shown from simulation results, the irregular LDPC codes constructed here are helpful in expediting the convergence of the iterative receivers.", "title": "" }, { "docid": "309a20834f17bd87e10f8f1c051bf732", "text": "Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with military cipher machines and PIN processing in banking payment networks, expanding in the 1990s into embedded applications: token vending machines for prepayment electricity and mobile phone credit. Major applications such as GSM mobile phone identification and pay TV set-top boxes have pushed low-cost cryptoprocessors toward ubiquity. In the last five years, dedicated crypto chips have been embedded in devices such as game console accessories and printer ink cartridges, to control product and accessory after markets. The \"Trusted Computing\" initiative will soon embed cryptoprocessors in PCs so they can identify each other remotely. This paper surveys the range of applications of tamper-resistant hardware and the array of attack and defense mechanisms which have evolved in the tamper-resistance arms race.", "title": "" }, { "docid": "81cd2034b2096db2be699821e499dfa8", "text": "At the US National Library of Medicine we have developed the Unified Medical Language System (UMLS), whose goal it is to provide integrated access to a large number of biomedical resources by unifying the vocabularies that are used to access those resources. The UMLS currently interrelates some 60 controlled vocabularies in the biomedical domain. The UMLS coverage is quite extensive, including not only many concepts in clinical medicine, but also a large number of concepts applicable to the broad domain of the life sciences. In order to provide an overarching conceptual framework for all UMLS concepts, we developed an upper-level ontology, called the UMLS semantic network. The semantic network, through its 134 semantic types, provides a consistent categorization of all concepts represented in the UMLS. The 54 links between the semantic types provide the structure for the network and represent important relationships in the biomedical domain. Because of the growing number of information resources that contain genetic information, the UMLS coverage in this area is being expanded. We recently integrated the taxonomy of organisms developed by the NLM's National Center for Biotechnology Information, and we are currently working together with the developers of the Gene Ontology to integrate this resource, as well. As additional, standard, ontologies become publicly available, we expect to integrate these into the UMLS construct.", "title": "" }, { "docid": "8381e95910a7500cdb37505e64a9331b", "text": "Previous ensemble streamflow prediction (ESP) studies in Korea reported that modelling error significantly affects the accuracy of the ESP probabilistic winter and spring (i.e. dry season) forecasts, and thus suggested that improving the existing rainfall-runoff model, TANK, would be critical to obtaining more accurate probabilistic forecasts with ESP. This study used two types of artificial neural network (ANN), namely the single neural network (SNN) and the ensemble neural network (ENN), to provide better rainfall-runoff simulation capability than TANK, which has been used with the ESP system for forecasting monthly inflows to the Daecheong multipurpose dam in Korea. Using the bagging method, the ENN combines the outputs of member networks so that it can control the generalization error better than an SNN. This study compares the two ANN models with TANK with respect to the relative bias and the root-mean-square error. The overall results showed that the ENN performed the best among the three rainfall-runoff models. The ENN also considerably improved the probabilistic forecasting accuracy, measured in terms of average hit score, half-Brier score and hit rate, of the present ESP system that used TANK. Therefore, this study concludes that the ENN would be more effective for ESP rainfall-runoff modelling than TANK or an SNN. Copyright  2005 John Wiley & Sons, Ltd.", "title": "" }, { "docid": "584540f486e1bf112eb8abe8731de341", "text": "This article overviews the diagnosis and management of traumatic injuries to primary teeth. The child's age, ability to cooperate for treatment, and the potential for collateral damage to developing permanent teeth can complicate the management of these injuries. The etiology of these injuries is reviewed including the disturbing role of child abuse. Serious medical complications including head injury, cervical spine injury, and tetanus are discussed. Diagnostic methods and the rationale for treatment of luxation injuries, crown, and crown/root fractures are included. Treatment priorities should include adequate pain control, safe management of the child's behavior, and protection of the developing permanent teeth.", "title": "" }, { "docid": "6fc9000394cc05b2f70909dd2d0c76fb", "text": "Thesupport-vector network is a new learning machine for two-group classification problems. The machine conceptually implements the following idea: input vectors are non-linearly mapped to a very high-dimension feature space. In this feature space a linear decision surface is constructed. Special properties of the decision surface ensures high generalization ability of the learning machine. The idea behind the support-vector network was previously implemented for the restricted case where the training data can be separated without errors. We here extend this result to non-separable training data. High generalization ability of support-vector networks utilizing polynomial input transformations is demonstrated. We also compare the performance of the support-vector network to various classical learning algorithms that all took part in a benchmark study of Optical Character Recognition.", "title": "" }, { "docid": "795f59c0658a56aa68a9271d591c81a6", "text": "We present a new kind of network perimeter monitoring strategy, which focuses on recognizing the infection and coordination dialog that occurs during a successful malware infection. BotHunter is an application designed to track the two-way communication flows between internal assets and external entities, developing an evidence trail of data exchanges that match a state-based infection sequence model. BotHunter consists of a correlation engine that is driven by three malware-focused network packet sensors, each charged with detecting specific stages of the malware infection process, including inbound scanning, exploit usage, egg downloading, outbound bot coordination dialog, and outbound attack propagation. The BotHunter correlator then ties together the dialog trail of inbound intrusion alarms with those outbound communication patterns that are highly indicative of successful local host infection. When a sequence of evidence is found to match BotHunter’s infection dialog model, a consolidated report is produced to capture all the relevant events and event sources that played a role during the infection process. We refer to this analytical strategy of matching the dialog flows between internal assets and the broader Internet as dialog-based correlation, and contrast this strategy to other intrusion detection and alert correlation methods. We present our experimental results using BotHunter in both virtual and live testing environments, and discuss our Internet release of the BotHunter prototype. BotHunter is made available both for operational use and to help stimulate research in understanding the life cycle of malware infections.", "title": "" }, { "docid": "1b1953e3dd28c67e7a8648392422df88", "text": "We examined Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) General Ability Index (GAI) and Full Scale Intelligence Quotient (FSIQ) discrepancies in 100 epilepsy patients; 44% had a significant GAI > FSIQ discrepancy. GAI-FSIQ discrepancies were correlated with the number of antiepileptic drugs taken and duration of epilepsy. Individual antiepileptic drugs differentially interfere with the expression of underlying intellectual ability in this group. FSIQ may significantly underestimate levels of general intellectual ability in people with epilepsy. Inaccurate representations of FSIQ due to selective impairments in working memory and reduced processing speed obscure the contextual interpretation of performance on other neuropsychological tests, and subtle localizing and lateralizing signs may be missed as a result.", "title": "" }, { "docid": "5547f8ad138a724c2cc05ce65f50ebd2", "text": "As machine learning (ML) technology continues to spread by rapid evolution, the system or service using Machine Learning technology, called ML product, makes big impact on our life, society and economy. Meanwhile, Quality Assurance (QA) for ML product is quite more difficult than hardware, non-ML software and service because performance of ML technology is much better than non-ML technology in exchange for the characteristics of ML product, e.g. low explainability. We must keep rapid evolution and reduce quality risk of ML product simultaneously. In this paper, we show a Quality Assurance Framework for Machine Learning product. Scope of QA in this paper is limited to product evaluation. First, a policy of QA for ML Product is proposed. General principles of product evaluation is introduced and applied to ML product evaluation as a part of the policy. They are composed of A-ARAI: Allowability, Achievability, Robustness, Avoidability and Improvability. A strategy of ML Product Evaluation is constructed as another part of the policy. Quality Integrity Level for ML product is also modelled. Second, we propose a test architecture of ML product testing. It consists of test levels and fundamental test types of ML product testing, including snapshot testing, learning testing and confrontation testing. Finally, we defines QA activity levels for ML product.", "title": "" } ]
scidocsrr
89a8e6866b448aa0a6d7f4c1e83b9be3
Learning What's Easy: Fully Differentiable Neural Easy-First Taggers
[ { "docid": "20acbae6f76e3591c8b696481baffc90", "text": "A long-standing challenge in coreference resolution has been the incorporation of entity-level information – features defined over clusters of mentions instead of mention pairs. We present a neural network based coreference system that produces high-dimensional vector representations for pairs of coreference clusters. Using these representations, our system learns when combining clusters is desirable. We train the system with a learning-to-search algorithm that teaches it which local decisions (cluster merges) will lead to a high-scoring final coreference partition. The system substantially outperforms the current state-of-the-art on the English and Chinese portions of the CoNLL 2012 Shared Task dataset despite using few hand-engineered features.", "title": "" } ]
[ { "docid": "af7c62cba99c426e6108d164939b44de", "text": "The hippocampal formation can encode relative spatial location, without reference to external cues, by the integration of linear and angular self-motion (path integration). Theoretical studies, in conjunction with recent empirical discoveries, suggest that the medial entorhinal cortex (MEC) might perform some of the essential underlying computations by means of a unique, periodic synaptic matrix that could be self-organized in early development through a simple, symmetry-breaking operation. The scale at which space is represented increases systematically along the dorsoventral axis in both the hippocampus and the MEC, apparently because of systematic variation in the gain of a movement-speed signal. Convergence of spatially periodic input at multiple scales, from so-called grid cells in the entorhinal cortex, might result in non-periodic spatial firing patterns (place fields) in the hippocampus.", "title": "" }, { "docid": "e96c9bdd3f5e9710f7264cbbe02738a7", "text": "25 years ago, Lenstra, Lenstra and Lovász presented their c el brated LLL lattice reduction algorithm. Among the various applicatio ns of the LLL algorithm is a method due to Coppersmith for finding small roots of polyn mial equations. We give a survey of the applications of this root finding metho d t the problem of inverting the RSA function and the factorization problem. A s we will see, most of the results are of a dual nature, they can either be interpret ed as cryptanalytic results or as hardness/security results.", "title": "" }, { "docid": "b939227b7de6ef57c2d236fcb01b7bfc", "text": "We propose a speed estimation method with human body accelerations measured on the chest by a tri-axial accelerometer. To estimate the speed we segmented the acceleration signal into strides measuring stride time, and applied two neural networks into the patterns parameterized from each stride calculating stride length. The first neural network determines whether the subject walks or runs, and the second neural network with different node interactions according to the subject's status estimates stride length. Walking or running speed is calculated with the estimated stride length divided by the measured stride time. The neural networks were trained by patterns obtained from 15 subjects and then validated by 2 untrained subjects' patterns. The result shows good agreement between actual and estimated speeds presenting the linear correlation coefficient r = 0.9874. We also applied the method to the real field and track data.", "title": "" }, { "docid": "39e69764f45296976e5131e700496e1b", "text": "Recently, a machine learning (ML) area called deep learning emerged in the computer-vision field and became very popular in many fields. It started from an event in late 2012, when a deep-learning approach based on a convolutional neural network (CNN) won an overwhelming victory in the best-known worldwide com putervision competition, ImageNet Classification. Since then, researchers in many fields, including medical image analysis, have started actively participating in the explosively growing field of deep learning. In this paper, deep learning techniques and their applications to medical image analysis are surveyed. This survey overviewed 1) standard ML techniques in the computer-vision field, 2) what has changed in ML before and after the introduction of deep learning, 3) ML models in deep learning, and 4) applications of deep learning to medical image analysis. The comparisons between MLs before and after deep learning revealed that ML with feature input (or feature-based ML) was dominant before the introduction of deep learning, and that the major and essential difference between ML before and after deep learning is learning image data directly without object segmentation or feature extraction; thus, it is the source of the power of deep learning, although the depth of the model is an important attribute. The survey of deep learning also revealed that there is a long history of deep-learning techniques in the class of ML with image input, except a new term, “deep learning”. “Deep learning” even before the term existed, namely, the class of ML with image input was applied to various problems in medical image analysis including classification between lesions and non-lesions, classification between lesion types, segmentation of lesions or organs, and detection of lesions. ML with image input including deep learning is a very powerful, versatile technology with higher performance, which can bring the current state-of-the-art performance level of medical image analysis to the next level, and it is expected that deep learning will be the mainstream technology in medical image analysis in the next few decades. “Deep learning”, or ML with image input, in medical image analysis is an explosively growing, promising field. It is expected that ML with image input will be the mainstream area in the field of medical image analysis in the next few decades.", "title": "" }, { "docid": "2ac9b0d68c4147a6a4def86184e292c8", "text": "In this paper we explore the application of travel-speed prediction to query processing in Moving Objects Databases. We propose to revise the motion plans of moving objects using the predicted travel-speeds. This revision occurs before answering queries. We develop three methods of doing this. These methods differ in the time when the motion plans are revised, and which of them are revised. We analyze the three methods theoretically and experimentally.", "title": "" }, { "docid": "2f9efc20fb961bc42f20211a6c958832", "text": "We introduce PixelPlayer, a system that, by leveraging large amounts of unlabeled videos, learns to locate image regions which produce sounds and separate the input sounds into a set of components that represents the sound from each pixel. Our approach capitalizes on the natural synchronization of the visual and audio modalities to learn models that jointly parse sounds and images, without requiring additional manual supervision. Experimental results on a newly collected MUSIC dataset show that our proposed Mix-and-Separate framework outperforms several baselines on source separation. Qualitative results suggest our model learns to ground sounds in vision, enabling applications such as independently adjusting the volume of sound sources.", "title": "" }, { "docid": "87da90ee583f5aa1777199f67bdefc83", "text": "The rapid development of computer networks in the past decades has created many security problems related to intrusions on computer and network systems. Intrusion Detection Systems IDSs incorporate methods that help to detect and identify intrusive and non-intrusive network packets. Most of the existing intrusion detection systems rely heavily on human analysts to analyze system logs or network traffic to differentiate between intrusive and non-intrusive network traffic. With the increase in data of network traffic, involvement of human in the detection system is a non-trivial problem. IDS’s ability to perform based on human expertise brings limitations to the system’s capability to perform autonomously over exponentially increasing data in the network. However, human expertise and their ability to analyze the system can be efficiently modeled using soft-computing techniques. Intrusion detection techniques based on machine learning and softcomputing techniques enable autonomous packet detections. They have the potential to analyze the data packets, autonomously. These techniques are heavily based on statistical analysis of data. The ability of the algorithms that handle these data-sets can use patterns found in previous data to make decisions for the new evolving data-patterns in the network traffic. In this paper, we present a rigorous survey study that envisages various soft-computing and machine learning techniques used to build autonomous IDSs. A robust IDSs system lays a foundation to build an efficient Intrusion Detection and Prevention System IDPS.", "title": "" }, { "docid": "f78acf94cabc87d4b53462987f5d77c7", "text": "Activity recognition has become an important function in many emerging computer vision applications e.g. automatic video surveillance system, human-computer interaction application, and video recommendation system, etc. In this paper, we propose a novel semantics based group activity recognition scheme, namely SBGAR, which achieves higher accuracy and efficiency than existing group activity recognition methods. SBGAR consists of two stages: in stage I, we use a LSTM model to generate a caption for each video frame; in stage II, another LSTM model is trained to predict the final activity categories based on these generated captions. We evaluate SBGAR using two well-known datasets: the Collective Activity Dataset and the Volleyball Dataset. Our experimental results show that SBGAR improves the group activity recognition accuracy with shorter computation time compared to the state-of-the-art methods.", "title": "" }, { "docid": "f83228e2130f464b8c5b1837d338d7e1", "text": "This article is focused on examining the factors and relationships that influence the browsing and buying behavior of individuals when they shop online. Specifically, we are interested in individual buyers using business-to-consumer sites. We are also interested in examining shopping preferences based on various demographic categories that might exhibit distinct purchasing attitudes and behaviors for certain categories of products and services. We examine these behaviors in the context of both products and services. After a period of decline in recent months, online shopping is on the rise again. By some estimates, total U.S. spending on online sales increased to $5.7 billion in December 2001 from $3.2 billion in June of 2001 [3, 5]. By these same estimates, the number of households shopping online increased to 18.7 million in December 2001 from 13.1 million in June 2001. Consumers spent an average of $304 per person in December 2001, compared with $247 in June 2001. According to an analyst at Forrester: “The fact that online retail remained stable during ... such social and economic instability speaks volumes about how well eCommerce is positioned to stand up to a poor economy” [4]. What do consumers utilize the Internet for? Nie and Erbring suggest that 52% of the consumers use the Internet for product information, 42% for travel information, and 24% for buying [9]. Recent online consumer behavior-related research refers to any Internet-related activity associated with the consumption of goods, services, and information [6]. In the definition of Internet consumption, Goldsmith and Bridges include “gathering information passively via exposure to advertising; shopping, which includes both browsing and deliberate information search, and the selection and buying of specific goods, services, and information” [7]. For the purposes of this study, we focus on all aspects of this consumption. We include all of them because information gathering aspects of e-commerce serve to educate the consumer, which is ulti-", "title": "" }, { "docid": "2271347e3b04eb5a73466aecbac4e849", "text": "[1] Robin Jia, Percy Liang. “Adversarial examples for evaluating reading comprehension systems.” In EMNLP 2017. [2] Caiming Xiong, Victor Zhong, Richard Socher. “DCN+ Mixed objective and deep residual coattention for question answering.” In ICLR 2018. [3] Danqi Chen, Adam Fisch, Jason Weston, Antoine Bordes. “Reading wikipedia to answer open-domain questions.” In ACL 2017. Check out more of our work at https://einstein.ai/research Method", "title": "" }, { "docid": "e016c72bf2c3173d5c9f4973d03ab380", "text": "SDN controllers demand tight performance guarantees over the control plane actions performed by switches. For example, traffic engineering techniques that frequently reconfigure the network require guarantees on the speed of reconfiguring the network. Initial experiments show that poor performance of Ternary Content-Addressable Memory (TCAM) control actions (e.g., rule insertion) can inflate application performance by a factor of 2x! Yet, modern switches provide no guarantees for these important control plane actions -- inserting, modifying, or deleting rules.\n In this paper, we present the design and evaluation of Hermes, a practical and immediately deployable framework that offers a novel method for partitioning and optimizing switch TCAM to enable performance guarantees. Hermes builds on recent studies on switch performance and provides guarantees by trading-off a nominal amount of TCAM space for assured performance. We evaluated Hermes using large-scale simulations. Our evaluations show that with less than 5% overheads, Hermes provides 5ms insertion guarantees that translates into an improvement of application level metrics by up to 80%. Hermes is more than 50% better than existing state of the art techniques and provides significant improvement for traditional networks running BGP.", "title": "" }, { "docid": "a5999023893d996f0485abcf991ffbe1", "text": "In this paper, we address the issue of recovering and segmenting the apparent velocity field in sequences of images. As for motion estimation, we minimize an objective function involving two robust terms. The first one cautiously captures the optical flow constraint, while the second (a priori) term incorporates a discontinuity-preserving smoothness constraint. To cope with the nonconvex minimization problem thus defined, we design an efficient deterministic multigrid procedure. It converges fast toward estimates of good quality, while revealing the large discontinuity structures of flow fields. We then propose an extension of the model by attaching to it a flexible object-based segmentation device based on deformable closed curves (different families of curve equipped with different kinds of prior can be easily supported). Experimental results on synthetic and natural sequences are presented, including an analysis of sensitivity to parameter tuning.", "title": "" }, { "docid": "f4490447bf8a43de95d61e1626d365ae", "text": "The connective tissue of the skin is composed mostly of collagen and elastin. Collagen makes up 70-80% of the dry weight of the skin and gives the dermis its mechanical and structural integrity. Elastin is a minor component of the dermis, but it has an important function in providing the elasticity of the skin. During aging, the synthesis of collagen gradually declines, and the skin thus becomes thinner in protected skin, especially after the seventh decade. Several factors contribute to the aging of the skin. In several hereditary disorders collagen or elastin are deficient, leading to accelerated aging. In cutis laxa, for example, elastin fibers are deficient or completely lacking, leading to sagging of the skin. Solar irradiation causes skin to look prematurely aged. Especially ultraviolet radiation induces an accumulation of abnormal elastotic material. These changes are usually observed after 60 years of age, but excessive exposure to the sun may cause severe photoaging as early as the second decade of life. The different biochemical and mechanical parameters of the dermis can be studied by modern techniques. The applications of these techniques to study the aging of dermal connective tissue are described in detail.", "title": "" }, { "docid": "556e737458015bf87047bb2f458fbd40", "text": "Research in organizational learning has demonstrated processes and occasionally performance implications of acquisition of declarative (know-what) and procedural (know-how) knowledge. However, considerably less attention has been paid to learned characteristics of relationships that affect the decision to seek information from other people. Based on a review of the social network, information processing, and organizational learning literatures, along with the results of a previous qualitative study, we propose a formal model of information seeking in which the probability of seeking information from another person is a function of (1) knowing what that person knows; (2) valuing what that person knows; (3) being able to gain timely access to that person’s thinking; and (4) perceiving that seeking information from that person would not be too costly. We also hypothesize that the knowing, access, and cost variables mediate the relationship between physical proximity and information seeking. The model is tested using two separate research sites to provide replication. The results indicate strong support for the model and the mediation hypothesis (with the exception of the cost variable). Implications are drawn for the study of both transactive memory and organizational learning, as well as for management practice. (Information; Social Networks; Organizational Learning; Transactive Knowledge)", "title": "" }, { "docid": "9500e8bbbb21df9cde0b2e4b8ea72d89", "text": "The practice of crowdsourcing is transforming the Web and giving rise to a new field.", "title": "" }, { "docid": "43831e29e62c574a93b6029409690bfe", "text": "We present a convolutional network that is equivariant to rigid body motions. The model uses scalar-, vector-, and tensor fields over 3D Euclidean space to represent data, and equivariant convolutions to map between such representations. These SE(3)-equivariant convolutions utilize kernels which are parameterized as a linear combination of a complete steerable kernel basis, which is derived analytically in this paper. We prove that equivariant convolutions are the most general equivariant linear maps between fields over R. Our experimental results confirm the effectiveness of 3D Steerable CNNs for the problem of amino acid propensity prediction and protein structure classification, both of which have inherent SE(3) symmetry.", "title": "" }, { "docid": "f25266d59f3918b85217c4c54629e5de", "text": "Customized logistics service and online shoppers’ satisfaction: an empirical study Mingyao Hu Fang Huang Hanping Hou Yong Chen Larissa Bulysheva Article information: To cite this document: Mingyao Hu Fang Huang Hanping Hou Yong Chen Larissa Bulysheva , (2016),\"Customized logistics service and online shoppers’ satisfaction: an empirical study\", Internet Research, Vol. 26 Iss 2 pp. Permanent link to this document: http://dx.doi.org/10.1108/IntR-11-2014-0295", "title": "" }, { "docid": "5ce47e3509865f7ff1c0a8521c13e857", "text": "Breast cancer is the most common cancer in women and thus the early stage detection in breast cancer can provide potential advantage in the treatment of this disease. Early treatment not only helps to cure cancer but also helps in its prevention of its recurrence. Data mining algorithms can provide great assistance in prediction of earl y stage breast cancer that always has been a challenging research problem. The main objective of this research is to find how precisely can these data mining algorithms predict the probability of recurrence of the disease among the patients on the basis of important stated parameters. The research highlights the performance of different clustering and classification algorithms on the dataset. Experiments show that classification algorithms are better predictors than clustering algorithms. The result indicates that the decision tree (C5.0) and SVM is the best predictor with 81% accuracy on the holdout sample and fuzzy c-means came with the lowest accuracy of37% among the algorithms used in this paper.", "title": "" }, { "docid": "36bdd8eefd2f72d06a4cefe68127ce04", "text": "Dantzig, Fulkerson, and Johnson (1954) introduced the cutting-plane method as a means of attacking the traveling salesman problem; this method has been applied to broad classes of problems in combinatorial optimization and integer programming. In this paper we discuss an implementation of Dantzig et al.'s method that is suitable for TSP instances having 1,000,000 or more cities. Our aim is to use the study of the TSP as a step towards understanding the applicability and limits of the general cutting-plane method in large-scale applications. 1. The Cutting-Plane Method The symmetric traveling salesman problem, or TSP for short, is this: given a nite number of \\cities\" along with the cost of travel between each pair of them, nd the cheapest way of visiting all of the cities and returning to your starting point. The travel costs are symmetric in the sense that traveling from city X to city Y costs just as much as traveling from Y to X; the \\way of visiting all of the cities\" is simply the order in which the cities are visited. The prominence of the TSP in the combinatorial optimization literature is to a large extent due to its success as an engine-of-discovery for techniques that have application far beyond the narrow con nes of the TSP itself. Foremost among the TSP-inspired discoveries is Dantzig, Fulkerson, and Johnson's (1954) cutting-plane method, which can be used to attack any problem minimize cx subject to x 2 S (1) such that S is a nite subset of some R and such that an eÆcient algorithm to recognize points of S is available. This method is iterative; each of its D. Applegate: Algorithms and Optimization Department, AT&T Labs { Research, Florham Park, NJ 07932, USA R. Bixby: Computational and Applied Mathematics, Rice University, Houston, TX 77005, USA V. Chv atal: Department of Computer Science, Rutgers University, Piscataway, NJ 08854, USA W. Cook: Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA ? Supported by ONR Grant N00014-03-1-0040 2 David Applegate et al. iterations begins with a linear programming (LP) relaxation of (1), meaning a problem minimize cx subject to Ax b (2) such that the polyhedron P de ned as fx : Ax bg contains S and is bounded. Since P is bounded, we can nd an optimal solution x of (2) such that x is an extreme point of P . If x belongs to S, then it constitutes an optimal solution of (1); otherwise some linear inequality is satis ed by all the points in S and violated by x ; such an inequality is called a cutting plane or simply a cut . In the latter case, we nd a nonempty family of cuts, add them to the system Ax b, and use the resulting tighter relaxation of (1) in the next iteration of the procedure. Dantzig et al. demonstrated the power of their cutting-plane method by solving a 49-city instance of the TSP, which was an impressive size in 1954. The TSP is a special case of (1) with m = n(n 1)=2, where n is the number of the cities, and with S consisting of the set of the incidence vectors of all the Hamiltonian cycles through the set V of the n cities; in this context, Hamiltonian cycles are commonly called tours. In Dantzig et al.'s attack, the initial P consists of all vectors x, with components subscripted by edges of the complete graph on V , that satisfy 0 xe 1 for all edges e (3) and P (xe : v 2 e) = 2 for all cities v. (4) (Throughout this paper, we treat the edges of a graph as two-point subsets of its vertex-set: v 2 emeans that vertex v is an endpoint of edge e; e\\Q 6= ; means that edge e has an endpoint in set Q; e Q 6= ;means that edge e has an endpoint outside setQ; and so on.) All but two of their cuts have the form P (xe : e\\Q 6= ;; e Q 6= ;) 2 such that Q is a nonempty proper subset of V . Dantzig et al. called such inequalities \\loop constraints\"; nowadays, they are commonly referred to as subtour elimination inequalities ; we are going to call them simply subtour inequalities . (As for the two exceptional cuts, Dantzig et al. give ad hoc combinatorial arguments to show that these inequalities are satis ed by incidence vectors of all tours through the 49 cities and, in a footnote, they say \\We are indebted to I. Glicksberg of Rand for pointing out relations of this kind to us.\") The original TSP algorithm of Dantzig et al. has been extended and improved by many researchers, led by the fundamental contributions of M. Grotschel and M. Padberg; surveys of this work can be found in Grotschel and Padberg (1985), Padberg and Gr otschel (1985), J unger et al. (1995, 1997), and Naddef (2002). The cutting-plane method is the core of nearly all successful approaches proposed to date for obtaining provably optimal solutions to the TSP, and it remains the only known technique for solving instances having more than several hundred cities. Beyond the TSP, the cutting-plane method has been applied to a host of NP-hard problems (see J unger et al. (1995)), and is an important component of modern Title Suppressed Due to Excessive Length 3 mixed-integer-programming codes (see Marchand et al. (1999) and Bixby et al. (2000, 2003)). In this paper we discuss an implementation of the Dantzig et al. algorithm designed for TSP instances having 1,000,000 or more cities; very large TSP instances arise is applications such as genome-sequencing (Agarwala et al. (2000)), but the primary aim of our work is to use the TSP as a means of studying issues that arise in the general application of cuttingplane algorithms for large-scale problems. Instances of this size are well beyond the reach of current (exact) solution techniques, but even in this case the cutting-plane method can be used to provide strong lower bounds on the optimal tour lengths. For example, we use cutting planes to show that the best known tour for a speci c 1,000,000-city randomly generated Euclidean instance is no more than 0.05% from optimality. This instance was created by David S. Johnson in 1994, studied by Johnson and McGeoch (1997, 2002) and included in the DIMACS (2001) challenge test set under the name \\E1M.0\". Its cities are points with integer coordinates drawn uniformly from the 1,000,000 by 1,000,000 grid; the cost of an edge is the Euclidean distance between the corresponding points, rounded to the nearest integer. The paper is organized as follows. In Section 2 we present separation algorithms for subtour inequalities and in Section 3 we present simple methods for separating a further class of TSP inequalities known as \\blossoms\"; in these two sections we consider only methods that can be easily applied to large problem instances. In Section 4 we discuss methods for adjusting cutting planes to respond to changes in the optimal LP solution x ; again, we consider only procedures that perform well on large instances. In Section 5 we discuss a linear-time implementation of the \\local cut\" technique for generating TSP inequalities by mapping the space of variables to a space of very low dimension. The core LP problem that needs to be solved in each iteration of the cutting-plane algorithm is discussed in Section 6. Data structures for storing cutting planes are treated in Section 7 and methods for handling the n(n 1)=2 edges are covered in Section 8. In Section 9 we report on computational results for a variety of test instances. The techniques developed in this paper are incorporated into the Concorde computer code of Applegate et al. (2003); the Concorde code is freely available for use in research studies. 2. Subtour Inequalities A separation algorithm for a class C of linear inequalities is an algorithm that, given any x , returns either an inequality in C that is violated by x or a failure message. Separation algorithms that return a failure message only if all inequalities in C are satis ed by x are called exact ; separation algorithms that may return a failure message even when some inequality in C is violated by x are called heuristic. 4 David Applegate et al. We present below several fast heuristics for subtour separation, and discuss brie y the Padberg and Rinaldi (1990a) exact subtour separation procedure. 2.1. The x(S; T ) notation Let V be a nite set of cities, let E be the edge-set of the complete graph on V , and let w be a vector indexed by E. Given disjoint subsets S; T of V , we write w(S; T ) to mean X (we : e 2 E; e \\ S 6= ;; e \\ T 6= ;): This notation is adopted from Ford and Fulkerson (1962); using it, the subtour inequality corresponding to S can be written as", "title": "" }, { "docid": "fd050993a4f3cfa4557db0f5f1862500", "text": "Most modern research on the effects of feedback during learning has assumed that feedback is an error correction mechanism. Recent studies of feedback-timing effects have suggested that feedback might also strengthen initially correct responses. In an experiment involving cued recall of trivia facts, we directly tested several theories of feedback-timing effects and also examined the effects of restudy and retest trials following immediate and delayed feedback. Results were not consistent with theories assuming that the only function of feedback is to correct initial errors but instead supported a theoretical account assuming that delaying feedback strengthens initially correct responses due to the spacing of encoding opportunities: Delaying feedback increased the probability of correct response perseveration on the final retention test but had minimal effects on error correction or error perseveration probabilities. In a 2nd experiment, the effects of varying the lags between study, test, and feedback trials during learning provided further support for the spacing hypothesis. (PsycINFO Database Record (c) 2009 APA, all rights reserved).", "title": "" } ]
scidocsrr
36458d622688ad4a11f8a60be6a91a0e
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure
[ { "docid": "78d88298e0b0e197f44939ee96210778", "text": "Cyber-security research and development for SCADA is being inhibited by the lack of available SCADA attack datasets. This paper presents a modular dataset generation framework for SCADA cyber-attacks, to aid the development of attack datasets. The presented framework is based on requirements derived from related prior research, and is applicable to any standardised or proprietary SCADA protocol. We instantiate our framework and validate the requirements using a Python implementation. This paper provides experiments of the framework's usage on a state-of-the-art DNP3 critical infrastructure test-bed, thus proving framework's ability to generate SCADA cyber-attack datasets.", "title": "" }, { "docid": "57d5b63c8ad062e1c15b1037e9973b28", "text": "SCADA systems are widely used in critical infrastructure sectors, including electricity generation and distribution, oil and gas production and distribution, and water treatment and distribution. SCADA process control systems are typically isolated from the internet via firewalls. However, they may still be subject to illicit cyber penetrations and may be subject to cyber threats from disgruntled insiders. We have developed a set of command injection, data injection, and denial of service attacks which leverage the lack of authentication in many common control system communication protocols including MODBUS, DNP3, and EtherNET/IP. We used these exploits to aid in development of a neural network based intrusion detection system which monitors control system physical behavior to detect artifacts of command and response injection attacks. Finally, we present intrusion detection accuracy results for our neural network based IDS which includes input features derived from physical properties of the control system.", "title": "" } ]
[ { "docid": "15975baddd2e687d14588fcfc674bbc8", "text": "The treatment of external genitalia trauma is diverse according to the nature of trauma and injured anatomic site. The classification of trauma is important to establish a strategy of treatment; however, to date there has been less effort to make a classification for trauma of external genitalia. The classification of external trauma in male could be established by the nature of injury mechanism or anatomic site: accidental versus self-mutilation injury and penis versus penis plus scrotum or perineum. Accidental injury covers large portion of external genitalia trauma because of high prevalence and severity of this disease. The aim of this study is to summarize the mechanism and treatment of the traumatic injury of penis. This study is the first review describing the issue.", "title": "" }, { "docid": "28530d3d388edc5d214a94d70ad7f2c3", "text": "In next generation wireless mobile networks, network virtualization will become an important key technology. In this paper, we firstly propose a resource allocation scheme for enabling efficient resource allocation in wireless network virtualization. Then, we formulate the resource allocation strategy as an optimization problem, considering not only the revenue earned by serving end users of virtual networks, but also the cost of leasing infrastructure from infrastructure providers. In addition, we develop an efficient alternating direction method of multipliers (ADMM)-based distributed virtual resource allocation algorithm in virtualized wireless networks. Simulation results are presented to show the effectiveness of the proposed scheme.", "title": "" }, { "docid": "a652eb10bf8f15855f9ac1f1981dc07f", "text": "n = 379) were jail inmates at the time of ingestion, 22.9% ( n = 124) had a history of psychosis, and 7.2% ( n = 39) were alcoholics or denture-wearing elderly subjects. Most foreign bodies passed spontaneously (75.6%; n = 410). Endoscopic removal was possible in 19.5% ( n = 106) and was not associated with any morbidity. Only 4.8% ( n = 26) required surgery. Of the latter, 30.8% ( n = 8) had long gastric FBs with no tendency for distal passage and were removed via gastrotomy; 15.4% ( n = 4) had thin, sharp FBs, causing perforation; and 53.8% ( n = 14) had FBs impacted in the ileocecal region, which were removed via appendicostomy. Conservative approach to FB ingestion is justified, although early endoscopic removal from the stomach is recommended. In cases of failure, surgical removal for gastric FBs longer than 7.0 cm is wise. Thin, sharp FBs require a high index of suspicion because they carry a higher risk for perforation. The ileocecal region is the most common site of impaction. Removal of the FB via appendicostomy is the safest option and should not be delayed more than 48 hours.", "title": "" }, { "docid": "7175d7767b2fc227136863bdec145dc2", "text": "In this letter, a tapered slot ultrawide band (UWB) Vivaldi antenna with enhanced gain having band notch characteristics in the WLAN/WiMAX band is presented. In this framework, a reference tapered slot Vivaldi antenna is first designed for UWB operation that is, 3.1–10.6 GHz using the standard procedure. The band-notch operation at 4.8 GHz is achieved with the help of especially designed complementary split ring resonator (CSRR) cell placed near the excitation point of the antenna. Further, the gain of the designed antenna is enhanced substantially with the help of anisotropic zero index metamaterial (AZIM) cells, which are optimized and positioned on the substrate in a particular fashion. In order to check the novelty of the design procedure, three distinct Vivaldi structures are fabricated and tested. Experimental data show quite good agreement with the simulated results. As the proposed antenna can minimize the electromagnetic interference (EMI) caused by the IEEE 802.11 WLAN/WiMAX standards, it can be used more efficiently in the UWB frequency band. VC 2016 Wiley Periodicals, Inc. Microwave Opt Technol Lett 58:233–238, 2016; View this article online at wileyonlinelibrary.com. DOI 10.1002/mop.29534", "title": "" }, { "docid": "a2775f9d8e0dd72ca5dd4ba76b49070a", "text": "What are the critical requirements to be considered for the security measures in Internet of Things (IoT) services? Further, how should those security resources be allocated? To provide valuable insight into these questions, this paper introduces a security assessment framework for the IoT service environment from an architectural perspective. Our proposed framework integrates fuzzy DEMATEL and fuzzy ANP to reflect dependence and feedback interrelations among security criteria and, ultimately, to weigh and prioritize them. The results, gleaned from the judgments of 38 security experts, revealed that security design should put more importance on the service layer, especially to ensure availability and trust. We believe that these results will contribute to the provision of more secure and reliable IoT services.", "title": "" }, { "docid": "2332c8193181b5ad31e9424ca37b0f5a", "text": "The ability to grasp ordinary and potentially never-seen objects is an important feature in both domestic and industrial robotics. For a system to accomplish this, it must autonomously identify grasping locations by using information from various sensors, such as Microsoft Kinect 3D camera. Despite numerous progress, significant work still remains to be done in this field. To this effect, we propose a dictionary learning and sparse representation (DLSR) framework for representing RGBD images from 3D sensors in the context of determining such good grasping locations. In contrast to previously proposed approaches that relied on sophisticated regularization or very large datasets, the derived perception system has a fast training phase and can work with small datasets. It is also theoretically founded for dealing with masked-out entries, which are common with 3D sensors. We contribute by presenting a comparative study of several DLSR approach combinations for recognizing and detecting grasp candidates on the standard Cornell dataset. Importantly, experimental results show a performance improvement of 1.69% in detection and 3.16% in recognition over current state-of-the-art convolutional neural network (CNN). Even though nowadays most popular vision-based approach is CNN, this suggests that DLSR is also a viable alternative with interesting advantages that CNN has not.", "title": "" }, { "docid": "2399e1ffd634417f00273993ad0ba466", "text": "Requirements prioritization aims at identifying the most important requirements for a software system, a crucial step when planning for system releases and deciding which requirements to implement in each release. Several prioritization methods and supporting tools have been proposed so far. How to evaluate their properties, with the aim of supporting the selection of the most appropriate method for a specific project, is considered a relevant question. In this paper, we present an empirical study aiming at evaluating two state-of-the art tool-supported requirements prioritization methods, AHP and CBRank. We focus on three measures: the ease of use, the time-consumption and the accuracy. The experiment has been conducted with 23 experienced subjects on a set of 20 requirements from a real project. Results indicate that for the first two characteristics CBRank overcomes AHP, while for the accuracy AHP performs better than CBRank, even if the resulting ranks from the two methods are very similar. The majority of the users found CBRank the ‘‘overall best”", "title": "" }, { "docid": "ba324cf5ca59b193d1f4ec9df5a691fd", "text": "The Chiron-1 user interface system demonstrates key techniques that enable a strict separation of an application from its user interface. These techniques include separating the control-flow aspects of the application and user interface: they are concurrent and may contain many threads. Chiron also separates windowing and look-and-feel issues from dialogue and abstract presentation decisions via mechanisms employing a client-server architecture. To separate application code from user interface code, user interface agents called artists are attached to instances of application abstract data types (ADTs). Operations on ADTs within the application implicitly trigger user interface activities within the artists. Multiple artists can be attached to ADTs, providing multiple views and alternative forms of access and manipulation by either a single user or by multiple users. Each artist and the application run in separate threads of control. Artists maintain the user interface by making remote calls to an abstract depiction hierarchy in the Chiron server, insulting the user interface code from the specifics of particular windowing systems and toolkits. The Chiron server and clients execute in separate processes. The client-server architecture also supports multilingual systems: mechanisms are demonstrated that support clients written in programming languages other than that of the server while nevertheless supporting object-oriented server concepts. The system has been used in several universities and research and development projects. It is available by anonymous ftp.", "title": "" }, { "docid": "9a071b23eb370f053a5ecfd65f4a847d", "text": "INTRODUCTION\nConcomitant obesity significantly impairs asthma control. Obese asthmatics show more severe symptoms and an increased use of medications.\n\n\nOBJECTIVES\nThe primary aim of the study was to identify genes that are differentially expressed in the peripheral blood of asthmatic patients with obesity, asthmatic patients with normal body mass, and obese patients without asthma. Secondly, we investigated whether the analysis of gene expression in peripheral blood may be helpful in the differential diagnosis of obese patients who present with symptoms similar to asthma.\n\n\nPATIENTS AND METHODS\nThe study group included 15 patients with asthma (9 obese and 6 normal-weight patients), while the control group-13 obese patients in whom asthma was excluded. The analysis of whole-genome expression was performed on RNA samples isolated from peripheral blood.\n\n\nRESULTS\nThe comparison of gene expression profiles between asthmatic patients with obesity and those with normal body mass revealed a significant difference in 6 genes. The comparison of the expression between controls and normal-weight patients with asthma showed a significant difference in 23 genes. The analysis of genes with a different expression revealed a group of transcripts that may be related to an increased body mass (PI3, LOC100008589, RPS6KA3, LOC441763, IFIT1, and LOC100133565). Based on gene expression results, a prediction model was constructed, which allowed to correctly classify 92% of obese controls and 89% of obese asthmatic patients, resulting in the overall accuracy of the model of 90.9%.\n\n\nCONCLUSIONS\nThe results of our study showed significant differences in gene expression between obese asthmatic patients compared with asthmatic patients with normal body mass as well as in obese patients without asthma compared with asthmatic patients with normal body mass.", "title": "" }, { "docid": "b4166b57419680e348d7a8f27fbc338a", "text": "OBJECTIVES\nTreatments of female sexual dysfunction have been largely unsuccessful because they do not address the psychological factors that underlie female sexuality. Negative self-evaluative processes interfere with the ability to attend and register physiological changes (interoceptive awareness). This study explores the effect of mindfulness meditation training on interoceptive awareness and the three categories of known barriers to healthy sexual functioning: attention, self-judgment, and clinical symptoms.\n\n\nMETHODS\nForty-four college students (30 women) participated in either a 12-week course containing a \"meditation laboratory\" or an active control course with similar content or laboratory format. Interoceptive awareness was measured by reaction time in rating physiological response to sexual stimuli. Psychological barriers were assessed with self-reported measures of mindfulness and psychological well-being.\n\n\nRESULTS\nWomen who participated in the meditation training became significantly faster at registering their physiological responses (interoceptive awareness) to sexual stimuli compared with active controls (F(1,28) = 5.45, p = .03, η(p)(2) = 0.15). Female meditators also improved their scores on attention (t = 4.42, df = 11, p = .001), self-judgment, (t = 3.1, df = 11, p = .01), and symptoms of anxiety (t = -3.17, df = 11, p = .009) and depression (t = -2.13, df = 11, p < .05). Improvements in interoceptive awareness were correlated with improvements in the psychological barriers to healthy sexual functioning (r = -0.44 for attention, r = -0.42 for self-judgment, and r = 0.49 for anxiety; all p < .05).\n\n\nCONCLUSIONS\nMindfulness-based improvements in interoceptive awareness highlight the potential of mindfulness training as a treatment of female sexual dysfunction.", "title": "" }, { "docid": "527f52078b24a8d8b49f4e9411a69936", "text": "Now-a-days Big Data have been created lot of buzz in technology world. Sentiment Analysis or opinion mining is very important application of ‘Big Data’. Sentiment analysis is used for knowing voice or response of crowd for products, services, organizations, individuals, movie reviews, issues, events, news etc... In this paper we are going to discuss about exiting methods, approaches to do sentimental analysis for unstructured data which reside on web. Currently, Sentiment Analysis concentrates for subjective statements or on subjectivity and overlook objective statements which carry sentiment(s). So, we propose new approach classify and handle subjective as well as objective statements for sentimental analysis. Keywords— Sentiment Analysis, Text Mining, Machine learning, Natural Language Processing, Big Data", "title": "" }, { "docid": "f71987051ad044673c8b41709cb34df7", "text": "The quality and the correctness of software are often the greatest concern in electronic systems. Formal verification tools can provide a guarantee that a design is free of specific flaws. This paper surveys algorithms that perform automatic static analysis of software to detect programming errors or prove their absence. The three techniques considered are static analysis with abstract domains, model checking, and bounded model checking. A short tutorial on these techniques is provided, highlighting their differences when applied to practical problems. This paper also surveys tools implementing these techniques and describes their merits and shortcomings.", "title": "" }, { "docid": "23f3ab8e7bc934ebb786916a5c4c7d27", "text": "This paper presents a Haskell library for graph processing: DeltaGraph. One unique feature of this system is that intentions to perform graph updates can be memoized in-graph in a decentralized fashion, and the propagation of these intentions within the graph can be decoupled from the realization of the updates. As a result, DeltaGraph can respond to updates in constant time and work elegantly with parallelism support. We build a Twitter-like application on top of DeltaGraph to demonstrate its effectiveness and explore parallelism and opportunistic computing optimizations.", "title": "" }, { "docid": "31be3d5db7d49d1bfc58c81efec83bdc", "text": "Electromagnetic elements such as inductance are not used in switched-capacitor converters to convert electrical power. In contrast, capacitors are used for storing and transforming the electrical power in these new topologies. Lower volume, higher power density, and more integration ability are the most important features of these kinds of converters. In this paper, the most important switched-capacitor converters topologies, which have been developed in the last decade as new topologies in power electronics, are introduced, analyzed, and compared with each other, in brief. Finally, a 100 watt double-phase half-mode resonant converter is simulated to convert 48V dc to 24 V dc for light weight electrical vehicle applications. Low output voltage ripple (0.4%), and soft switching for all power diodes and switches are achieved under the worst-case conditions.", "title": "" }, { "docid": "133d850d8fc0252ad69ee178e1e523af", "text": "In this article, we build models to predict the existence of citations among papers by formulating link prediction for 5 large-scale datasets of citation networks. The supervised machine-learning model is applied with 11 features. As a result, our learner performs very well, with the F1 values of between 0.74 and 0.82. Three features in particular, link-based Jaccard coefficient , difference in betweenness centrality , and cosine similarity of term frequency–inverse document frequency vectors, largely affect the predictions of citations.The results also indicate that different models are required for different types of research areas—research fields with a single issue or research fields with multiple issues. In the case of research fields with multiple issues, there are barriers among research fields because our results indicate that papers tend to be cited in each research field locally. Therefore, one must consider the typology of targeted research areas when building models for link prediction in citation networks.", "title": "" }, { "docid": "aecacf7d1ba736899f185ee142e32522", "text": "BACKGROUND\nLow rates of handwashing compliance among nurses are still reported in literature. Handwashing beliefs and attitudes were found to correlate and predict handwashing practices. However, such an important field is not fully explored in Jordan.\n\n\nOBJECTIVES\nThis study aims at exploring Jordanian nurses' handwashing beliefs, attitudes, and compliance and examining the predictors of their handwashing compliance.\n\n\nMETHODS\nA cross-sectional multicenter survey design was used to collect data from registered nurses and nursing assistants (N = 198) who were providing care to patients in governmental hospitals in Jordan. Data collection took place over 3 months during the period of February 2011 to April 2011 using the Handwashing Assessment Inventory.\n\n\nRESULTS\nParticipants' mean score of handwashing compliance was 74.29%. They showed positive attitudes but seemed to lack knowledge concerning handwashing. Analysis revealed a 5-predictor model, which accounted for 37.5% of the variance in nurses' handwashing compliance. Nurses' beliefs relatively had the highest prediction effects (β = .309, P < .01), followed by skin assessment (β = .290, P < .01).\n\n\nCONCLUSION\nJordanian nurses reported moderate handwashing compliance and were found to lack knowledge concerning handwashing protocols, for which education programs are recommended. This study raised the awareness regarding the importance of complying with handwashing protocols.", "title": "" }, { "docid": "21f079e590e020df08d461ba78a26d65", "text": "The aim of this study was to develop a tool to measure the knowledge of nurses on pressure ulcer prevention. PUKAT 2·0 is a revised and updated version of the Pressure Ulcer Knowledge Assessment Tool (PUKAT) developed in 2010 at Ghent University, Belgium. The updated version was developed using state-of-the-art techniques to establish evidence concerning validity and reliability. Face and content validity were determined through a Delphi procedure including both experts from the European Pressure Ulcer Advisory Panel (EPUAP) and the National Pressure Ulcer Advisory Panel (NPUAP) (n = 15). A subsequent psychometric evaluation of 342 nurses and nursing students evaluated the item difficulty, discriminating power and quality of the response alternatives. Furthermore, construct validity was established through a test-retest procedure and the known-groups technique. The content validity was good and the difficulty level moderate. The discernment was found to be excellent: all groups with a (theoretically expected) higher level of expertise had a significantly higher score than the groups with a (theoretically expected) lower level of expertise. The stability of the tool is sufficient (Intraclass Correlation Coefficient = 0·69). The PUKAT 2·0 demonstrated good psychometric properties and can be used and disseminated internationally to assess knowledge about pressure ulcer prevention.", "title": "" }, { "docid": "dc169d6f01d225028cc76658323e79b3", "text": "Adopting a primary prevention perspective, this study examines competencies with the potential to enhance well-being and performance among future workers. More specifically, the contributions of ability-based and trait models of emotional intelligence (EI), assessed through well-established measures, to indices of hedonic and eudaimonic well-being were examined for a sample of 157 Italian high school students. The Mayer-Salovey-Caruso Emotional Intelligence Test was used to assess ability-based EI, the Bar-On Emotional Intelligence Inventory and the Trait Emotional Intelligence Questionnaire were used to assess trait EI, the Positive and Negative Affect Scale and the Satisfaction With Life Scale were used to assess hedonic well-being, and the Meaningful Life Measure was used to assess eudaimonic well-being. The results highlight the contributions of trait EI in explaining both hedonic and eudaimonic well-being, after controlling for the effects of fluid intelligence and personality traits. Implications for further research and intervention regarding future workers are discussed.", "title": "" }, { "docid": "8cbe0ff905a58e575f2d84e4e663a857", "text": "Mixed reality (MR) technology development is now gaining momentum due to advances in computer vision, sensor fusion, and realistic display technologies. With most of the research and development focused on delivering the promise of MR, there is only barely a few working on the privacy and security implications of this technology. Œis survey paper aims to put in to light these risks, and to look into the latest security and privacy work on MR. Speci€cally, we list and review the di‚erent protection approaches that have been proposed to ensure user and data security and privacy in MR. We extend the scope to include work on related technologies such as augmented reality (AR), virtual reality (VR), and human-computer interaction (HCI) as crucial components, if not the origins, of MR, as well as numerous related work from the larger area of mobile devices, wearables, and Internet-of-Œings (IoT). We highlight the lack of investigation, implementation, and evaluation of data protection approaches in MR. Further challenges and directions on MR security and privacy are also discussed.", "title": "" } ]
scidocsrr
60856d58ff1beaad37d16b5ece220455
DocUNet: Document Image Unwarping via a Stacked U-Net
[ { "docid": "f1deb9134639fb8407d27a350be5b154", "text": "This work introduces a novel Convolutional Network architecture for the task of human pose estimation. Features are processed across all scales and consolidated to best capture the various spatial relationships associated with the body. We show how repeated bottom-up, top-down processing used in conjunction with intermediate supervision is critical to improving the performance of the network. We refer to the architecture as a ‘stacked hourglass’ network based on the successive steps of pooling and upsampling that are done to produce a final set of estimates. State-of-the-art results are achieved on the FLIC and MPII benchmarks outcompeting all recent methods.", "title": "" } ]
[ { "docid": "f9ff7c40bbf7682496f1863dd8ada4e1", "text": "Now a days, it is very risky to handle the data in internet against intruders. Data is generally in the form of text, audio , video and image. Steganography is one of the best method to share the data secretly and securely. Steganography algorithm can be applied to audio, video and image file. Secret data may in the form of text, image or even in the form of video and audio. Hiding secret information in video file is known as video steganography. In this paper, a review on various video steganography techniques has been presented. Various spatial domain and transform domain techniques of video steganography have been discussed in this paper. Keywords— Steganography, Discrete wavelet transform, Discrete Cosine transform, cover image.", "title": "" }, { "docid": "982af44d0c5fc3d0bddd2804cee77a04", "text": "Coprime array offers a larger array aperture than uniform linear array with the same number of physical sensors, and has a better spatial resolution with increased degrees of freedom. However, when it comes to the problem of adaptive beamforming, the existing adaptive beamforming algorithms designed for the general array cannot take full advantage of coprime feature offered by the coprime array. In this paper, we propose a novel coprime array adaptive beamforming algorithm, where both robustness and efficiency are well balanced. Specifically, we first decompose the coprime array into a pair of sparse uniform linear subarrays and process their received signals separately. According to the property of coprime integers, the direction-of-arrival (DOA) can be uniquely estimated for each source by matching the super-resolution spatial spectra of the pair of sparse uniform linear subarrays. Further, a joint covariance matrix optimization problem is formulated to estimate the power of each source. The estimated DOAs and their corresponding power are utilized to reconstruct the interference-plus-noise covariance matrix and estimate the signal steering vector. Theoretical analyses are presented in terms of robustness and efficiency, and simulation results demonstrate the effectiveness of the proposed coprime array adaptive beamforming algorithm.", "title": "" }, { "docid": "c4062390a6598f4e9407d29e52c1a3ed", "text": "We have conducted a comprehensive search for conserved elements in vertebrate genomes, using genome-wide multiple alignments of five vertebrate species (human, mouse, rat, chicken, and Fugu rubripes). Parallel searches have been performed with multiple alignments of four insect species (three species of Drosophila and Anopheles gambiae), two species of Caenorhabditis, and seven species of Saccharomyces. Conserved elements were identified with a computer program called phastCons, which is based on a two-state phylogenetic hidden Markov model (phylo-HMM). PhastCons works by fitting a phylo-HMM to the data by maximum likelihood, subject to constraints designed to calibrate the model across species groups, and then predicting conserved elements based on this model. The predicted elements cover roughly 3%-8% of the human genome (depending on the details of the calibration procedure) and substantially higher fractions of the more compact Drosophila melanogaster (37%-53%), Caenorhabditis elegans (18%-37%), and Saccharaomyces cerevisiae (47%-68%) genomes. From yeasts to vertebrates, in order of increasing genome size and general biological complexity, increasing fractions of conserved bases are found to lie outside of the exons of known protein-coding genes. In all groups, the most highly conserved elements (HCEs), by log-odds score, are hundreds or thousands of bases long. These elements share certain properties with ultraconserved elements, but they tend to be longer and less perfectly conserved, and they overlap genes of somewhat different functional categories. In vertebrates, HCEs are associated with the 3' UTRs of regulatory genes, stable gene deserts, and megabase-sized regions rich in moderately conserved noncoding sequences. Noncoding HCEs also show strong statistical evidence of an enrichment for RNA secondary structure.", "title": "" }, { "docid": "8b8f4ddff20f2321406625849af8766a", "text": "This paper provides an introduction to specifying multilevel models using PROC MIXED. After a brief introduction to the field of multilevel modeling, users are provided with concrete examples of how PROC MIXED can be used to estimate (a) two-level organizational models, (b) two-level growth models, and (c) three-level organizational models. Both random intercept and random intercept and slope models are illustrated. Examples are shown using different real world data sources, including the publically available Early Childhood Longitudinal Study–Kindergarten cohort data. For each example, different research questions are examined through both narrative explanations and examples of the PROC MIXED code and corresponding output.", "title": "" }, { "docid": "cd863a82161f4b28cc43eeda21e01a65", "text": "Face aging, which renders aging faces for an input face, has attracted extensive attention in the multimedia research. Recently, several conditional Generative Adversarial Nets (GANs) based methods have achieved great success. They can generate images fitting the real face distributions conditioned on each individual age group. However, these methods fail to capture the transition patterns, e.g., the gradual shape and texture changes between adjacent age groups. In this paper, we propose a novel Contextual Generative Adversarial Nets (C-GANs) to specifically take it into consideration. The C-GANs consists of a conditional transformation network and two discriminative networks. The conditional transformation network imitates the aging procedure with several specially designed residual blocks. The age discriminative network guides the synthesized face to fit the real conditional distribution. The transition pattern discriminative network is novel, aiming to distinguish the real transition patterns with the fake ones. It serves as an extra regularization term for the conditional transformation network, ensuring the generated image pairs to fit the corresponding real transition pattern distribution. Experimental results demonstrate the proposed framework produces appealing results by comparing with the state-of-the-art and ground truth. We also observe performance gain for cross-age face verification.", "title": "" }, { "docid": "9668d1cc357a70780282dfdfe9ed4bda", "text": "A challenge in estimating students’ changing knowledge from sequential observations of their performance arises when each observed step involves multiple subskills. To overcome this mismatch in grain size between modelled skills and observed actions, we use logistic regression over each step’s subskills in a dynamic Bayes net (LR-DBN) to model transition probabilities for the overall knowledge required by the step. Unlike previous methods, LR-DBN can trace knowledge of the individual subskills without assuming they are independent. We evaluate how well it fits children’s oral reading fluency data logged by Project LISTEN’s Reading Tutor, compared to other methods.", "title": "" }, { "docid": "627b14801c8728adf02b75e8eb62896f", "text": "In the 45 years since Cattell used English trait terms to begin the formulation of his \"description of personality,\" a number of investigators have proposed an alternative structure based on 5 orthogonal factors. The generality of this 5-factor model is here demonstrated across unusually comprehensive sets of trait terms. In the first of 3 studies, 1,431 trait adjectives grouped into 75 clusters were analyzed; virtually identical structures emerged in 10 replications, each based on a different factor-analytic procedure. A 2nd study of 479 common terms grouped into 133 synonym clusters revealed the same structure in 2 samples of self-ratings and in 2 samples of peer ratings. None of the factors beyond the 5th generalized across the samples. In the 3rd study, analyses of 100 clusters derived from 339 trait terms suggest their potential utility as Big-Five markers in future studies.", "title": "" }, { "docid": "af0328c3a271859d31c0e3993db7105e", "text": "The increasing bandwidth demand in data centers and telecommunication infrastructures had prompted new electrical interface standards capable of operating up to 56Gb/s per-lane. The CEI-56G-VSR-PAM4 standard [1] defines PAM-4 signaling at 56Gb/s targeting chip-to-module interconnect. Figure 6.3.1 shows the measured S21 of a channel resembling such interconnects and the corresponding single-pulse response after TX-FIR and RX CTLE. Although the S21 is merely ∼10dB at 14GHz, the single-pulse response exhibits significant reflections from impedance discontinuities, mainly between package and PCB traces. These reflections are detrimental to PAM-4 signaling and cannot be equalized effectively by RX CTLE and/or a few taps of TX feed-forward equalization. This paper presents the design of a PAM-4 receiver using 10-tap direct decision-feedback equalization (DFE) targeting such VSR channels.", "title": "" }, { "docid": "ab82e7a031b52991c184b6a0e12a7b33", "text": "In this paper we survey the current literature on code obfuscation and review current practices as well as applications. We analyze the different obfuscation techniques in relation to protection of intellectual property and the hiding of malicious code. Surprisingly, the same techniques used to thwart reverse engineers are used to hide malicious code from virus scanners. Additionally, obfuscation can be used to protect against malicious code injection and attacks. Though obfuscation transformations can protect code, they have limitations in the form of larger code footprints and reduced performance.", "title": "" }, { "docid": "66f6ca5a7ed26e43a5e06fb2c218aa94", "text": "We design two compressed data structures for the full-text indexing problem that support efficient substring searches using roughly the space required for storing the text in compressed form.Our first compressed data structure retrieves the <i>occ</i> occurrences of a pattern <i>P</i>[1,<i>p</i>] within a text <i>T</i>[1,<i>n</i>] in <i>O</i>(<i>p</i> + <i>occ</i> log<sup>1+ε</sup> <i>n</i>) time for any chosen ε, 0<ε<1. This data structure uses at most 5<i>n</i><i>H</i><inf><i>k</i></inf>(<i>T</i>) + <i>o</i>(<i>n</i>) bits of storage, where <i>H</i><inf><i>k</i></inf>(<i>T</i>) is the <i>k</i>th order empirical entropy of <i>T</i>. The space usage is Θ(<i>n</i>) bits in the worst case and <i>o</i>(<i>n</i>) bits for compressible texts. This data structure exploits the relationship between suffix arrays and the Burrows--Wheeler Transform, and can be regarded as a <i>compressed suffix array</i>.Our second compressed data structure achieves <i>O</i>(<i>p</i>+<i>occ</i>) query time using <i>O</i>(<i>n</i><i>H</i><inf><i>k</i></inf>(<i>T</i>)log<sup>ε</sup> <i>n</i>) + <i>o</i>(<i>n</i>) bits of storage for any chosen ε, 0<ε<1. Therefore, it provides optimal <i>output-sensitive</i> query time using <i>o</i>(<i>n</i>log <i>n</i>) bits in the worst case. This second data structure builds upon the first one and exploits the interplay between two compressors: the Burrows--Wheeler Transform and the <i>LZ78</i> algorithm.", "title": "" }, { "docid": "62bc89c06c044fdaf01f623860750d8e", "text": "PURPOSE\nThe objective of this study was to evaluate the clinical quality of 191 porcelain laminate veneers and to explore the gingival response in a long-term survey.\n\n\nMATERIALS AND METHODS\nThe clinical examination was made by two calibrated examiners following modified California Dental Association/Ryge criteria. In addition, margin index, papillary bleeding index, sulcus probing depth, and increase in gingival recession were recorded. Two age groups were formed to evaluate the influence of wearing time upon the clinical results. The results were statistically evaluated using the Kaplan-Meier survival estimation method, Chi-squared test, and Kruskal-Wallis test.\n\n\nRESULTS\nA failure rate of 4% was found. Six of the total of seven failures were seen when veneers were partially bonded to dentin. Marginal integrity was acceptable in 99% and was rated as excellent in 63%. Superficial marginal discoloration was present in 17%. Slight marginal recession was detected in 31%, and bleeding on probing was found in 25%.\n\n\nCONCLUSION\nPorcelain laminate veneers offer a predictable and successful treatment modality that preserves a maximum of sound tooth structure. An increased risk of failure is present only when veneers are partially bonded to dentin. The estimated survival probability over a period of 10 years is 91%.", "title": "" }, { "docid": "14494622fc47aa261038c10153dbb828", "text": "This article describes a robust semantic parser that uses a broad knowledge base created by interconnecting three major resources: FrameNet, VerbNet and PropBank. The FrameNet corpus contains the examples annotated with semantic roles whereas the VerbNet lexicon provides the knowledge about the syntactic behavior of the verbs. We connect VerbNet and FrameNet by mapping the FrameNet frames to the VerbNet Intersective Levin classes. The PropBank corpus, which is tightly connected to the VerbNet lexicon, is used to increase the verb coverage and also to test the effectiveness of our approach. The results indicate that our model is an interesting step towards the design of more robust semantic parsers.", "title": "" }, { "docid": "848f628c10c098c3004127133dec8fd1", "text": "Pattern recognition in digital images is a major limitation in machine learning area. But, in recent years, deep learning has rapidly been diffused, providing large advancements in visual computing by solving the main problems that machine learning imposes. Based on these advances, this study aims to improve results of a problem well-known by visual computing, the classification of melanoma, this one is classified as a malignant tumor, highly invasive and easily confused with other skin diseases. To achieve this, we use some techniques of deep learning to try to get better results in the task of classifying whether a melanotic lesion is the malignant type (melanoma) or not (nevus). In this work we present a training approach using a custom dataset of skin diseases, transfer learning, convolutional neural networks and data augmentation of the deep network ResNet (Deep Residual Network). Keywords-deep learning; convolutional neural networks; melanoma classification;", "title": "" }, { "docid": "77b78ec70f390289424cade3850fc098", "text": "As the primary barrier between an organism and its environment, epithelial cells are well-positioned to regulate tolerance while preserving immunity against pathogens. Class II major histocompatibility complex molecules (MHC class II) are highly expressed on the surface of epithelial cells (ECs) in both the lung and intestine, although the functional consequences of this expression are not fully understood. Here, we summarize current information regarding the interactions that regulate the expression of EC MHC class II in health and disease. We then evaluate the potential role of EC as non-professional antigen presenting cells. Finally, we explore future areas of study and the potential contribution of epithelial surfaces to gut-lung crosstalk.", "title": "" }, { "docid": "733c6f0858d050c621dd553ec72aebc7", "text": "In an effort to better prevent and respond to bullying and cyberbullying, schools are recognizing a need to focus on positive youth development. One often-neglected developmental construct in this rubric is resilience, which can help students successfully respond to the variety of challenges they face. Enhancing this internal competency can complement the ever-present efforts of schools as they work to create a safe and supportive learning environment by shaping the external environment around the child. Based on a national sample of 1204 American youth between the ages of 12 and 17, we explore the relationship between resilience and experience with bullying and cyberbullying. We also examine whether resilient youth who were bullied (at school and online) were less likely to be significantly impacted at school. Results show resilience is a potent protective factor, both in preventing experience with bullying and mitigating its effect. Implications for school and community-based interventions are offered.", "title": "" }, { "docid": "ca50f634d24d4cd00a079e496d00e4b2", "text": "We designed and implemented a fork-type automatic guided vehicle (AGV) with a laser guidance system. Most previous AGVs have used two types of guidance systems: magnetgyro and wire guidance. However, these guidance systems have high costs, are difficult to maintain with changes in the operating environment, and can drive only a pre-determined path with installed sensors. A laser guidance system was developed for addressing these issues, but limitations including slow response time and low accuracy remain. We present a laser guidance system and control system for AGVs with laser navigation. For analyzing the performance of the proposed system, we designed and built a fork-type AGV, and performed repetitions of our experiments under the same working conditions. The results show an average positioning error of 51.76 mm between the simulated driving path and the driving path of the actual fork-type AGV. Consequently, we verified that the proposed method is effective and suitable for use in actual AGVs.", "title": "" }, { "docid": "f0fa3b62c04032a7bf9af44d279036dc", "text": "0957-4174/$ see front matter 2010 Elsevier Ltd. A doi:10.1016/j.eswa.2010.02.080 * Corresponding author. Tel.: +386 15892467; fax: E-mail addresses: miha.skerlavaj@ef.uni-lj.si (M. Šk edu (J.H. Song), ymlee@sm.ac.kr (Y. Lee). URL: http://www.mihaskerlavaj.net (M. Škerlavaj) 1 Tel.: +1 4057443613. 2 Tel.: +82 220777050. The aim of this paper is to present and test a model of innovativeness improvement based on the impact of organizational learning culture. The concept of organizational learning culture (OLC) is presented and defined as a set of norms and values about the functioning of an organization. They should support systematic, in-depth approaches aimed at achieving higher-level organizational learning. The elements of an organizational learning process that we use are information acquisition, information interpretation, and behavioral and cognitive changes. Within the competing values framework OLC covers some aspects of all four different types of cultures: group, developmental, hierarchical, and rational. Constructs comprising innovativeness are innovative culture and innovations, which are made of technical (product and service) and administrative (process) innovations. We use data from 201 Korean companies employing more than 50 people. The impact of OLC on innovations empirically tested via structural equation modeling (SEM). The results show that OLC has a very strong positive direct effect on innovations as well as moderate positive indirect impact via innovative culture. 2010 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "7fed30fd573ec933d59d0bab63a61dcb", "text": "The propagation delay of a comparator and dead time causes the duty-discontinuity region near the boundary of the step-down and step-up regions in a non-inverting buck-boost (NIBB) converter. The duty-discontinuity region leads to an unstable output voltage and an unpredictable output voltage ripple, which might cause the entire power system to shut down. In this paper, a mode-transition technique called duty-lock control is proposed for a digitally controlled NIBB converter. It locks the duty cycle and eliminates the error between the output voltage and the reference signal by using a proposed fixed reference scheme that ensures the stability of the digital controller and output voltage. The experimental results that were applied to a field-programmable gate array-based platform revealed that the output voltage of the NIBB converter is stable throughout the entire transition region, without any efficiency tradeoffs. The input voltage of the converter that was provided by a Li-ion battery was 2.7-4.2 V, and the output voltage was 1.0-3.6 V, which is suitable for radio-frequency power amplifiers. The switching frequency was 500 kHz, and the maximum load current was 450 mA.", "title": "" }, { "docid": "1d6024cacf033182eaf97897934c296c", "text": "Older adults with cognitive impairments often have difficulty performing instrumental activities of daily living (IADLs). Prompting technologies have gained popularity over the last decade and have the potential to assist these individuals with IADLs in order to live independently. Although prompting techniques are routinely used by caregivers and health care providers to aid individuals with cognitive impairment in maintaining their independence with everyday activities, there is no clear consensus or gold standard regarding prompt content, method of instruction, timing of delivery, or interface of prompt delivery in the gerontology or technology literatures. In this paper, we demonstrate how cognitive rehabilitation principles can inform and advance the development of more effective assistive prompting technologies that could be employed in smart environments. We first describe cognitive rehabilitation theory (CRT) and show how it provides a useful theoretical foundation for guiding the development of assistive technologies for IADL completion. We then use the CRT framework to critically review existing smart prompting technologies to answer questions that will be integral to advancing development of effective smart prompting technologies. Finally, we raise questions for future exploration as well as challenges and suggestions for future directions in this area of research.", "title": "" }, { "docid": "89eafc121aba7ca9dc4bd95ffa973b0d", "text": "Software engineering has been historically topdown. From a fully specified problem, a software engineer needs to detail each step of the resolution to get a solution. The resulting program will be functionally adequate as long as its execution environment complies with the original specifications. With their large amount of data, their ever changing multi-level dynamics, smart cities are too complex for a topdown approach. They prompt the need for a paradigm shift in computer science. Programs should be able to self-adapt on the fly, to handle unspecified events,, to efficiently deal with tremendous amount of data. To this end, bottom-up approach should become the norm. Machine learning is a first step,, distributed computing helps. Multi-Agent Systems (MAS) can combine machine learning, distributed computing, may be easily designed with a bottom-up approach. This paper explores how MASs can answer challenges at various levels of smart cities, from sensors networks to ambient intelligence.", "title": "" } ]
scidocsrr
1a035c8a688751ae9604f7ed86173e34
Scheduling internet of things applications in cloud computing
[ { "docid": "ab5f788eaa10739eb3cd99bf12e424de", "text": "Successful development of cloud computing paradigm necessitates accurate performance evaluation of cloud data centers. As exact modeling of cloud centers is not feasible due to the nature of cloud centers and diversity of user requests, we describe a novel approximate analytical model for performance evaluation of cloud server farms and solve it to obtain accurate estimation of the complete probability distribution of the request response time and other important performance indicators. The model allows cloud operators to determine the relationship between the number of servers and input buffer size, on one side, and the performance indicators such as mean number of tasks in the system, blocking probability, and probability that a task will obtain immediate service, on the other.", "title": "" } ]
[ { "docid": "cc85e917ca668a60461ba6848e4c3b42", "text": "In this paper a generic method for fault detection and isolation (FDI) in manufacturing systems considered as discrete event systems (DES) is presented. The method uses an identified model of the closed loop of plant and controller built on the basis of observed fault free system behavior. An identification algorithm known from literature is used to determine the fault detection model in form of a non-deterministic automaton. New results of how to parameterize this algorithm are reported. To assess the fault detection capability of an identified automaton, probabilistic measures are proposed. For fault isolation, the concept of residuals adapted for DES is used by defining appropriate set operations representing generic fault symptoms. The method is applied to a case study system.", "title": "" }, { "docid": "4c48737ffa2a1e385cd93255ce440584", "text": "Even though the emerging field of user experience generally acknowledges the importance of aesthetic qualities in interactive products and services, there is a lack of approaches recognizing the fundamentally temporal nature of interaction aesthetics. By means of interaction criticism, I introduce four concepts that begin to characterize the aesthetic qualities of interaction. Pliability refers to the sense of malleability and tightly coupled interaction that makes the use of an interactive visualization captivating. Rhythm is an important characteristic of certain types of interaction, from the sub-second pacing of musical interaction to the hour-scale ebb and flow of peripheral emotional communication. Dramaturgical structure is not only a feature of online role-playing games, but plays an important role in several design genres from the most mundane to the more intellectually sophisticated. Fluency is a way to articulate the gracefulness with which we are able to handle multiple demands for our attention and action in augmented spaces.", "title": "" }, { "docid": "7abad18b2ddc66b07267ef76b109d1c9", "text": "Modern applications for distributed publish/subscribe systems often require stream aggregation capabilities along with rich data filtering. When compared to other distributed systems, aggregation in pub/sub differentiates itself as a complex problem which involves dynamic dissemination paths that are difficult to predict and optimize for a priori, temporal fluctuations in publication rates, and the mixed presence of aggregated and non-aggregated workloads. In this paper, we propose a formalization for the problem of minimizing communication traffic in the context of aggregation in pub/sub. We present a solution to this minimization problem by using a reduction to the well-known problem of minimum vertex cover in a bipartite graph. This solution is optimal under the strong assumption of complete knowledge of future publications. We call the resulting algorithm \"Aggregation Decision, Optimal with Complete Knowledge\" (ADOCK). We also show that under a dynamic setting without full knowledge, ADOCK can still be applied to produce a low, yet not necessarily optimal, communication cost. We also devise a computationally cheaper dynamic approach called \"Aggregation Decision with Weighted Publication\" (WAD). We compare our solutions experimentally using two real datasets and explore the trade-offs with respect to communication and computation costs.", "title": "" }, { "docid": "b779b82b0ecc316b13129480586ac483", "text": "Chainspace is a decentralized infrastructure, known as a distributed ledger, that supports user defined smart contracts and executes user-supplied transactions on their objects. The correct execution of smart contract transactions is verifiable by all. The system is scalable, by sharding state and the execution of transactions, and using S-BAC, a distributed commit protocol, to guarantee consistency. Chainspace is secure against subsets of nodes trying to compromise its integrity or availability properties through Byzantine Fault Tolerance (BFT), and extremely highauditability, non-repudiation and ‘blockchain’ techniques. Even when BFT fails, auditing mechanisms are in place to trace malicious participants. We present the design, rationale, and details of Chainspace; we argue through evaluating an implementation of the system about its scaling and other features; we illustrate a number of privacy-friendly smart contracts for smart metering, polling and banking and measure their performance.", "title": "" }, { "docid": "cdb937def5a92e3843a761f57278783e", "text": "We design a novel, communication-efficient, failure-robust protocol for secure aggregation of high-dimensional data. Our protocol allows a server to compute the sum of large, user-held data vectors from mobile devices in a secure manner (i.e. without learning each user's individual contribution), and can be used, for example, in a federated learning setting, to aggregate user-provided model updates for a deep neural network. We prove the security of our protocol in the honest-but-curious and active adversary settings, and show that security is maintained even if an arbitrarily chosen subset of users drop out at any time. We evaluate the efficiency of our protocol and show, by complexity analysis and a concrete implementation, that its runtime and communication overhead remain low even on large data sets and client pools. For 16-bit input values, our protocol offers $1.73 x communication expansion for 210 users and 220-dimensional vectors, and 1.98 x expansion for 214 users and 224-dimensional vectors over sending data in the clear.", "title": "" }, { "docid": "3f9bcd99eac46264ee0920ddcc866d33", "text": "The advent of easy to use blogging tools is increasing the number of bloggers leading to more diversity in the quality blogspace. The blog search technologies that help users to find “good” blogs are thus more and more important. This paper proposes a new algorithm called “EigenRumor” that scores each blog entry by weighting the hub and authority scores of the bloggers based on eigenvector calculations. This algorithm enables a higher score to be assigned to the blog entries submitted by a good blogger but not yet linked to by any other blogs based on acceptance of the blogger's prior work. General Terms Algorithms, Management, Experimentation", "title": "" }, { "docid": "e1b6de27518c1c17965a891a8d14a1e1", "text": "Mobile phones are becoming more and more widely used nowadays, and people do not use the phone only for communication: there is a wide variety of phone applications allowing users to select those that fit their needs. Aggregated over time, application usage patterns exhibit not only what people are consistently interested in but also the way in which they use their phones, and can help improving phone design and personalized services. This work aims at mining automatically usage patterns from apps data recorded continuously with smartphones. A new probabilistic framework for mining usage patterns is proposed. Our methodology involves the design of a bag-of-apps model that robustly represents level of phone usage over specific times of the day, and the use of a probabilistic topic model that jointly discovers patterns of usage over multiple applications and describes users as mixtures of such patterns. Our framework is evaluated using 230 000+ hours of real-life app phone log data, demonstrates that relevant patterns of usage can be extracted, and is objectively validated on a user retrieval task with competitive performance.", "title": "" }, { "docid": "06b43b63aafbb70de2601b59d7813576", "text": "Facial expression recognizers based on handcrafted features have achieved satisfactory performance on many databases. Recently, deep neural networks, e. g. deep convolutional neural networks (CNNs) have been shown to boost performance on vision tasks. However, the mechanisms exploited by CNNs are not well established. In this paper, we establish the existence and utility of feature maps selective to action units in a deep CNN trained by transfer learning. We transfer a network pre-trained on the Image-Net dataset to the facial expression recognition task using the Karolinska Directed Emotional Faces (KDEF), Radboud Faces Database(RaFD) and extended Cohn-Kanade (CK+) database. We demonstrate that higher convolutional layers of the deep CNN trained on generic images are selective to facial action units. We also show that feature selection is critical in achieving robustness, with action unit selective feature maps being more critical in the facial expression recognition task. These results support the hypothesis that both human and deeply learned CNNs use similar mechanisms for recognizing facial expressions.", "title": "" }, { "docid": "33ef3a8f8f218ef38dce647bf232a3a7", "text": "Network traffic monitoring and analysis-related research has struggled to scale for massive amounts of data in real time. Some of the vertical scaling solutions provide good implementation of signature based detection. Unfortunately these approaches treat network flows across different subnets and cannot apply anomaly-based classification if attacks originate from multiple machines at a lower speed, like the scenario of Peer-to-Peer Botnets. In this paper the authors build up on the progress of open source tools like Hadoop, Hive and Mahout to provide a scalable implementation of quasi-real-time intrusion detection system. The implementation is used to detect Peer-to-Peer Botnet attacks using machine learning approach. The contributions of this paper are as follows: (1) Building a distributed framework using Hive for sniffing and processing network traces enabling extraction of dynamic network features; (2) Using the parallel processing power of Mahout to build Random Forest based Decision Tree model which is applied to the problem of Peer-to-Peer Botnet detection in quasi-real-time. The implementation setup and performance metrics are presented as initial observations and future extensions are proposed. 2014 Elsevier Inc. All rights reserved.", "title": "" }, { "docid": "16426be05f066e805e48a49a82e80e2e", "text": "Ontologies have been developed and used by several researchers in different knowledge domains aiming to ease the structuring and management of knowledge, and to create a unique standard to represent concepts of such a knowledge domain. Considering the computer security domain, several tools can be used to manage and store security information. These tools generate a great amount of security alerts, which are stored in different formats. This lack of standard and the amount of data make the tasks of the security administrators even harder, because they have to understand, using their tacit knowledge, different security alerts to make correlation and solve security problems. Aiming to assist the administrators in executing these tasks efficiently, this paper presents the main features of the computer security incident ontology developed to model, using a unique standard, the concepts of the security incident domain, and how the ontology has been evaluated.", "title": "" }, { "docid": "980a9d76136ffa057865d2bb425dc8e7", "text": "Research in digital watermarking is mature. Several software implementations of watermarking algorithms are described in the literature, but few attempts have been made to describe hardware implementations. The ultimate objective of the research presented in this paper was to develop low-power, highperformance, real-time, reliable and secure watermarking systems, which can be achieved through hardware implementations. In this paper, we discuss the development of a very-large-scale integration architecture for a high-performance watermarking chip that can perform both invisible robust and invisible fragile image watermarking in the spatial domain. We prototyped the watermarking chip in two ways: (i) by using a Xilinx field-programmable gate array and (ii) by building a custom integrated circuit. To the best of our knowledge, this prototype is the first watermarking chip with both invisible robust and invisible fragile watermarking capabilities.", "title": "" }, { "docid": "b2c789ba7dbb43ebafa331ea8ae252c1", "text": "Twelve right-handed men performed two mental rotation tasks and two control tasks while whole-head functional magnetic resonance imaging was applied. Mental rotation tasks implied the comparison of different sorts of stimulus pairs, viz. pictures of hands and pictures of tools, which were either identical or mirror images and which were rotated in the plane of the picture. Control tasks were equal except that stimuli pairs were not rotated. Reaction time profiles were consistent with those found in previous research. Imaging data replicate classic areas of activation in mental rotation for hands and tools (bilateral superior parietal lobule and visual extrastriate cortex) but show an important difference in premotor area activation: pairs of hands engender bilateral premotor activation while pairs of tools elicit only left premotor brain activation. The results suggest that participants imagined moving both their hands in the hand condition, while imagining manipulating objects with their hand of preference (right hand) in the tool condition. The covert actions of motor imagery appear to mimic the \"natural way\" in which a person would manipulate the object in reality, and the activation of cortical regions during mental rotation seems at least in part determined by an intrinsic process that depends on the afforded actions elicited by the kind of stimuli presented.", "title": "" }, { "docid": "8dc8dd1ded0a74ec4d004122463025bf", "text": "To evaluate retinal function objectively in subjects with different stages of age-related macular degeneration (AMD) using multifocal electroretinography (mfERG) and compare it with age-matched control group. A total of 42 subjects with AMD and 37 age-matched healthy control group aged over 55 years were included in this prospective study. mfERG test was performed to all subjects. Average values in concentric ring analysis in four rings (ring 1, from 0° to 5° of eccentricity relative to fixation; ring 2, from 5° to 10°; ring 3, from 10° to 15°; ring 4, over 15°) and in quadrant analysis (superior nasal quadrant, superior temporal quadrant, inferior nasal quadrant and inferior temporal quadrant) were recorded. Test results were evaluated by one-way ANOVA test and independent samples t test. In mfERG concentric ring analysis, N1 amplitude, P1 amplitude and N2 amplitude were found to be lower and N1 implicit time, P1 implicit time and N2 implicit time were found to be delayed in subjects with AMD compared to control group. In quadrant analysis, N1, P1 and N2 amplitude was lower in all quadrants, whereas N1 implicit time was normal and P1 and N2 implicit times were prolonged in subjects with AMD. mfERG is a useful test in evaluating retinal function in subjects with AMD. AMD affects both photoreceptors and inner retinal function at late stages.", "title": "" }, { "docid": "03d41408da6babfc97399c64860f50cd", "text": "The nine degrees-of-freedom (DOF) inertial measurement units (IMU) are generally composed of three kinds of sensor: accelerometer, gyroscope and magnetometer. The calibration of these sensor suites not only requires turn-table or purpose-built fixture, but also entails a complex and laborious procedure in data sampling. In this paper, we propose a method to calibrate a 9-DOF IMU by using a set of casually sampled raw sensor measurement. Our sampling procedure allows the sensor suite to move by hand and only requires about six minutes of fast and slow arbitrary rotations with intermittent pauses. It requires neither the specially-designed fixture and equipment, nor the strict sequences of sampling steps. At the core of our method are the techniques of data filtering and a hierarchical scheme for calibration. All the raw sensor measurements are preprocessed by a series of band-pass filters before use. And our calibration scheme makes use of the gravity and the ambient magnetic field as references, and hierarchically calibrates the sensor model parameters towards the minimization of the mis-alignment, scaling and bias errors. Moreover, the calibration steps are formulated as a series of function optimization problems and are solved by an evolutionary algorithm. Finally, the performance of our method is experimentally evaluated. The results show that our method can effectively calibrate the sensor model parameters from one set of raw sensor measurement, and yield consistent calibration results.", "title": "" }, { "docid": "d93609853422aed1c326d35ab820095d", "text": "We present a method for inferring a 4D light field of a hidden scene from 2D shadows cast by a known occluder on a diffuse wall. We do this by determining how light naturally reflected off surfaces in the hidden scene interacts with the occluder. By modeling the light transport as a linear system, and incorporating prior knowledge about light field structures, we can invert the system to recover the hidden scene. We demonstrate results of our inference method across simulations and experiments with different types of occluders. For instance, using the shadow cast by a real house plant, we are able to recover low resolution light fields with different levels of texture and parallax complexity. We provide two experimental results: a human subject and two planar elements at different depths.", "title": "" }, { "docid": "9eef13dc72daa4ec6cce816c61364d2d", "text": "Bootstrapping is a crucial operation in Gentry’s breakthrough work on fully homomorphic encryption (FHE), where a homomorphic encryption scheme evaluates its own decryption algorithm. There has been a couple of implementations of bootstrapping, among which HElib arguably marks the state-of-the-art in terms of throughput, ciphertext/message size ratio and support for large plaintext moduli. In this work, we applied a family of “lowest digit removal” polynomials to design an improved homomorphic digit extraction algorithm which is a crucial part in bootstrapping for both FV and BGV schemes. When the secret key has 1-norm h = ||s||1 and the plaintext modulus is t = p, we achieved bootstrapping depth log h + log(logp(ht)) in FV scheme. In case of the BGV scheme, we brought down the depth from log h+ 2 log t to log h + log t. We implemented bootstrapping for FV in the SEAL library. We also introduced another “slim mode”, which restrict the plaintexts to batched vectors in Zpr . The slim mode has similar throughput as the full mode, while each individual run is much faster and uses much smaller memory. For example, bootstrapping takes 6.75 seconds for vectors over GF (127) with 64 slots and 1381 seconds for vectors over GF (257) with 128 slots. We also implemented our improved digit extraction procedure for the BGV scheme in HElib.", "title": "" }, { "docid": "ed351364658a99d4d9c10dd2b9be3c92", "text": "Information technology continues to provide opportunities to alter the decisionmaking behavior of individuals, groups and organizations. Two related changes that are emerging are social media and Web 2.0 technologies. These technologies can positively and negatively impact the rationality and effectiveness of decision-making. For example, changes that help marketing managers alter consumer decision behavior may result in poorer decisions by consumers. Also, managers who heavily rely on a social network rather than expert opinion and facts may make biased decisions. A number of theories can help explain how social media may impact decision-making and the consequences.", "title": "" }, { "docid": "036908ecb1c648dc900f41dcde2b1a15", "text": "A Fractional Fourier Transform (FrFT) based waveform design for joint radar-communication systems (Co-Radar) that embeds data into chirp sub-carriers with different time-frequency rates has been recently presented. Simulations demonstrated the possibility to reach data rates as high as 3.660 Mb/s while maintaining good radar performance compared to a Linear Frequency Modulated (LFM) pulse that occupies the same bandwidth. In this paper the experimental validation of the concept is presented. The system is considered in its basic configuration, with a mono-static radar that generates the waveforms and performs basic radar tasks, and a communication receiver in charge of the pulse demodulation. The entire network is implemented on a Software Defined Radio (SDR) device. The system is then used to acquire data and assess radar and communication capabilities.", "title": "" }, { "docid": "7df97d3a5c393053b22255a0414e574a", "text": "Let G be a directed graph containing n vertices, one of which is a distinguished source s, and m edges, each with a non-negative cost. We consider the problem of finding, for each possible sink vertex u , a pair of edge-disjoint paths from s to u of minimum total edge cost. Suurballe has given an O(n2 1ogn)-time algorithm for this problem. We give an implementation of Suurballe’s algorithm that runs in O(m log(, +,+)n) time and O(m) space. Our algorithm builds an implicit representation of the n pairs of paths; given this representation, the time necessary to explicitly construct the pair of paths for any given sink is O(1) per edge on the paths.", "title": "" }, { "docid": "87ecd8c0331b6277cddb6a9a11cec42f", "text": "OBJECTIVE\nThis study aimed to determine the principal factors contributing to the cost of avoiding a birth with Down syndrome by using cell-free DNA (cfDNA) to replace conventional screening.\n\n\nMETHODS\nA range of unit costs were assigned to each item in the screening process. Detection rates were estimated by meta-analysis and modeling. The marginal cost associated with the detection of additional cases using cfDNA was estimated from the difference in average costs divided by the difference in detection.\n\n\nRESULTS\nThe main factor was the unit cost of cfDNA testing. For example, replacing a combined test costing $150 with 3% false-positive rate and invasive testing at $1000, by cfDNA tests at $2000, $1500, $1000, and $500, the marginal cost is $8.0, $5.8, $3.6, and $1.4m, respectively. Costs were lower when replacing a quadruple test and higher for a 5% false-positive rate, but the relative importance of cfDNA unit cost was unchanged. A contingent policy whereby 10% to 20% women were selected for cfDNA testing by conventional screening was considerably more cost-efficient. Costs were sensitive to cfDNA uptake.\n\n\nCONCLUSION\nUniversal cfDNA screening for Down syndrome will only become affordable by public health purchasers if costs fall substantially. Until this happens, the contingent use of cfDNA is recommended.", "title": "" } ]
scidocsrr
a8a5e1a068988b01514f535de3fd864c
GU IRLAB at SemEval-2018 Task 7: Tree-LSTMs for Scientific Relation Classification
[ { "docid": "6f973565132ed9a535551ca7ec78086d", "text": "This paper describes the first task on semantic relation extraction and classification in scientific paper abstracts at SemEval 2018. The challenge focuses on domain-specific semantic relations and includes three different subtasks. The subtasks were designed so as to compare and quantify the effect of different pre-processing steps on the relation classification results. We expect the task to be relevant for a broad range of researchers working on extracting specialized knowledge from domain corpora, for example but not limited to scientific or bio-medical information extraction. The task attracted a total of 32 participants, with 158 submissions across different scenarios.", "title": "" }, { "docid": "a4bb8b5b749fb8a95c06a9afab9a17bb", "text": "Many Natural Language Processing applications nowadays rely on pre-trained word representations estimated from large text corpora such as news collections, Wikipedia and Web Crawl. In this paper, we show how to train high-quality word vector representations by using a combination of known tricks that are however rarely used together. The main result of our work is the new set of publicly available pre-trained models that outperform the current state of the art by a large margin on a number of tasks.", "title": "" }, { "docid": "1593fd6f9492adc851c709e3dd9b3c5f", "text": "This paper addresses the problem of extracting keyphrases from scientific articles and categorizing them as corresponding to a task, process, or material. We cast the problem as sequence tagging and introduce semi-supervised methods to a neural tagging model, which builds on recent advances in named entity recognition. Since annotated training data is scarce in this domain, we introduce a graph-based semi-supervised algorithm together with a data selection scheme to leverage unannotated articles. Both inductive and transductive semi-supervised learning strategies outperform state-of-the-art information extraction performance on the 2017 SemEval Task 10 ScienceIE task.", "title": "" } ]
[ { "docid": "a1ea62378027e20466a4c16cbc96aa63", "text": "A key benefit of connecting edge and cloud computing is the capability to achieve high-throughput under high concurrent accesses, mobility support, real-time processing guarantees, and data persistency. For example, the elastic provisioning and storage capabilities provided by cloud computing allow us to cope with scalability, persistency and reliability requirements and to adapt the infrastructure capacity to the exacting needs based on the amount of generated data.", "title": "" }, { "docid": "a86c79f52fc8399ab00430459d4f0737", "text": "Complex networks have emerged as a simple yet powerful framework to represent and analyze a wide range of complex systems. The problem of ranking the nodes and the edges in complex networks is critical for a broad range of real-world problems because it affects how we access online information and products, how success and talent are evaluated in human activities, and how scarce resources are allocated by companies and policymakers, among others. This calls for a deep understanding of how existing ranking algorithmsperform, andwhich are their possible biases thatmay impair their effectiveness. Many popular ranking algorithms (such as Google’s PageRank) are static in nature and, as a consequence, they exhibit important shortcomings when applied to real networks that rapidly evolve in time. At the same time, recent advances in the understanding and modeling of evolving networks have enabled the development of a wide and diverse range of ranking algorithms that take the temporal dimension into account. The aim of this review is to survey the existing ranking algorithms, both static and time-aware, and their applications to evolving networks.We emphasize both the impact of network evolution on well-established static algorithms and the benefits from including the temporal dimension for tasks such as prediction of network traffic, prediction of future links, and identification of significant nodes. © 2017 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "59626458b4f250a59bb5c47586afe023", "text": "Previous work for relation extraction from free text is mainly based on intra-sentence information. As relations might be mentioned across sentences, inter-sentence information can be leveraged to improve distantly supervised relation extraction. To effectively exploit inter-sentence information , we propose a ranking-based approach, which first learns a scoring function based on a listwise learning-to-rank model and then uses it for multi-label relation extraction. Experimental results verify the effectiveness of our method for aggregating information across sentences. Additionally, to further improve the ranking of high-quality extractions, we propose an effective method to rank relations from different entity pairs. This method can be easily integrated into our overall relation extraction framework, and boosts the precision significantly.", "title": "" }, { "docid": "52ebff6e9509b27185f9f12bc65d86f8", "text": "We address the problem of simplifying Portuguese texts at the sentence level by treating it as a \"translation task\". We use the Statistical Machine Translation (SMT) framework to learn how to translate from complex to simplified sentences. Given a parallel corpus of original and simplified texts, aligned at the sentence level, we train a standard SMT system and evaluate the \"translations\" produced using both standard SMT metrics like BLEU and manual inspection. Results are promising according to both evaluations, showing that while the model is usually overcautious in producing simplifications, the overall quality of the sentences is not degraded and certain types of simplification operations, mainly lexical, are appropriately captured.", "title": "" }, { "docid": "9e11598c99b0345525e9df897e108e9c", "text": "A new shielding scheme, active shielding, is proposed for reducing delays on interconnects. As opposed to conventional (passive) shielding, the active shielding approach helps to speed up signal propagation on a wire by ensuring in-phase switching of adjacent nets. Results show that the active shielding scheme improves performance by up to 16% compared to passive shields and up to 29% compared to unshielded wires. When signal slopes at the end of the line are compared, savings of up to 38% and 27% can be achieved when compared to passive shields and unshielded wires, respectively.", "title": "" }, { "docid": "b54a2d0350ceac52ed92565af267b6e2", "text": "In this paper, we address the problem of classifying image sets for face recognition, where each set contains images belonging to the same subject and typically covering large variations. By modeling each image set as a manifold, we formulate the problem as the computation of the distance between two manifolds, called manifold-manifold distance (MMD). Since an image set can come in three pattern levels, point, subspace, and manifold, we systematically study the distance among the three levels and formulate them in a general multilevel MMD framework. Specifically, we express a manifold by a collection of local linear models, each depicted by a subspace. MMD is then converted to integrate the distances between pairs of subspaces from one of the involved manifolds. We theoretically and experimentally study several configurations of the ingredients of MMD. The proposed method is applied to the task of face recognition with image sets, where identification is achieved by seeking the minimum MMD from the probe to the gallery of image sets. Our experiments demonstrate that, as a general set similarity measure, MMD consistently outperforms other competing nondiscriminative methods and is also promisingly comparable to the state-of-the-art discriminative methods.", "title": "" }, { "docid": "68a6edfafb8e7dab899f8ce1f76d311c", "text": "Networks such as social networks, airplane networks, and citation networks are ubiquitous. The adjacency matrix is often adopted to represent a network, which is usually high dimensional and sparse. However, to apply advanced machine learning algorithms to network data, low-dimensional and continuous representations are desired. To achieve this goal, many network embedding methods have been proposed recently. The majority of existing methods facilitate the local information i.e. local connections between nodes, to learn the representations, while completely neglecting global information (or node status), which has been proven to boost numerous network mining tasks such as link prediction and social recommendation. Hence, it also has potential to advance network embedding. In this paper, we study the problem of preserving local and global information for network embedding. In particular, we introduce an approach to capture global information and propose a network embedding framework LOG, which can coherently model LOcal and Global information. Experimental results demonstrate the ability to preserve global information of the proposed framework. Further experiments are conducted to demonstrate the effectiveness of learned representations of the proposed framework.", "title": "" }, { "docid": "b7eb2c65c459c9d5776c1e2cba84706c", "text": "Observers, searching for targets among distractor items, guide attention with a mix of top-down information--based on observers' knowledge--and bottom-up information--stimulus-based and largely independent of that knowledge. There are 2 types of top-down guidance: explicit information (e.g., verbal description) and implicit priming by preceding targets (top-down because it implies knowledge of previous searches). Experiments 1 and 2 separate bottom-up and top-down contributions to singleton search. Experiment 3 shows that priming effects are based more strongly on target than on distractor identity. Experiments 4 and 5 show that more difficult search for one type of target (color) can impair search for other types (size, orientation). Experiment 6 shows that priming guides attention and does not just modulate response.", "title": "" }, { "docid": "be17c7401c1ba4da153bf5816a291793", "text": "The Android platform is designed to support mutually untrusted third-party apps, which run as isolated processes but may interact via platform-controlled mechanisms, called Intents. Interactions among third-party apps are intended and can contribute to a rich user experience, for example, the ability to share pictures from one app with another. The Android platform presents an interesting point in a design space of module systems that is biased toward isolation, extensibility, and untrusted contributions. The Intent mechanism essentially provides message channels among modules, in which the set of message types is extensible. However, the module system has design limitations including the lack of consistent mechanisms to document message types, very limited checking that a message conforms to its specifications, the inability to explicitly declare dependencies on other modules, and the lack of checks for backward compatibility as message types evolve over time. In order to understand the degree to which these design limitations result in real issues, we studied a broad corpus of apps and cross-validated our results against app documentation and Android support forums. Our findings suggest that design limitations do indeed cause development problems. Based on our results, we outline further research questions and propose possible mitigation strategies.", "title": "" }, { "docid": "2a827ddb30be8cdc3ecaf09da2e898de", "text": "There is an increasing interest on accelerating neural networks for real-time applications. We study the studentteacher strategy, in which a small and fast student network is trained with the auxiliary information learned from a large and accurate teacher network. We propose to use conditional adversarial networks to learn the loss function to transfer knowledge from teacher to student. The proposed method is particularly effective for relatively small student networks. Moreover, experimental results show the effect of network size when the modern networks are used as student. We empirically study the trade-off between inference time and classification accuracy, and provide suggestions on choosing a proper student network.", "title": "" }, { "docid": "a39fb4e8c15878ba4fdac54f02451789", "text": "The Cloud computing system can be easily threatened by various attacks, because most of the cloud computing systems provide service to so many people who are not proven to be trustworthy. Due to their distributed nature, cloud computing environment are easy targets for intruders[1]. There are various Intrusion Detection Systems having various specifications to each. Cloud computing have two approaches i. e. Knowledge-based IDS and Behavior-Based IDS to detect intrusions in cloud computing. Behavior-Based IDS assumes that an intrusion can be detected by observing a deviation from normal to expected behavior of the system or user[2]s. Knowledge-based IDS techniques apply knowledge", "title": "" }, { "docid": "274829e884c6ba5f425efbdce7604108", "text": "The Internet of Things (IoT) is constantly evolving and is giving unique solutions to the everyday problems faced by man. “Smart City” is one such implementation aimed at improving the lifestyle of human beings. One of the major hurdles in most cities is its solid waste management, and effective management of the solid waste produced becomes an integral part of a smart city. This paper aims at providing an IoT based architectural solution to tackle the problems faced by the present solid waste management system. By providing a complete IoT based system, the process of tracking, collecting, and managing the solid waste can be easily automated and monitored efficiently. By taking the example of the solid waste management crisis of Bengaluru city, India, we have come up with the overall system architecture and protocol stack to give a IoT based solution to improve the reliability and efficiency of the system. By making use of sensors, we collect data from the garbage bins and send them to a gateway using LoRa technology. The data from various garbage bins are collected by the gateway and sent to the cloud over the Internet using the MQTT (Message Queue Telemetry Transport) protocol. The main advantage of the proposed system is the use of LoRa technology for data communication which enables long distance data transmission along with low power consumption as compared to Wi-Fi, Bluetooth or Zigbee.", "title": "" }, { "docid": "f55f9174b70196e912c0cbe477ada467", "text": "This paper studies the use of structural representations for learning relations between pairs of short texts (e.g., sentences or paragraphs) of the kind: the second text answers to, or conveys exactly the same information of, or is implied by, the first text. Engineering effective features that can capture syntactic and semantic relations between the constituents composing the target text pairs is rather complex. Thus, we define syntactic and semantic structures representing the text pairs and then apply graph and tree kernels to them for automatically engineering features in Support Vector Machines. We carry out an extensive comparative analysis of stateof-the-art models for this type of relational learning. Our findings allow for achieving the highest accuracy in two different and important related tasks, i.e., Paraphrasing Identification and Textual Entailment Recognition.", "title": "" }, { "docid": "16f5b9d30f579fd494f7d239b2ebee3a", "text": "Previous studies have identified that images carry the attribute of memorability, a predictive value of whether a novel image will be later remembered or forgotten. Here we investigate the interplay between intrinsic and extrinsic factors that affect image memorability. First, we find that intrinsic differences in memorability exist at a finer-grained scale than previously documented. Second, we test two extrinsic factors: image context and observer behavior. Building on prior findings that images that are distinct with respect to their context are better remembered, we propose an information-theoretic model of image distinctiveness. Our model can automatically predict how changes in context change the memorability of natural images. In addition to context, we study a second extrinsic factor: where an observer looks while memorizing an image. It turns out that eye movements provide additional information that can predict whether or not an image will be remembered, on a trial-by-trial basis. Together, by considering both intrinsic and extrinsic effects on memorability, we arrive at a more complete and fine-grained model of image memorability than previously available.", "title": "" }, { "docid": "b101ab8f2242e85ccd7948b0b3ffe9b4", "text": "This paper describes a language-independent model for multi-class sentiment analysis using a simple neural network architecture of five layers (Embedding, Conv1D, GlobalMaxPooling and two Fully-Connected). The advantage of the proposed model is that it does not rely on language-specific features such as ontologies, dictionaries, or morphological or syntactic pre-processing. Equally important, our system does not use pre-trained word2vec embeddings which can be costly to obtain and train for some languages. In this research, we also demonstrate that oversampling can be an effective approach for correcting class imbalance in the data. We evaluate our methods on three publicly available datasets for English, German and Arabic, and the results show that our system’s performance is comparable to, or even better than, the state of the art for these datasets. We make our source-code publicly available.", "title": "" }, { "docid": "e979aa517c072730067354386190198f", "text": "Current models for stance classification often treat each target independently, but in many applications, there exist natural dependencies among targets, e.g., stance towards two or more politicians in an election or towards several brands of the same product. In this paper, we focus on the problem of multi-target stance detection. We present a new dataset that we built for this task. Furthermore, We experiment with several neural models on the dataset and show that they are more effective in jointly modeling the overall position towards two related targets compared to independent predictions and other models of joint learning, such as cascading classification. We make the new dataset publicly available, in order to facilitate further research in multi-target stance classification.", "title": "" }, { "docid": "17ed907c630ec22cbbb5c19b5971238d", "text": "The fastest tools for network reachability queries use adhoc algorithms to compute all packets from a source S that can reach a destination D. This paper examines whether network reachability can be solved efficiently using existing verification tools. While most verification tools only compute reachability (“Can S reach D?”), we efficiently generalize them to compute all reachable packets. Using new and old benchmarks, we compare model checkers, SAT solvers and various Datalog implementations. The only existing verification method that worked competitively on all benchmarks in seconds was Datalog with a new composite Filter-Project operator and a Difference of Cubes representation. While Datalog is slightly slower than the Hassel C tool, it is far more flexible. We also present new results that more precisely characterize the computational complexity of network verification. This paper also provides a gentle introduction to program verification for the networking community.", "title": "" }, { "docid": "c09391a25defcb797a7c8da3f429fafa", "text": "BACKGROUND\nTo examine the postulated relationship between Ambulatory Care Sensitive Conditions (ACSC) and Primary Health Care (PHC) in the US context for the European context, in order to develop an ACSC list as markers of PHC effectiveness and to specify which PHC activities are primarily responsible for reducing hospitalization rates.\n\n\nMETHODS\nTo apply the criteria proposed by Solberg and Weissman to obtain a list of codes of ACSC and to consider the PHC intervention according to a panel of experts. Five selection criteria: i) existence of prior studies; ii) hospitalization rate at least 1/10,000 or 'risky health problem'; iii) clarity in definition and coding; iv) potentially avoidable hospitalization through PHC; v) hospitalization necessary when health problem occurs. Fulfilment of all criteria was required for developing the final ACSC list. A sample of 248,050 discharges corresponding to 2,248,976 inhabitants of Catalonia in 1996 provided hospitalization rate data. A Delphi survey was performed with a group of 44 experts reviewing 113 ICD diagnostic codes (International Classification of Diseases, 9th Revision, Clinical Modification), previously considered to be ACSC.\n\n\nRESULTS\nThe five criteria selected 61 ICD as a core list of ACSC codes and 90 ICD for an expanded list.\n\n\nCONCLUSIONS\nA core list of ACSC as markers of PHC effectiveness identifies health conditions amenable to specific aspects of PHC and minimizes the limitations attributable to variations in hospital admission policies. An expanded list should be useful to evaluate global PHC performance and to analyse market responsibility for ACSC by PHC and Specialist Care.", "title": "" }, { "docid": "0f84e488b0e0b18e829aee14213dcebe", "text": "The ability to reliably identify sarcasm and irony in text can improve the perfo rmance of many Natural Language Processing (NLP) systems including summarization, sentiment analysis, etc. The existing sar casm detection systems have focused on identifying sarcasm on a sentence level or for a specific phrase. However, often it is impos sible to identify a sentence containing sarcasm without knowing the context. In this paper we describe a corpus generation experiment w h re e collect regular and sarcastic Amazon product reviews. We perform qualitative and quantitative analysis of the corpus. The resu lting corpus can be used for identifying sarcasm on two levels: a document and a text utterance (where a text utterance can be as short as a sentence and as long as a whole document).", "title": "" }, { "docid": "7c2ce686e8ac6f8c073a0c994dd7caf3", "text": "Exploring architectures for large, modern FPGAs requires sophisticated software that can model and target hypothetical devices. Furthermore, research into new CAD algorithms often requires a complete and open source baseline CAD flow. This article describes recent advances in the open source Verilog-to-Routing (VTR) CAD flow that enable further research in these areas. VTR now supports designs with multiple clocks in both timing analysis and optimization. Hard adder/carry logic can be included in an architecture in various ways and significantly improves the performance of arithmetic circuits. The flow now models energy consumption, an increasingly important concern. The speed and quality of the packing algorithms have been significantly improved. VTR can now generate a netlist of the final post-routed circuit which enables detailed simulation of a design for a variety of purposes. We also release new FPGA architecture files and models that are much closer to modern commercial architectures, enabling more realistic experiments. Finally, we show that while this version of VTR supports new and complex features, it has a 1.5× compile time speed-up for simple architectures and a 6× speed-up for complex architectures compared to the previous release, with no degradation to timing or wire-length quality.", "title": "" } ]
scidocsrr
8681b706596ec0cdc42c757d4012acac
Coarse-and Fine-Grained Sentiment Analysis of Social Media Text
[ { "docid": "fc70a1820f838664b8b51b5adbb6b0db", "text": "This paper presents a method for identifying an opinion with its holder and topic, given a sentence from online news media texts. We introduce an approach of exploiting the semantic structure of a sentence, anchored to an opinion bearing verb or adjective. This method uses semantic role labeling as an intermediate step to label an opinion holder and topic using data from FrameNet. We decompose our task into three phases: identifying an opinion-bearing word, labeling semantic roles related to the word in the sentence, and then finding the holder and the topic of the opinion word among the labeled semantic roles. For a broader coverage, we also employ a clustering technique to predict the most probable frame for a word which is not defined in FrameNet. Our experimental results show that our system performs significantly better than the baseline.", "title": "" }, { "docid": "03b3d8220753570a6b2f21916fe4f423", "text": "Recent systems have been developed for sentiment classification, opinion recogni­ tion, and opinion analysis (e.g., detect­ ing polarity and strength). We pursue an­ other aspect of opinion analysis: identi­ fying the sources of opinions, emotions, and sentiments. We view this problem as an information extraction task and adopt a hybrid approach that combines Con­ ditional Random Fields (Lafferty et al., 2001) and a variation of AutoSlog (Riloff, 1996a). While CRFs model source iden­ tification as a sequence tagging task, Au­ toSlog learns extraction patterns. Our re­ sults show that the combination of these two methods performs better than either one alone. The resulting system identifies opinion sources with precision and recall using a head noun matching measure, and precision and recall using an overlap measure.", "title": "" } ]
[ { "docid": "452285eb334f8b4ecc17592e53d7080e", "text": "Fathers are taking on more childcare and household responsibilities than they used to and many non-profit and government organizations have pushed for changes in policies to support fathers. Despite this effort, little research has explored how fathers go online related to their roles as fathers. Drawing on an interview study with 37 fathers, we find that they use social media to document and archive fatherhood, learn how to be a father, and access social support. They also go online to support diverse family needs, such as single fathers' use of Reddit instead of Facebook, fathers raised by single mothers' search for role models online, and stay-at-home fathers' use of father blogs. However, fathers are constrained by privacy concerns and perceptions of judgment relating to sharing content online about their children. Drawing on theories of fatherhood, we present theoretical and design ideas for designing online spaces to better support fathers and fatherhood. We conclude with a call for a research agenda to support fathers online.", "title": "" }, { "docid": "de37d1ba8d9c467b5059a02e2eb6ed6a", "text": "Periodontal disease represents a group of oral inflammatory infections initiated by oral pathogens which exist as a complex biofilms on the tooth surface and cause destruction to tooth supporting tissues. The severity of this disease ranges from mild and reversible inflammation of the gingiva (gingivitis) to chronic destruction of connective tissues, the formation of periodontal pocket and ultimately result in loss of teeth. While human subgingival plaque harbors more than 500 bacterial species, considerable research has shown that Porphyromonas gingivalis, a Gram-negative anaerobic bacterium, is the major etiologic agent which contributes to chronic periodontitis. This black-pigmented bacterium produces a myriad of virulence factors that cause destruction to periodontal tissues either directly or indirectly by modulating the host inflammatory response. Here, this review provides an overview of P. gingivalis and how its virulence factors contribute to the pathogenesis with other microbiome consortium in oral cavity.", "title": "" }, { "docid": "05a77d687230dc28697ca1751586f660", "text": "In recent years, there has been a huge increase in the number of bots online, varying from Web crawlers for search engines, to chatbots for online customer service, spambots on social media, and content-editing bots in online collaboration communities. The online world has turned into an ecosystem of bots. However, our knowledge of how these automated agents are interacting with each other is rather poor. Bots are predictable automatons that do not have the capacity for emotions, meaning-making, creativity, and sociality and it is hence natural to expect interactions between bots to be relatively predictable and uneventful. In this article, we analyze the interactions between bots that edit articles on Wikipedia. We track the extent to which bots undid each other's edits over the period 2001-2010, model how pairs of bots interact over time, and identify different types of interaction trajectories. We find that, although Wikipedia bots are intended to support the encyclopedia, they often undo each other's edits and these sterile \"fights\" may sometimes continue for years. Unlike humans on Wikipedia, bots' interactions tend to occur over longer periods of time and to be more reciprocated. Yet, just like humans, bots in different cultural environments may behave differently. Our research suggests that even relatively \"dumb\" bots may give rise to complex interactions, and this carries important implications for Artificial Intelligence research. Understanding what affects bot-bot interactions is crucial for managing social media well, providing adequate cyber-security, and designing well functioning autonomous vehicles.", "title": "" }, { "docid": "fa14a12ca1971416100efd8e79089428", "text": "Some statistical and machine learning methods have been proposed to build hard drive prediction models based on the SMART attributes, and have achieved good prediction performance. However, these models were not evaluated in the way as they are used in real-world data centers. Moreover, the hard drives deteriorate gradually, but these models can not describe this gradual change precisely. This paper proposes new hard drive failure prediction models based on Classification and Regression Trees, which perform better in prediction performance as well as stability and interpretability compared with the state-of the-art model, the Back propagation artificial neural network model. Experiments demonstrate that the Classification Tree (CT) model predicts over 95% of failures at a false alarm rate (FAR) under 0.1% on a real-world dataset containing 25,792 drives. Aiming at the practical application of prediction models, we test them with different drive families, with fewer number of drives, and with different model updating strategies. The CT model still shows steady and good performance. We propose a health degree model based on Regression Tree (RT) as well, which can give the drive a health assessment rather than a simple classification result. Therefore, the approach can deal with warnings raised by the prediction model in order of their health degrees. We implement a reliability model for RAID-6 systems with proactive fault tolerance and show that our CT model can significantly improve the reliability and/or reduce construction and maintenance cost of large-scale storage systems.", "title": "" }, { "docid": "2e0882f6087269769a9ca1e3d2289af9", "text": "The demand for minority representation in video games often focuses on proving that members of marginalized groups are gamers. In turn, it is asserted that the gaming industry should focus on appealing to these players via targeted content. Being targeted as a gamer, however, does not a gamer make. Identity as a gamer intersects with other identities like gender, race, and sexuality. Negative connotations about gaming lead people to not identify as gamers, and even to not play video games. This article concludes, based on interview data, that those invested in diversity in video games must focus their attention on the construction of the medium, and not the construction of the audience as such. This shift in academic attention is necessary to develop arguments for representation in games that do not rely on marking groups as specific kinds of gaming markets via identifiers like gender, race, and sexuality.", "title": "" }, { "docid": "b3cbd3d9deaed22f1b936ad141d10078", "text": "Thirty-eight fruit salad samples including cantaloupe, citrus fruits, honeydew, pineapple, cut strawberries and mixed fruit salads, and 65 pasteurized fruit juice samples (apple, carrot, grapefruit, grape and orange juices, apple cider, and soy milk) were purchased from local supermarkets in the Washington, DC area and tested for fungal contamination. The majority of fruit salad samples (97%) were contaminated with yeasts at levels ranging from <2.0 to 9.72 log10 of colony forming units per gram (cfu/g). Frequently encountered yeasts were Pichia spp., Candida pulcherrima, C. lambica, C. sake, Rhodotorula spp., and Debaryomyces polymorphus. Low numbers of Penicillium spp. were found in pineapple salads, whereas Cladosporium spp. were present in mixed fruit and cut strawberry salads. Twenty-two per cent of the fruit juice samples tested showed fungal contamination. Yeasts were the predominant contaminants ranging from <1.0 to 6.83 log10 cfu/ml. Yeasts commonly found in fruit juices were C. lambica, C. sake, and Rhodotorula rubra. Geotrichum spp. and low numbers of Penicillium and Fusarium spp. (1.70 and 1.60 log10 cfu/ml, respectively) were present in grapefruit juice.", "title": "" }, { "docid": "55903de2bf1c877fac3fdfc1a1db68fc", "text": "UK small to medium sized enterprises (SMEs) are suffering increasing levels of cybersecurity breaches and are a major point of vulnerability in the supply chain networks in which they participate. A key factor for achieving optimal security levels within supply chains is the management and sharing of cybersecurity information associated with specific metrics. Such information sharing schemes amongst SMEs in a supply chain network, however, would give rise to a certain level of risk exposure. In response, the purpose of this paper is to assess the implications of adopting select cybersecurity metrics for information sharing in SME supply chain consortia. Thus, a set of commonly used metrics in a prototypical cybersecurity scenario were chosen and tested from a survey of 17 UK SMEs. The results were analysed in respect of two variables; namely, usefulness of implementation and willingness to share across supply chains. Consequently, we propose a Cybersecurity Information Sharing Taxonomy for identifying risk exposure categories for SMEs sharing cybersecurity information, which can be applied to developing Information Sharing Agreements (ISAs) within SME supply chain consortia.", "title": "" }, { "docid": "fb89a5aa87f1458177d6a32ef25fdf3b", "text": "The increase in population, the rapid economic growth and the rise in community living standards accelerate municipal solid waste (MSW) generation in developing cities. This problem is especially serious in Pudong New Area, Shanghai, China. The daily amount of MSW generated in Pudong was about 1.11 kg per person in 2006. According to the current population growth trend, the solid waste quantity generated will continue to increase with the city's development. In this paper, we describe a waste generation and composition analysis and provide a comprehensive review of municipal solid waste management (MSWM) in Pudong. Some of the important aspects of waste management, such as the current status of waste collection, transport and disposal in Pudong, will be illustrated. Also, the current situation will be evaluated, and its problems will be identified.", "title": "" }, { "docid": "049a7164a973fb515ed033ba216ec344", "text": "Modern vehicle fleets, e.g., for ridesharing platforms and taxi companies, can reduce passengers' waiting times by proactively dispatching vehicles to locations where pickup requests are anticipated in the future. Yet it is unclear how to best do this: optimal dispatching requires optimizing over several sources of uncertainty, including vehicles' travel times to their dispatched locations, as well as coordinating between vehicles so that they do not attempt to pick up the same passenger. While prior works have developed models for this uncertainty and used them to optimize dispatch policies, in this work we introduce a model-free approach. Specifically, we propose MOVI, a Deep Q-network (DQN)-based framework that directly learns the optimal vehicle dispatch policy. Since DQNs scale poorly with a large number of possible dispatches, we streamline our DQN training and suppose that each individual vehicle independently learns its own optimal policy, ensuring scalability at the cost of less coordination between vehicles. We then formulate a centralized receding-horizon control (RHC) policy to compare with our DQN policies. To compare these policies, we design and build MOVI as a large-scale realistic simulator based on 15 million taxi trip records that simulates policy-agnostic responses to dispatch decisions. We show that the DQN dispatch policy reduces the number of unserviced requests by 76% compared to without dispatch and 20% compared to the RHC approach, emphasizing the benefits of a model-free approach and suggesting that there is limited value to coordinating vehicle actions. This finding may help to explain the success of ridesharing platforms, for which drivers make individual decisions.", "title": "" }, { "docid": "977d66be371c4f795048811fc2ac13d3", "text": "The Proportional Resonant (PR) current controller provides gains at a certain frequency (resonant frequency) and eliminates steady state errors. Therefore, the PR controller can be successfully applied to single grid-connected PV inverter current control. On the contrary, a PI controller has steady-state errors and limited disturbance rejection capability. Compared with the Land LC filters, the LCL filter has excellent harmonic suppression capability, but the inherent resonant peak of the LCL filter may introduce instability in the whole system. Therefore, damping must be introduced to improve the control of the system. Considering the controller and the LCL filter active damping as a whole system makes the controller design method more complex. In fact, their frequency responses may affect each other. The traditional trial-and-error procedure is too time-consuming and the design process is inefficient. This paper provides a detailed analysis of the frequency response influence between the PR controller and the LCL filter regarded as a whole system. In addition, the paper presents a systematic method for designing controller parameters and the capacitor current feedback coefficient factor of LCL filter active-damping. The new method relies on meeting the stable margins of the system. Moreover, the paper also clarifies the impact of the grid on the inverter output current. Numerical simulation and a 3 kW laboratory setup assessed the feasibility and effectiveness of the proposed method. OPEN ACCESS Energies 2014, 7 3935", "title": "" }, { "docid": "6c0021aebabc2eae4ba31334443357a6", "text": "The trend of pushing deep learning from cloud to edge due to concerns of latency, bandwidth, and privacy has created demand for low-energy deep convolutional neural networks (CNNs). The single-layer classifier in [1] achieves sub-nJ operation, but is limited to moderate accuracy on low-complexity tasks (90% on MNIST). Larger CNN chips provide dataflow computing for high-complexity tasks (AlexNet) at mJ energy [2], but edge deployment remains a challenge due to off-chip DRAM access energy. This paper describes a mixed-signal binary CNN processor that performs image classification of moderate complexity (86% on CIFAR-10) and employs near-memory computing to achieve a classification energy of 3.8μJ, a 40x improvement over TrueNorth [3]. We accomplish this using (1) the BinaryNet algorithm for CNNs with weights and activations constrained to +1/−1 [4], which drastically simplifies multiplications (XNOR) and allows integrating all memory on-chip; (2) an energy-efficient switched-capacitor (SC) neuron that addresses BinaryNet's challenge of wide vector summation; (3) architectural parallelism, parameter reuse, and locality.", "title": "" }, { "docid": "f57bcea5431a11cc431f76727ba81a26", "text": "We develop a Bayesian procedure for estimation and inference for spatial models of roll call voting. This approach is extremely flexible, applicable to any legislative setting, irrespective of size, the extremism of the legislators’ voting histories, or the number of roll calls available for analysis. The model is easily extended to let other sources of information inform the analysis of roll call data, such as the number and nature of the underlying dimensions, the presence of party whipping, the determinants of legislator preferences, and the evolution of the legislative agenda; this is especially helpful since generally it is inappropriate to use estimates of extant methods (usually generated under assumptions of sincere voting) to test models embodying alternate assumptions (e.g., log-rolling, party discipline). A Bayesian approach also provides a coherent framework for estimation and inference with roll call data that eludes extant methods; moreover, via Bayesian simulation methods, it is straightforward to generate uncertainty assessments or hypothesis tests concerning any auxiliary quantity of interest or to formally compare models. In a series of examples we show how our method is easily extended to accommodate theoretically interesting models of legislative behavior. Our goal is to provide a statistical framework for combining the measurement of legislative preferences with tests of models of legislative behavior.", "title": "" }, { "docid": "2a8326b355ba4a64111a581e3cf8ba3b", "text": "There has been a growing interest in AI in the design of multiagent systems, especially in multiagent cooperative planning. In this paper, we investigate the extent to which methods from single-agent planning and learning can be applied in multiagent settings. We survey a number of different techniques from decision-theoretic planning and reinforcement learning and describe a number of interesting issues that arise with regard to coordinating the policies of individual agents. To this end, we describe multiagent Markov decision processes as a general model in which to frame this discussion. These are special n-person cooperative games in which agents share the same utility function. We discuss coordination mechanisms based on imposed conventions (or social laws) as well as learning methods for coordination. Our focus is on the decomposition of sequential decision processes so that coordination can be learned (or imposed) locally, at the level of individual states. We also discuss the use of structured problem representations and their role in the generalization of learned conventions and in approximation.", "title": "" }, { "docid": "27bc95568467efccb3e6cc185e905e42", "text": "Major studios and independent production firms (Indies) often have to select or “greenlight” a portfolio of scripts to turn into movies. Despite the huge financial risk at stake, there is currently no risk management tool they can use to aid their decisions, even though such a tool is sorely needed. In this paper, we developed a forecasting and risk management tool, based on movies scripts, to aid movie studios and production firms in their green-lighting decisions. The methodology developed can also assist outside investors if they have access to the scripts. Building upon and extending the previous literature, we extracted three levels of textual information (genre/content, bag-of-words, and semantics) from movie scripts. We then incorporate these textual variables as predictors, together with the contemplated production budget, into a BART-QL (Bayesian Additive Regression Tree for Quasi-Linear) model to obtain the posterior predictive distributions, rather than point forecasts, of the box office revenues for the corresponding movies. We demonstrate how the predictive distributions of box office revenues can potentially be used to help movie producers intelligently select their movie production portfolios based on their risk preferences, and we describe an illustrative analysis performed for an independent production firm.", "title": "" }, { "docid": "8dc947fa1cba80700e4a2f88d87bc52a", "text": "It is a field that is defined by its topic (and fundamental questions about it) rather than by a family of methods, much like urban studies or gerontology. Social informatics has been a subject of systematic analytical and critical research for the last 25 years. This body of research has developed theories and findings that are pertinent to understanding the design, development, and operation of usable information systems, including intranets, electronic forums, digital libraries and electronic journals.", "title": "" }, { "docid": "a0c126480f0bce527a893853f6f3bec9", "text": "Word problems are an established technique for teaching mathematical modeling skills in K-12 education. However, many students find word problems unconnected to their lives, artificial, and uninteresting. Most students find them much more difficult than the corresponding symbolic representations. To account for this phenomenon, an ideal pedagogy might involve an individually crafted progression of unique word problems that form a personalized plot. We propose a novel technique for automatic generation of personalized word problems. In our system, word problems are generated from general specifications using answer-set programming (ASP). The specifications include tutor requirements (properties of a mathematical model), and student requirements (personalization, characters, setting). Our system takes a logical encoding of the specification, synthesizes a word problem narrative and its mathematical model as a labeled logical plot graph, and realizes the problem in natural language. Human judges found our problems as solvable as the textbook problems, with a slightly more artificial language.", "title": "" }, { "docid": "b2808bbd0fd36410cbcf700bc3625516", "text": "Suboptimal nutrition is a leading cause of poor health. Nutrition and policy science have advanced rapidly, creating confusion yet also providing powerful opportunities to reduce the adverse health and economic impacts of poor diets. This review considers the history, new evidence, controversies, and corresponding lessons for modern dietary and policy priorities for cardiovascular diseases, obesity, and diabetes mellitus. Major identified themes include the importance of evaluating the full diversity of diet-related risk pathways, not only blood lipids or obesity; focusing on foods and overall diet patterns, rather than single isolated nutrients; recognizing the complex influences of different foods on long-term weight regulation, rather than simply counting calories; and characterizing and implementing evidence-based strategies, including policy approaches, for lifestyle change. Evidence-informed dietary priorities include increased fruits, nonstarchy vegetables, nuts, legumes, fish, vegetable oils, yogurt, and minimally processed whole grains; and fewer red meats, processed (eg, sodium-preserved) meats, and foods rich in refined grains, starch, added sugars, salt, and trans fat. More investigation is needed on the cardiometabolic effects of phenolics, dairy fat, probiotics, fermentation, coffee, tea, cocoa, eggs, specific vegetable and tropical oils, vitamin D, individual fatty acids, and diet-microbiome interactions. Little evidence to date supports the cardiometabolic relevance of other popular priorities: eg, local, organic, grass-fed, farmed/wild, or non-genetically modified. Evidence-based personalized nutrition appears to depend more on nongenetic characteristics (eg, physical activity, abdominal adiposity, gender, socioeconomic status, culture) than genetic factors. Food choices must be strongly supported by clinical behavior change efforts, health systems reforms, novel technologies, and robust policy strategies targeting economic incentives, schools and workplaces, neighborhood environments, and the food system. Scientific advances provide crucial new insights on optimal targets and best practices to reduce the burdens of diet-related cardiometabolic diseases.", "title": "" }, { "docid": "49d3548babbc17cf265c60745dbea1a0", "text": "OBJECTIVE\nTo evaluate the role of transabdominal three-dimensional (3D) ultrasound in the assessment of the fetal brain and its potential for routine neurosonographic studies.\n\n\nMETHODS\nWe studied prospectively 202 consecutive fetuses between 16 and 24 weeks' gestation. A 3D ultrasound volume of the fetal head was acquired transabdominally. The entire brain anatomy was later analyzed using the multiplanar images by a sonologist who was expert in neonatal cranial sonography. The quality of the conventional planes obtained (coronal, sagittal and axial, at different levels) and the ability of the 3D multiplanar neuroscan to visualize properly the major anatomical structures of the brain were evaluated.\n\n\nRESULTS\nAcceptable cerebral multiplanar images were obtained in 92% of the cases. The corpus callosum could be seen in 84% of the patients, the fourth ventricle in 78%, the lateral sulcus (Sylvian fissure) in 86%, the cingulate sulcus in 75%, the cerebellar hemispheres in 98%, the cerebellar vermis in 92%, the medulla oblongata in 97% and the cavum vergae in 9% of them. The thalami and the cerebellopontine cistern (cisterna magna) were identified in all cases. At or beyond 20 weeks, superior visualization (in > 90% of cases) was achieved of the cerebral fissures, the corpus callosum (97%), the supracerebellar cisterns (92%) and the third ventricle (93%). Some cerebral fissures were seen initially at 16-17 weeks.\n\n\nCONCLUSION\nMultiplanar images obtained by transabdominal 3D ultrasound provide a simple and effective approach for detailed evaluation of the fetal brain anatomy. This technique has the potential to be used in the routine fetal anomaly scan.", "title": "" }, { "docid": "dc3de555216f10d84890ecb1165774ff", "text": "Research into the visual perception of human emotion has traditionally focused on the facial expression of emotions. Recently researchers have turned to the more challenging field of emotional body language, i.e. emotion expression through body pose and motion. In this work, we approach recognition of basic emotional categories from a computational perspective. In keeping with recent computational models of the visual cortex, we construct a biologically plausible hierarchy of neural detectors, which can discriminate seven basic emotional states from static views of associated body poses. The model is evaluated against human test subjects on a recent set of stimuli manufactured for research on emotional body language.", "title": "" }, { "docid": "28445e19325130be11eae6d21963489e", "text": "Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks. Our approach detects a broad range of cyber-attacks (e.g., distributed denial of service (DDoS) attacks, data breaches, and account hijacking) in a weakly supervised manner using just a small set of seed event triggers and requires no training or labeled samples. A new query expansion strategy based on convolution kernels and dependency parses helps model semantic structure and aids in identifying key event characteristics. Through a large-scale analysis over Twitter, we demonstrate that our approach consistently identifies and encodes events, outperforming existing methods.", "title": "" } ]
scidocsrr
6a4bdf8a3531300909b2c97569672111
Gated Multimodal Units for Information Fusion
[ { "docid": "0bbfd07d0686fc563f156d75d3672c7b", "text": "In this paper, we provide a comprehensive survey of the mixture of experts (ME). We discuss the fundamental models for regression and classification and also their training with the expectation-maximization algorithm. We follow the discussion with improvements to the ME model and focus particularly on the mixtures of Gaussian process experts. We provide a review of the literature for other training methods, such as the alternative localized ME training, and cover the variational learning of ME in detail. In addition, we describe the model selection literature which encompasses finding the optimum number of experts, as well as the depth of the tree. We present the advances in ME in the classification area and present some issues concerning the classification model. We list the statistical properties of ME, discuss how the model has been modified over the years, compare ME to some popular algorithms, and list several applications. We conclude our survey with future directions and provide a list of publicly available datasets and a list of publicly available software that implement ME. Finally, we provide examples for regression and classification. We believe that the study described in this paper will provide quick access to the relevant literature for researchers and practitioners who would like to improve or use ME, and that it will stimulate further studies in ME.", "title": "" } ]
[ { "docid": "e668a6b42058bc44925d073fd9ee0cdd", "text": "Reducing the in-order delivery, or playback, delay of reliable transport layer protocols over error prone networks can significantly improve application layer performance. This is especially true for applications that have time sensitive constraints such as streaming services. We explore the benefits of a coded generalization of selective repeat ARQ for minimizing the in-order delivery delay. An analysis of the delay's first two moments is provided so that we can determine when and how much redundancy should be added to meet a user's requirements. Numerical results help show the gains over selective repeat ARQ, as well as the trade-offs between meeting the user's delay constraints and the costs inflicted on the achievable rate. Finally, the analysis is compared with experimental results to help illustrate how our work can be used to help inform system decisions.", "title": "" }, { "docid": "eed45b473ebaad0740b793bda8345ef3", "text": "Plyometric training (PT) enhances soccer performance, particularly vertical jump. However, the effectiveness of PT depends on various factors. A systematic search of the research literature was conducted for randomized controlled trials (RCTs) studying the effects of PT on countermovement jump (CMJ) height in soccer players. Ten studies were obtained through manual and electronic journal searches (up to April 2017). Significant differences were observed when compared: (1) PT group vs. control group (ES=0.85; 95% CI 0.47-1.23; I2=68.71%; p<0.001), (2) male vs. female soccer players (Q=4.52; p=0.033), (3) amateur vs. high-level players (Q=6.56; p=0.010), (4) single session volume (<120 jumps vs. ≥120 jumps; Q=6.12, p=0.013), (5) rest between repetitions (5 s vs. 10 s vs. 15 s vs. 30 s; Q=19.10, p<0.001), (6) rest between sets (30 s vs. 60 s vs. 90 s vs. 120 s vs. 240 s; Q=19.83, p=0.001) and (7) and overall training volume (low: <1600 jumps vs. high: ≥1600 jumps; Q=5.08, p=0.024). PT is an effective form of training to improve vertical jump performance (i.e., CMJ) in soccer players. The benefits of PT on CMJ performance are greater for interventions of longer rest interval between repetitions (30 s) and sets (240 s) with higher volume of more than 120 jumps per session and 1600 jumps in total. Gender and competitive level differences should be considered when planning PT programs in soccer players.", "title": "" }, { "docid": "33431760dfc16c095a4f0b8d4ed94790", "text": "Millions of individuals worldwide are afflicted with acute and chronic respiratory diseases, causing temporary and permanent disabilities and even death. Oftentimes, these diseases occur as a result of altered immune responses. The aryl hydrocarbon receptor (AhR), a ligand-activated transcription factor, acts as a regulator of mucosal barrier function and may influence immune responsiveness in the lungs through changes in gene expression, cell–cell adhesion, mucin production, and cytokine expression. This review updates the basic immunobiology of the AhR signaling pathway with regards to inflammatory lung diseases such as asthma, chronic obstructive pulmonary disease, and silicosis following data in rodent models and humans. Finally, we address the therapeutic potential of targeting the AhR in regulating inflammation during acute and chronic respiratory diseases.", "title": "" }, { "docid": "c906d026937ebea3525f5dee5d923335", "text": "VGGNets have turned out to be effective for object recognition in still images. However, it is unable to yield good performance by directly adapting the VGGNet models trained on the ImageNet dataset for scene recognition. This report describes our implementation of training the VGGNets on the large-scale Places205 dataset. Specifically, we train three VGGNet models, namely VGGNet-11, VGGNet-13, and VGGNet-16, by using a Multi-GPU extension of Caffe toolbox with high computational efficiency. We verify the performance of trained Places205-VGGNet models on three datasets: MIT67, SUN397, and Places205. Our trained models achieve the state-of-the-art performance o n these datasets and are made public available 1.", "title": "" }, { "docid": "7249e8c5db7d9d048f777aeeaf34954c", "text": "With the growth of system size and complexity, reliability has become of paramount importance for petascale systems. Reliability, Availability, and Serviceability (RAS) logs have been commonly used for failure analysis. However, analysis based on just the RAS logs has proved to be insufficient in understanding failures and system behaviors. To overcome the limitation of this existing methodologies, we analyze the Blue Gene/P RAS logs and the Blue Gene/P job logs in a cooperative manner. From our co-analysis effort, we have identified a dozen important observations about failure characteristics and job interruption characteristics on the Blue Gene/P systems. These observations can significantly facilitate the research in fault resilience of large-scale systems.", "title": "" }, { "docid": "c564656568c9ce966e88d11babc0d445", "text": "In this study, Turkish texts belonging to different categories were classified by using word2vec word vectors. Firstly, vectors of the words in all the texts were extracted then, each text was represented in terms of the mean vectors of the words it contains. Texts were classified by SVM and 0.92 F measurement score was obtained for seven different categories. As a result, it was experimentally shown that word2vec is more successful than tf-idf based classification for Turkish document classification.", "title": "" }, { "docid": "a74b091706f4aeb384d2bf3d477da67d", "text": "Amazon's Echo and its conversational agent Alexa open exciting opportunities for understanding how people perceive and interact with virtual agents. Drawing from user reviews of the Echo posted to Amazon.com, this case study explores the degree to which user reviews indicate personification of the device, sociability level of interactions, factors linked with personification, and influences on user satisfaction. Results indicate marked variance in how people refer to the device, with over half using the personified name Alexa but most referencing the device with object pronouns. Degree of device personification is linked with sociability of interactions: greater personification co-occurs with more social interactions with the Echo. Reviewers mentioning multiple member households are more likely to personify the device than reviewers mentioning living alone. Even after controlling for technical issues, personification predicts user satisfaction with the Echo.", "title": "" }, { "docid": "1ede796449f610b186638aa2ac9ceedf", "text": "We introduce a framework for exploring and learning representations of log data generated by enterprise-grade security devices with the goal of detecting advanced persistent threats (APTs) spanning over several weeks. The presented framework uses a divide-and-conquer strategy combining behavioral analytics, time series modeling and representation learning algorithms to model large volumes of data. In addition, given that we have access to human-engineered features, we analyze the capability of a series of representation learning algorithms to complement human-engineered features in a variety of classification approaches. We demonstrate the approach with a novel dataset extracted from 3 billion log lines generated at an enterprise network boundaries with reported command and control communications. The presented results validate our approach, achieving an area under the ROC curve of 0.943 and 95 true positives out of the Top 100 ranked instances on the test data set.", "title": "" }, { "docid": "08f49b003a3a5323e38e4423ba6503a4", "text": "Neurofeedback (NF), a type of neurobehavioral training, has gained increasing attention in recent years, especially concerning the treatment of children with ADHD. Promising results have emerged from recent randomized controlled studies, and thus, NF is on its way to becoming a valuable addition to the multimodal treatment of ADHD. In this review, we summarize the randomized controlled trials in children with ADHD that have been published within the last 5 years and discuss issues such as the efficacy and specificity of effects, treatment fidelity and problems inherent in placebo-controlled trials of NF. Directions for future NF research are outlined, which should further address specificity and help to determine moderators and mediators to optimize and individualize NF training. Furthermore, we describe methodological (tomographic NF) and technical ('tele-NF') developments that may also contribute to further improvements in treatment outcome.", "title": "" }, { "docid": "0cf3a201140e02039295a2ef4697a635", "text": "In recent years, deep convolutional neural networks (ConvNet) have shown their popularity in various real world applications. To provide more accurate results, the state-of-the-art ConvNet requires millions of parameters and billions of operations to process a single image, which represents a computational challenge for general purpose processors. As a result, hardware accelerators such as Graphic Processing Units (GPUs) and Field Programmable Gate Arrays (FPGAs), have been adopted to improve the performance of ConvNet. However, GPU-based solution consumes a considerable amount of power and a traditional RTL design on FPGA requires tedious development that is very time-consuming. In this work, we propose a scalable and parameterized end-to-end ConvNet design using Intel FPGA SDK for OpenCL. To validate the design, we implement VGG 16 model on two different FPGA boards. Consequently, our designs achieve 306.41 GOPS on Intel Stratix A7 and 318.94 GOPS on Intel Arria 10 GX 10AX115. To the best of our knowledge, this outperforms previous FPGA-based accelerators. Compared to the CPU (Intel Xeon E5-2620) and a mid-range GPU (Nvidia K40), our design is 24.3X and 1.7X more energy efficient respectively.", "title": "" }, { "docid": "280672ad5473e061269114d0d11acc90", "text": "With personalization, consumers can choose from various product attributes and a customized product is assembled based on their preferences. Marketers often offer personalization on websites. This paper investigates consumer purchase intentions toward personalized products in an online selling situation. The research builds and tests three hypotheses: (1) intention to purchase personalized products will be affected by individualism, uncertainty avoidance, power distance, and masculinity dimensions of a national culture; (2) consumers will be more likely to buy personalized search products than experience products; and (3) intention to buy a personalized product will not be influenced by price premiums up to some level. Results indicate that individualism is the only culture dimension to have a significant effect on purchase intention. Product type and individualism by price interaction also have a significant effect, whereas price does not. Major findings and implications are discussed. a Department of Business Administration, School of Economics and Business, Hanyang University, Ansan, South Korea b Department of International Business, School of Commerce and Business, University of Auckland, Auckland, New Zealand c School of Business, State University of New York at New Paltz, New Paltz, New York 12561, USA This work was supported by a Korea Research Foundation Grant (KRF-2004-041-B00211) to the first author. Corresponding author. Tel.: +82 31 400 5653; fax: +82 31 400 5591. E-mail addresses: jmoon@hanyang.ac.kr (J. Moon), d.chadee@auckland.ac.nz (D. Chadee), tikoos@newpaltz.edu (S. Tikoo). 1 Tel.: +64 9 373 7599 x85951. 2 Tel.: +1 845 257 2959.", "title": "" }, { "docid": "9e6df649528ce4f011fcc09d089b4559", "text": "Aspect-based sentiment analysis (ABSA) tries to predict the polarity of a given document with respect to a given aspect entity. While neural network architectures have been successful in predicting the overall polarity of sentences, aspectspecific sentiment analysis still remains as an open problem. In this paper, we propose a novel method for integrating aspect information into the neural model. More specifically, we incorporate aspect information into the neural model by modeling word-aspect relationships. Our novel model, Aspect Fusion LSTM (AF-LSTM) learns to attend based on associative relationships between sentence words and aspect which allows our model to adaptively focus on the correct words given an aspect term. This ameliorates the flaws of other state-of-the-art models that utilize naive concatenations to model word-aspect similarity. Instead, our model adopts circular convolution and circular correlation to model the similarity between aspect and words and elegantly incorporates this within a differentiable neural attention framework. Finally, our model is end-to-end differentiable and highly related to convolution-correlation (holographic like) memories. Our proposed neural model achieves state-of-the-art performance on benchmark datasets, outperforming ATAE-LSTM by 4%− 5% on average across multiple datasets.", "title": "" }, { "docid": "4f9558d13c3caf7244b31adc69c8832d", "text": "Self-adaptation is a first class concern for cloud applications, which should be able to withstand diverse runtime changes. Variations are simultaneously happening both at the cloud infrastructure level - for example hardware failures - and at the user workload level - flash crowds. However, robustly withstanding extreme variability, requires costly hardware over-provisioning. \n In this paper, we introduce a self-adaptation programming paradigm called brownout. Using this paradigm, applications can be designed to robustly withstand unpredictable runtime variations, without over-provisioning. The paradigm is based on optional code that can be dynamically deactivated through decisions based on control theory. \n We modified two popular web application prototypes - RUBiS and RUBBoS - with less than 170 lines of code, to make them brownout-compliant. Experiments show that brownout self-adaptation dramatically improves the ability to withstand flash-crowds and hardware failures.", "title": "" }, { "docid": "dfb78a96f9af81aa3f4be1a28e4ce0a2", "text": "This paper presents two ultra-high-speed SerDes dedicated for PAM4 and NRZ data. The PAM4 TX incorporates an output driver with 3-tap FFE and adjustable weighting to deliver clean outputs at 4 levels, and the PAM4 RX employs a purely linear full-rate CDR and CTLE/1-tap DFE combination to recover and demultiplex the data. NRZ TX includes a tree-structure MUX with built-in PLL and phase aligner. NRZ RX adopts linear PD with special vernier technique to handle the 56 Gb/s input data. All chips have been verified in silicon with reasonable performance, providing prospective design examples for next-generation 400 GbE.", "title": "" }, { "docid": "2bbcdf5f3182262d3fcd6addc1e3f835", "text": "Online handwritten Chinese text recognition (OHCTR) is a challenging problem as it involves a large-scale character set, ambiguous segmentation, and variable-length input sequences. In this paper, we exploit the outstanding capability of path signature to translate online pen-tip trajectories into informative signature feature maps, successfully capturing the analytic and geometric properties of pen strokes with strong local invariance and robustness. A multi-spatial-context fully convolutional recurrent network (MC-FCRN) is proposed to exploit the multiple spatial contexts from the signature feature maps and generate a prediction sequence while completely avoiding the difficult segmentation problem. Furthermore, an implicit language model is developed to make predictions based on semantic context within a predicting feature sequence, providing a new perspective for incorporating lexicon constraints and prior knowledge about a certain language in the recognition procedure. Experiments on two standard benchmarks, Dataset-CASIA and Dataset-ICDAR, yielded outstanding results, with correct rates of 97.50 and 96.58 percent, respectively, which are significantly better than the best result reported thus far in the literature.", "title": "" }, { "docid": "981da4eddfc1c9fbbceef437f5f43439", "text": "A significant number of schizophrenic patients show patterns of smooth pursuit eye-tracking patterns that differ strikingly from the generally smooth eye-tracking seen in normals and in nonschizophrenic patients. These deviations are probably referable not only to motivational or attentional factors, but also to oculomotor involvement that may have a critical relevance for perceptual dysfunction in schizophrenia.", "title": "" }, { "docid": "9be80d8f93dd5edd72ecd759993935d6", "text": "The excretory system regulates the chemical composition of body fluids by removing metabolic wastes and retaining the proper amount of water, salts and nutrients. The invertebrate excretory structures are classified in according to their marked variations in the morphological structures into three types included contractile vacuoles in protozoa, nephridia (flame cell system) in most invertebrate animals and Malpighian tubules (arthropod kidney) in insects [2]. There are three distinct excretory organs formed in succession during the development of the vertebrate kidney, they are called pronephros, mesonephros and metanephros. The pronephros is the most primitive one and exists as a functional kidney only in some of the lowest fishes and is called the archinephros. The mesonephros represents the functional excretory organs in anamniotes and called as opisthonephros. The metanephros is the most caudally located of the excretory organs and the last to appear, it represents the functional kidney in amniotes [2-4].", "title": "" }, { "docid": "ef8be5104f9bc4a0f4353ed236b6afb8", "text": "State-of-the-art human pose estimation methods are based on heat map representation. In spite of the good performance, the representation has a few issues in nature, such as non-differentiable postprocessing and quantization error. This work shows that a simple integral operation relates and unifies the heat map representation and joint regression, thus avoiding the above issues. It is differentiable, efficient, and compatible with any heat map based methods. Its effectiveness is convincingly validated via comprehensive ablation experiments under various settings, specifically on 3D pose estimation, for the first time.", "title": "" }, { "docid": "079de41f553c8bd5c87f7c3cfbe5d836", "text": "We present a design study for a nano-scale crossbar memory system that uses memristors with symmetrical but highly nonlinear current-voltage characteristics as memory elements. The memory is non-volatile since the memristors retain their state when un-powered. In order to address the nano-wires that make up this nano-scale crossbar, we use two coded demultiplexers implemented using mixed-scale crossbars (in which CMOS-wires cross nano-wires and in which the crosspoint junctions have one-time configurable memristors). This memory system does not utilize the kind of devices (diodes or transistors) that are normally used to isolate the memory cell being written to and read from in conventional memories. Instead, special techniques are introduced to perform the writing and the reading operation reliably by taking advantage of the nonlinearity of the type of memristors used. After discussing both writing and reading strategies for our memory system in general, we focus on a 64 x 64 memory array and present simulation results that show the feasibility of these writing and reading procedures. Besides simulating the case where all device parameters assume exactly their nominal value, we also simulate the much more realistic case where the device parameters stray around their nominal value: we observe a degradation in margins, but writing and reading is still feasible. These simulation results are based on a device model for memristors derived from measurements of fabricated devices in nano-scale crossbars using Pt and Ti nano-wires and using oxygen-depleted TiO(2) as the switching material.", "title": "" }, { "docid": "35725331e4abd61ed311b14086dd3d5c", "text": "BACKGROUND\nBody dysmorphic disorder (BDD) consists of a preoccupation with an 'imagined' defect in appearance which causes significant distress or impairment in functioning. There has been little previous research into BDD. This study replicates a survey from the USA in a UK population and evaluates specific measures of BDD.\n\n\nMETHOD\nCross-sectional interview survey of 50 patients who satisfied DSM-IV criteria for BDD as their primary disorder.\n\n\nRESULTS\nThe average age at onset was late adolescence and a large proportion of patients were either single or divorced. Three-quarters of the sample were female. There was a high degree of comorbidity with the most common additional Axis l diagnosis being either a mood disorder (26%), social phobia (16%) or obsessive-compulsive disorder (6%). Twenty-four per cent had made a suicide attempt in the past. Personality disorders were present in 72% of patients, the most common being paranoid, avoidant and obsessive-compulsive.\n\n\nCONCLUSIONS\nBDD patients had a high associated comorbidity and previous suicide attempts. BDD is a chronic handicapping disorder and patients are not being adequately identified or treated by health professionals.", "title": "" } ]
scidocsrr
413ee699bef30878753ca72c96d9a50f
Has the bug really been fixed?
[ { "docid": "d1c69dac07439ade32a962134753ab08", "text": "The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, since they record both the old buggy code and the new fixed code. This paper presents a bug finding algorithm using bug fix memories: a project-specific bug and fix knowledge base developed by analyzing the history of bug fixes. A bug finding tool, BugMem, implements the algorithm. The approach is different from bug finding tools based on theorem proving or static model checking such as Bandera, ESC/Java, FindBugs, JLint, and PMD. Since these tools use pre-defined common bug patterns to find bugs, they do not aim to identify project-specific bugs. Bug fix memories use a learning process, so the bug patterns are project-specific, and project-specific bugs can be detected. The algorithm and tool are assessed by evaluating if real bugs and fixes in project histories can be found in the bug fix memories. Analysis of five open source projects shows that, for these projects, 19.3%-40.3% of bugs appear repeatedly in the memories, and 7.9%-15.5% of bug and fix pairs are found in memories. The results demonstrate that project-specific bug fix patterns occur frequently enough to be useful as a bug detection technique. Furthermore, for the bug and fix pairs, it is possible to both detect the bug and provide a strong suggestion for the fix. However, there is also a high false positive rate, with 20.8%-32.5% of non-bug containing changes also having patterns found in the memories. A comparison of BugMem with a bug finding tool, PMD, shows that the bug sets identified by both tools are mostly exclusive, indicating that BugMem complements other bug finding tools.", "title": "" } ]
[ { "docid": "f95e19e9fc88df498361c3cb12ae56b0", "text": "Wearable health monitoring is an emerging technology for continuous monitoring of vital signs including the electrocardiogram (ECG). This signal is widely adopted to diagnose and assess major health risks and chronic cardiac diseases. This paper focuses on reviewing wearable ECG monitoring systems in the form of wireless, mobile and remote technologies related to older adults. Furthermore, the efficiency, user acceptability, strategies and recommendations on improving current ECG monitoring systems with an overview of the design and modelling are presented. In this paper, over 120 ECG monitoring systems were reviewed and classified into smart wearable, wireless, mobile ECG monitoring systems with related signal processing algorithms. The results of the review suggest that most research in wearable ECG monitoring systems focus on the older adults and this technology has been adopted in aged care facilitates. Moreover, it is shown that how mobile telemedicine systems have evolved and how advances in wearable wireless textile-based systems could ensure better quality of healthcare delivery. The main drawbacks of deployed ECG monitoring systems including imposed limitations on patients, short battery life, lack of user acceptability and medical professional’s feedback, and lack of security and privacy of essential data have been also discussed.", "title": "" }, { "docid": "910380272b4a00626c9a6162b90416d6", "text": "Bayesian optimization is a sample-efficient approach to global optimization that relies on theoretically motivated value heuristics (acquisition functions) to guide its search process. Fully maximizing acquisition functions produces the Bayes’ decision rule, but this ideal is difficult to achieve since these functions are frequently non-trivial to optimize. This statement is especially true when evaluating queries in parallel, where acquisition functions are routinely non-convex, highdimensional, and intractable. We first show that acquisition functions estimated via Monte Carlo integration are consistently amenable to gradient-based optimization. Subsequently, we identify a common family of acquisition functions, including EI and UCB, whose properties not only facilitate but justify use of greedy approaches for their maximization.", "title": "" }, { "docid": "2debaecdacfa8e62bb78ff8f0cba2ce4", "text": "Analysis techniques, such as control flow, data flow, and control dependence, are used for a variety of software-engineering tasks, including structural and regression testing, dynamic execution profiling, static and dynamic slicing, and program understanding. To be applicable to programs in languages, such as Java and C++, these analysis techniques must account for the effects of exception occurrences and exception-handling constructs; failure to do so can cause the analysis techniques to compute incorrect results and thus, limit the usefulness of the applications that use them. This paper discusses the effects of exceptionhandling constructs on several analysis techniques. The paper presents techniques to construct representations for programs with explicit exception occurrences—exceptions that are raised explicitly through throw statements—and exception-handling constructs. The paper presents algorithms that use these representations to perform the desired analyses. The paper also discusses several softwareengineering applications that use these analyses. Finally, the paper describes empirical results pertaining to the occurrence of exception-handling constructs in Java programs, and their effects on some analysis tasks. Keywords— Exception handling, control-flow analysis, control-dependence analysis, data-flow analysis, program slicing, structural testing.", "title": "" }, { "docid": "b6cd09d268aa8e140bef9fc7890538c3", "text": "XML is quickly becoming the de facto standard for data exchange over the Internet. This is creating a new set of data management requirements involving XML, such as the need to store and query XML documents. Researchers have proposed using relational database systems to satisfy these requirements by devising ways to \"shred\" XML documents into relations, and translate XML queries into SQL queries over these relations. However, a key issue with such an approach, which has largely been ignored in the research literature, is how (and whether) the ordered XML data model can be efficiently supported by the unordered relational data model. This paper shows that XML's ordered data model can indeed be efficiently supported by a relational database system. This is accomplished by encoding order as a data value. We propose three order encoding methods that can be used to represent XML order in the relational data model, and also propose algorithms for translating ordered XPath expressions into SQL using these encoding methods. Finally, we report the results of an experimental study that investigates the performance of the proposed order encoding methods on a workload of ordered XML queries and updates.", "title": "" }, { "docid": "d3ec3eeb5e56bdf862f12fe0d9ffe71c", "text": "This paper will communicate preliminary findings from applied research exploring how to ensure that serious games are cost effective and engaging components of future training solutions. The applied research is part of a multimillion pound program for the Department of Trade and Industry, and involves a partnership between UK industry and academia to determine how bespoke serious games should be used to best satisfy learning needs in a range of contexts. The main objective of this project is to produce a minimum of three serious games prototypes for clients from different sectors (e.g., military, medical and business) each prototype addressing a learning need or learning outcome that helps solve a priority business problem or fulfill a specific training need. This paper will describe a development process that aims to encompass learner specifics and targeted learning outcomes in order to ensure that the serious game is successful. A framework for describing game-based learning scenarios is introduced, and an approach to the analysis that effectively profiles the learner within the learner group with respect to game-based learning is outlined. The proposed solution also takes account of relevant findings from serious games research on particular learner groups that might support the selection and specification of a game. A case study on infection control will be used to show how this approach to the analysis is being applied for a healthcare issue.", "title": "" }, { "docid": "771dbdda9855595e3ad71b1a7aa5377a", "text": "We present a system, TransProse, that automatically generates musical pieces from text. TransProse uses known relations between parameters of music such as tempo and scale, and the emotions they evoke. Further, it uses a novel mechanism to determine note sequence that captures the emotional activity in the text. The work has applications in information visualization, in creating audio-visual e-books, and in developing music apps.", "title": "" }, { "docid": "8944e004d344e2fe9fe06b58ae0c07da", "text": "virtual reality, developing techniques for synthesizing arbitrary views has become an important technical issue. Given an object’s structural model (such as a polygon or volume model), it’s relatively easy to synthesize arbitrary views. Generating a structural model of an object, however, isn’t necessarily easy. For this reason, research has been progressing on a technique called image-based modeling and rendering (IBMR) that avoids this problem. To date, researchers have performed studies on various IBMR techniques. (See the “Related Work” sidebar for more specific information.) Our work targets 3D scenes in motion. In this article, we propose a method for view-dependent layered representation of 3D dynamic scenes. Using densely arranged cameras, we’ve developed a system that can perform processing in real time from image pickup to interactive display, using video sequences instead of static images, at 10 frames per second (frames/sec). In our system, images on layers are view dependent, and we update both the shape and image of each layer in real time. This lets us use the dynamic layers as the coarse structure of the dynamic 3D scenes, which improves the quality of the synthesized images. In this sense, our prototype system may be one of the first full real-time IBMR systems. Our experimental results show that this method is useful for interactive 3D rendering of real scenes.", "title": "" }, { "docid": "f638fa2d4e358f91a05fc5329d6058f0", "text": "We present a computational framework for Theory of Mind (ToM): the human ability to make joint inferences about the unobservable beliefs and preferences underlying the observed actions of other agents. These mental state attributions can be understood as Bayesian inferences in a probabilistic generative model for rational action, or planning under uncertain and incomplete information, formalized as a Partially Observable Markov Decision Problem (POMDP). That is, we posit that ToM inferences approximately reconstruct the combination of a reward function and belief state trajectory for an agent based on observing that agent’s action sequence in a given environment. We test this POMDP model by showing human subjects the trajectories of agents moving in simple spatial environments and asking for joint inferences about the agents’ utilities and beliefs about unobserved aspects of the environment. Our model performs substantially better than two simpler variants: one in which preferences are inferred without reference to an agents’ beliefs, and another in which beliefs are inferred without reference to the agent’s dynamic observations in the environment. We find that preference inferences are substantially more robust and consistent with our model’s predictions than are belief inferences, in line with classic work showing that the ability to infer goals is more concretely grounded in visual data, develops earlier in infancy, and can be localized to specific neurons in the primate brain.", "title": "" }, { "docid": "0e1d93bb8b1b2d2e3453384092f39afc", "text": "Repetitive or prolonged head flexion posture while using a smartphone is known as one of risk factors for pain symptoms in the neck. To quantitatively assess the amount and range of head flexion of smartphone users, head forward flexion angle was measured from 18 participants when they were conducing three common smartphone tasks (text messaging, web browsing, video watching) while sitting and standing in a laboratory setting. It was found that participants maintained head flexion of 33-45° (50th percentile angle) from vertical when using the smartphone. The head flexion angle was significantly larger (p < 0.05) for text messaging than for the other tasks, and significantly larger while sitting than while standing. Study results suggest that text messaging, which is one of the most frequently used app categories of smartphone, could be a main contributing factor to the occurrence of neck pain of heavy smartphone users. Practitioner Summary: In this laboratory study, the severity of head flexion of smartphone users was quantitatively evaluated when conducting text messaging, web browsing and video watching while sitting and standing. Study results indicate that text messaging while sitting caused the largest head flexion than that of other task conditions.", "title": "" }, { "docid": "e1afaed983932bc98c5b0b057d4b5ab6", "text": "This paper presents a novel solution for the problem of building text classifier using positive documents (P) and unlabeled documents (U). Here, the unlabeled documents are mixed with positive and negative documents. This problem is also called PU-Learning. The key feature of PU-Learning is that there is no negative document for training. Recently, several approaches have been proposed for solving this problem. Most of them are based on the same idea, which builds a classifier in two steps. Each existing technique uses a different method for each step. Generally speaking, these existing approaches do not perform well when the size of P is small. In this paper, we propose a new approach aiming at improving the system when the size of P is small. This approach combines the graph-based semi-supervised learning method with the two-step method. Experiments indicate that our proposed method performs well especially when the size of P is small.", "title": "" }, { "docid": "be19dab37fdd4b6170816defbc550e2e", "text": "A new continuous transverse stub (CTS) antenna array is presented in this paper. It is built using the substrate integrated waveguide (SIW) technology and designed for beam steering applications in the millimeter waveband. The proposed CTS antenna array consists of 18 stubs that are arranged in the SIW perpendicular to the wave propagation. The performance of the proposed CTS antenna array is demonstrated through simulation and measurement results. From the experimental results, the peak gain of 11.63-16.87 dBi and maximum radiation power of 96.8% are achieved in the frequency range 27.06-36 GHz with low cross-polarization level. In addition, beam steering capability is achieved in the maximum radiation angle range varying from -43° to 3 ° depending on frequency.", "title": "" }, { "docid": "8a1d0d2767a35235fa5ac70818ec92e7", "text": "This work demonstrates two 94 GHz SPDT quarter-wave shunt switches using saturated SiGe HBTs. A new mode of operation, called reverse saturation, using the emitter at the RF output node of the switch, is utilized to take advantage of the higher emitter doping and improved isolation from the substrate. The switches were designed in a 180 nm SiGe BiCMOS technology featuring 90 nm SiGe HBTs (selective emitter shrink) with fT/fmax of 250/300+ GHz. The forward-saturated switch achieves an insertion loss and isolation at 94 GHz of 1.8 dB and 19.3 dB, respectively. The reverse-saturated switch achieves a similar isolation, but reduces the insertion loss to 1.4 dB. This result represents a 30% improvement in insertion loss in comparison to the best CMOS SPDT at 94 GHz.", "title": "" }, { "docid": "77a156afb22bbecd37d0db073ef06492", "text": "Rhonda Farrell University of Fairfax, Vienna, VA ABSTRACT While acknowledging the many benefits that cloud computing solutions bring to the world, it is important to note that recent research and studies of these technologies have identified a myriad of potential governance, risk, and compliance (GRC) issues. While industry clearly acknowledges their existence and seeks to them as much as possible, timing-wise it is still well before the legal framework has been put in place to adequately protect and adequately respond to these new and differing global challenges. This paper seeks to inform the potential cloud adopter, not only of the perceived great technological benefit, but to also bring to light the potential security, privacy, and related GRC issues which will need to be prioritized, managed, and mitigated before full implementation occurs.", "title": "" }, { "docid": "edf41dbd01d4060982c2c75469bbac6b", "text": "In this paper, we develop a design method for inclined and displaced (compound) slotted waveguide array antennas. The characteristics of a compound slot element and the design results by using an equivalent circuit are shown. The effectiveness of the designed antennas is verified through experiments.", "title": "" }, { "docid": "ea77710f946e118eeed7a0240a98ba79", "text": "Magnesium-Calcium (Mg-Ca) alloy has received considerable attention as an emerging biodegradable implant material in orthopedic fixation applications. The biodegradable Mg-Ca alloys avoid stress shielding and secondary surgery inherent with permanent metallic implant materials. They also provide sufficient mechanical strength in load carrying applications as opposed to biopolymers. However, the key issue facing a biodegradable Mg-Ca implant is the fast corrosion in the human body environment. The ability to adjust degradation rate of Mg-Ca alloys is critical for the successful development of biodegradable orthopedic implants. This paper focuses on the functions and requirements of bone implants and critical issues of current implant biomaterials. Microstructures and mechanical properties of Mg-Ca alloys, and the unique properties of novel magnesium-calcium implant materials have been reviewed. Various manufacturing techniques to process Mg-Ca based alloys have been analyzed regarding their impacts on implant performance. Corrosion performance of Mg-Ca alloys processed by different manufacturing techniques was compared. In addition, the societal and economical impacts of developing biodegradable orthopedic implants have been emphasized.", "title": "" }, { "docid": "2ead9e973f2a237b604bf68284e0acf1", "text": "Cognitive radio networks challenge the traditional wireless networking paradigm by introducing concepts firmly stemmed into the Artificial Intelligence (AI) field, i.e., learning and reasoning. This fosters optimal resource usage and management allowing a plethora of potential applications such as secondary spectrum access, cognitive wireless backbones, cognitive machine-to-machine etc. The majority of overview works in the field of cognitive radio networks deal with the notions of observation and adaptations, which are not a distinguished cognitive radio networking aspect. Therefore, this paper provides insight into the mechanisms for obtaining and inferring knowledge that clearly set apart the cognitive radio networks from other wireless solutions.", "title": "" }, { "docid": "f45d8267b8ae96d043c5c6773fe6c90f", "text": "The function of the brain is intricately woven into the fabric of time. Functions such as (1) storing and accessing past memories, (2) dealing with immediate sensorimotor needs in the present, and (3) projecting into the future for goal-directed behavior are good examples of how key brain processes are integrated into time. Moreover, it can even seem that the brain generates time (in the psychological sense, not in the physical sense) since, without the brain, a living organism cannot have the notion of past nor future. When combined with an evolutionary perspective, this seemingly straightforward idea that the brain enables the conceptualization of past and future can lead to deeper insights into the principles of brain function, including that of consciousness. In this paper, we systematically investigate, through simulated evolution of artificial neural networks, conditions for the emergence of past and future in simple neural architectures, and discuss the implications of our findings for consciousness and mind uploading.", "title": "" }, { "docid": "f0c7d922be0a1cc37b76d106b6ca08ad", "text": "AIM\nTo provide an overview of interpretive phenomenology.\n\n\nBACKGROUND\nPhenomenology is a philosophy and a research approach. As a research approach, it is used extensively in nursing and 'interpretive' phenomenology is becoming increasingly popular.\n\n\nDATA SOURCES\nOnline and manual searches of relevant books and electronic databases were undertaken.\n\n\nREVIEW METHODS\nLiterature review on papers on phenomenology, research and nursing (written in English) was undertaken.\n\n\nDISCUSSION\nA brief outline of the origins of the concept, and the influence of 'descriptive' phenomenology on the development of interpretive phenomenology is provided. Its aim, origins and philosophical basis, including the core concepts of dasein, fore-structure/pre-understanding, world view existential themes and the hermeneutic circle, are described and the influence of these concepts in phenomenological nursing research is illustrated.\n\n\nCONCLUSION\nThis paper will assist readers when deciding whether interpretive phenomenology is appropriate for their research projects.\n\n\nIMPLICATIONS FOR RESEARCH/PRACTICE\nThis paper adds to the discussion on interpretive phenomenology and helps inform readers of its use as a research methodology.", "title": "" }, { "docid": "5378de08d9014988b6fd1720902b30f1", "text": "This paper presents the simulation and experimental investigations of a printed microstrip slot antenna. It is a quarter wavelength monopole slot cut in the finite ground plane edge, and fed electromagnetically by a microstrip transmission line. It provides a wide impedance bandwidth adjustable by variation of its parameters, such as the relative permittivity and thickness of the substrate, width, and location of the slot in the ground plane, and feed and ground plane dimensions. The ground plane is small, 50 mm/spl times/80 mm, and is about the size of a typical PC wireless card. At the center frequency of 3.00 GHz, its width of 50 mm is about /spl lambda//2 and influences the slot impedance and bandwidth significantly. An impedance bandwidth (S/sub 11/=-10 dB) of up to about 60% is achieved by individually optimizing its parameters. The simulation results are confirmed experimentally. A dual complementary slot antenna configuration is also investigated for the polarization diversity.", "title": "" }, { "docid": "85007af502deac21cd6477945e0578d6", "text": "State of the art movie restoration methods either estimate motion and filter out the trajectories, or compensate the motion by an optical flow estimate and then filter out the compensated movie. Now, the motion estimation problem is ill posed. This fact is known as the aperture problem: trajectories are ambiguous since they could coincide with any promenade in the space-time isophote surface. In this paper, we try to show that, for denoising, the aperture problem can be taken advantage of. Indeed, by the aperture problem, many pixels in the neighboring frames are similar to the current pixel one wishes to denoise. Thus, denoising by an averaging process can use many more pixels than just the ones on a single trajectory. This observation leads to use for movies a recently introduced image denoising method, the NL-means algorithm. This static 3D algorithm outperforms motion compensated algorithms, as it does not lose movie details. It involves the whole movie isophote and not just a trajectory.", "title": "" } ]
scidocsrr
5f31dfded71c8aa0596b961f83ad9bfd
A new hybrid global optimization approach for selecting clinical and biological features that are relevant to the effective diagnosis of ovarian cancer
[ { "docid": "86826e10d531b8d487fada7a5c151a41", "text": "Feature selection is an important preprocessing step in data mining. Mutual information-based feature selection is a kind of popular and effective approaches. In general, most existing mutual information-based techniques are greedy methods, which are proven to be efficient but suboptimal. In this paper, mutual information-based feature selection is transformed into a global optimization problem, which provides a new idea for solving feature selection problems. Firstly, a single-objective feature selection algorithm combining relevance and redundancy is presented, which has well global searching ability and high computational efficiency. Furthermore, to improve the performance of feature selection, we propose a multi-objective feature selection algorithm. The method can meet different requirements and achieve a tradeoff among multiple conflicting objectives. On this basis, a hybrid feature selection framework is adopted for obtaining a final solution. We compare the performance of our algorithm with related methods on both synthetic and real datasets. Simulation results show the effectiveness and practicality of the proposed method.", "title": "" }, { "docid": "023166be79a875da0b06a4d6d562839f", "text": "There is no a priori reason why machine learning must borrow from nature. A field could exist, complete with well-defined algorithms, data structures, and theories of learning, without once referring to organisms, cognitive or genetic structures, and psychological or evolutionary theories. Yet at the end of the day, with the position papers written, the computers plugged in, and the programs debugged, a learning edifice devoid of natural metaphor would lack something. It would ignore the fact that all these creations have become possible only after three billion years of evolution on this planet. It would miss the point that the very ideas of adaptation and learning are concepts invented by the most recent representatives of the species Homo sapiens from the careful observation of themselves and life around them. It would miss the point that natural examples of learning and adaptation are treasure troves of robust procedures and structures. Fortunately, the field of machine learning does rely upon nature's bounty for both inspiration and mechanism. Many machine learning systems now borrow heavily from current thinking in cognitive science, and rekindled interest in neural networks and connectionism is evidence of serious mechanistic and philosophical currents running through the field. Another area where natural example has been tapped is in work on genetic algorithms (GAs) and genetics-based machine learning. Rooted in the early cybernetics movement (Holland, 1962), progress has been made in both theory (Holland, 1975; Holland, Holyoak, Nisbett, & Thagard, 1986) and application (Goldberg, 1989; Grefenstette, 1985, 1987) to the point where genetics-based systems are finding their way into everyday commercial use (Davis & Coombs, 1987; Fourman, 1985).", "title": "" } ]
[ { "docid": "085f0bef6bef5f91659edfad039f422e", "text": "With the development in modern communication technology, every physical device is now connecting with the internet. IoT is getting emerging technology for connecting physical devices with the user. In this paper we combined existing energy meter with the IoT technology. By implementation of IoT in the case of meter reading for electricity can give customer relief in using electrical energy. In this work a digital energy meter is connected with cloud server via IoT device. It sends the amount of consumed energy of connected customer to webserver. There is a feature for disconnection in the case of unauthorized and unpaid consumption and also have option for renew the connection by paying bill online. We tried to build up a consumer and business friendly system.", "title": "" }, { "docid": "db111db8aaaf1185d9dc99ba53e6e828", "text": "Topic model uncovers abstract topics within texts documents, which is an essential task in text analysis in social networks. However, identifying topics in text documents in social networks is challenging since the texts are short, unlabeled, and unstructured. For this reason, we propose a topic classification system regarding the features of text documents in social networks. The proposed system is based on several machine-learning algorithms and voting system. The accuracy of the system has been tested using text documents that were classified into three topics. The experiment results show that the proposed system guarantees high accuracy rates in documents topic classification.", "title": "" }, { "docid": "8f6107d045b94917cf0f0bd3f262a1bf", "text": "An interesting challenge for explainable recommender systems is to provide successful interpretation of recommendations using structured sentences. It is well known that user-generated reviews, have strong influence on the users' decision. Recent techniques exploit user reviews to generate natural language explanations. In this paper, we propose a character-level attention-enhanced long short-term memory model to generate natural language explanations. We empirically evaluated this network using two real-world review datasets. The generated text present readable and similar to a real user's writing, due to the ability of reproducing negation, misspellings, and domain-specific vocabulary.", "title": "" }, { "docid": "1c3c21a159bed9bf293838eee7c6c36b", "text": "The laminar location of the cell bodies and terminals of interareal connections determines the hierarchical structural organization of the cortex and has been intensively studied. However, we still have only a rudimentary understanding of the connectional principles of feedforward (FF) and feedback (FB) pathways. Quantitative analysis of retrograde tracers was used to extend the notion that the laminar distribution of neurons interconnecting visual areas provides an index of hierarchical distance (percentage of supragranular labeled neurons [SLN]). We show that: 1) SLN values constrain models of cortical hierarchy, revealing previously unsuspected areal relations; 2) SLN reflects the operation of a combinatorial distance rule acting differentially on sets of connections between areas; 3) Supragranular layers contain highly segregated bottom-up and top-down streams, both of which exhibit point-to-point connectivity. This contrasts with the infragranular layers, which contain diffuse bottom-up and top-down streams; 4) Cell filling of the parent neurons of FF and FB pathways provides further evidence of compartmentalization; 5) FF pathways have higher weights, cross fewer hierarchical levels, and are less numerous than FB pathways. Taken together, the present results suggest that cortical hierarchies are built from supra- and infragranular counterstreams. This compartmentalized dual counterstream organization allows point-to-point connectivity in both bottom-up and top-down directions.", "title": "" }, { "docid": "2547e6e8138c49b76062e241391dfc1d", "text": "Methods of deep neural networks (DNNs) have recently demonstrated superior performance on a number of natural language processing tasks. However, in most previous work, the models are learned based on either unsupervised objectives, which does not directly optimize the desired task, or singletask supervised objectives, which often suffer from insufficient training data. We develop a multi-task DNN for learning representations across multiple tasks, not only leveraging large amounts of cross-task data, but also benefiting from a regularization effect that leads to more general representations to help tasks in new domains. Our multi-task DNN approach combines tasks of multiple-domain classification (for query classification) and information retrieval (ranking for web search), and demonstrates significant gains over strong baselines in a comprehensive set of domain adaptation.", "title": "" }, { "docid": "bea5359317e05e0a9c3b4d474ca0067f", "text": "Agile method Scrum can effectively resolve numerous problems encountered when Capability Maturity Model Integration(CMMI) is implemented in small and medium software development organizations, but some special needs are hard to be satisfied. According to small and medium organizations' characteristic, the paper analyzes feasibility of combining Scrum and CMMI in depth. It is useful for organizations that build a new project management framework based on both CMMI and Scrum practices.", "title": "" }, { "docid": "4ba4930befdc19c32c4fb73abe35d141", "text": "Us enhance usab adaptivity and designers mod hindering thus level, increasin possibility of e aims at creat concepts and p literature, app user context an to create a ge This ontology alleviate the a download, is ex areas, person visualization.", "title": "" }, { "docid": "04384b62c17f9ff323db4d51bea86fe9", "text": "Imbalanced data widely exist in many high-impact applications. An example is in air traffic control, where among all three types of accident causes, historical accident reports with ‘personnel issues’ are much more than the other two types (‘aircraft issues’ and ‘environmental issues’) combined. Thus, the resulting data set of accident reports is highly imbalanced. On the other hand, this data set can be naturally modeled as a network, with each node representing an accident report, and each edge indicating the similarity of a pair of accident reports. Up until now, most existing work on imbalanced data analysis focused on the classification setting, and very little is devoted to learning the node representations for imbalanced networks. To bridge this gap, in this paper, we first propose Vertex-Diminished Random Walk (VDRW) for imbalanced network analysis. It is significantly different from the existing Vertex Reinforced Random Walk by discouraging the random particle to return to the nodes that have already been visited. This design is particularly suitable for imbalanced networks as the random particle is more likely to visit the nodes from the same class, which is a desired property for learning node representations. Furthermore, based on VDRW, we propose a semi-supervised network representation learning framework named ImVerde for imbalanced networks, where context sampling uses VDRW and the limited label information to create node-context pairs, and balanced-batch sampling adopts a simple under-sampling method to balance these pairs from different classes. Experimental results demonstrate that ImVerde based on VDRW outperforms stateof-the-art algorithms for learning network representations from imbalanced data.", "title": "" }, { "docid": "cf0d5d3877bf26822c2196a3a17bd073", "text": "The purpose of this paper is to review existing sensor and sensor network ontologies to understand whether they can be reused as a basis for a manufacturing perception sensor ontology, or if the existing ontologies hold lessons for the development of a new ontology. We develop an initial set of requirements that should apply to a manufacturing perception sensor ontology. These initial requirements are used in reviewing selected existing sensor ontologies. This paper describes the steps for 1) extending and refining the requirements; 2) proposing hierarchical structures for verifying the purposes of the ontology; and 3) choosing appropriate tools and languages to support such an ontology. Some languages could include OWL (Web Ontology Language) [1] and SensorML (Sensor Markup Language) [2]. This work will be proposed as a standard within the IEEE Robotics and Automation Society (RAS) Ontologies for Robotics Automation (ORA) Working Group [3]. 1. Overview of Sensor Ontology Effort Next generation robotic systems for manufacturing must perform highly complex tasks in dynamic environments. To improve return on investment, manufacturing robots and automation must become more flexible and adaptable, and less dependent on blind, repetitive motions in a structured, fixed environment. To become more adaptable, robots need both precise sensing for parts and assemblies, so they can focus on specific tasks in which they must interact with and manipulate objects; and situational awareness, so they can robustly sense their entire environment for long-term planning and short-term safety. Meeting these requirements will need advances in sensing and perception systems that can identify and locate objects, can detect people and obstacles, and, in general, can perceive as many elements of the manufacturing environment as needed for operation. To robustly and accurately perceive many elements of the environment will require a wide range of collaborating smart sensors such as cameras, laser scanners, stereo cameras, and others. In many cases these sensors will need to be integrated into a distributed sensor network that offers extensive coverage of a manufacturing facility by sensors of complementary capabilities. To support the development of these sensors and networks, the National Institute of Standards and Technology (NIST) manufacturing perception sensor ontology effort looks to create an ontology of sensors, sensor networks, sensor capabilities, environmental objects, and environmental conditions so as to better define and anticipate the wide range of perception systems needed. The ontology will include:", "title": "" }, { "docid": "3a723bb57dedaaf473384243fe6e1ab1", "text": "Objective\nWe explored whether use of deep learning to model temporal relations among events in electronic health records (EHRs) would improve model performance in predicting initial diagnosis of heart failure (HF) compared to conventional methods that ignore temporality.\n\n\nMaterials and Methods\nData were from a health system's EHR on 3884 incident HF cases and 28 903 controls, identified as primary care patients, between May 16, 2000, and May 23, 2013. Recurrent neural network (RNN) models using gated recurrent units (GRUs) were adapted to detect relations among time-stamped events (eg, disease diagnosis, medication orders, procedure orders, etc.) with a 12- to 18-month observation window of cases and controls. Model performance metrics were compared to regularized logistic regression, neural network, support vector machine, and K-nearest neighbor classifier approaches.\n\n\nResults\nUsing a 12-month observation window, the area under the curve (AUC) for the RNN model was 0.777, compared to AUCs for logistic regression (0.747), multilayer perceptron (MLP) with 1 hidden layer (0.765), support vector machine (SVM) (0.743), and K-nearest neighbor (KNN) (0.730). When using an 18-month observation window, the AUC for the RNN model increased to 0.883 and was significantly higher than the 0.834 AUC for the best of the baseline methods (MLP).\n\n\nConclusion\nDeep learning models adapted to leverage temporal relations appear to improve performance of models for detection of incident heart failure with a short observation window of 12-18 months.", "title": "" }, { "docid": "9d55947637b358c4dc30d7ba49885472", "text": "Deep neural networks have been successfully applied to many text matching tasks, such as paraphrase identification, question answering, and machine translation. Although ad-hoc retrieval can also be formalized as a text matching task, few deep models have been tested on it. In this paper, we study a state-of-the-art deep matching model, namely MatchPyramid, on the ad-hoc retrieval task. The MatchPyramid model employs a convolutional neural network over the interactions between query and document to produce the matching score. We conducted extensive experiments to study the impact of different pooling sizes, interaction functions and kernel sizes on the retrieval performance. Finally, we show that the MatchPyramid models can significantly outperform several recently introduced deep matching models on the retrieval task, but still cannot compete with the traditional retrieval models, such as BM25 and language models. CCS Concepts •Information systems→ Retrieval models and ranking;", "title": "" }, { "docid": "ff20e5cd554cd628eba07776fa9a5853", "text": "We describe our early experience in applying our console log mining techniques [19, 20] to logs from production Google systems with thousands of nodes. This data set is five orders of magnitude in size and contains almost 20 times as many messages types as the Hadoop data set we used in [19]. It also has many properties that are unique to large scale production deployments (e.g., the system stays on for several months and multiple versions of the software can run concurrently). Our early experience shows that our techniques, including source code based log parsing, state and sequence based feature creation and problem detection, work well on this production data set. We also discuss our experience in using our log parser to assist the log sanitization.", "title": "" }, { "docid": "1303770cf8d0f1b0f312feb49281aa10", "text": "A terahertz metamaterial absorber (MA) with properties of broadband width, polarization-insensitive, wide angle incidence is presented. Different from the previous methods to broaden the absorption width, this letter proposes a novel combinatorial way which units a nested structure with multiple metal-dielectric layers. We numerically investigate the proposed MA, and the simulation results show that the absorber achieves a broadband absorption over a frequency range of 0.896 THz with the absorptivity greater than 90%. Moreover, the full-width at half maximum of the absorber is up to 1.224 THz which is 61.2% with respect to the central frequency. The mechanism for the broadband absorption originates from the overlapping of longitudinal coupling between layers and coupling of the nested structure. Importantly, the nested structure makes a great contribution to broaden the absorption width. Thus, constructing a nested structure in a multi-layer absorber may be considered as an effective way to design broadband MAs.", "title": "" }, { "docid": "ea262ac413534326feaed7adf8455881", "text": "Numerous sensors in modern mobile phones enable a range of people-centric applications. This paper envisions a system called PhonePoint Pen that uses the in-built accelerometer in mobile phones to recognize human writing. By holding the phone like a pen, a user should be able to write short messages or draw simple diagrams in the air. The acceleration due to hand gestures can be translated into geometric strokes, and recognized as characters. We prototype the PhonePoint Pen on the Nokia N95 platform, and evaluate it through real users. Results show that English characters can be identified with an average accuracy of 91.9%, if the users conform to a few reasonable constraints. Future work is focused on refining the prototype, with the goal of offering a new user-experience that complements keyboards and touch-screens.", "title": "" }, { "docid": "aaf30f184fcea3852f73a5927100cac7", "text": "Dyslexia is a neurodevelopmental reading disability estimated to affect 5-10% of the population. While there is yet no full understanding of the cause of dyslexia, or agreement on its precise definition, it is certain that many individuals suffer persistent problems in learning to read for no apparent reason. Although it is generally agreed that early intervention is the best form of support for children with dyslexia, there is still a lack of efficient and objective means to help identify those at risk during the early years of school. Here we show that it is possible to identify 9-10 year old individuals at risk of persistent reading difficulties by using eye tracking during reading to probe the processes that underlie reading ability. In contrast to current screening methods, which rely on oral or written tests, eye tracking does not depend on the subject to produce some overt verbal response and thus provides a natural means to objectively assess the reading process as it unfolds in real-time. Our study is based on a sample of 97 high-risk subjects with early identified word decoding difficulties and a control group of 88 low-risk subjects. These subjects were selected from a larger population of 2165 school children attending second grade. Using predictive modeling and statistical resampling techniques, we develop classification models from eye tracking records less than one minute in duration and show that the models are able to differentiate high-risk subjects from low-risk subjects with high accuracy. Although dyslexia is fundamentally a language-based learning disability, our results suggest that eye movements in reading can be highly predictive of individual reading ability and that eye tracking can be an efficient means to identify children at risk of long-term reading difficulties.", "title": "" }, { "docid": "45a8fea3e8d780c65811cee79082237f", "text": "Pedestrian dead reckoning, especially on smart-phones, is likely to play an increasingly important role in indoor tracking and navigation, due to its low cost and ability to work without any additional infrastructure. A challenge however, is that positioning, both in terms of step detection and heading estimation, must be accurate and reliable, even when the use of the device is so varied in terms of placement (e.g. handheld or in a pocket) or orientation (e.g holding the device in either portrait or landscape mode). Furthermore, the placement can vary over time as a user performs different tasks, such as making a call or carrying the device in a bag. A second challenge is to be able to distinguish between a true step and other periodic motion such as swinging an arm or tapping when the placement and orientation of the device is unknown. If this is not done correctly, then the PDR system typically overestimates the number of steps taken, leading to a significant long term error. We present a fresh approach, robust PDR (R-PDR), based on exploiting how bipedal motion impacts acquired sensor waveforms. Rather than attempting to recognize different placements through sensor data, we instead simply determine whether the motion of one or both legs impact the measurements. In addition, we formulate a set of techniques to accurately estimate the device orientation, which allows us to very accurately (typically over 99%) reject false positives. We demonstrate that regardless of device placement, we are able to detect the number of steps taken with >99.4% accuracy. R-PDR thus addresses the two main limitations facing existing PDR techniques.", "title": "" }, { "docid": "6a2e3c783b468474ca0f67d7c5af456c", "text": "We evaluated the cytotoxic effects of four prostaglandin analogs (PGAs) used to treat glaucoma. First we established primary cultures of conjunctival stromal cells from healthy donors. Then cell cultures were incubated with different concentrations (0, 0.1, 1, 5, 25, 50 and 100%) of commercial formulations of bimatoprost, tafluprost, travoprost and latanoprost for increasing periods (5 and 30 min, 1 h, 6 h and 24 h) and cell survival was assessed with three different methods: WST-1, MTT and calcein/AM-ethidium homodimer-1 assays. Our results showed that all PGAs were associated with a certain level of cell damage, which correlated significantly with the concentration of PGA used, and to a lesser extent with culture time. Tafluprost tended to be less toxic than bimatoprost, travoprost and latanoprost after all culture periods. The results for WST-1, MTT and calcein/AM-ethidium homodimer-1 correlated closely. When the average lethal dose 50 was calculated, we found that the most cytotoxic drug was latanoprost, whereas tafluprost was the most sparing of the ocular surface in vitro. These results indicate the need to design novel PGAs with high effectiveness but free from the cytotoxic effects that we found, or at least to obtain drugs that are functional at low dosages. The fact that the commercial formulation of tafluprost used in this work was preservative-free may support the current tendency to eliminate preservatives from eye drops for clinical use.", "title": "" }, { "docid": "9f3f5e2baa1bff4aa28a2ce2a4c47088", "text": "One of the most perplexing problems in risk analysis is why some relatively minor risks or risk events, as assessed by technical experts, often elicit strong public concerns and result in substantial impacts upon society and economy. This article sets forth a conceptual framework that seeks to link systematically the technical assessment of risk with psychological, sociological, and cultural perspectives of risk perception and risk-related behavior. The main thesis is that hazards interact with psychological, social, institutional, and cultural processes in ways that may amplify or attenuate public responses to the risk or risk event. A structural description of the social amplification of risk is now possible. Amplification occurs at two stages: in the transfer of information about the risk, and in the response mechanisms of society. Signals about risk are processed by individual and social amplification stations, including the scientist who communicates the risk assessment, the news media, cultural groups, interpersonal networks, and others. Key steps of amplifications can be identified at each stage. The amplified risk leads to behavioral responses, which, in turn, result in secondary impacts. Models are presented that portray the elements and linkages in the proposed conceptual framework.", "title": "" }, { "docid": "d07ba52b14c098ca5e2178ce64fc4403", "text": "Consider the multivariate nonparametric regression model. It is shown that estimators based on sparsely connected deep neural networks with ReLU activation function and properly chosen network architecture achieve the minimax rates of convergence (up to log n-factors) under a general composition assumption on the regression function. The framework includes many well-studied structural constraints such as (generalized) additive models. While there is a lot of flexibility in the network architecture, the tuning parameter is the sparsity of the network. Specifically, we consider large networks with number of potential network parameters exceeding the sample size. The analysis gives some insights why multilayer feedforward neural networks perform well in practice. Interestingly, the depth (number of layers) of the neural network architectures plays an important role and our theory suggests that for nonparametric regression scaling the network depth with the logarithm of the sample size is natural. It is also shown that under the composition assumption wavelet estimators can only achieve suboptimal rates.", "title": "" } ]
scidocsrr
18b752f9e223fba936ca48722db2d9ec
Visual search and reading tasks using ClearType and regular displays: two experiments
[ { "docid": "eb0eec2fe000511a37e6487ff51ddb68", "text": "We report on a laboratory study that compares reading from paper to reading on-line. Critical differences have to do with the major advantages paper offers in supporting annotation while reading, quick navigation, and flexibility of spatial layout. These, in turn, allow readers to deepen their understanding of the text, extract a sense of its structure, create a plan for writing, cross-refer to other documents, and interleave reading and writing. We discuss the design implications of these findings for the development of better reading technologies.", "title": "" } ]
[ { "docid": "8eb51537b051bbf78d87a0cd48e9d90c", "text": "One of the important techniques of Data mining is Classification. Many real world problems in various fields such as business, science, industry and medicine can be solved by using classification approach. Neural Networks have emerged as an important tool for classification. The advantages of Neural Networks helps for efficient classification of given data. In this study a Heart diseases dataset is analyzed using Neural Network approach. To increase the efficiency of the classification process parallel approach is also adopted in the training phase.", "title": "" }, { "docid": "4ccea211a4b3b01361a4205990491764", "text": "published by the press syndicate of the university of cambridge Vygotsky's educational theory in cultural context / edited by Alex Kozulin. .. [et al.]. p. cm. – (Learning in doing) Includes bibliographical references and index.", "title": "" }, { "docid": "936cebe86936c6aa49758636554a4dc7", "text": "A new kind of distributed power divider/combiner circuit for use in octave bandwidth (or more) microstrip power transistor amplifier is presented. The design, characteristics and advantages are discussed. Experimental results on a 4-way divider are presented and compared with theory.", "title": "" }, { "docid": "23d6e2407335a076526df89355b9c7fe", "text": "In view of the load balancing problem in VM resources scheduling, this paper presents a scheduling strategy on load balancing of VM resources based on genetic algorithm. According to historical data and current state of the system and through genetic algorithm, this strategy computes ahead the influence it will have on the system after the deployment of the needed VM resources and then chooses the least-affective solution, through which it achieves the best load balancing and reduces or avoids dynamic migration. At the same time, this paper brings in variation rate to describe the load variation of system virtual machines, and it also introduces average load distance to measure the overall load balancing effect of the algorithm. The experiment shows that this strategy has fairly good global astringency and efficiency, and the algorithm of this paper is, to a great extent, able to solve the problems of load imbalance and high migration cost after system VM being scheduled. What is more, the average load distance does not grow with the increase of VM load variation rate, and the system scheduling algorithm has quite good resource utility.", "title": "" }, { "docid": "76f1935fcf5d30cd61d5452a892c4afb", "text": "This paper examines the adoption and implementation of the Information Technology Infrastructure Library (ITIL). Specifically, interviews with a CIO, as well as literature from the ITIL Official site and from the practitioner’s journals are consulted in order to determine whether the best practices contained in the ITIL framework may improve the management of information technology (IT) services, as well as assist in promoting the alignment of Business and the IT Function within the organization. A conceptual model is proposed which proposes a two-way relationship between IT and the provision of IT Services, with ITIL positioned as an intervening variable.", "title": "" }, { "docid": "65d60131b1ceba50399ceffa52de7e8a", "text": "Cox, Matthew L. Miller, and Jeffrey A. Bloom. San Diego, CA: Academic Press, 2002, 576 pp. $69.96 (hardbound). A key ingredient to copyright protection, digital watermarking provides a solution to the illegal copying of material. It also has broader uses in recording and electronic transaction tracking. This book explains “the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.” [book notes] The authors are extensively experienced in digital watermarking technologies. Cox recently joined the NEC Research Institute after a five-year stint at AT&T Bell Labs. Miller’s interest began at AT&T Bell Labs in 1979. He also is employed at NEC. Bloom is a researcher in digital watermarking at the Sarnoff Corporation. His acquaintance with the field began at Signafy, Inc. and continued through his employment at NEC Research Institute. The book features the following: Review of the underlying principles of watermarking relevant for image, video, and audio; Discussion of a wide variety of applications, theoretical principles, detection and embedding concepts, and key properties; Examination of copyright protection and other applications; Presentation of a series of detailed examples that illustrate watermarking concepts and practices; Appendix, in print and on the Web, containing the source code for the examples; Comprehensive glossary of terms. “The authors provide a comprehensive overview of digital watermarking, rife with detailed examples and grounded within strong theoretical framework. Digital Watermarking will serve as a valuable introduction as well as a useful reference for those engaged in the field.”—Walter Bender, Director, M.I.T. Media Lab", "title": "" }, { "docid": "b8274589a145a94e19329b2640a08c17", "text": "Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcast information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport’s protocols that makes it possible to trace the movements of a particular passport, without having to break the passport’s cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.", "title": "" }, { "docid": "6e36103ba9f21103252141ad4a53b4ac", "text": "In this paper, we describe the binary classification of sentences into idiomatic and non-idiomatic. Our idiom detection algorithm is based on linear discriminant analysis (LDA). To obtain a discriminant subspace, we train our model on a small number of randomly selected idiomatic and non-idiomatic sentences. We then project both the training and the test data on the chosen subspace and use the three nearest neighbor (3NN) classifier to obtain accuracy. The proposed approach is more general than the previous algorithms for idiom detection — neither does it rely on target idiom types, lexicons, or large manually annotated corpora, nor does it limit the search space by a particular linguistic con-", "title": "" }, { "docid": "9fd0049d079919282082a119763f2740", "text": "The rapid development of Internet has given birth to a new business model: Cloud Computing. This new paradigm has experienced a fantastic rise in recent years. Because of its infancy, it remains a model to be developed. In particular, it must offer the same features of services than traditional systems. The cloud computing is large distributed systems that employ distributed resources to deliver a service to end users by implementing several technologies. Hence providing acceptable response time for end users, presents a major challenge for cloud computing. All components must cooperate to meet this challenge, in particular through load balancing algorithms. This will enhance the availability and will gain the end user confidence. In this paper we try to give an overview of load balancing in the cloud computing by exposing the most important research challenges.", "title": "" }, { "docid": "5063a63d425b5ceebbadfbab14a0a75d", "text": "Two studies investigated young infants' use of the word-learning principle Mutual Exclusivity. In Experiment 1, a linear relationship between age and performance was discovered. Seventeen-month-old infants successfully used Mutual Exclusivity to map novel labels to novel objects in a preferential looking paradigm. That is, when presented a familiar and a novel object (e.g. car and phototube) and asked to \"look at the dax\", 17-month-olds increased looking to the novel object (i.e. phototube) above baseline preference. On these trials, 16-month-olds were at chance. And, 14-month-olds systematically increased looking to the familiar object (i.e. car) in response to hearing the novel label \"dax\". Experiment 2 established that this increase in looking to the car was due solely to hearing the novel label \"dax\". Several possible interpretations of the surprising form of failure at 14 months are discussed.", "title": "" }, { "docid": "3e3514d3a163c1982529327e81a88f84", "text": "With the growth of recipe sharing services, online cooking recipes associated with ingredients and cooking procedures are available. Many recipe sharing sites have devoted to the development of recipe recommendation mechanism. While most food related research has been on recipe recommendation, little effort has been done on analyzing the correlation between recipe cuisines and ingredients. In this paper, we aim to investigate the underlying cuisine-ingredient connections by exploiting the classification techniques, including associative classification and support vector machine. Our study conducted on food.com data provides insights about which cuisines are the most similar and what are the essential ingredients for a cuisine, with an application to automatic cuisine labeling for recipes.", "title": "" }, { "docid": "1baaa67ff7b4d00d6f03ae908cf1ca71", "text": "Function approximation has been found in many applications. The radial basis function (RBF) network is one approach which has shown a great promise in this sort of problems because of its faster learning capacity. A traditional RBF network takes Gaussian functions as its basis functions and adopts the least-squares criterion as the objective function, However, it still suffers from two major problems. First, it is difficult to use Gaussian functions to approximate constant values. If a function has nearly constant values in some intervals, the RBF network will be found inefficient in approximating these values. Second, when the training patterns incur a large error, the network will interpolate these training patterns incorrectly. In order to cope with these problems, an RBF network is proposed in this paper which is based on sequences of sigmoidal functions and a robust objective function. The former replaces the Gaussian functions as the basis function of the network so that constant-valued functions can be approximated accurately by an RBF network, while the latter is used to restrain the influence of large errors. Compared with traditional RBF networks, the proposed network demonstrates the following advantages: (1) better capability of approximation to underlying functions; (2) faster learning speed; (3) better size of network; (4) high robustness to outliers.", "title": "" }, { "docid": "4768001167cefad7b277e3b77de648bb", "text": "MicroRNAs (miRNAs) regulate gene expression at the posttranscriptional level and are therefore important cellular components. As is true for protein-coding genes, the transcription of miRNAs is regulated by transcription factors (TFs), an important class of gene regulators that act at the transcriptional level. The correct regulation of miRNAs by TFs is critical, and increasing evidence indicates that aberrant regulation of miRNAs by TFs can cause phenotypic variations and diseases. Therefore, a TF-miRNA regulation database would be helpful for understanding the mechanisms by which TFs regulate miRNAs and understanding their contribution to diseases. In this study, we manually surveyed approximately 5000 reports in the literature and identified 243 TF-miRNA regulatory relationships, which were supported experimentally from 86 publications. We used these data to build a TF-miRNA regulatory database (TransmiR, http://cmbi.bjmu.edu.cn/transmir), which contains 82 TFs and 100 miRNAs with 243 regulatory pairs between TFs and miRNAs. In addition, we included references to the published literature (PubMed ID) information about the organism in which the relationship was found, whether the TFs and miRNAs are involved with tumors, miRNA function annotation and miRNA-associated disease annotation. TransmiR provides a user-friendly interface by which interested parties can easily retrieve TF-miRNA regulatory pairs by searching for either a miRNA or a TF.", "title": "" }, { "docid": "8ab4f34c736742a153477f919dfb4d8f", "text": "In this paper, we model the trajectory of sea vessels and provide a service that predicts in near-real time the position of any given vessel in 4’, 10’, 20’ and 40’ time intervals. We explore the necessary tradeoffs between accuracy, performance and resource utilization are explored given the large volume and update rates of input data. We start with building models based on well-established machine learning algorithms using static datasets and multi-scan training approaches and identify the best candidate to be used in implementing a single-pass predictive approach, under real-time constraints. The results are measured in terms of accuracy and performance and are compared against the baseline kinematic equations. Results show that it is possible to efficiently model the trajectory of multiple vessels using a single model, which is trained and evaluated using an adequately large, static dataset, thus achieving a significant gain in terms of resource usage while not compromising accuracy.", "title": "" }, { "docid": "a330c7ec22ab644404bbb558158e69e7", "text": "With the advance in both hardware and software technologies, automated data generation and storage has become faster than ever. Such data is referred to as data streams. Streaming data is ubiquitous today and it is often a challenging task to store, analyze and visualize such rapid large volumes of data. Most conventional data mining techniques have to be adapted to run in a streaming environment, because of the underlying resource constraints in terms of memory and running time. Furthermore, the data stream may often show concept drift, because of which adaptation of conventional algorithms becomes more challenging. One such important conventional data mining problem is that of classification. In the classification problem, we attempt to model the class variable on the basis of one or more feature variables. While this problem has been extensively studied from a conventional mining perspective, it is a much more challenging problem in the data stream domain. In this chapter, we will re-visit the problem of classification from the data stream perspective. The techniques for this problem need to be thoroughly re-designed to address the issue of resource constraints and concept drift. This chapter reviews the state-of-the-art techniques in the literature along with their corresponding advantages and disadvantages.", "title": "" }, { "docid": "5da45b946151bc72930cb8eebbe9d3f8", "text": "Dr. Manfred Bischoff Institute of Innovation Management of EADS, Zeppelin University, Am Seemoser Horn 20, D-88045 Friedrichshafen, Germany. ellen.enkel@zeppelin-university.de Institute of Technology Management, University of St. Gallen, Dufourstrasse 40a, CH-9000 St. Gallen, Switzerland. oliver.gassmann@unisg.ch Center for Open Innovation, Haas School of Business, Faculty Wing, F402, University of California, Berkeley, Berkeley, CA 94720-1930, USA. chesbrou@haas.berkeley.edu", "title": "" }, { "docid": "1a9d595aaff44165fd486b97025ca36d", "text": "1389-1286/$ see front matter 2008 Elsevier B.V doi:10.1016/j.comnet.2008.09.022 * Corresponding author. Tel.: +1 413 545 4465. E-mail address: zink@cs.umass.edu (M. Zink). 1 http://www.usatoday.com/tech/news/2006-07 x.htm http://en.wikipedia.org/wiki/YouTube. User-Generated Content has become very popular since new web services such as YouTube allow for the distribution of user-produced media content. YouTube-like services are different from existing traditional VoD services in that the service provider has only limited control over the creation of new content. We analyze how content distribution in YouTube is realized and then conduct a measurement study of YouTube traffic in a large university campus network. Based on these measurements, we analyzed the duration and the data rate of streaming sessions, the popularity of videos, and access patterns for video clips from the clients in the campus network. The analysis of the traffic shows that trace statistics are relatively stable over short-term periods while long-term trends can be observed. We demonstrate how synthetic traces can be generated from the measured traces and show how these synthetic traces can be used as inputs to trace-driven simulations. We also analyze the benefits of alternative distribution infrastructures to improve the performance of a YouTube-like VoD service. The results of these simulations show that P2P-based distribution and proxy caching can reduce network traffic significantly and allow for faster access to video clips. 2008 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "6b221edbde15defb80ecfb03340b012d", "text": "Abstract We use well-established methods of knot theory to study the topological structure of the set of periodic orbits of the Lü attractor. We show that, for a specific set of parameters, the Lü attractor is topologically different from the classical Lorenz attractor, whose dynamics is formed by a double cover of the simple horseshoe. This argues against the ‘similarity’ between the Lü and Lorenz attractors, claimed, for these parameter values, by some authors on the basis of non-topological observations. However, we show that the Lü system belongs to the Lorenz-like family, since by changing the values of the parameters, the behaviour of the system follows the behaviour of all members of this family. An attractor of the Lü kind with higher order symmetry is constructed and some remarks on the Chen attractor are also presented.", "title": "" }, { "docid": "3c81e6ff0e7b2eb509cea08904bdeaf3", "text": "A novel ultra wideband (UWB) bandpass filter with double notch-bands is presented in this paper. Multilayer schematic is adopted to achieve compact size. Stepped impedance resonators (SIRs), which can also suppress harmonic response, are designed on top and second layers, respectively, and broadside coupling technique is used to achieve tight couplings for a wide passband. Folded SIRs that can provide desired notch-bands are designed on the third layer and coupled underneath the second layer SIRs. The designed prototype is fabricated using multilayer liquid crystal polymer (LCP) technology. Good agreement between simulated and measured response is observed. The fabricated filter has dual notch-bands with center frequencies of 6.4/8.0 GHz with 3 dB bandwidths of 9.5%/13.4% and high rejection levels up to 26.4 dB and 43.7 dB at 6.4/8.0 GHz are observed, respectively. It also has low-insertion losses and flat group delay in passbands, and excellent stopband rejection level higher than 30.0 dB from 11.4 GHz to 18.0 GHz.", "title": "" }, { "docid": "5be572ea448bfe40654956112cecd4e1", "text": "BACKGROUND\nBeta blockers reduce mortality in patients who have chronic heart failure, systolic dysfunction, and are on background treatment with diuretics and angiotensin-converting enzyme inhibitors. We aimed to compare the effects of carvedilol and metoprolol on clinical outcome.\n\n\nMETHODS\nIn a multicentre, double-blind, and randomised parallel group trial, we assigned 1511 patients with chronic heart failure to treatment with carvedilol (target dose 25 mg twice daily) and 1518 to metoprolol (metoprolol tartrate, target dose 50 mg twice daily). Patients were required to have chronic heart failure (NYHA II-IV), previous admission for a cardiovascular reason, an ejection fraction of less than 0.35, and to have been treated optimally with diuretics and angiotensin-converting enzyme inhibitors unless not tolerated. The primary endpoints were all-cause mortality and the composite endpoint of all-cause mortality or all-cause admission. Analysis was done by intention to treat.\n\n\nFINDINGS\nThe mean study duration was 58 months (SD 6). The mean ejection fraction was 0.26 (0.07) and the mean age 62 years (11). The all-cause mortality was 34% (512 of 1511) for carvedilol and 40% (600 of 1518) for metoprolol (hazard ratio 0.83 [95% CI 0.74-0.93], p=0.0017). The reduction of all-cause mortality was consistent across predefined subgroups. The composite endpoint of mortality or all-cause admission occurred in 1116 (74%) of 1511 on carvedilol and in 1160 (76%) of 1518 on metoprolol (0.94 [0.86-1.02], p=0.122). Incidence of side-effects and drug withdrawals did not differ by much between the two study groups.\n\n\nINTERPRETATION\nOur results suggest that carvedilol extends survival compared with metoprolol.", "title": "" } ]
scidocsrr
977e5731a5015629f26c85791195f0dc
Visual localization and loop closing using decision trees and binary features
[ { "docid": "cc4c58f1bd6e5eb49044353b2ecfb317", "text": "Today, visual recognition systems are still rarely employed in robotics applications. Perhaps one of the main reasons for this is the lack of demanding benchmarks that mimic such scenarios. In this paper, we take advantage of our autonomous driving platform to develop novel challenging benchmarks for the tasks of stereo, optical flow, visual odometry/SLAM and 3D object detection. Our recording platform is equipped with four high resolution video cameras, a Velodyne laser scanner and a state-of-the-art localization system. Our benchmarks comprise 389 stereo and optical flow image pairs, stereo visual odometry sequences of 39.2 km length, and more than 200k 3D object annotations captured in cluttered scenarios (up to 15 cars and 30 pedestrians are visible per image). Results from state-of-the-art algorithms reveal that methods ranking high on established datasets such as Middlebury perform below average when being moved outside the laboratory to the real world. Our goal is to reduce this bias by providing challenging benchmarks with novel difficulties to the computer vision community. Our benchmarks are available online at: www.cvlibs.net/datasets/kitti.", "title": "" }, { "docid": "368a3dd36283257c5573a7e1ab94e930", "text": "This paper develops the multidimensional binary search tree (or <italic>k</italic>-d tree, where <italic>k</italic> is the dimensionality of the search space) as a data structure for storage of information to be retrieved by associative searches. The <italic>k</italic>-d tree is defined and examples are given. It is shown to be quite efficient in its storage requirements. A significant advantage of this structure is that a single data structure can handle many types of queries very efficiently. Various utility algorithms are developed; their proven average running times in an <italic>n</italic> record file are: insertion, <italic>O</italic>(log <italic>n</italic>); deletion of the root, <italic>O</italic>(<italic>n</italic><supscrpt>(<italic>k</italic>-1)/<italic>k</italic></supscrpt>); deletion of a random node, <italic>O</italic>(log <italic>n</italic>); and optimization (guarantees logarithmic performance of searches), <italic>O</italic>(<italic>n</italic> log <italic>n</italic>). Search algorithms are given for partial match queries with <italic>t</italic> keys specified [proven maximum running time of <italic>O</italic>(<italic>n</italic><supscrpt>(<italic>k</italic>-<italic>t</italic>)/<italic>k</italic></supscrpt>)] and for nearest neighbor queries [empirically observed average running time of <italic>O</italic>(log <italic>n</italic>).] These performances far surpass the best currently known algorithms for these tasks. An algorithm is presented to handle any general intersection query. The main focus of this paper is theoretical. It is felt, however, that <italic>k</italic>-d trees could be quite useful in many applications, and examples of potential uses are given.", "title": "" } ]
[ { "docid": "65fa13e16b7411c5b3ed20f6009809df", "text": "In the past few years, various advancements have been made in generative models owing to the formulation of Generative Adversarial Networks (GANs). GANs have been shown to perform exceedingly well on a wide variety of tasks pertaining to image generation and style transfer. In the field of Natural Language Processing, word embeddings such as word2vec and GLoVe are state-of-the-art methods for applying neural network models on textual data. Attempts have been made for utilizing GANs with word embeddings for text generation. This work presents an approach to text generation using SkipThought sentence embeddings in conjunction with GANs based on gradient penalty functions and f-measures. The results of using sentence embeddings with GANs for generating text conditioned on input information are comparable to the approaches where word embeddings are used.", "title": "" }, { "docid": "4523358a96dbf48fd86a1098ffef5c7e", "text": "This paper proposes a new randomized strategy for adaptive MCMC using Bayesian optimization. This approach applies to nondifferentiable objective functions and trades off exploration and exploitation to reduce the number of potentially costly objective function evaluations. We demonstrate the strategy in the complex setting of sampling from constrained, discrete and densely connected probabilistic graphical models where, for each variation of the problem, one needs to adjust the parameters of the proposal mechanism automatically to ensure efficient mixing of the Markov chains.", "title": "" }, { "docid": "15f51cbbb75d236a5669f613855312e0", "text": "The recent work of Gatys et al., who characterized the style of an image by the statistics of convolutional neural network filters, ignited a renewed interest in the texture generation and image stylization problems. While their image generation technique uses a slow optimization process, recently several authors have proposed to learn generator neural networks that can produce similar outputs in one quick forward pass. While generator networks are promising, they are still inferior in visual quality and diversity compared to generation-by-optimization. In this work, we advance them in two significant ways. First, we introduce an instance normalization module to replace batch normalization with significant improvements to the quality of image stylization. Second, we improve diversity by introducing a new learning formulation that encourages generators to sample unbiasedly from the Julesz texture ensemble, which is the equivalence class of all images characterized by certain filter responses. Together, these two improvements take feed forward texture synthesis and image stylization much closer to the quality of generation-via-optimization, while retaining the speed advantage.", "title": "" }, { "docid": "27dda1e123c1b2844b9a570c0f01757b", "text": "Yue-Tian-Yi Zhao a, Zi-Yang Jia b, Yong Tang c,d,*, Jason Jie Xiong e, Yi-Cheng Zhang d a School of Foreign Languages, University of Electronic Science and Technology of China, Chengdu, 610054, China b Department of Computer Science, Rutgers University, Piscataway, NJ 08854, USA c School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 610054, China d Department of Physics, University of Fribourg, Chemin du Musée 3, CH-1700 Fribourg, Switzerland e Department of Computer Information Systems and Supply Chain Management, Walker College of Business, Appalachian State University, Boone, NC 28608, USA", "title": "" }, { "docid": "9b52a659fb6383e92c5968a082b01b71", "text": "The internet of things (IoT) has a variety of application domains, including smart homes. This paper analyzes distinct IoT security and privacy features, including security requirements, threat models, and attacks from the smart home perspective. Further, this paper proposes an intelligent collaborative security management model to minimize security risk. The security challenges of the IoT for a smart home scenario are encountered, and a comprehensive IoT security management for smart homes has been proposed.", "title": "" }, { "docid": "c2b3329a849a5554ab6636bf42218519", "text": "Autism spectrum disorders are not rare; many primary care pediatricians care for several children with autism spectrum disorders. Pediatricians play an important role in early recognition of autism spectrum disorders, because they usually are the first point of contact for parents. Parents are now much more aware of the early signs of autism spectrum disorders because of frequent coverage in the media; if their child demonstrates any of the published signs, they will most likely raise their concerns to their child's pediatrician. It is important that pediatricians be able to recognize the signs and symptoms of autism spectrum disorders and have a strategy for assessing them systematically. Pediatricians also must be aware of local resources that can assist in making a definitive diagnosis of, and in managing, autism spectrum disorders. The pediatrician must be familiar with developmental, educational, and community resources as well as medical subspecialty clinics. This clinical report is 1 of 2 documents that replace the original American Academy of Pediatrics policy statement and technical report published in 2001. This report addresses background information, including definition, history, epidemiology, diagnostic criteria, early signs, neuropathologic aspects, and etiologic possibilities in autism spectrum disorders. In addition, this report provides an algorithm to help the pediatrician develop a strategy for early identification of children with autism spectrum disorders. The accompanying clinical report addresses the management of children with autism spectrum disorders and follows this report on page 1162 [available at www.pediatrics.org/cgi/content/full/120/5/1162]. Both clinical reports are complemented by the toolkit titled \"Autism: Caring for Children With Autism Spectrum Disorders: A Resource Toolkit for Clinicians,\" which contains screening and surveillance tools, practical forms, tables, and parent handouts to assist the pediatrician in the identification, evaluation, and management of autism spectrum disorders in children.", "title": "" }, { "docid": "837dd154df4971adaa4d1f397f546c20", "text": "Public infrastructure systems provide many of the services that are critical to the health, functioning, and security of society. Many of these infrastructures, however, lack continuous physical sensor monitoring to be able to detect failure events or damage that has occurred to these systems. We propose the use of social sensor big data to detect these events. We focus on two main infrastructure systems, transportation and energy, and use data from Twitter streams to detect damage to bridges, highways, gas lines, and power infrastructure. Through a three-step filtering approach and assignment to geographical cells, we are able to filter out noise in this data to produce relevant geolocated tweets identifying failure events. Applying the strategy to real-world data, we demonstrate the ability of our approach to utilize social sensor big data to detect damage and failure events in these critical public infrastructures.", "title": "" }, { "docid": "8ec9a57e096e05ad57e3421b67dc1b27", "text": "I review the literature on equity market momentum, a seminal and intriguing finding in finance. This phenomenon is the ability of returns over the past one to four quarters to predict future returns over the same period in the cross-section of equities. I am able to document about ten different theories for momentum, and a large volume of empirical work on the topic. I find, however, that after a quarter century following the discovery of momentum by Jegadeesh and Titman (1993), we are still no closer to finding a discernible cause for this phenomenon, in spite of the extensive work on the topic. More needs to be done to develop tests that are focused not so much on testing one specific theory, but on ruling out alternative", "title": "" }, { "docid": "12579b211831d9df508ecd1f90469399", "text": "This article considers stochastic algorithms for efficiently solving a class of large scale non-linear least squares (NLS) problems which frequently arise in applications. We propose eight variants of a practical randomized algorithm where the uncertainties in the major stochastic steps are quantified. Such stochastic steps involve approximating the NLS objective function using Monte-Carlo methods, and this is equivalent to the estimation of the trace of corresponding symmetric positive semi-definite (SPSD) matrices. For the latter, we prove tight necessary and sufficient conditions on the sample size (which translates to cost) to satisfy the prescribed probabilistic accuracy. We show that these conditions are practically computable and yield small sample sizes. They are then incorporated in our stochastic algorithm to quantify the uncertainty in each randomized step. The bounds we use are applications of more general results regarding extremal tail probabilities of linear combinations of gamma distributed random variables. We derive and prove new results concerning the maximal and minimal tail probabilities of such linear combinations, which can be considered independently of the rest of this paper.", "title": "" }, { "docid": "b81ed45ad3a3fae8d85993f8cf462640", "text": "Structure learning is a very important problem in the field of Bayesian networks (BNs). It is also an active research area for more than two decades; therefore, many approaches have been proposed in order to find an optimal structure based on training samples. In this paper, a Particle Swarm Optimization (PSO)-based algorithm is proposed to solve the BN structure learning problem; named BNC-PSO (Bayesian Network Construction algorithm using PSO). Edge inserting/deleting is employed in the algorithm to make the particles have the ability to achieve the optimal solution, while a cycle removing procedure is used to prevent the generation of invalid solutions. Then, the theorem of Markov chain is used to prove the global convergence of our proposed algorithm. Finally, some experiments are designed to evaluate the performance of the proposed PSO-based algorithm. Experimental results indicate that BNC-PSO is worthy of being studied in the field of BNs construction. Meanwhile, it can significantly increase nearly 15% in the scoring metric values, comparing with other optimization-based algorithms. BNC‐PSO: Structure Learning of Bayesian Networks by Particle Swarm Optimization S. Gheisari M.R. Meybodi Department of Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran. Computer Engineering and Information Technology Department, Amirkabir University of Technology, Tehran, Iran. S.gheisari@srbiau.ac.ir mmeybodi@aut.ac.ir Abstract Structure learning is a very important problem in the field of Bayesian networks (BNs). It is also an active research area for more than two decades; therefore, many approaches have been proposed in order to find an optimal structure based on training samples. In this paper, a Particle Swarm Optimization (PSO)-based algorithm is proposed to solve the BN structure learning problem; named BNC-PSO (Bayesian Network Construction algorithm using PSO). Edge inserting/deleting is employed in the algorithm to make the particles have the ability to achieve the optimal solution, while a cycle removing procedure is used to prevent the generation of invalid solutions. Then, the theorem of Markov chain is used to prove the global convergence of our proposed algorithm. Finally, some experiments are designed to evaluate the performance of the proposed PSO-based algorithm. Experimental results indicate that BNC-PSO is worthy of being studied in the field of BNs construction. Meanwhile, it can significantly increase nearly 15% in the scoring metric values, comparing with other optimization-based algorithms.", "title": "" }, { "docid": "e18a8e3622ae85763c729bd2844ce14c", "text": "0957-4174/$ see front matter 2012 Elsevier Ltd. A http://dx.doi.org/10.1016/j.eswa.2012.05.028 ⇑ Corresponding author. E-mail address: dgil@dtic.ua.es (D. Gil). 1 These authors equally contributed to this work. Fertility rates have dramatically decreased in the last two decades, especially in men. It has been described that environmental factors, as well as life habits, may affect semen quality. Artificial intelligence techniques are now an emerging methodology as decision support systems in medicine. In this paper we compare three artificial intelligence techniques, decision trees, Multilayer Perceptron and Support Vector Machines, in order to evaluate their performance in the prediction of the seminal quality from the data of the environmental factors and lifestyle. To do that we collect data by a normalized questionnaire from young healthy volunteers and then, we use the results of a semen analysis to asses the accuracy in the prediction of the three classification methods mentioned above. The results show that Multilayer Perceptron and Support Vector Machines show the highest accuracy, with prediction accuracy values of 86% for some of the seminal parameters. In contrast decision trees provide a visual and illustrative approach that can compensate the slightly lower accuracy obtained. In conclusion artificial intelligence methods are a useful tool in order to predict the seminal profile of an individual from the environmental factors and life habits. From the studied methods, Multilayer Perceptron and Support Vector Machines are the most accurate in the prediction. Therefore these tools, together with the visual help that decision trees offer, are the suggested methods to be included in the evaluation of the infertile patient. 2012 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "6e07085f81dc4f6892e0f2aba7a8dcdd", "text": "With the rapid growth in the number of spiraling network users and the increase in the use of communication technologies, the multi-server environment is the most common environment for widely deployed applications. Reddy et al. recently showed that Lu et al.'s biometric-based authentication scheme for multi-server environment was insecure, and presented a new authentication and key-agreement scheme for the multi-server. Reddy et al. continued to assert that their scheme was more secure and practical. After a careful analysis, however, their scheme still has vulnerabilities to well-known attacks. In this paper, the vulnerabilities of Reddy et al.'s scheme such as the privileged insider and user impersonation attacks are demonstrated. A proposal is then presented of a new biometric-based user authentication scheme for a key agreement and multi-server environment. Lastly, the authors demonstrate that the proposed scheme is more secure using widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, and that it serves to satisfy all of the required security properties.", "title": "" }, { "docid": "6c68bccf376da1f963aaa8ec5e08b646", "text": "The composition of the gut microbiota is in constant flow under the influence of factors such as the diet, ingested drugs, the intestinal mucosa, the immune system, and the microbiota itself. Natural variations in the gut microbiota can deteriorate to a state of dysbiosis when stress conditions rapidly decrease microbial diversity and promote the expansion of specific bacterial taxa. The mechanisms underlying intestinal dysbiosis often remain unclear given that combinations of natural variations and stress factors mediate cascades of destabilizing events. Oxidative stress, bacteriophages induction and the secretion of bacterial toxins can trigger rapid shifts among intestinal microbial groups thereby yielding dysbiosis. A multitude of diseases including inflammatory bowel diseases but also metabolic disorders such as obesity and diabetes type II are associated with intestinal dysbiosis. The characterization of the changes leading to intestinal dysbiosis and the identification of the microbial taxa contributing to pathological effects are essential prerequisites to better understand the impact of the microbiota on health and disease.", "title": "" }, { "docid": "1987ba476be524db448cce1835460a33", "text": "We report on the main features of the IJCAI’07 program, including its theme, and its schedule and organization. In particular, we discuss an effective and novel presentation format at IJCAI in which oral and poster papers were presented in the same sessions categorized by topic area.", "title": "" }, { "docid": "48fde3a2cd8781ce675ce116ed8ee861", "text": "DVB-S2 is the second-generation specification for satellite broad-band applications, developed by the Digital Video Broadcasting (DVB) Project in 2003. The system is structured as a toolkit to allow the implementation of the following satellite applications: TV and sound broadcasting, interactivity (i.e., Internet access), and professional services, such as TV contribution links and digital satellite news gathering. It has been specified around three concepts: best transmission performance approaching the Shannon limit, total flexibility, and reasonable receiver complexity. Channel coding and modulation are based on more recent developments by the scientific community: low density parity check codes are adopted, combined with QPSK, 8PSK, 16APSK, and 32APSK modulations for the system to work properly on the nonlinear satellite channel. The framing structure allows for maximum flexibility in a versatile system and also synchronization in worst case configurations (low signal-to-noise ratios). Adaptive coding and modulation, when used in one-to-one links, then allows optimization of the transmission parameters for each individual user,dependant on path conditions. Backward-compatible modes are also available,allowing existing DVB-S integrated receivers-decoders to continue working during the transitional period. The paper provides a tutorial overview of the DVB-S2 system, describing its main features and performance in various scenarios and applications.", "title": "" }, { "docid": "583e56fcef68f697d19b179766341aba", "text": "We recorded echolocation calls from 14 sympatric species of bat in Britain. Once digitised, one temporal and four spectral features were measured from each call. The frequency-time course of each call was approximated by fitting eight mathematical functions, and the goodness of fit, represented by the mean-squared error, was calculated. Measurements were taken using an automated process that extracted a single call from background noise and measured all variables without intervention. Two species of Rhinolophus were easily identified from call duration and spectral measurements. For the remaining 12 species, discriminant function analysis and multilayer back-propagation perceptrons were used to classify calls to species level. Analyses were carried out with and without the inclusion of curve-fitting data to evaluate its usefulness in distinguishing among species. Discriminant function analysis achieved an overall correct classification rate of 79% with curve-fitting data included, while an artificial neural network achieved 87%. The removal of curve-fitting data improved the performance of the discriminant function analysis by 2 %, while the performance of a perceptron decreased by 2 %. However, an increase in correct identification rates when curve-fitting information was included was not found for all species. The use of a hierarchical classification system, whereby calls were first classified to genus level and then to species level, had little effect on correct classification rates by discriminant function analysis but did improve rates achieved by perceptrons. This is the first published study to use artificial neural networks to classify the echolocation calls of bats to species level. Our findings are discussed in terms of recent advances in recording and analysis technologies, and are related to factors causing convergence and divergence of echolocation call design in bats.", "title": "" }, { "docid": "43f2dcf2f2260ff140e20380d265105b", "text": "As ontologies are the backbone of the Semantic Web, they attract much attention from researchers and engineers in many domains. This results in an increasing number of ontologies and semantic web applications. The number and complexity of such ontologies makes it hard for developers of ontologies and tools to decide which ontologies to use and reuse. To simplify the problem, a modularization algorithm can be used to partition ontologies into sets of modules. In order to evaluate the quality of modularization, we propose a new evaluation metric that quantifies the goodness of ontology modularization. In particular, we investigate the ontology module homogeneity, which assesses module cohesion, and the ontology module heterogeneity, which appraises module coupling. The experimental results demonstrate that the proposed metric is effective.", "title": "" }, { "docid": "62cc85ab7517797f50ce5026fbc5617a", "text": "OBJECTIVE\nTo assess for the first time the morphology of the lymphatic system in patients with lipedema and lipo-lymphedema of the lower extremities by MR lymphangiography.\n\n\nMATERIALS AND METHODS\n26 lower extremities in 13 consecutive patients (5 lipedema, 8 lipo-lymphedema) were examined by MR lymphangiography. 18 mL of gadoteridol and 1 mL of mepivacainhydrochloride 1% were subdivided into 10 portions and injected intracutaneously in the forefoot. MR imaging was performed with a 1.5-T system equipped with high-performance gradients. For MR lymphangiography, a 3D-spoiled gradient-echo sequence was used. For evaluation of the lymphedema a heavily T2-weighted 3D-TSE sequence was performed.\n\n\nRESULTS\nIn all 16 lower extremities (100%) with lipo-lymphedema, high signal intensity areas in the epifascial region could be detected on the 3D-TSE sequence. In the 16 examined lower extremities with lipo-lymphedema, 8 lower legs and 3 upper legs demonstrated enlarged lymphatic vessels up to a diameter of 3 mm. In two lower legs with lipo-lymphedema, an area of dermal back-flow was seen, indicating lymphatic outflow obstruction. In the 10 examined lower extremities with clinically pure lipedema, 4 lower legs and 2 upper legs demonstrated enlarged lymphatic vessels up to a diameter of 2 mm, indicating a subclinical status of lymphedema. In all examined extremities, the inguinal lymph nodes demonstrated a contrast material enhancement in the first image acquisition 15 min after injection.\n\n\nCONCLUSION\nMR lymphangiography is a safe and accurate minimal-invasive imaging modality for the evaluation of the lymphatic circulation in patients with lipedema and lipo-lymphedema of the lower extremities. If the extent of lymphatic involvement is unclear at the initial clinical examination or requires a better definition for optimal therapeutic planning, MR lymphangiography is able to identify the anatomic and physiological derangements and to establish an objective baseline.", "title": "" }, { "docid": "c23cb6c1cebcc1f5fcd925dc3b75ab6b", "text": "This paper presents the design of a controller for an autonomous ground vehicle. The goal is to track the lane centerline while avoiding collisions with obstacles. A nonlinear model predictive control (MPC) framework is used where the control inputs are the front steering angle and the braking torques at the four wheels. The focus of this work is on the development of a tailored algorithm for solving the nonlinear MPC problem. Hardware-in-the-loop simulations with the proposed algorithm show a reduction in the computational time as compared to general purpose nonlinear solvers. Experimental tests on a passenger vehicle at high speeds on low friction road surfaces show the effectiveness of the proposed algorithm.", "title": "" } ]
scidocsrr
c8629718e67cccbf5a4b71079a0fed55
An IoT environmental data collection system for fungal detection in crop fields
[ { "docid": "8c61854c397f8c56c4258c53d6d58894", "text": "Given the rapid development of plant genomic technologies, a lack of access to plant phenotyping capabilities limits our ability to dissect the genetics of quantitative traits. Effective, high-throughput phenotyping platforms have recently been developed to solve this problem. In high-throughput phenotyping platforms, a variety of imaging methodologies are being used to collect data for quantitative studies of complex traits related to the growth, yield and adaptation to biotic or abiotic stress (disease, insects, drought and salinity). These imaging techniques include visible imaging (machine vision), imaging spectroscopy (multispectral and hyperspectral remote sensing), thermal infrared imaging, fluorescence imaging, 3D imaging and tomographic imaging (MRT, PET and CT). This paper presents a brief review on these imaging techniques and their applications in plant phenotyping. The features used to apply these imaging techniques to plant phenotyping are described and discussed in this review.", "title": "" }, { "docid": "597e00855111c6ccb891c96e28f23585", "text": "Global food demand is increasing rapidly, as are the environmental impacts of agricultural expansion. Here, we project global demand for crop production in 2050 and evaluate the environmental impacts of alternative ways that this demand might be met. We find that per capita demand for crops, when measured as caloric or protein content of all crops combined, has been a similarly increasing function of per capita real income since 1960. This relationship forecasts a 100-110% increase in global crop demand from 2005 to 2050. Quantitative assessments show that the environmental impacts of meeting this demand depend on how global agriculture expands. If current trends of greater agricultural intensification in richer nations and greater land clearing (extensification) in poorer nations were to continue, ~1 billion ha of land would be cleared globally by 2050, with CO(2)-C equivalent greenhouse gas emissions reaching ~3 Gt y(-1) and N use ~250 Mt y(-1) by then. In contrast, if 2050 crop demand was met by moderate intensification focused on existing croplands of underyielding nations, adaptation and transfer of high-yielding technologies to these croplands, and global technological improvements, our analyses forecast land clearing of only ~0.2 billion ha, greenhouse gas emissions of ~1 Gt y(-1), and global N use of ~225 Mt y(-1). Efficient management practices could substantially lower nitrogen use. Attainment of high yields on existing croplands of underyielding nations is of great importance if global crop demand is to be met with minimal environmental impacts.", "title": "" } ]
[ { "docid": "85480263c05578c19b38360dbf843910", "text": "Monolithic operating system designs undermine the security of computing systems by allowing single exploits anywhere in the kernel to enjoy full supervisor privilege. The nested kernel operating system architecture addresses this problem by \"nesting\" a small isolated kernel within a traditional monolithic kernel. The \"nested kernel\" interposes on all updates to virtual memory translations to assert protections on physical memory, thus significantly reducing the trusted computing base for memory access control enforcement. We incorporated the nested kernel architecture into FreeBSD on x86-64 hardware while allowing the entire operating system, including untrusted components, to operate at the highest hardware privilege level by write-protecting MMU translations and de-privileging the untrusted part of the kernel. Our implementation inherently enforces kernel code integrity while still allowing dynamically loaded kernel modules, thus defending against code injection attacks. We also demonstrate that the nested kernel architecture allows kernel developers to isolate memory in ways not possible in monolithic kernels by introducing write-mediation and write-logging services to protect critical system data structures. Performance of the nested kernel prototype shows modest overheads: <1% average for Apache and 2.7% for kernel compile. Overall, our results and experience show that the nested kernel design can be retrofitted to existing monolithic kernels, providing important security benefits.", "title": "" }, { "docid": "099bd9e751b8c1e3a07ee06f1ba4b55b", "text": "This paper presents a robust stereo-vision-based drivable road detection and tracking system that was designed to navigate an intelligent vehicle through challenging traffic scenarios and increment road safety in such scenarios with advanced driver-assistance systems (ADAS). This system is based on a formulation of stereo with homography as a maximum a posteriori (MAP) problem in a Markov random held (MRF). Under this formulation, we develop an alternating optimization algorithm that alternates between computing the binary labeling for road/nonroad classification and learning the optimal parameters from the current input stereo pair itself. Furthermore, online extrinsic camera parameter reestimation and automatic MRF parameter tuning are performed to enhance the robustness and accuracy of the proposed system. In the experiments, the system was tested on our experimental intelligent vehicles under various real challenging scenarios. The results have substantiated the effectiveness and the robustness of the proposed system with respect to various challenging road scenarios such as heterogeneous road materials/textures, heavy shadows, changing illumination and weather conditions, and dynamic vehicle movements.", "title": "" }, { "docid": "318daea2ef9b0d7afe2cb08edcfe6025", "text": "Stock market prediction has become an attractive investigation topic due to its important role in economy and beneficial offers. There is an imminent need to uncover the stock market future behavior in order to avoid investment risks. The large amount of data generated by the stock market is considered a treasure of knowledge for investors. This study aims at constructing an effective model to predict stock market future trends with small error ratio and improve the accuracy of prediction. This prediction model is based on sentiment analysis of financial news and historical stock market prices. This model provides better accuracy results than all previous studies by considering multiple types of news related to market and company with historical stock prices. A dataset containing stock prices from three companies is used. The first step is to analyze news sentiment to get the text polarity using naïve Bayes algorithm. This step achieved prediction accuracy results ranging from 72.73% to 86.21%. The second step combines news polarities and historical stock prices together to predict future stock prices. This improved the prediction accuracy up to 89.80%.", "title": "" }, { "docid": "fe6f81141e58bf5cf13bec80e033e197", "text": "Recommender systems represent user preferences for the purpose of suggesting items to purchase or examine. They have become fundamental applications in electronic commerce and information access, providing suggestions that effectively prune large information spaces so that users are directed toward those items that best meet their needs and preferences. A variety of techniques have been proposed for performing recommendation, including content-based, collaborative, knowledge-based and other techniques. To improve performance, these methods have sometimes been combined in hybrid recommenders. This paper surveys the landscape of actual and possible hybrid recommenders, and introduces a novel hybrid, system that combines content-based recommendation and collaborative filtering to recommend restaurants.", "title": "" }, { "docid": "b9b194410824bd769b708baef7953aaf", "text": "Road and lane detection play an important role in autonomous driving and commercial driver-assistance systems. Vision-based road detection is an essential step towards autonomous driving, yet a challenging task due to illumination and complexity of the visual scenery. Urban scenes may present additional challenges such as intersections, multi-lane scenarios, or clutter due to heavy traffic. This paper presents an integrative approach to ego-lane detection that aims to be as simple as possible to enable real-time computation while being able to adapt to a variety of urban and rural traffic scenarios. The approach at hand combines and extends a road segmentation method in an illumination-invariant color image, lane markings detection using a ridge operator, and road geometry estimation using RANdom SAmple Consensus (RANSAC). Employing the segmented road region as a prior for lane markings extraction significantly improves the execution time and success rate of the RANSAC algorithm, and makes the detection of weakly pronounced ridge structures computationally tractable, thus enabling ego-lane detection even in the absence of lane markings. Segmentation performance is shown to increase when moving from a color-based to a histogram correlation-based model. The power and robustness of this algorithm has been demonstrated in a car simulation system as well as in the challenging KITTI data base of real-world urban traffic scenarios.", "title": "" }, { "docid": "b5af84f96015be76875f620d0c24e646", "text": "The worldwide burden of cancer (malignant tumor) is a major health problem, with more than 8 million new cases and 5 million deaths per year. Cancer is the second leading cause of death. With growing techniques the survival rate has increased and so it becomes important to contribute even the smallest help in this field favoring the survival rate. Tumor is a mass of tissue formed as the result of abnormal, excessive, uncoordinated, autonomous and purposeless proliferation of cells.", "title": "" }, { "docid": "96fa50abd2a4fcff47af85f07b4e9d5d", "text": "Complex biological systems and cellular networks may underlie most genotype to phenotype relationships. Here, we review basic concepts in network biology, discussing different types of interactome networks and the insights that can come from analyzing them. We elaborate on why interactome networks are important to consider in biology, how they can be mapped and integrated with each other, what global properties are starting to emerge from interactome network models, and how these properties may relate to human disease.", "title": "" }, { "docid": "3057285113f5cdd4308f7dcbc028fcad", "text": "PURPOSE\nTo evaluate structural alterations of iris and pupil diameters (PDs) in patients using systemic α-1-adrenergic receptor antagonists (α-1ARAs), which are associated with intraoperative floppy iris syndrome (IFIS).\n\n\nMETHODS\nEighty-eight eyes of 49 male were evaluated prospectively. Patients were assigned to 2 different groups. Study group included 23 patients taking any systemic α-1ARAs treatment, and control group included 26 patients not taking any systemic α-1ARAs treatment. All patients underwent anterior segment optical coherence tomography to evaluate iris thickness at the dilator muscle region (DMR) and at the sphincter muscle region (SMR). The PD was measured using a computerized infrared pupillometer under scotopic and photopic illumination.\n\n\nRESULTS\nThe study group included 46 eyes of 23 patients and the control group included 42 eyes of 26 patients. Most treated patients were on tamsulosin (16/23). Mean age was similar in the study and control groups (61.9±7.1 vs. 60.3±8, 2 years, nonsignificant). DMR (506.5±89.4 vs. 503.6±83.5 μm), SMR (507.8±78.1 vs. 522.1±96.4 μm) and the DMR/SMR ratio (1.0±0.15 vs. 0.99±0.23 μm) was similar in the study and control groups and these differences were nonsignificant. Scotopic PDs were also similar in both groups (3.99±1.11 vs. 3.74±1.35, nonsignificant). A significantly reduced photopic PD (2.89±0.55 vs. 3.62±0.64, P<0.001) and an increased scotopic/photopic PD (1.42±0.44 vs. 1.02±0.30, P<0.001) were found in the study group.\n\n\nCONCLUSIONS\nEvaluating PD alterations might be more useful than evaluating iris structural alterations in predicting IFIS. There is still a need for a reliable method that will determine the possibility of IFIS.", "title": "" }, { "docid": "2e58ccf42547abeaa39f9d811b159feb", "text": "Civitas is the first electronic voting system that is coercion-resistant, universally and voter verifiable, and suitable for remote voting. This paper describes the design and implementation of Civitas. Assurance is established in the design through security proofs, and in the implementation through information-flow security analysis. Experimental results give a quantitative evaluation of the tradeoffs between time, cost, and security.", "title": "" }, { "docid": "fdeaaa484227c1e3c0dbb02677cd68a6", "text": "A new image-based approach for fast and robust vehicle tracking from a moving platform is presented. Position, orientation, and full motion state, including velocity, acceleration, and yaw rate of a detected vehicle, are estimated from a tracked rigid 3-D point cloud. This point cloud represents a 3-D object model and is computed by analyzing image sequences in both space and time, i.e., by fusion of stereo vision and tracked image features. Starting from an automated initial vehicle hypothesis, tracking is performed by means of an extended Kalman filter. The filter combines the knowledge about the movement of the rigid point cloud's points in the world with the dynamic model of a vehicle. Radar information is used to improve the image-based object detection at far distances. The proposed system is applied to predict the driving path of other traffic participants and currently runs at 25 Hz (640 times 480 images) on our demonstrator vehicle.", "title": "" }, { "docid": "dc2f4cbd2c18e4f893750a0a1a40002b", "text": "A microstrip half-grid array antenna (HGA) based on low temperature co-fired ceramic (LTCC) technology is presented in this paper. The antenna is designed for the 77-81 GHz radar frequency band and uses a high permittivity material (εr = 7.3). The traditional single-grid array antenna (SGA) uses two radiating elements in the H-plane. For applications using digital beam forming, the focusing of an SGA in the scanning plane (H-plane) limits the field of view (FoV) of the radar system and the width of the SGA enlarges the minimal spacing between the adjacent channels. To overcome this, an array antenna using only half of the grid as radiating element was designed. As feeding network, a laminated waveguide with a vertically arranged power divider was adopted. For comparison, both an SGA and an HGA were fabricated. The measured results show: using an HGA, an HPBW increment in the H-plane can be achieved and their beam patterns in the E-plane remain similar. This compact LTCC antenna is suitable for radar application with a large FoV requirement.", "title": "" }, { "docid": "70b0353efb11a25630ace7faba4a588b", "text": "We develop an abstract theory of justifications suitable for describing the semantics of a range of logics in knowledge representation, computational and mathematical logic. A theory or program in one of these logics induces a semantical structure called a justification frame. Such a justification frame defines a class of justifications each of which embodies a potential reason why its facts are true. By defining various evaluation functions for these justifications, a range of different semantics are obtained. By allowing nesting of justification frames, various language constructs can be integrated in a seamless way. The theory provides elegant and compact formalisations of existing and new semantics in logics of various areas, showing unexpected commonalities and interrelations, and creating opportunities for new expressive knowledge representation formalisms.", "title": "" }, { "docid": "f479586f0a6fba660950a8d002e7e595", "text": "ii I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. Abstract An important element in retailing is the use of impulse purchases; generally small items that are bought by consumers on the spur of the moment. By some estimates, impulse purchases make up approximately 50 percent of all spending by consumers. While impulse purchases have been studied in the brick-and-mortar retail environment, they have not been researched in the online retail environment. With e-commerce growing rapidly and approaching $20 billion per year in the Canadian and US markets, this is an important unexplored area. Using real purchasing behaviour from visitors to the Reunion website of Huntsville High School in Ontario Canada, I explored factors that influence the likelihood of an impulse purchase in an online retail environment. Consistent with diminishing sensitivity (mental accounting and the psychophysics of pricing), the results indicate that the likelihood of a consumer purchasing the impulse item increases with the total amount spent on other items. The results also show that presenting the offer in a popup is a more effective location and presentation mode than embedding the offer into the checkout page and increases the likelihood of the consumer making an impulse purchase. In addition, the results confirm that providing a reason to purchase by linking a $1 donation for a charity to the impulse item increases the frequency of the impulse purchase. iv Acknowledgements", "title": "" }, { "docid": "cd6e9587aa41f95768d6c146df82c50f", "text": "This paper deals with genetic algorithm implementation in Python. Genetic algorithm is a probabilistic search algorithm based on the mechanics of natural selection and natural genetics. In genetic algorithms, a solution is represented by a list or a string. List or string processing in Python is more productive than in C/C++/Java. Genetic algorithms implementation in Python is quick and easy. In this paper, we introduce genetic algorithm implementation methods in Python. And we discuss various tools for speeding up Python programs.", "title": "" }, { "docid": "30fe64da6dc0d75d0be37ac1a92e8c24", "text": "—Perhaps the most important application of accurate personal identification is securing limited access systems from malicious attacks. Among all the presently employed biometric techniques, fingerprint identification systems have received the most attention due to the long history of fingerprints and their extensive use in forensics. This paper deals with the issue of selection of an optimal algorithm for fingerprint matching in order to design a system that matches required specifications in performance and accuracy. Two competing algorithms were compared against a common database using MATLAB simulations.", "title": "" }, { "docid": "a01965406575363328f4dae4241a05b7", "text": "IT governance is one of these concepts that suddenly emerged and became an important issue in the information technology area. Some organisations started with the implementation of IT governance in order to achieve a better alignment between business and IT. This paper interprets important existing theories, models and practices in the IT governance domain and derives research questions from it. Next, multiple research strategies are triangulated in order to understand how organisations are implementing IT governance in practice and to analyse the relationship between these implementations and business/IT alignment. Major finding is that organisations with more mature IT governance practices likely obtain a higher degree of business/IT alignment maturity.", "title": "" }, { "docid": "ec625a278b7ae5b0aea787814fdd425f", "text": "IoT with its ability to make objects be sensed and connected is inevitable in the smart campus market. Even though the smart campus market has not taken off yet, there is an enormous research that is going on now all over the world to explore such technology. Several factors are driving investigators to study smart campus including: deliver high quality services, protect the environment, and save cost. In this paper, not only we explore the research conducted in this area, but we also investigate challenges and provide possible research opportunities regarding smart campus.", "title": "" }, { "docid": "31e558e1d306e204bfa64121749b75fc", "text": "Experimental results in psychology have shown the important role of manipulation in guiding infant development. This has inspired work in developmental robotics as well. In this case, however, the benefits of this approach have been limited by the intrinsic difficulties of the task. Controlling the interaction between the robot and the environment in a meaningful and safe way is hard especially when little prior knowledge is available. We push the idea that haptic feedback can enhance the way robots interact with unmodeled environments. We approach grasping and manipulation as tasks driven mainly by tactile and force feedback. We implemented a grasping behavior on a robotic platform with sensitive tactile sensors and compliant actuators; the behavior allows the robot to grasp objects placed on a table. Finally, we demonstrate that the haptic feedback originated by the interaction with the objects carries implicit information about their shape and can be useful for learning.", "title": "" }, { "docid": "f05718832e9e8611b4cd45b68d0f80e3", "text": "Conflict occurs frequently in any workplace; health care is not an exception. The negative consequences include dysfunctional team work, decreased patient satisfaction, and increased employee turnover. Research demonstrates that training in conflict resolution skills can result in improved teamwork, productivity, and patient and employee satisfaction. Strategies to address a disruptive physician, a particularly difficult conflict situation in healthcare, are addressed.", "title": "" }, { "docid": "eeee6fceaec33b4b1ef5aed9f8b0dcf5", "text": "This paper presents a novel orthomode transducer (OMT) with the dimension of WR-10 waveguide. The internal structure of the OMT is in the shape of Y so we named it a Y-junction OMT, it contain one square waveguide port with the dimension 2.54mm × 2.54mm and two WR-10 rectangular waveguide ports with the dimension of 1.27mm × 2.54mm. The operating frequency band of OMT is 70-95GHz (more than 30% bandwidth) with simulated insertion loss <;-0.3dB and cross polarization better than -40dB throughout the band for both TE10 and TE01 modes.", "title": "" } ]
scidocsrr
f8cae453dd8d1bde276a601c72f55766
The inverted multi-index
[ { "docid": "0784d5907a8e5f1775ad98a25b1b0b31", "text": "The Internet contains billions of images, freely available online. Methods for efficiently searching this incredibly rich resource are vital for a large number of applications. These include object recognition, computer graphics, personal photo collections, online image search tools. In this paper, our goal is to develop efficient image search and scene matching techniques that are not only fast, but also require very little memory, enabling their use on standard hardware or even on handheld devices. Our approach uses recently developed machine learning techniques to convert the Gist descriptor (a real valued vector that describes orientation energies at different scales and orientations within an image) to a compact binary code, with a few hundred bits per image. Using our scheme, it is possible to perform real-time searches with millions from the Internet using a single large PC and obtain recognition results comparable to the full descriptor. Using our codes on high quality labeled images from the LabelMe database gives surprisingly powerful recognition results using simple nearest neighbor techniques.", "title": "" }, { "docid": "c8d9ec6aa63b783e4c591dccdbececcf", "text": "The use of context is critical for scene understanding in computer vision, where the recognition of an object is driven by both local appearance and the object’s relationship to other elements of the scene (context). Most current approaches rely on modeling the relationships between object categories as a source of context. In this paper we seek to move beyond categories to provide a richer appearancebased model of context. We present an exemplar-based model of objects and their relationships, the Visual Memex, that encodes both local appearance and 2D spatial context between object instances. We evaluate our model on Torralba’s proposed Context Challenge against a baseline category-based system. Our experiments suggest that moving beyond categories for context modeling appears to be quite beneficial, and may be the critical missing ingredient in scene understanding systems.", "title": "" }, { "docid": "a7c330c9be1d7673bfff43b0544db4ea", "text": "The state of the art in visual object retrieval from large databases is achieved by systems that are inspired by text retrieval. A key component of these approaches is that local regions of images are characterized using high-dimensional descriptors which are then mapped to ldquovisual wordsrdquo selected from a discrete vocabulary.This paper explores techniques to map each visual region to a weighted set of words, allowing the inclusion of features which were lost in the quantization stage of previous systems. The set of visual words is obtained by selecting words based on proximity in descriptor space. We describe how this representation may be incorporated into a standard tf-idf architecture, and how spatial verification is modified in the case of this soft-assignment. We evaluate our method on the standard Oxford Buildings dataset, and introduce a new dataset for evaluation. Our results exceed the current state of the art retrieval performance on these datasets, particularly on queries with poor initial recall where techniques like query expansion suffer. Overall we show that soft-assignment is always beneficial for retrieval with large vocabularies, at a cost of increased storage requirements for the index.", "title": "" }, { "docid": "5cfc4911a59193061ab55c2ce5013272", "text": "What can you do with a million images? In this paper, we present a new image completion algorithm powered by a huge database of photographs gathered from the Web. The algorithm patches up holes in images by finding similar image regions in the database that are not only seamless, but also semantically valid. Our chief insight is that while the space of images is effectively infinite, the space of semantically differentiable scenes is actually not that large. For many image completion tasks, we are able to find similar scenes which contain image fragments that will convincingly complete the image. Our algorithm is entirely data driven, requiring no annotations or labeling by the user. Unlike existing image completion methods, our algorithm can generate a diverse set of image completions and we allow users to select among them. We demonstrate the superiority of our algorithm over existing image completion approaches.", "title": "" } ]
[ { "docid": "db9e401e4c2bdee1187389c340541877", "text": "We show in this paper how some algebraic methods can be used for fingerprint matching. The described technique is able to compute the score of a match also when the template and test fingerprints have been not correctly acquired. In particular, the match is independent of translations, rotations and scaling transformations of the template. The technique is also able to compute a match score when part of the fingerprint image is incorrect or missed. The algorithm is being implemented in CoCoA, a computer algebra system for doing computations in Commutative Algebra.", "title": "" }, { "docid": "f53c6f056c388653ab770d301f16d8ce", "text": "Primary-backup replication is commonly used for providing fault tolerance in databases. It is performed by replaying the database recovery log on a backup server. Such a scheme raises several challenges for modern, high-throughput multicore databases. It is hard to replay the recovery log concurrently, and so the backup can become the bottleneck. Moreover, with the high transaction rates on the primary, the log transfer can cause network bottlenecks. Both these bottlenecks can significantly slow the primary database. In this paper, we propose using record-replay for replicating fast databases. Our design enables replay to be performed scalably and concurrently, so that the backup performance scales with the primary performance. At the same time, our approach requires only 15-20% of the network bandwidth required by traditional logging, reducing network infrastructure costs significantly.", "title": "" }, { "docid": "96e8896f961e9b2bf422211c8b988452", "text": "In this paper, we present a word extraction and recognition methodology from online cursive handwritten text-lines recorded by Leap motion controller The online text, drawn by 3D gesture in air, is distinct from usual online pen-based strokes. The 3D gestures are recorded in air, hence they produce often non-uniform text style and jitter-effect while writing. Also, due to the constraint of writing in air, the pause of stroke-flow between words is missing. Instead all words and lines are connected by a continuous stroke. In this paper, we have used a simple but effective heuristic to segment words written in air. Here, we propose a segmentation methodology of continuous 3D strokes into text-lines and words. Separation of text lines is achieved by heuristically finding the large gap-information between end and start-positions of successive text lines. Word segmentation is characterized in our system as a two class problem. In the next phase, we have used Hidden Markov Model-based approach to recognize these segmented words. Our experimental validation with a large dataset consisting with 320 sentences reveals that the proposed heuristic based word segmentation algorithm performs with accuracy as high as 80.3%c and an accuracy of 77.6% has been recorded by HMM-based word recognition when these segmented words are fed to HMM. The results show that the framework is efficient even with cluttered gestures.", "title": "" }, { "docid": "288bf12e3949a568b1f7f0aad1f2d365", "text": "Process mining can be seen as the “missing link” between data mining and business process management. The lion0s share of process mining research has been devoted to the discovery of procedural process models from event logs. However, often there are predefined constraints that (partially) describe the normative or expected process, e.g., “activity A should be followed by B” or “activities A and B should never be both executed”. A collection of such constraints is called a declarative process model. Although it is possible to discover such models based on event data, this paper focuses on aligning event logs and predefined declarative process models. Discrepancies between log and model are mediated such that observed log traces are related to paths in the model. The resulting alignments provide sophisticated diagnostics that pinpoint where deviations occur and how severe they are. Moreover, selected parts of the declarative process model can be used to clean and repair the event log before applying other process mining techniques. Our alignment-based approach for preprocessing and conformance checking using declarative process models has been implemented in ProM and has been evaluated using both synthetic logs and real-life logs from a Dutch hospital. & 2013 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "8994337878d2ac35464cb4af5e32fccc", "text": "We describe an algorithm for approximate inference in graphical models based on Hölder’s inequality that provides upper and lower bounds on common summation problems such as computing the partition function or probability of evidence in a graphical model. Our algorithm unifies and extends several existing approaches, including variable elimination techniques such as minibucket elimination and variational methods such as tree reweighted belief propagation and conditional entropy decomposition. We show that our method inherits benefits from each approach to provide significantly better bounds on sum-product tasks.", "title": "" }, { "docid": "e38407316eeee84eaf086ed7779da0a1", "text": "Percutaneous vertebroplasty (PV) and kyphoplasty (PK) are the 2vertebral augmentation procedures that have emerged as minimally invasive surgical options to treat painful vertebral compression fractures (VCF) during the last 2 decades. VCF may either be osteoporotic or tumor-associated. Two hundred million women are affected by osteoporosis globally. Vertebral fracture may result in acute pain around the fracture site, loss of vertebral height due to vertebral collapse, spinal instability, and kyphotic deformity. The main goal of the PV and PK procedures is to give immediate pain relief to patients and restore the vertebral height lost due to fracture. In percutaneous vertebroplasty, bone cement is injected through a minimal incision into the fractured site. Kyphoplasty involves insertion of a balloon into the fractured site, followed by inflation-deflation to create a cavity into which the filler material is injected, and the balloon is taken out prior to cement injection. This literature review presents a qualitative overview on the current status of vertebral augmentation procedures,especially PV and PK, and compares the efficacy and safety of these 2 procedures. The review consists of a brief history of the development of these 2 techniques, a discussion on the current research on the bone cement, clinical outcome of the 2 procedures, and it also sheds light on ongoing and future research to maximize the efficacy and safety of vertebral augmentation procedures.", "title": "" }, { "docid": "e7bf90ed4a5b4a509f41a7afc7ffde1e", "text": "Previous theorizing by clinical psychologists suggests that adolescent narcissism may be related to parenting practices (Kernberg, 1975; Kohut, 1977). Two studies investigated the relations between parenting dimensions (i.e., warmth, monitoring, and psychological control) and narcissism both with and without removing from narcissism variance associated with trait self-esteem. Two hundred and twenty-two college students (Study 1) and 212 high school students (Study 2) completed the Narcissistic Personality Inventory, a trait self-esteem scale, and standard measures of the three parenting dimensions. Parental warmth was associated positively and monitoring was associated negatively with both types of narcissism. Psychological control was positively associated with narcissism scores from which trait self-esteem variance had been removed. Clinical implications of the findings are discussed, limitations are addressed, and future research directions are suggested.", "title": "" }, { "docid": "6a252976282ba1d0d354d8a86d0c49f1", "text": "Ethics of brain emulations Whole brain emulation attempts to achieve software intelligence by copying the function of biological nervous systems into software. This paper aims at giving an overview of the ethical issues of the brain emulation approach, and analyse how they should affect responsible policy for developing the field. Animal emulations have uncertain moral status, and a principle of analogy is proposed for judging treatment of virtual animals. Various considerations of developing and using human brain emulations are discussed. Introduction Whole brain emulation (WBE) is an approach to achieve software intelligence by copying the functional structure of biological nervous systems into software. Rather than attempting to understand the high-level processes underlying perception, action, emotions and intelligence, the approach assumes that they would emerge from a sufficiently close imitation of the low-level neural functions, even if this is done through a software process. (Sandberg 2013) of brain emulations have been discussed, little analysis of the ethics of the project so far has been done. The main questions of this paper are to what extent brain emulations are moral patients, and what new ethical concerns are introduced as a result of brain emulation technology. The basic idea is to take a particular brain, scan its structure in detail at some resolution, construct a software model of the physiology that is so faithful to the original that, when run on appropriate hardware, it will have an internal causal structure that is essentially the same as the original brain. All relevant functions on some level of description are present, and higher level functions supervene from these. While at present an unfeasibly ambitious challenge, the necessary computing power and various scanning methods are rapidly developing. Large scale computational brain models are a very active research area, at present reaching the size of mammalian nervous systems. al. 2012) WBE can be viewed as the logical endpoint of current trends in computational neuroscience and systems biology. Obviously the eventual feasibility depends on a number of philosophical issues (physicalism, functionalism, non-organicism) and empirical facts (computability, scale separation, detectability, scanning and simulation tractability) that cannot be predicted beforehand; WBE can be viewed as a program trying to test them empirically. (Sandberg 2013) Early projects are likely to merge data from multiple brains and studies, attempting to show that this can produce a sufficiently rich model to produce nontrivial behaviour but not attempting to emulate any particular individual. However, …", "title": "" }, { "docid": "22ef6b3fd2f4c926d81881039244511f", "text": "Whereas in most cases a fatty liver remains free of inflammation, 10%-20% of patients who have fatty liver develop inflammation and fibrosis (nonalcoholic steatohepatitis [NASH]). Inflammation may precede steatosis in certain instances. Therefore, NASH could reflect a disease where inflammation is followed by steatosis. In contrast, NASH subsequent to simple steatosis may be the consequence of a failure of antilipotoxic protection. In both situations, many parallel hits derived from the gut and/or the adipose tissue may promote liver inflammation. Endoplasmic reticulum stress and related signaling networks, (adipo)cytokines, and innate immunity are emerging as central pathways that regulate key features of NASH.", "title": "" }, { "docid": "e5ad080ca6155eaa72cdfa9f3ca03276", "text": "We consider the problem of semantic image segmentation using deep convolutional neural networks. We propose a novel network architecture called the label refinement network that predicts segmentation labels in a coarse-to-fine fashion at several resolutions. The segmentation labels at a coarse resolution are used together with convolutional features to obtain finer resolution segmentation labels. We define loss functions at several stages in the network to provide supervisions at different stages. Our experimental results on several standard datasets demonstrate that the proposed model provides an effective way of producing pixel-wise dense image labeling.", "title": "" }, { "docid": "b52eb0d80b64fc962b17fb08ce446e12", "text": "INTRODUCTION\nPriapism describes a persistent erection arising from dysfunction of mechanisms regulating penile tumescence, rigidity, and flaccidity. A correct diagnosis of priapism is a matter of urgency requiring identification of underlying hemodynamics.\n\n\nAIMS\nTo define the types of priapism, address its pathogenesis and epidemiology, and develop an evidence-based guideline for effective management.\n\n\nMETHODS\nSix experts from four countries developed a consensus document on priapism; this document was presented for peer review and debate in a public forum and revisions were made based on recommendations of chairpersons to the International Consultation on Sexual Medicine. This report focuses on guidelines written over the past decade and reviews the priapism literature from 2003 to 2009. Although the literature is predominantly case series, recent reports have more detailed methodology including duration of priapism, etiology of priapism, and erectile function outcomes.\n\n\nMAIN OUTCOME MEASURES\nConsensus recommendations were based on evidence-based literature, best medical practices, and bench research.\n\n\nRESULTS\nBasic science supporting current concepts in the pathophysiology of priapism, and clinical research supporting the most effective treatment strategies are summarized in this review.\n\n\nCONCLUSIONS\nPrompt diagnosis and appropriate management of priapism are necessary to spare patients ineffective interventions and maximize erectile function outcomes. Future research is needed to understand corporal smooth muscle pathology associated with genetic and acquired conditions resulting in ischemic priapism. Better understanding of molecular mechanisms involved in the pathogenesis of stuttering ischemic priapism will offer new avenues for medical intervention. Documenting erectile function outcomes based on duration of ischemic priapism, time to interventions, and types of interventions is needed to establish evidence-based guidance. In contrast, pathogenesis of nonischemic priapism is understood, and largely attributable to trauma. Better documentation of onset of high-flow priapism in relation to time of injury, and response to conservative management vs. angiogroaphic or surgical interventions is needed to establish evidence-based guidance.", "title": "" }, { "docid": "c02d5b0b36cf108a25d93bd8fc5d2ada", "text": "Architectural threat analysis has become an important cornerstone for organizations concerned with developing secure software. Due to the large number of existing techniques it is becoming more challenging for practitioners to select an appropriate threat analysis technique. Therefore, we conducted a systematic literature review (SLR) of the existing techniques for threat analysis. In our study we compare 26 methodologies for what concerns their applicability, characteristics of the required input for analysis, characteristics of analysis procedure, characteristics of analysis outcomes and ease of adoption. We also provide insight into the obstacles for adopting the existing approaches and discuss the current state of their adoption in software engineering trends (e.g. Agile, DevOps, etc.). As a summary of our findings we have observed that: the analysis procedure is not precisely defined, there is a lack of quality assurance of analysis outcomes and tool support and validation are limited.", "title": "" }, { "docid": "e6300989e5925d38d09446b3e43092e5", "text": "Cloud computing provides resources as services in pay-as-you-go mode to customers by using virtualization technology. As virtual machine (VM) is hosted on physical server, great energy is consumed by maintaining the servers in data center. More physical servers means more energy consumption and more money cost. Therefore, the VM placement (VMP) problem is significant in cloud computing. This paper proposes an approach based on ant colony optimization (ACO) to solve the VMP problem, named as ACO-VMP, so as to effectively use the physical resources and to reduce the number of running physical servers. The number of physical servers is the same as the number of the VMs at the beginning. Then the ACO approach tries to reduce the physical server one by one. We evaluate the performance of the proposed ACO-VMP approach in solving VMP with the number of VMs being up to 600. Experimental results compared with the ones obtained by the first-fit decreasing (FFD) algorithm show that ACO-VMP can solve VMP more efficiently to reduce the number of physical servers significantly, especially when the number of VMs is large.", "title": "" }, { "docid": "511db40bbc4d24ca8d09b5343aa8d91e", "text": "Increased risk taking may explain the link between bad moods and self-defeating behavior. In Study 1, personal recollections of self-defeating actions implicated bad moods and resultant risky decisions. In Study 2, embarrassment increased the preference for a long-shot (high-risk, high-payoff) lottery over a low-risk, low-payoff one. Anger had a similar effect in Study 3. Study 4 replicated this and showed that the effect could be eliminated by making participants analyze the lotteries rationally, suggesting that bad moods foster risk taking by impairing self-regulation instead of by altering subjective utilities. Studies 5 and 6 showed that the risky tendencies are limited to unpleasant moods accompanied by high arousal; neither sadness nor neutral arousal resulted in destructive risk taking.", "title": "" }, { "docid": "a171aec0d1989afc2e1f09f08b493596", "text": "The internet era has generated a requirement for low cost, anonymous and rapidly verifiable transactions to be used for online barter, and fast settling money have emerged as a consequence. For the most part, e-money has fulfilled this role, but the last few years have seen two new types of money emerge. Centralised virtual currencies, usually for the purpose of transacting in social and gaming economies, and crypto-currencies, which aim to eliminate the need for financial intermediaries by offering direct peer-to-peer online payments. We describe the historical context which led to the development of these currencies and some modern and recent trends in their uptake, in terms of both usage in the real economy and as investment products. As these currencies are purely digital constructs, with no government or local authority backing, we then discuss them in the context of monetary theory, in order to determine how they may be have value under each. Finally, we provide an overview of the state of regulatory readiness in terms of dealing with transactions in these currencies in various regions of the world.", "title": "" }, { "docid": "52a3688f1474b824a6696b03a8b6536c", "text": "Credit scoring models have been widely studied in the areas of statistics, machine learning, and artificial intelligence (AI). Many novel approaches such as artificial neural networks (ANNs), rough sets, or decision trees have been proposed to increase the accuracy of credit scoring models. Since an improvement in accuracy of a fraction of a percent might translate into significant savings, a more sophisticated model should be proposed for significantly improving the accuracy of the credit scoring models. In this paper, two-stage genetic programming (2SGP) is proposed to deal with the credit scoring problem by incorporating the advantages of the IF–THEN rules and the discriminant function. On the basis of the numerical results, we can conclude that 2SGP can provide the better accuracy than other models. 2005 Published by Elsevier Inc. 0096-3003/$ see front matter 2005 Published by Elsevier Inc. doi:10.1016/j.amc.2005.05.027 * Corresponding author. Address: Institute of Management of Technology and Institute of Traffic and Transportation College of Management, National Chiao Tung University, 1001 TaHsueh Road, Hsinchu 300, Taiwan. E-mail address: u5460637@ms16.hinet.net (G.-H. Tzeng). 2 J.-J. Huang et al. / Appl. Math. Comput. xxx (2005) xxx–xxx ARTICLE IN PRESS", "title": "" }, { "docid": "ce35e9efdddd5da0109794645270be8f", "text": "The objective of generalized sampling expansion (GSE) is the reconstruction of an unknown, continuously defined function f (t) from samples of the responses from M linear time-invariant (LTI) systems that are each sampled using the 1/Mth Nyquist rate. In this paper, we investigate the GSE for lowpass and bandpass signals with multiple sampling rates in the fractional Fourier transform (FRFT) domain. First, we propose an improvement of Papoulis' GSE, which has multiple sampling rates in the FRFT domain. Based on the proposed GSE, we derive the periodic nonuniform sampling scheme and the derivative interpolation method by designing different fractional filters and selecting specific sampling rates. In addition, the Papoulis GSE and the previous GSE associated with FRFT are shown to be special instances of our results. Second, we address the problem of the GSE of fractional bandpass signals. A new GSE for fractional bandpass signals with equal sampling rates is derived. We show that the restriction of an even number of channels in the GSE for fractional bandpass signals is unnecessary, and perfect signal reconstruction is possible for any arbitrary number of channels. Further, we develop the GSE for a fractional bandpass signal with multiple sampling rates. Lastly, we discuss the application of the proposed method in the context of single-image super-resolution reconstruction based on GSE. Illustrations and simulations are presented to verify the validity and effectiveness of the proposed results.", "title": "" }, { "docid": "193943c42bbc4e9cba28a483f175b66a", "text": "While a user's preference is directly reflected in the interactive choice process between her and the recommender, this wealth of information was not fully exploited for learning recommender models. In particular, existing collaborative filtering (CF) approaches take into account only the binary events of user actions but totally disregard the contexts in which users' decisions are made. In this paper, we propose Collaborative Competitive Filtering (CCF), a framework for learning user preferences by modeling the choice process in recommender systems. CCF employs a multiplicative latent factor model to characterize the dyadic utility function. But unlike CF, CCF models the user behavior of choices by encoding a local competition effect. In this way, CCF allows us to leverage dyadic data that was previously lumped together with missing data in existing CF models. We present two formulations and an efficient large scale optimization algorithm. Experiments on three real-world recommendation data sets demonstrate that CCF significantly outperforms standard CF approaches in both offline and online evaluations.", "title": "" }, { "docid": "15509fbfed58c67a39d5799acc5ec6a8", "text": "Finite state machines (FSMs) are the backbone of many applications, but are difficult to parallelize due to their inherent dependencies. Speculative FSM parallelization has shown promise on multicore machines with up to eight cores. However, as hardware parallelism grows (e.g., Xeon Phi has up to 288 logical cores), a fundamental question raises: How does the speculative FSM parallelization scale as the number of cores increases? Without answering this question, existing methods for speculative FSM parallelization simply choose to use all available cores, which might not only waste computing resources, but also result in suboptimal performance.\n In this work, we conduct a systematic scalability analysis for speculative FSM parallelization. Unlike many other parallelizations which can be modeled by the classic Amdahl's law or its simple extensions, speculative FSM parallelization scales unconventionally due to the non-deterministic nature of speculation and the cost variations of misspeculation. To address these challenges, this work introduces a spectrum of scalability models that are customized to the properties of specific FSMs and the underlying architecture. The models, for the first time, precisely capture the scalability of speculative parallelization for different FSM computations, and clearly show the existence of a \"sweet spot\" in terms of the number of cores employed by the speculative FSM parallelization to achieve the optimal performance. To make the scalability models practical, we develop S3, a <u>s</u>calability-<u>s</u>ensitive <u>s</u>peculation framework for FSM parallelization. For any given FSM, S3 can automatically characterize its properties and analyze its scalability, hence guide speculative parallelization towards the optimal performance and more efficient use of computing resources. Evaluations on different FSMs and architectures confirm the accuracy of the proposed models and show that S3 achieves significant speedup (up to 5X) and energy savings (up to 77%).", "title": "" }, { "docid": "22160219ffa40e4e42f1519fe25ecb6a", "text": "We propose a new prior distribution for classical (non-hierarchical) logistic regression models, constructed by first scaling all nonbinary variables to have mean 0 and standard deviation 0.5, and then placing independent Student-t prior distributions on the coefficients. As a default choice, we recommend the Cauchy distribution with center 0 and scale 2.5, which in the simplest setting is a longer-tailed version of the distribution attained by assuming one-half additional success and one-half additional failure in a logistic regression. Cross-validation on a corpus of datasets shows the Cauchy class of prior distributions to outperform existing implementations of Gaussian and Laplace priors. We recommend this prior distribution as a default choice for routine applied use. It has the advantage of always giving answers, even when there is complete separation in logistic regression (a common problem, even when the sample size is large and the number of predictors is small) and also automatically applying more shrinkage to higherorder interactions. This can be useful in routine data analysis as well as in automated procedures such as chained equations for missing-data imputation. We implement a procedure to fit generalized linear models in R with the Student-t prior distribution by incorporating an approximate EM algorithm into the usual iteratively weighted least squares. We illustrate with several applications, including a series of logistic regressions predicting voting preferences, a small bioassay experiment, and an imputation model for a public health data set.", "title": "" } ]
scidocsrr
f5b3fc2cdb8558c05e48482705db5285
Composing graphical models with neural networks for structured representations and fast inference
[ { "docid": "62d39d41523bca97939fa6a2cf736b55", "text": "We consider criteria for variational representations of non-Gaussian latent variables, and derive variational EM algorithms in general form. We establish a general equivalence among convex bounding methods, evidence based methods, and ensemble learning/Variational Bayes methods, which has previously been demonstrated only for particular cases.", "title": "" } ]
[ { "docid": "27ebec7dcf4372a907e1952b67dbbe3e", "text": "A large sample (N = 141) of college students participated in both a conjunctive visual search task and an ambiguous figures task that have been used as tests of selective attention. Tests for effects of bilingualism on attentional control were conducted by both partitioning the participants into bilinguals and monolinguals and by treating bilingualism as a continuous variable, but there were no effects of bilingualism in any of the tests. Bayes factor analyses confirmed that the evidence substantially favored the null hypothesis. These new findings mesh with failures to replicate language-group differences in congruency-sequence effects, inhibition-of-return, and working memory capacity. The evidence that bilinguals are better than monolinguals at attentional control is equivocal at best.", "title": "" }, { "docid": "55d5e03e86a3b35dc2ee258dc5c6029f", "text": "This paper presents an approach to the automatic generation of electromechanical engineering designs. We apply Messy Genetic Algorithm optimization techniques to the evolution of assemblies composed of the Lego structures. Each design is represented as a labeled assembly graph and is evaluated based on a set of behavior and structural equations. The initial populations are generated at random and design candidates for subsequent generations are produced by user-specified selection techniques. Crossovers are applied by using cut and splice operators at the random points of the chromosomes; random mutations are applied to modify the graph with a certain low probability. This cycle will continue until a suitable design is found. The research contributions in this work include the development of a new GA encoding scheme for mechanical assemblies (Legos), as well as the creation of selection criteria for this domain. Our eventual goal is to introduce a simulation of electromechanical devices into our evaluation functions. We believe that this research creates a foundation for future work and it will apply GA techniques to the evolution of more complex and realistic electromechanical structures.", "title": "" }, { "docid": "e83a360cb318b948b221206b75664b23", "text": "Marine defaunation, or human-caused animal loss in the oceans, emerged forcefully only hundreds of years ago, whereas terrestrial defaunation has been occurring far longer. Though humans have caused few global marine extinctions, we have profoundly affected marine wildlife, altering the functioning and provisioning of services in every ocean. Current ocean trends, coupled with terrestrial defaunation lessons, suggest that marine defaunation rates will rapidly intensify as human use of the oceans industrializes. Though protected areas are a powerful tool to harness ocean productivity, especially when designed with future climate in mind, additional management strategies will be required. Overall, habitat degradation is likely to intensify as a major driver of marine wildlife loss. Proactive intervention can avert a marine defaunation disaster of the magnitude observed on land.", "title": "" }, { "docid": "48664108c3bea8cc90a8e431baaa4f78", "text": "Studying how privacy regulation might impact economic activity on the advertising-supported Internet.", "title": "" }, { "docid": "ead343ffee692a8645420c58016c129d", "text": "One of the most important applications in multiview imaging (MVI) is the development of advanced immersive viewing or visualization systems using, for instance, 3DTV. With the introduction of multiview TVs, it is expected that a new age of 3DTV systems will arrive in the near future. Image-based rendering (IBR) refers to a collection of techniques and representations that allow 3-D scenes and objects to be visualized in a realistic way without full 3-D model reconstruction. IBR uses images as the primary substrate. The potential for photorealistic visualization has tremendous appeal, and it has been receiving increasing attention over the years. Applications such as video games, virtual travel, and E-commerce stand to benefit from this technology. This article serves as a tutorial introduction and brief review of this important technology. First the classification, principles, and key research issues of IBR are discussed. Then, an object-based IBR system to illustrate the techniques involved and its potential application in view synthesis and processing are explained. Stereo matching, which is an important technique for depth estimation and view synthesis, is briefly explained and some of the top-ranked methods are highlighted. Finally, the challenging problem of interactive IBR is explained. Possible solutions and some state-of-the-art systems are also reviewed.", "title": "" }, { "docid": "850483f2db17a4f5d5a48db80d326dd3", "text": "The Internet has revolutionized healthcare by offering medical information ubiquitously to patients via the web search. The healthcare status, complex medical information needs of patients are expressed diversely and implicitly in their medical text queries. Aiming to better capture a focused picture of user's medical-related information search and shed insights on their healthcare information access strategies, it is challenging yet rewarding to detect structured user intentions from their diversely expressed medical text queries. We introduce a graph-based formulation to explore structured concept transitions for effective user intent detection in medical queries, where each node represents a medical concept mention and each directed edge indicates a medical concept transition. A deep model based on multi-task learning is introduced to extract structured semantic transitions from user queries, where the model extracts word-level medical concept mentions as well as sentence-level concept transitions collectively. A customized graph-based mutual transfer loss function is designed to impose explicit constraints and further exploit the contribution of mentioning a medical concept word to the implication of a semantic transition. We observe an 8% relative improvement in AUC and 23% relative reduction in coverage error by comparing the proposed model with the best baseline model for the concept transition inference task on real-world medical text queries.", "title": "" }, { "docid": "54537c242bc89fbf15d9191be80c5073", "text": "In the propositional setting, the marginal problem is to find a (maximum-entropy) distribution that has some given marginals. We study this problem in a relational setting and make the following contributions. First, we compare two different notions of relational marginals. Second, we show a duality between the resulting relational marginal problems and the maximum likelihood estimation of the parameters of relational models, which generalizes a well-known duality from the propositional setting. Third, by exploiting the relational marginal formulation, we present a statistically sound method to learn the parameters of relational models that will be applied in settings where the number of constants differs between the training and test data. Furthermore, based on a relational generalization of marginal polytopes, we characterize cases where the standard estimators based on feature’s number of true groundings needs to be adjusted and we quantitatively characterize the consequences of these adjustments. Fourth, we prove bounds on expected errors of the estimated parameters, which allows us to lower-bound, among other things, the effective sample size of relational training data.", "title": "" }, { "docid": "34e8cbfa11983f896d9e159daf08cc27", "text": "XtratuM is an hypervisor designed to meet safety critical requirements. Initially designed for x86 architectures (version 2.0), it has been strongly redesigned for SPARC v8 arquitecture and specially for the to the LEON2 processor. Current version 2.2, includes all the functionalities required to build safety critical systems based on ARINC 653, AUTOSTAR and other standards. Although XtratuMdoes not provides a compliant API with these standards, partitions can offer easily the appropriated API to the applications. XtratuM is being used by the aerospace sector to build software building blocks of future generic on board software dedicated to payloads management units in aerospace. XtratuM provides ARINC 653 scheduling policy, partition management, inter-partition communications, health monitoring, logbooks, traces, and other services to easily been adapted to the ARINC standard. The configuration of the system is specified in a configuration file (XML format) and it is compiled to achieve a static configuration of the final container (XtratuM and the partition’s code) to be deployed to the hardware board. As far as we know, XtratuM is the first hypervisor for the SPARC v8 arquitecture. In this paper, the main design aspects are discussed and the internal architecture described. An evaluation of the most significant metrics is also provided. This evaluation permits to affirm that the overhead of a hypervisor is lower than 3% if the slot duration is higher than 1 millisecond.", "title": "" }, { "docid": "2da84ca7d7db508a6f9a443f2dbae7c1", "text": "This paper proposes a computationally efficient approach to detecting objects natively in 3D point clouds using convolutional neural networks (CNNs). In particular, this is achieved by leveraging a feature-centric voting scheme to implement novel convolutional layers which explicitly exploit the sparsity encountered in the input. To this end, we examine the trade-off between accuracy and speed for different architectures and additionally propose to use an L1 penalty on the filter activations to further encourage sparsity in the intermediate representations. To the best of our knowledge, this is the first work to propose sparse convolutional layers and L1 regularisation for efficient large-scale processing of 3D data. We demonstrate the efficacy of our approach on the KITTI object detection benchmark and show that VoteSDeep models with as few as three layers outperform the previous state of the art in both laser and laser-vision based approaches by margins of up to 40% while remaining highly competitive in terms of processing time.", "title": "" }, { "docid": "0c8947cbaa2226a024bf3c93541dcae1", "text": "As storage systems grow in size and complexity, they are increasingly confronted with concurrent disk failures together with multiple unrecoverable sector errors. To ensure high data reliability and availability, erasure codes with high fault tolerance are required. In this article, we present a new family of erasure codes with high fault tolerance, named GRID codes. They are called such because they are a family of strip-based codes whose strips are arranged into multi-dimensional grids. In the construction of GRID codes, we first introduce a concept of matched codes and then discuss how to use matched codes to construct GRID codes. In addition, we propose an iterative reconstruction algorithm for GRID codes. We also discuss some important features of GRID codes. Finally, we compare GRID codes with several categories of existing codes. Our comparisons show that for large-scale storage systems, our GRID codes have attractive advantages over many existing erasure codes: (a) They are completely XOR-based and have very regular structures, ensuring easy implementation; (b) they can provide up to 15 and even higher fault tolerance; and (c) their storage efficiency can reach up to 80% and even higher. All the advantages make GRID codes more suitable for large-scale storage systems.", "title": "" }, { "docid": "c5428f44292952bfb9443f61aa6d6ce0", "text": "In this letter, a tunable protection switch device using open stubs for $X$ -band low-noise amplifiers (LNAs) is proposed. The protection switch is implemented using p-i-n diodes. As the parasitic inductance in the p-i-n diodes may degrade the protection performance, tunable open stubs are attached to these diodes to obtain a grounding effect. The performance is optimized for the desired frequency band by adjusting the lengths of the microstrip line open stubs. The designed LNA protection switch is fabricated and measured, and sufficient isolation is obtained for a 200 MHz operating band. The proposed protection switch is suitable for solid-state power amplifier radars in which the LNAs need to be protected from relatively long pulses.", "title": "" }, { "docid": "77620bb2a19faffd4530e1814ca08f86", "text": "As in any academic discipline, the evaluation of proposed methodologies and techniques is of vital importance for assessing the validity of novel ideas or findings in Software Engineering. Over the years, a large number of evaluation approaches have been employed, some of them drawn from other domains and other particularly developed for the needs of software engineering related research. In this paper we present the results of a survey of evaluation techniques that have been utilized in research papers that appeared in three leading software engineering journal and propose a taxonomy of evaluation approaches which might be helpful towards the organization of knowledge regarding the different strategies for the validation of research outcomes. The applicability of the proposed taxonomy has been evaluated by classifying the articles retrieved from ICSE'2012.", "title": "" }, { "docid": "9f5e4d52df5f13a80ccdb917a899bb9e", "text": "This paper proposes a robust background model-based dense-visual-odometry (BaMVO) algorithm that uses an RGB-D sensor in a dynamic environment. The proposed algorithm estimates the background model represented by the nonparametric model from depth scenes and then estimates the ego-motion of the sensor using the energy-based dense-visual-odometry approach based on the estimated background model in order to consider moving objects. Experimental results demonstrate that the ego-motion is robustly obtained by BaMVO in a dynamic environment.", "title": "" }, { "docid": "26a9bf8c2e6a8dc0d13774fd614b8776", "text": "This paper addresses an open challenge in educational data mining, i.e., the problem of automatically mapping online courses from different providers (universities, MOOCs, etc.) onto a universal space of concepts, and predicting latent prerequisite dependencies (directed links) among both concepts and courses. We propose a novel approach for inference within and across course-level and concept-level directed graphs. In the training phase, our system projects partially observed course-level prerequisite links onto directed concept-level links; in the testing phase, the induced concept-level links are used to infer the unknown courselevel prerequisite links. Whereas courses may be specific to one institution, concepts are shared across different providers. The bi-directional mappings enable our system to perform interlingua-style transfer learning, e.g. treating the concept graph as the interlingua and transferring the prerequisite relations across universities via the interlingua. Experiments on our newly collected datasets of courses from MIT, Caltech, Princeton and CMU show promising results.", "title": "" }, { "docid": "4ede3f2caa829e60e4f87a9b516e28bd", "text": "This report describes the difficulties of training neural networks and in particular deep neural networks. It then provides a literature review of training methods for deep neural networks, with a focus on pre-training. It focuses on Deep Belief Networks composed of Restricted Boltzmann Machines and Stacked Autoencoders and provides an outreach on further and alternative approaches. It also includes related practical recommendations from the literature on training them. In the second part, initial experiments using some of the covered methods are performed on two databases. In particular, experiments are performed on the MNIST hand-written digit dataset and on facial emotion data from a Kaggle competition. The results are discussed in the context of results reported in other research papers. An error rate lower than the best contribution to the Kaggle competition is achieved using an optimized Stacked Autoencoder.", "title": "" }, { "docid": "9d9e9a25e19c83a2a435128823a6519a", "text": "The rapid deployment of millions of mobile sensors and smartphones has resulted in a demand for opportunistic encounter-based networking to support mobile social networking applications and proximity-based gaming. However, the success of these emerging networks is limited by the lack of effective and energy efficient neighbor discovery protocols. While probabilistic approaches perform well for the average case, they exhibit long tails resulting in high upper bounds on neighbor discovery time. Recent deterministic protocols, which allow nodes to wake up at specific timeslots according to a particular pattern, improve on the worst case bound, but do so by sacrificing average case performance. In response to these limitations, we have designed Searchlight, a highly effective asynchronous discovery protocol that is built on three basic ideas. First, it leverages the constant offset between periodic awake slots to design a simple probing-based approach to ensure discovery. Second, it allows awake slots to cover larger sections of time, which ultimately reduces total awake time drastically. Finally, Searchlight has the option to employ probabilistic techniques with its deterministic approach that can considerably improve its performance in the average case when all nodes have the same duty cycle. We validate Searchlight through analysis and real-world experiments on smartphones that show considerable improvement (up to 50%) in worst-case discovery latency over existing approaches in almost all cases, irrespective of duty cycle symmetry.", "title": "" }, { "docid": "0c162c4f83294c4f701eabbd69f171f7", "text": "This paper aims to explore how the principles of a well-known Web 2.0 service, the world¿s largest social music service \"Last.fm\" (www.last.fm), can be applied to research, which potential it could have in the world of research (e.g. an open and interdisciplinary database, usage-based reputation metrics, and collaborative filtering) and which challenges such a model would face in academia. A real-world application of these principles, \"Mendeley\" (www.mendeley.com), will be demoed at the IEEE e-Science Conference 2008.", "title": "" }, { "docid": "bf14f996f9013351aca1e9935157c0e3", "text": "Attributed graphs are becoming important tools for modeling information networks, such as the Web and various social networks (e.g. Facebook, LinkedIn, Twitter). However, it is computationally challenging to manage and analyze attributed graphs to support effective decision making. In this paper, we propose, Pagrol, a parallel graph OLAP (Online Analytical Processing) system over attributed graphs. In particular, Pagrol introduces a new conceptual Hyper Graph Cube model (which is an attributed-graph analogue of the data cube model for relational DBMS) to aggregate attributed graphs at different granularities and levels. The proposed model supports different queries as well as a new set of graph OLAP Roll-Up/Drill-Down operations. Furthermore, on the basis of Hyper Graph Cube, Pagrol provides an efficient MapReduce-based parallel graph cubing algorithm, MRGraph-Cubing, to compute the graph cube for an attributed graph. Pagrol employs numerous optimization techniques: (a) a self-contained join strategy to minimize I/O cost; (b) a scheme that groups cuboids into batches so as to minimize redundant computations; (c) a cost-based scheme to allocate the batches into bags (each with a small number of batches); and (d) an efficient scheme to process a bag using a single MapReduce job. Results of extensive experimental studies using both real Facebook and synthetic datasets on a 128-node cluster show that Pagrol is effective, efficient and scalable.", "title": "" }, { "docid": "07305bc3eab0d83772ea1ab8ceebed9d", "text": "This paper examines the effect of the freemium strategy on Google Play, an online marketplace for Android mobile apps. By analyzing a large panel dataset consisting of 1,597 ranked mobile apps, we found that the freemium strategy is positively associated with increased sales volume and revenue of the paid apps. Higher sales rank and review rating of the free version of a mobile app both lead to higher sales rank of its paid version. However, only higher review rating of the free app contributes to higher revenue from the paid version, suggesting that although offering a free version is a viable way to improve the visibility of a mobile app, revenue is largely determined by product quality, not product visibility. Moreover, we found that the impact of review rating is not significant when the free version is offered, or when the mobile app is a hedonic app.", "title": "" } ]
scidocsrr
d3889f249c96ad7e734031ae8ddd16f5
Factors mediating disclosure in social network sites
[ { "docid": "7eed84f959268599e1b724b0752f6aa5", "text": "Using the information systems lifecycle as a unifying framework, we review online communities research and propose a sequence for incorporating success conditions during initiation and development to increase their chances of becoming a successful community, one in which members participate actively and develop lasting relationships. Online communities evolve following distinctive lifecycle stages and recommendations for success are more or less relevant depending on the developmental stage of the online community. In addition, the goal of the online community under study determines the components to include in the development of a successful online community. Online community builders and researchers will benefit from this review of the conditions that help online communities succeed.", "title": "" } ]
[ { "docid": "a6b4ee8a6da7ba240b7365cf1a70669d", "text": "Received: 2013-04-15 Accepted: 2013-05-13 Accepted after one revision by Prof. Dr. Sinz. Published online: 2013-06-14 This article is also available in German in print and via http://www. wirtschaftsinformatik.de: Blohm I, Leimeister JM (2013) Gamification. Gestaltung IT-basierter Zusatzdienstleistungen zur Motivationsunterstützung und Verhaltensänderung. WIRTSCHAFTSINFORMATIK. doi: 10.1007/s11576-013-0368-0.", "title": "" }, { "docid": "752e6d6f34ffc638e9a0d984a62db184", "text": "Defect prediction models are classifiers that are trained to identify defect-prone software modules. Such classifiers have configurable parameters that control their characteristics (e.g., the number of trees in a random forest classifier). Recent studies show that these classifiers may underperform due to the use of suboptimal default parameter settings. However, it is impractical to assess all of the possible settings in the parameter spaces. In this paper, we investigate the performance of defect prediction models where Caret --- an automated parameter optimization technique --- has been applied. Through a case study of 18 datasets from systems that span both proprietary and open source domains, we find that (1) Caret improves the AUC performance of defect prediction models by as much as 40 percentage points; (2) Caret-optimized classifiers are at least as stable as (with 35% of them being more stable than) classifiers that are trained using the default settings; and (3) Caret increases the likelihood of producing a top-performing classifier by as much as 83%. Hence, we conclude that parameter settings can indeed have a large impact on the performance of defect prediction models, suggesting that researchers should experiment with the parameters of the classification techniques. Since automated parameter optimization techniques like Caret yield substantially benefits in terms of performance improvement and stability, while incurring a manageable additional computational cost, they should be included in future defect prediction studies.", "title": "" }, { "docid": "beec3b6b4e5ecaa05d6436426a6d93b7", "text": "This paper introduces a 6LoWPAN simulation model for OMNeT++. Providing a 6LoWPAN model is an important step to advance OMNeT++-based Internet of Things simulations. We integrated Contiki’s 6LoWPAN implementation into OMNeT++ in order to avoid problems of non-standard compliant, non-interoperable, or highly abstracted and thus unreliable simulation models. The paper covers the model’s structure as well as its integration and the generic interaction between OMNeT++ / INET and Contiki.", "title": "" }, { "docid": "41d546266db9b3e9ec5071e4926abb8d", "text": "Estimating the shape of transparent and refractive objects is one of the few open problems in 3D reconstruction. Under the assumption that the rays refract only twice when traveling through the object, we present the first approach to simultaneously reconstructing the 3D positions and normals of the object's surface at both refraction locations. Our acquisition setup requires only two cameras and one monitor, which serves as the light source. After acquiring the ray-ray correspondences between each camera and the monitor, we solve an optimization function which enforces a new position-normal consistency constraint. That is, the 3D positions of surface points shall agree with the normals required to refract the rays under Snell's law. Experimental results using both synthetic and real data demonstrate the robustness and accuracy of the proposed approach.", "title": "" }, { "docid": "cf41591ea323c2dd2aa4f594c61315d9", "text": "Natural language descriptions of videos provide a potentially rich and vast source of supervision. However, the highly-varied nature of language presents a major barrier to its effective use. What is needed are models that can reason over uncertainty over both videos and text. In this paper, we tackle the core task of person naming: assigning names of people in the cast to human tracks in TV videos. Screenplay scripts accompanying the video provide some crude supervision about who’s in the video. However, even the basic problem of knowing who is mentioned in the script is often difficult, since language often refers to people using pronouns (e.g., “he”) and nominals (e.g., “man”) rather than actual names (e.g., “Susan”). Resolving the identity of these mentions is the task of coreference resolution, which is an active area of research in natural language processing. We develop a joint model for person naming and coreference resolution, and in the process, infer a latent alignment between tracks and mentions. We evaluate our model on both vision and NLP tasks on a new dataset of 19 TV episodes. On both tasks, we significantly outperform the independent baselines.", "title": "" }, { "docid": "13cdf06acdcf3f6e0c7085662cb99315", "text": "Terrestrial ecosystems play a significant role in the global carbon cycle and offset a large fraction of anthropogenic CO2 emissions. The terrestrial carbon sink is increasing, yet the mechanisms responsible for its enhancement, and implications for the growth rate of atmospheric CO2, remain unclear. Here using global carbon budget estimates, ground, atmospheric and satellite observations, and multiple global vegetation models, we report a recent pause in the growth rate of atmospheric CO2, and a decline in the fraction of anthropogenic emissions that remain in the atmosphere, despite increasing anthropogenic emissions. We attribute the observed decline to increases in the terrestrial sink during the past decade, associated with the effects of rising atmospheric CO2 on vegetation and the slowdown in the rate of warming on global respiration. The pause in the atmospheric CO2 growth rate provides further evidence of the roles of CO2 fertilization and warming-induced respiration, and highlights the need to protect both existing carbon stocks and regions, where the sink is growing rapidly.", "title": "" }, { "docid": "b1ffdb1e3f069b78458a2b464293d97a", "text": "We consider the detection of activities from non-cooperating individuals with features obtained on the radio frequency channel. Since environmental changes impact the transmission channel between devices, the detection of this alteration can be used to classify environmental situations. We identify relevant features to detect activities of non-actively transmitting subjects. In particular, we distinguish with high accuracy an empty environment or a walking, lying, crawling or standing person, in case-studies of an active, device-free activity recognition system with software defined radios. We distinguish between two cases in which the transmitter is either under the control of the system or ambient. For activity detection the application of one-stage and two-stage classifiers is considered. Apart from the discrimination of the above activities, we can show that a detected activity can also be localized simultaneously within an area of less than 1 meter radius.", "title": "" }, { "docid": "22241857a42ffcad817356900f52df66", "text": "Most of the intensive care units (ICU) are equipped with commercial pulse oximeters for monitoring arterial blood oxygen saturation (SpO2) and pulse rate (PR). Photoplethysmographic (PPG) data recorded from pulse oximeters usually corrupted by motion artifacts (MA), resulting in unreliable and inaccurate estimated measures of SpO2. In this paper, a simple and efficient MA reduction method based on Ensemble Empirical Mode Decomposition (E2MD) is proposed for the estimation of SpO2 from processed PPGs. Performance analysis of the proposed E2MD is evaluated by computing the statistical and quality measures indicating the signal reconstruction like SNR and NRMSE. Intentionally created MAs (Horizontal MA, Vertical MA and Bending MA) in the recorded PPGs are effectively reduced by the proposed one and proved to be the best suitable method for reliable and accurate SpO2 estimation from the processed PPGs.", "title": "" }, { "docid": "2702eb18e03af90e4061badd87bae7f7", "text": "Two linear time (and hence asymptotically optimal) algorithms for computing the Euclidean distance transform of a two-dimensional binary image are presented. The algorithms are based on the construction and regular sampling of the Voronoi diagram whose sites consist of the unit (feature) pixels in the image. The rst algorithm, which is of primarily theoretical interest, constructs the complete Voronoi diagram. The second, more practical, algorithm constructs the Voronoi diagram where it intersects the horizontal lines passing through the image pixel centres. Extensions to higher dimensional images and to other distance functions are also discussed.", "title": "" }, { "docid": "897962874a43ee19e3f50f431d4c449e", "text": "According to Dennett, the same system may be described using a ‘physical’ (mechanical) explanatory stance, or using an ‘intentional’ (beliefand goalbased) explanatory stance. Humans tend to find the physical stance more helpful for certain systems, such as planets orbiting a star, and the intentional stance for others, such as living animals. We define a formal counterpart of physical and intentional stances within computational theory: a description of a system as either a device, or an agent, with the key difference being that ‘devices’ are directly described in terms of an input-output mapping, while ‘agents’ are described in terms of the function they optimise. Bayes’ rule can then be applied to calculate the subjective probability of a system being a device or an agent, based only on its behaviour. We illustrate this using the trajectories of an object in a toy grid-world domain.", "title": "" }, { "docid": "36e99c1f3be629e3d556e5dc48243e0a", "text": "Recent studies have shown that synaptic unreliability is a robust and sufficient mechanism for inducing the stochasticity observed in cortex. Here, we introduce Synaptic Sampling Machines (S2Ms), a class of neural network models that uses synaptic stochasticity as a means to Monte Carlo sampling and unsupervised learning. Similar to the original formulation of Boltzmann machines, these models can be viewed as a stochastic counterpart of Hopfield networks, but where stochasticity is induced by a random mask over the connections. Synaptic stochasticity plays the dual role of an efficient mechanism for sampling, and a regularizer during learning akin to DropConnect. A local synaptic plasticity rule implementing an event-driven form of contrastive divergence enables the learning of generative models in an on-line fashion. S2Ms perform equally well using discrete-timed artificial units (as in Hopfield networks) or continuous-timed leaky integrate and fire neurons. The learned representations are remarkably sparse and robust to reductions in bit precision and synapse pruning: removal of more than 75% of the weakest connections followed by cursory re-learning causes a negligible performance loss on benchmark classification tasks. The spiking neuron-based S2Ms outperform existing spike-based unsupervised learners, while potentially offering substantial advantages in terms of power and complexity, and are thus promising models for on-line learning in brain-inspired hardware.", "title": "" }, { "docid": "83238b7ede9cc85090e44028e79375af", "text": "Purpose – This paper aims to represent a capability model for industrial robot as they pertain to assembly tasks. Design/methodology/approach – The architecture of a real kit building application is provided to demonstrate how robot capabilities can be used to fully automate the planning of assembly tasks. Discussion on the planning infrastructure is done with the Planning Domain Definition Language (PDDL) for heterogeneous multi robot systems. Findings – The paper describes PDDL domain and problem files that are used by a planner to generate a plan for kitting. Discussion on the plan shows that the best robot is selected to carry out assembly actions. Originality/value – The author presents a robot capability model that is intended to be used for helping manufacturers to characterize the different capabilities their robots contribute to help the end user to select the appropriate robots for the appropriate tasks, selecting backup robots during robot’s failures to limit the deterioration of the system’s productivity and the products’ quality and limiting robots’ failures and increasing productivity by providing a tool to manufacturers that outputs a process plan that assigns the best robot to each task needed to accomplish the assembly.", "title": "" }, { "docid": "88f6a0f18d32d9cf6da82ff730b22298", "text": "In this letter, we propose an energy efficient power control scheme for resource sharing between cellular and device-to-device (D2D) users in cellular network assisted D2D communication. We take into account the circuit power consumption of the device-to-device user (DU) and aim at maximizing the DU's energy efficiency while guaranteeing the required throughputs of both the DU and the cellular user. Specifically, we define three different regions for the circuit power consumption of the DU and derive the optimal power control scheme for each region. Moreover, a distributed algorithm is proposed for implementation of the optimal power control scheme.", "title": "" }, { "docid": "d5e3b7d29389990154b50087f5c13c88", "text": "This paper presents two sets of features, shape representation and kinematic structure, for human activity recognition using a sequence of RGB-D images. The shape features are extracted using the depth information in the frequency domain via spherical harmonics representation. The other features include the motion of the 3D joint positions (i.e. the end points of the distal limb segments) in the human body. Both sets of features are fused using the Multiple Kernel Learning (MKL) technique at the kernel level for human activity recognition. Our experiments on three publicly available datasets demonstrate that the proposed features are robust for human activity recognition and particularly when there are similarities", "title": "" }, { "docid": "815e0ad06fdc450aa9ba3f56ab19ab05", "text": "A member of the Liliaceae family, garlic ( Allium sativum) is highly regarded throughout the world for both its medicinal and culinary value. Early men of medicine such as Hippocrates, Pliny and Aristotle encouraged a number of therapeutic uses for this botanical. Today, it is commonly used in many cultures as a seasoning or spice. Garlic also stands as the second most utilized supplement. With its sulfur containing compounds, high trace mineral content, and enzymes, garlic has shown anti-viral, anti-bacterial, anti-fungal and antioxidant abilities. Diseases that may be helped or prevented by garlic’s medicinal actions include Alzheimer’s Disease, cancer, cardiovascular disease (including atherosclerosis, strokes, hypertension, thrombosis and hyperlipidemias) children’s conditions, dermatologic applications, stress, and infections. Some research points to possible benefits in diabetes, drug toxicity, and osteoporosis.", "title": "" }, { "docid": "ad53198bab3ad3002b965914f92ce3c9", "text": "Adaptive Learning Algorithms for Transferable Visual Recognition by Judith Ho↵man Doctor of Philosophy in Engineering – Electrical Engineering and Computer Sciences University of California, Berkeley Professor Trevor Darrell, Chair Understanding visual scenes is a crucial piece in many artificial intelligence applications ranging from autonomous vehicles and household robotic navigation to automatic image captioning for the blind. Reliably extracting high-level semantic information from the visual world in real-time is key to solving these critical tasks safely and correctly. Existing approaches based on specialized recognition models are prohibitively expensive or intractable due to limitations in dataset collection and annotation. By facilitating learned information sharing between recognition models these applications can be solved; multiple tasks can regularize one another, redundant information can be reused, and the learning of novel tasks is both faster and easier. In this thesis, I present algorithms for transferring learned information between visual data sources and across visual tasks all with limited human supervision. I will both formally and empirically analyze the adaptation of visual models within the classical domain adaptation setting and extend the use of adaptive algorithms to facilitate information transfer between visual tasks and across image modalities. Most visual recognition systems learn concepts directly from a large collection of manually annotated images/videos. A model which detects pedestrians requires a human to manually go through thousands or millions of images and indicate all instances of pedestrians. However, this model is susceptible to biases in the labeled data and often fails to generalize to new scenarios a detector trained in Palo Alto may have degraded performance in Rome, or a detector trained in sunny weather may fail in the snow. Rather than require human supervision for each new task or scenario, this work draws on deep learning, transformation learning, and convex-concave optimization to produce novel optimization frameworks which transfer information from the large curated databases to real world scenarios.", "title": "" }, { "docid": "79a3631f3ada452ad3193924071211dd", "text": "The encoder-decoder model is widely used in natural language generation tasks. However, the model sometimes suffers from repeated redundant generation, misses important phrases, and includes irrelevant entities. Toward solving these problems we propose a novel source-side token prediction module. Our method jointly estimates the probability distributions over source and target vocabularies to capture a correspondence between source and target tokens. The experiments show that the proposed model outperforms the current state-of-the-art method in the headline generation task. Additionally, we show that our method has an ability to learn a reasonable token-wise correspondence without knowing any true alignments.", "title": "" }, { "docid": "77b9d8a71d5bdd0afdf93cd525950496", "text": "One of the main tasks of a dialog system is to assign intents to user utterances, which is a form of text classification. Since intent labels are application-specific, bootstrapping a new dialog system requires collecting and annotating in-domain data. To minimize the need for a long and expensive data collection process, we explore ways to improve the performance of dialog systems with very small amounts of training data. In recent years, word embeddings have been shown to provide valuable features for many different language tasks. We investigate the use of word embeddings in a text classification task with little training data. We find that count and vector features complement each other and their combination yields better results than either type of feature alone. We propose a simple alternative, vector extrema, to replace the usual averaging of a sentence’s vectors. We show how taking vector extrema is well suited for text classification and compare it against standard vector baselines in three different applications.", "title": "" }, { "docid": "420fa81c2dbe77622108c978d5c6c019", "text": "Reasoning about a scene's thermal signature, in addition to its visual appearance and spatial configuration, would facilitate significant advances in perceptual systems. Applications involving the segmentation and tracking of persons, vehicles, and other heat-emitting objects, for example, could benefit tremendously from even coarsely accurate relative temperatures. With the increasing affordability of commercially available thermal cameras, as well as the imminent introduction of new, mobile form factors, such data will be readily and widely accessible. However, in order for thermal processing to complement existing methods in RGBD, there must be an effective procedure for calibrating RGBD and thermal cameras to create RGBDT (red, green, blue, depth, and thermal) data. In this paper, we present an automatic method for the synchronization and calibration of RGBD and thermal cameras in arbitrary environments. While traditional calibration methods fail in our multimodal setting, we leverage invariant features visible by both camera types. We first synchronize the streams with a simple optimization procedure that aligns their motion statistic time series. We then find the relative poses of the cameras by minimizing an objective that measures the alignment between edge maps from the two streams. In contrast to existing methods that use special calibration targets with key points visible to both cameras, our method requires nothing more than some edges visible to both cameras, such as those arising from humans. We evaluate our method and demonstrate that it consistently converges to the correct transform and that it results in high-quality RGBDT data.", "title": "" }, { "docid": "19863150313643b977f72452bb5a8a69", "text": "Important research effort has been devoted to the topic of optimal planning of distribution systems. However, in general it has been mostly referred to the design of the primary network, with very modest considerations to the effect of the secondary network in the planning and future operation of the complete grid. Relatively little attention has been paid to the optimization of the secondary grid and to its effect on the optimality of the design of the complete electrical system, although the investment and operation costs of the secondary grid represent an important portion of the total costs. Appropriate design procedures have been proposed separately for both the primary and the secondary grid; however, in general, both planning problems have been presented and treated as different-almost isolated-problems, setting aside with this approximation some important factors that couple both problems, such as the fact that they may share the right of way, use the same poles, etc., among other factors that strongly affect the calculation of the investment costs. The main purpose of this work is the development and initial testing of a model for the optimal planning of a distribution system that includes both the primary and the secondary grids, so that a single optimization problem is stated for the design of the integral primary-secondary distribution system that overcomes these simplifications. The mathematical model incorporates the variables that define both the primary as well as the secondary planning problems and consists of a mixed integer-linear programming problem that may be solved by means of any suitable algorithm. Results are presented of the application of the proposed integral design procedure using conventional mixed integer-linear programming techniques to a real case of a residential primary-secondary distribution system consisting of 75 electrical nodes.", "title": "" } ]
scidocsrr
e745cdf3341de90bb9b19a4739da8659
Game design principles in everyday fitness applications
[ { "docid": "16d949f6915cbb958cb68a26c6093b6b", "text": "Overweight and obesity are a global epidemic, with over one billion overweight adults worldwide (300+ million of whom are obese). Obesity is linked to several serious health problems and medical conditions. Medical experts agree that physical activity is critical to maintaining fitness, reducing weight, and improving health, yet many people have difficulty increasing and maintaining physical activity in everyday life. Clinical studies have shown that health benefits can occur from simply increasing the number of steps one takes each day and that social support can motivate people to stay active. In this paper, we describe Houston, a prototype mobile phone application for encouraging activity by sharing step count with friends. We also present four design requirements for technologies that encourage physical activity that we derived from a three-week long in situ pilot study that was conducted with women who wanted to increase their physical activity.", "title": "" }, { "docid": "e5a3119470420024b99df2d6eb14b966", "text": "Why should wait for some days to get or receive the rules of play game design fundamentals book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This rules of play game design fundamentals is well known book in the world, of course many people will try to own it. Why don't you become the first? Still confused with the way?", "title": "" }, { "docid": "1aeca45f1934d963455698879b1e53e8", "text": "A sedentary lifestyle is a contributing factor to chronic diseases, and it is often correlated with obesity. To promote an increase in physical activity, we created a social computer game, Fish'n'Steps, which links a player’s daily foot step count to the growth and activity of an animated virtual character, a fish in a fish tank. As further encouragement, some of the players’ fish tanks included other players’ fish, thereby creating an environment of both cooperation and competition. In a fourteen-week study with nineteen participants, the game served as a catalyst for promoting exercise and for improving game players’ attitudes towards physical activity. Furthermore, although most player’s enthusiasm in the game decreased after the game’s first two weeks, analyzing the results using Prochaska's Transtheoretical Model of Behavioral Change suggests that individuals had, by that time, established new routines that led to healthier patterns of physical activity in their daily lives. Lessons learned from this study underscore the value of such games to encourage rather than provide negative reinforcement, especially when individuals are not meeting their own expectations, to foster long-term behavioral change.", "title": "" } ]
[ { "docid": "c5081f86c4a173a40175e65b05d9effb", "text": "Convergence insufficiency is characterized by an inability to maintain effortless alignment of the two eyes (binocular convergence) while performing near tasks. Conventional rehabilitative vision therapy for the condition is monotonous and dull, leading to low levels of compliance. If the therapy is not performed then improvements in the condition are unlikely. This paper examines the use of computer games as a new delivery paradigm for vision therapy, specifically at how they can be used in the treatment of convergence insufficiency while at home. A game was created and tested in a small scale clinical trial. Results show clinical improvements, as well as high levels of compliance and motivation. Additionally, the game was able to objectively track patient progress and compliance.", "title": "" }, { "docid": "928eb797289d2630ff2e701ced782a14", "text": "The restricted Boltzmann machine (RBM) has received an increasing amount of interest in recent years. It determines good mapping weights that capture useful latent features in an unsupervised manner. The RBM and its generalizations have been successfully applied to a variety of image classification and speech recognition tasks. However, most of the existing RBM-based models disregard the preservation of the data manifold structure. In many real applications, the data generally reside on a low-dimensional manifold embedded in high-dimensional ambient space. In this brief, we propose a novel graph regularized RBM to capture features and learning representations, explicitly considering the local manifold structure of the data. By imposing manifold-based locality that preserves constraints on the hidden layer of the RBM, the model ultimately learns sparse and discriminative representations. The representations can reflect data distributions while simultaneously preserving the local manifold structure of data. We test our model using several benchmark image data sets for unsupervised clustering and supervised classification problem. The results demonstrate that the performance of our method exceeds the state-of-the-art alternatives.", "title": "" }, { "docid": "70ea3e32d4928e7fd174b417ec8b6d0e", "text": "We show that invariance in a deep neural network is equivalent to information minimality of the representation it computes, and that stacking layers and injecting noise during training naturally bias the network towards learning invariant representations. Then, we show that overfitting is related to the quantity of information stored in the weights, and derive a sharp bound between this information and the minimality and Total Correlation of the layers. This allows us to conclude that implicit and explicit regularization of the loss function not only help limit overfitting, but also foster invariance and disentangling of the learned representation. We also shed light on the properties of deep networks in relation to the geometry of the loss function.", "title": "" }, { "docid": "fd4bd9edcaff84867b6e667401aa3124", "text": "We give suggestions for the presentation of research results from frequentist, information-theoretic, and Bayesian analysis paradigms, followed by several general suggestions. The information-theoretic and Bayesian methods offer alternative approaches to data analysis and inference compared to traditionally used methods. Guidance is lacking on the presentation of results under these alternative procedures and on nontesting aspects of classical frequentist methods of statistical analysis. Null hypothesis testing has come under intense criticism. We recommend less reporting of the results of statistical tests of null hypotheses in cases where the null is surely false anyway, or where the null hypothesis is of little interest to science or management. JOURNAL OF WILDLIFE MANAGEMENT 65(3):373-378", "title": "" }, { "docid": "b1453c089b5b9075a1b54e4f564f7b45", "text": "Neural networks are increasingly deployed in real-world safety-critical domains such as autonomous driving, aircraft collision avoidance, and malware detection. However, these networks have been shown to often mispredict on inputs with minor adversarial or even accidental perturbations. Consequences of such errors can be disastrous and even potentially fatal as shown by the recent Tesla autopilot crashes. Thus, there is an urgent need for formal analysis systems that can rigorously check neural networks for violations of different safety properties such as robustness against adversarial perturbations within a certain L-norm of a given image. An effective safety analysis system for a neural network must be able to either ensure that a safety property is satisfied by the network or find a counterexample, i.e., an input for which the network will violate the property. Unfortunately, most existing techniques for performing such analysis struggle to scale beyond very small networks and the ones that can scale to larger networks suffer from high false positives and cannot produce concrete counterexamples in case of a property violation. In this paper, we present a new efficient approach for rigorously checking different safety properties of neural networks that significantly outperforms existing approaches by multiple orders of magnitude. Our approach can check different safety properties and find concrete counterexamples for networks that are 10× larger than the ones supported by existing analysis techniques. We believe that our approach to estimating tight output bounds of a network for a given input range can also help improve the explainability of neural networks and guide the training process of more robust neural networks.", "title": "" }, { "docid": "ad4d38ee8089a67353586abad319038f", "text": "State-of-the-art systems of Chinese Named Entity Recognition (CNER) require large amounts of hand-crafted features and domainspecific knowledge to achieve high performance. In this paper, we apply a bidirectional LSTM-CRF neural network that utilizes both characterlevel and radical-level representations. We are the first to use characterbased BLSTM-CRF neural architecture for CNER. By contrasting the results of different variants of LSTM blocks, we find the most suitable LSTM block for CNER. We are also the first to investigate Chinese radical-level representations in BLSTM-CRF architecture and get better performance without carefully designed features. We evaluate our system on the third SIGHAN Bakeoff MSRA data set for simplfied CNER task and achieve state-of-the-art performance 90.95% F1.", "title": "" }, { "docid": "c256283819014d79dd496a3183116b68", "text": "For the 5th generation of terrestrial mobile communications, Multi-Carrier (MC) transmission based on non-orthogonal waveforms is a promising technology component compared to orthogonal frequency division multiplex (OFDM) in order to achieve higher throughput and enable flexible spectrum management. Coverage extension and service continuity can be provided considering satellites as additional components in future networks by allowing vertical handover to terrestrial radio interfaces. In this paper, the properties of Filter Bank Multicarrier (FBMC) as potential MC transmission scheme is discussed taking into account the requirements for the satellite-specific PHY-Layer like non-linear distortions due to High Power Amplifiers (HPAs). The performance for specific FBMC configurations is analyzed in terms of peak-to-average power ratio (PAPR), computational complexity, non-linear distortions as well as carrier frequency offsets sensitivity (CFOs). Even though FBMC and OFDM have similar PAPR and suffer comparable spectral regrowth at the output of the non linear amplifier, simulations on link level show that FBMC still outperforms OFDM in terms of CFO sensitivity and symbol error rate in the presence of non-linear distortions.", "title": "" }, { "docid": "c2f807e336be1b8d918d716c07668ae1", "text": "The present article proposes and describes a new ZCS non-isolated bidirectional buck-boost DC-DC converter for energy storage applications in electric vehicles. Usually, the conventional converters are adapted with an auxiliary resonant cell to provide the zero current switching turn-on/turn-off condition for the main switching devices. The advantages of proposed converter has reduced switching losses, reduced component count and improved efficiency. The proposed converter operates either in boost or buck mode. This paper mainly deals with the operating principles, analysis and design simulations of the proposed converter in order to prove the better soft-switching capability, reduced switching losses and efficiency improvement than the conventional converter.", "title": "" }, { "docid": "7963adab39b58ab0334b8eef4149c59c", "text": "The aim of the present study was to gain a better understanding of the content characteristics that make online consumer reviews a useful source of consumer information. To this end, we content analyzed reviews of experience and search products posted on Amazon.com (N = 400). The insights derived from this content analysis were linked with the proportion of ‘useful’ votes that reviews received from fellow consumers. The results show that content characteristics are paramount to understanding the perceived usefulness of reviews. Specifically, argumentation (density and diversity) served as a significant predictor of perceived usefulness, as did review valence although this latter effect was contingent on the type of product (search or experience) being evaluated in reviews. The presence of expertise claims appeared to be weakly related to the perceived usefulness of reviews. The broader theoretical, methodological and practical implications of these findings are discussed.", "title": "" }, { "docid": "179d8f41102862710595671e5a819d70", "text": "Detecting changes in time series data is an important data analysis task with application in various scientific domains. In this paper, we propose a novel approach to address the problem of change detection in time series data, which can find both the amplitude and degree of changes. Our approach is based on wavelet footprints proposed originally by the signal processing community for signal compression. We, however, exploit the properties of footprints to efficiently capture discontinuities in a signal. We show that transforming time series data using footprint basis up to degree D generates nonzero coefficients only at the change points with degree up to D. Exploiting this property, we propose a novel change detection query processing scheme which employs footprint-transformed data to identify change points, their amplitudes, and degrees of change efficiently and accurately. We also present two methods for exact and approximate transformation of data. Our analytical and empirical results with both synthetic and real-world data show that our approach outperforms the best known change detection approach in terms of both performance and accuracy. Furthermore, unlike the state of the art approaches, our query response time is independent from the number of change points in the data and the user-defined change threshold.", "title": "" }, { "docid": "c59aaad99023e5c6898243db208a4c3c", "text": "This paper presents a method for automated vessel segmentation in retinal images. For each pixel in the field of view of the image, a 41-D feature vector is constructed, encoding information on the local intensity structure, spatial properties, and geometry at multiple scales. An AdaBoost classifier is trained on 789 914 gold standard examples of vessel and nonvessel pixels, then used for classifying previously unseen images. The algorithm was tested on the public digital retinal images for vessel extraction (DRIVE) set, frequently used in the literature and consisting of 40 manually labeled images with gold standard. Results were compared experimentally with those of eight algorithms as well as the additional manual segmentation provided by DRIVE. Training was conducted confined to the dedicated training set from the DRIVE database, and feature-based AdaBoost classifier (FABC) was tested on the 20 images from the test set. FABC achieved an area under the receiver operating characteristic (ROC) curve of 0.9561, in line with state-of-the-art approaches, but outperforming their accuracy (0.9597 versus 0.9473 for the nearest performer).", "title": "" }, { "docid": "e11b4a08fc864112d4f68db1ea9703e9", "text": "Forecasting is an integral part of any organization for their decision-making process so that they can predict their targets and modify their strategy in order to improve their sales or productivity in the coming future. This paper evaluates and compares various machine learning models, namely, ARIMA, Auto Regressive Neural Network(ARNN), XGBoost, SVM, Hy-brid Models like Hybrid ARIMA-ARNN, Hybrid ARIMA-XGBoost, Hybrid ARIMA-SVM and STL Decomposition (using ARIMA, Snaive, XGBoost) to forecast sales of a drug store company called Rossmann. Training data set contains past sales and supplemental information about drug stores. Accuracy of these models is measured by metrics such as MAE and RMSE. Initially, linear model such as ARIMA has been applied to forecast sales. ARIMA was not able to capture nonlinear patterns precisely, hence nonlinear models such as Neural Network, XGBoost and SVM were used. Nonlinear models performed better than ARIMA and gave low RMSE. Then, to further optimize the performance, composite models were designed using hybrid technique and decomposition technique. Hybrid ARIMA-ARNN, Hybrid ARIMA-XGBoost, Hybrid ARIMA-SVM were used and all of them performed better than their respective individual models. Then, the composite model was designed using STL Decomposition where the decomposed components namely seasonal, trend and remainder components were forecasted by Snaive, ARIMA and XGBoost. STL gave better results than individual and hybrid models. This paper evaluates and analyzes why composite models give better results than an individual model and state that decomposition technique is better than the hybrid technique for this application.", "title": "" }, { "docid": "2710a25b3cf3caf5ebd5fb9f08c9e5e3", "text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.", "title": "" }, { "docid": "8c2e69380cebdd6affd43c6bfed2fc51", "text": "A fundamental property of many plasma-membrane proteins is their association with the underlying cytoskeleton to determine cell shape, and to participate in adhesion, motility and other plasma-membrane processes, including endocytosis and exocytosis. The ezrin–radixin–moesin (ERM) proteins are crucial components that provide a regulated linkage between membrane proteins and the cortical cytoskeleton, and also participate in signal-transduction pathways. The closely related tumour suppressor merlin shares many properties with ERM proteins, yet also provides a distinct and essential function.", "title": "" }, { "docid": "a1046f5282cf4057fd143fdce79c6990", "text": "Rheumatoid arthritis is a multisystem disease with underlying immune mechanisms. Osteoarthritis is a debilitating, progressive disease of diarthrodial joints associated with the aging process. Although much is known about the pathogenesis of rheumatoid arthritis and osteoarthritis, our understanding of some immunologic changes remains incomplete. This study tries to examine the numeric changes in the T cell subsets and the alterations in the levels of some cytokines and adhesion molecules in these lesions. To accomplish this goal, peripheral blood and synovial fluid samples were obtained from 24 patients with rheumatoid arthritis, 15 patients with osteoarthritis and six healthy controls. The counts of CD4 + and CD8 + T lymphocytes were examined using flow cytometry. The levels of some cytokines (TNF-α, IL1-β, IL-10, and IL-17) and a soluble intercellular adhesion molecule-1 (sICAM-1) were measured in the sera and synovial fluids using enzyme linked immunosorbant assay. We found some variations in the counts of T cell subsets, the levels of cytokines and sICAM-1 adhesion molecule between the healthy controls and the patients with arthritis. High levels of IL-1β, IL-10, IL-17 and TNF-α (in the serum and synovial fluid) were observed in arthritis compared to the healthy controls. In rheumatoid arthritis, a high serum level of sICAM-1 was found compared to its level in the synovial fluid. A high CD4+/CD8+ T cell ratio was found in the blood of the patients with rheumatoid arthritis. In rheumatoid arthritis, the cytokine levels correlated positively with some clinicopathologic features. To conclude, the development of rheumatoid arthritis and osteoarthritis is associated with alteration of the levels of some cytokines. The assessment of these immunologic changes may have potential prognostic roles.", "title": "" }, { "docid": "15e034d722778575b43394b968be19ad", "text": "Elections are contests for the highest stakes in national politics and the electoral system is a set of predetermined rules for conducting elections and determining their outcome. Thus defined, the electoral system is distinguishable from the actual conduct of elections as well as from the wider conditions surrounding the electoral contest, such as the state of civil liberties, restraints on the opposition and access to the mass media. While all these aspects are of obvious importance to free and fair elections, the main interest of this study is the electoral system.", "title": "" }, { "docid": "77b78ec70f390289424cade3850fc098", "text": "As the primary barrier between an organism and its environment, epithelial cells are well-positioned to regulate tolerance while preserving immunity against pathogens. Class II major histocompatibility complex molecules (MHC class II) are highly expressed on the surface of epithelial cells (ECs) in both the lung and intestine, although the functional consequences of this expression are not fully understood. Here, we summarize current information regarding the interactions that regulate the expression of EC MHC class II in health and disease. We then evaluate the potential role of EC as non-professional antigen presenting cells. Finally, we explore future areas of study and the potential contribution of epithelial surfaces to gut-lung crosstalk.", "title": "" }, { "docid": "11a1c92620d58100194b735bfc18c695", "text": "Stabilization by static output feedback (SOF) is a long-standing open problem in control: given an n by n matrix A and rectangular matrices B and C, find a p by q matrix K such that A + BKC is stable. Low-order controller design is a practically important problem that can be cast in the same framework, with (p+k)(q+k) design parameters instead of pq, where k is the order of the controller, and k << n. Robust stabilization further demands stability in the presence of perturbation and satisfactory transient as well as asymptotic system response. We formulate two related nonsmooth, nonconvex optimization problems over K, respectively with the following objectives: minimization of the -pseudospectral abscissa of A+BKC, for a fixed ≥ 0, and maximization of the complex stability radius of A + BKC. Finding global optimizers of these functions is hard, so we use a recently developed gradient sampling method that approximates local optimizers. For modest-sized systems, local optimization can be carried out from a large number of starting points with no difficulty. The best local optimizers may then be investigated as candidate solutions to the static output feedback or low-order controller design problem. We show results for two problems published in the control literature. The first is a turbo-generator example that allows us to show how different choices of the optimization objective lead to stabilization with qualitatively different properties, conveniently visualized by pseudospectral plots. The second is a well known model of a Boeing 767 aircraft at a flutter condition. For this problem, we are not aware of any SOF stabilizing K published in the literature. Our method was not only able to find an SOF stabilizing K, but also to locally optimize the complex stability radius of A + BKC. We also found locally optimizing order–1 and order–2 controllers for this problem. All optimizers are visualized using pseudospectral plots.", "title": "" }, { "docid": "02469f669769f5c9e2a9dc49cee20862", "text": "In this work we study the use of 3D hand poses to recognize first-person dynamic hand actions interacting with 3D objects. Towards this goal, we collected RGB-D video sequences comprised of more than 100K frames of 45 daily hand action categories, involving 26 different objects in several hand configurations. To obtain hand pose annotations, we used our own mo-cap system that automatically infers the 3D location of each of the 21 joints of a hand model via 6 magnetic sensors and inverse kinematics. Additionally, we recorded the 6D object poses and provide 3D object models for a subset of hand-object interaction sequences. To the best of our knowledge, this is the first benchmark that enables the study of first-person hand actions with the use of 3D hand poses. We present an extensive experimental evaluation of RGB-D and pose-based action recognition by 18 baselines/state-of-the-art approaches. The impact of using appearance features, poses, and their combinations are measured, and the different training/testing protocols are evaluated. Finally, we assess how ready the 3D hand pose estimation field is when hands are severely occluded by objects in egocentric views and its influence on action recognition. From the results, we see clear benefits of using hand pose as a cue for action recognition compared to other data modalities. Our dataset and experiments can be of interest to communities of 3D hand pose estimation, 6D object pose, and robotics as well as action recognition.", "title": "" }, { "docid": "24e1a6f966594d4230089fc433e38ce6", "text": "The need for omnidirectional antennas for wireless applications has increased considerably. The antennas are used in a variety of bands anywhere from 1.7 to 2.5 GHz, in different configurations which mainly differ in gain. The omnidirectionality is mostly obtained using back-to-back elements or simply using dipoles in different collinear-array configurations. The antenna proposed in this paper is a patch which was built in a cylindrical geometry rather than a planar one, and which generates an omnidirectional pattern in the H-plane.", "title": "" } ]
scidocsrr
dd0cb927c3761811edfcf9d58f00936d
Censorship in the Wild: Analyzing Internet Filtering in Syria
[ { "docid": "1856090b401a304f1172c2958d05d6b3", "text": "The Iranian government operates one of the largest and most sophisticated Internet censorship regimes in the world, but the mechanisms it employs have received little research attention, primarily due to lack of access to network connections within the country and personal risks to Iranian citizens who take part. In this paper, we examine the status of Internet censorship in Iran based on network measurements conducted from a major Iranian ISP during the lead up to the June 2013 presidential election. We measure the scope of the censorship by probing Alexa’s top 500 websites in 18 different categories. We investigate the technical mechanisms used for HTTP Host–based blocking, keyword filtering, DNS hijacking, and protocol-based throttling. Finally, we map the network topology of the censorship infrastructure and find evidence that it relies heavily on centralized equipment, a property that might be fruitfully exploited by next generation approaches to censorship circumvention.", "title": "" } ]
[ { "docid": "eaca6393a08baa24958f7197fb4b8e8a", "text": "OBJECTIVE\nTo assess adherence to community-based directly observed treatment (DOT) among Tanzanian tuberculosis patients using the Medication Event Monitoring System (MEMS) and to validate alternative adherence measures for resource-limited settings using MEMS as a gold standard.\n\n\nMETHODS\nThis was a longitudinal pilot study of 50 patients recruited consecutively from one rural hospital, one urban hospital and two urban health centres. Treatment adherence was monitored with MEMS and the validity of the following adherence measures was assessed: isoniazid urine test, urine colour test, Morisky scale, Brief Medication Questionnaire, adapted AIDS Clinical Trials Group (ACTG) adherence questionnaire, pill counts and medication refill visits.\n\n\nFINDINGS\nThe mean adherence rate in the study population was 96.3% (standard deviation, SD: 7.7). Adherence was less than 100% in 70% of the patients, less than 95% in 21% of them, and less than 80% in 2%. The ACTG adherence questionnaire and urine colour test had the highest sensitivities but lowest specificities. The Morisky scale and refill visits had the highest specificities but lowest sensitivities. Pill counts and refill visits combined, used in routine practice, yielded moderate sensitivity and specificity, but sensitivity improved when the ACTG adherence questionnaire was added.\n\n\nCONCLUSION\nPatients on community-based DOT showed good adherence in this study. The combination of pill counts, refill visits and the ACTG adherence questionnaire could be used to monitor adherence in settings where MEMS is not affordable. The findings with regard to adherence and to the validity of simple adherence measures should be confirmed in larger populations with wider variability in adherence rates.", "title": "" }, { "docid": "b912b32d9f1f4e7a5067450b98870a71", "text": "As of May 2013, 56 percent of American adults had a smartphone, and most of them used it to access the Internet. One-third of smartphone users report that their phone is the primary way they go online. Just as the Internet changed retailing in the late 1990s, many argue that the transition to mobile, sometimes referred to as “Web 3.0,” will have a similarly disruptive effect (Brynjolfsson et al. 2013). In this paper, we aim to document some early effects of how mobile devices might change Internet and retail commerce. We present three main findings based on an analysis of eBay’s mobile shopping application and core Internet platform. First, and not surprisingly, the early adopters of mobile e-commerce applications appear", "title": "" }, { "docid": "fc7efee1840ef385537f1686859da87c", "text": "The self-oscillating converter is a popular circuit for cost-sensitive applications due to its simplicity and low component count. It is widely employed in mobile phone charges and as the stand-by power source in offline power supplies for data-processing equipment. However, this circuit almost was not explored for supplier Power LEDs. This paper presents a self-oscillating buck power electronics driver for supply directly Power LEDs, with no additional circuit. A simplified mathematical model of LED was used to characterize the self-oscillating converter for the power LED driver. In order to improve the performance of the proposed buck converter in this work the control of the light intensity of LEDs was done using a microcontroller to emulate PWM modulation with frequency 200 Hz. At using the converter proposed the effects of the LED manufacturing tolerances and drifts over temperature almost has no influence on the LED average current.", "title": "" }, { "docid": "a34e153e5027a1483fd25c3ff3e1ea0c", "text": "In this paper, we study how to initialize the convolutional neural network (CNN) model for training on a small dataset. Specially, we try to extract discriminative filters from the pre-trained model for a target task. On the basis of relative entropy and linear reconstruction, two methods, Minimum Entropy Loss (MEL) and Minimum Reconstruction Error (MRE), are proposed. The CNN models initialized by the proposed MEL and MRE methods are able to converge fast and achieve better accuracy. We evaluate MEL and MRE on the CIFAR10, CIFAR100, SVHN, and STL-10 public datasets. The consistent performances demonstrate the advantages of the proposed methods.", "title": "" }, { "docid": "867e59b8f2dd4ccc0fdd3820853dc60e", "text": "Software product lines are hard to configure. Techniques that work for medium sized product lines fail for much larger product lines such as the Linux kernel with 6000+ features. This paper presents simple heuristics that help the Indicator-Based Evolutionary Algorithm (IBEA) in finding sound and optimum configurations of very large variability models in the presence of competing objectives. We employ a combination of static and evolutionary learning of model structure, in addition to utilizing a pre-computed solution used as a “seed” in the midst of a randomly-generated initial population. The seed solution works like a single straw that is enough to break the camel's back -given that it is a feature-rich seed. We show promising results where we can find 30 sound solutions for configuring upward of 6000 features within 30 minutes.", "title": "" }, { "docid": "3f612ae95f426959e249bc0bb4fc3a68", "text": "Author’s Note: Special Thanks for their support to Emily Morganti and Heather Logas of Telltale Games; Becky Waxman, Jan Christoe and Marita Robinson of GameBoomers; Stefaan de Keersmaeker, a.k.a. “Father,” of The Older Gamers; Jen at FourFatChicks.com; Cindy at MysteryManor.com; Tami at Spyglassguides.com; Mina at grrlgamer.com; the team at Seasoned Gamers; Chris Morris; Betsy Book; and all those who participated in the study. Games and Culture Volume XX Number X Month XXXX xx-xx © 2008 Sage Publications 10.1177/1555412008314132 http://gac.sagepub.com hosted at http://online.sagepub.com The Truth About Baby Boomer Gamers", "title": "" }, { "docid": "47c5fd58d6fdbb5003cb907aa1c0bee8", "text": "OBJECTIVES\nTo review the effects of physical activity on health and behavior outcomes and develop evidence-based recommendations for physical activity in youth.\n\n\nSTUDY DESIGN\nA systematic literature review identified 850 articles; additional papers were identified by the expert panelists. Articles in the identified outcome areas were reviewed, evaluated and summarized by an expert panelist. The strength of the evidence, conclusions, key issues, and gaps in the evidence were abstracted in a standardized format and presented and discussed by panelists and organizational representatives.\n\n\nRESULTS\nMost intervention studies used supervised programs of moderate to vigorous physical activity of 30 to 45 minutes duration 3 to 5 days per week. The panel believed that a greater amount of physical activity would be necessary to achieve similar beneficial effects on health and behavioral outcomes in ordinary daily circumstances (typically intermittent and unsupervised activity).\n\n\nCONCLUSION\nSchool-age youth should participate daily in 60 minutes or more of moderate to vigorous physical activity that is developmentally appropriate, enjoyable, and involves a variety of activities.", "title": "" }, { "docid": "d64a0520a0cb49b1906d1d343ca935ec", "text": "A 3D LTCC (low temperature co-fired ceramic) millimeter wave balun using asymmetric structure was investigated in this paper. The proposed balun consists of embedded multilayer microstrip and CPS (coplanar strip) lines. It was designed at 40GHz. The measured insertion loss of the back-to-back balanced transition is -1.14dB, thus the estimated insertion loss of each device is -0.57dB including the CPS line loss. The 10dB return loss bandwidth of the unbalanced back-to-back transition covers the frequency range of 17.3/spl sim/46.6GHz (91.7%). The area occupied by this balun is 0.42 /spl times/ 0.066/spl lambda//sub 0/ (2.1 /spl times/ 0.33mm/sup 2/). The high performances have been achieved using the low loss and relatively high dielectric constant of LTCC (/spl epsiv//sub r/=5.4, tan/spl delta/=0.0015 at 35GHz) and a 3D stacked configuration. This balun can be used as a transition of microstrip-to-CPS and vice-versa and insures also an impedance transformation from 50 to 110 Ohm for an easy integration with a high input impedance antenna. This is the first reported 40 GHz wideband 3D LTCC balun using asymmetric structure to balance the output amplitude and phase difference.", "title": "" }, { "docid": "391ee7fbe7c5a83c8dada4062b8c432d", "text": "A crystal oscillator is proposed which can exhibit a frequency versus temperature stability comparable to that of the best atomic frequency standards.<<ETX>>", "title": "" }, { "docid": "2c30b761ec425c6bd8fff97a9ce4868c", "text": "We propose a joint representation and classification framework that achieves the dual goal of finding the most discriminative sparse overcomplete encoding and optimal classifier parameters. Formulating an optimization problem that combines the objective function of the classification with the representation error of both labeled and unlabeled data, constrained by sparsity, we propose an algorithm that alternates between solving for subsets of parameters, whilst preserving the sparsity. The method is then evaluated over two important classification problems in computer vision: object categorization of natural images using the Caltech 101 database and face recognition using the Extended Yale B face database. The results show that the proposed method is competitive against other recently proposed sparse overcomplete counterparts and considerably outperforms many recently proposed face recognition techniques when the number training samples is small.", "title": "" }, { "docid": "c08d820bc6109a86364a793e334878c4", "text": "People travel in the real world and leave their location history in a form of trajectories. These trajectories do not only connect locations in the physical world but also bridge the gap between people and locations. This paper introduces a social networking service, called GeoLife, which aims to understand trajectories, locations and users, and mine the correlation between users and locations in terms of user-generated GPS trajectories. GeoLife offers three key applications scenarios: 1) sharing life experiences based on GPS trajectories; 2) generic travel recommendations, e.g., the top interesting locations, travel sequences among locations and travel experts in a given region; and 3) personalized friend and location recommendation.", "title": "" }, { "docid": "b2c24d93d1326ac8ce62cb5c5328689d", "text": "The effects of a training program consisting of weight lifting combined with plyometric exercises on kicking performance, myosin heavy-chain composition (vastus lateralis), physical fitness, and body composition (using dual-energy X-ray absorptiometry (DXA)) was examined in 37 male physical education students divided randomly into a training group (TG: 16 subjects) and a control group (CG: 21 subjects). The TG followed 6 weeks of combined weight lifting and plyometric exercises. In all subjects, tests were performed to measure their maximal angular speed of the knee during in-step kicks on a stationary ball. Additional tests for muscle power (vertical jump), running speed (30 m running test), anaerobic capacity (Wingate and 300 m running tests), and aerobic power (20 m shuttle run tests) were also performed. Training resulted in muscle hypertrophy (+4.3%), increased peak angular velocity of the knee during kicking (+13.6%), increased percentage of myosin heavy-chain (MHC) type IIa (+8.4%), increased 1 repetition maximum (1 RM) of inclined leg press (ILP) (+61.4%), leg extension (LE) (+20.2%), leg curl (+15.9%), and half squat (HQ) (+45.1%), and enhanced performance in vertical jump (all p < or = 0.05). In contrast, MHC type I was reduced (-5.2%, p < or = 0.05) after training. In the control group, these variables remained unchanged. In conclusion, 6 weeks of strength training combining weight lifting and plyometric exercises results in significant improvement of kicking performance, as well as other physical capacities related to success in football (soccer).", "title": "" }, { "docid": "db37b12a1e816c15e8719a7048ba3687", "text": "This study examined the impact of Internet addiction (IA) on life satisfaction and life engagement in young adults. A total of 210 University students participated in the study. Multivariate regression analysis showed that the model was significant and contributes 8% of the variance in life satisfaction (Adjusted R=.080, p<.001) and 2.8% of the variance in life engagement (Adjusted R=.028, p<.05). Unstandardized regression coefficient (B) indicates that one unit increase in raw score of Internet addiction leads to .168 unit decrease in raw score of life satisfaction (B=-.168, p<.001) and .066 unit decrease in raw score of life engagement (B=-.066, p<.05). Means and standard deviations of the scores on IA and its dimensions showed that the most commonly given purposes of Internet are online discussion, adult chatting, online gaming, chatting, cyber affair and watching pornography. Means and standard deviations of the scores on IA and its dimensions across different types of social networking sites further indicate that people who frequently participate in skype, twitter and facebook have relatively higher IA score. Correlations of different aspects of Internet use with major variables indicate significant and positive correlations of Internet use with IA, neglect of duty and virtual fantasies. Implications of the findings for theory, research and practice are discussed.", "title": "" }, { "docid": "bb0cc670d2c9a6004a4e89719b9337cf", "text": "Sharing of functional units inside a processor by two applications can lead to to information leaks and micro-architectural side-channel attacks. Meanwhile, processors now commonly come with hardware performance counters which can count a variety of micro-architectural events, ranging from cache behavior to floating point unit usage. In this paper we propose that the hardware performance counters can be leveraged by the operating system's scheduler to predict the upcoming program phases of the applications running on the system. By detecting and predicting program phases, the scheduler can make sure that programs in the same program phase, i.e. using same type of functional unit, are not scheduled on the same processor core, thus helping to mitigate potential side-channel attacks.", "title": "" }, { "docid": "32d811155b77cd6b5586da9c75ea6670", "text": "OBJECTIVES\nImplementation of the International Statistical Classification of Disease and Related Health Problems, 10th Revision (ICD-10) coding system presents challenges for using administrative data. Recognizing this, we conducted a multistep process to develop ICD-10 coding algorithms to define Charlson and Elixhauser comorbidities in administrative data and assess the performance of the resulting algorithms.\n\n\nMETHODS\nICD-10 coding algorithms were developed by \"translation\" of the ICD-9-CM codes constituting Deyo's (for Charlson comorbidities) and Elixhauser's coding algorithms and by physicians' assessment of the face-validity of selected ICD-10 codes. The process of carefully developing ICD-10 algorithms also produced modified and enhanced ICD-9-CM coding algorithms for the Charlson and Elixhauser comorbidities. We then used data on in-patients aged 18 years and older in ICD-9-CM and ICD-10 administrative hospital discharge data from a Canadian health region to assess the comorbidity frequencies and mortality prediction achieved by the original ICD-9-CM algorithms, the enhanced ICD-9-CM algorithms, and the new ICD-10 coding algorithms.\n\n\nRESULTS\nAmong 56,585 patients in the ICD-9-CM data and 58,805 patients in the ICD-10 data, frequencies of the 17 Charlson comorbidities and the 30 Elixhauser comorbidities remained generally similar across algorithms. The new ICD-10 and enhanced ICD-9-CM coding algorithms either matched or outperformed the original Deyo and Elixhauser ICD-9-CM coding algorithms in predicting in-hospital mortality. The C-statistic was 0.842 for Deyo's ICD-9-CM coding algorithm, 0.860 for the ICD-10 coding algorithm, and 0.859 for the enhanced ICD-9-CM coding algorithm, 0.868 for the original Elixhauser ICD-9-CM coding algorithm, 0.870 for the ICD-10 coding algorithm and 0.878 for the enhanced ICD-9-CM coding algorithm.\n\n\nCONCLUSIONS\nThese newly developed ICD-10 and ICD-9-CM comorbidity coding algorithms produce similar estimates of comorbidity prevalence in administrative data, and may outperform existing ICD-9-CM coding algorithms.", "title": "" }, { "docid": "78b61359d8668336b198af9ad59fe149", "text": "This paper discusses a fuzzy cost-based failure modes, effects, and criticality analysis (FMECA) approach for wind turbines. Conventional FMECA methods use a crisp risk priority number (RPN) as a measure of criticality which suffers from the difficulty of quantifying the risk. One method of increasing wind turbine reliability is to install a condition monitoring system (CMS). The RPN can be reduced with the help of a CMS because faults can be detected at an incipient level, and preventive maintenance can be scheduled. However, the cost of installing a CMS cannot be ignored. The fuzzy cost-based FMECA method proposed in this paper takes into consideration the cost of a CMS and the benefits it brings and provides a method for determining whether it is financially profitable to install a CMS. The analysis is carried out in MATLAB® which provides functions for fuzzy logic operation and defuzzification.", "title": "" }, { "docid": "dd16da9d44e47fb0f7fe1a25063daeee", "text": "The excitation and vibration triggered by the long-term operation of railway vehicles inevitably result in defective states of catenary support devices. With the massive construction of high-speed electrified railways, automatic defect detection of diverse and plentiful fasteners on the catenary support device is of great significance for operation safety and cost reduction. Nowadays, the catenary support devices are periodically captured by the cameras mounted on the inspection vehicles during the night, but the inspection still mostly relies on human visual interpretation. To reduce the human involvement, this paper proposes a novel vision-based method that applies the deep convolutional neural networks (DCNNs) in the defect detection of the fasteners. Our system cascades three DCNN-based detection stages in a coarse-to-fine manner, including two detectors to sequentially localize the cantilever joints and their fasteners and a classifier to diagnose the fasteners’ defects. Extensive experiments and comparisons of the defect detection of catenary support devices along the Wuhan–Guangzhou high-speed railway line indicate that the system can achieve a high detection rate with good adaptation and robustness in complex environments.", "title": "" }, { "docid": "d050730d7a5bd591b805f1b9729b0f2d", "text": "In plant phenotyping, it has become important to be able to measure many features on large image sets in order to aid genetic discovery. The size of the datasets, now often captured robotically, often precludes manual inspection, hence the motivation for finding a fully automated approach. Deep learning is an emerging field that promises unparalleled results on many data analysis problems. Building on artificial neural networks, deep approaches have many more hidden layers in the network, and hence have greater discriminative and predictive power. We demonstrate the use of such approaches as part of a plant phenotyping pipeline. We show the success offered by such techniques when applied to the challenging problem of image-based plant phenotyping and demonstrate state-of-the-art results (>97% accuracy) for root and shoot feature identification and localization. We use fully automated trait identification using deep learning to identify quantitative trait loci in root architecture datasets. The majority (12 out of 14) of manually identified quantitative trait loci were also discovered using our automated approach based on deep learning detection to locate plant features. We have shown deep learning-based phenotyping to have very good detection and localization accuracy in validation and testing image sets. We have shown that such features can be used to derive meaningful biological traits, which in turn can be used in quantitative trait loci discovery pipelines. This process can be completely automated. We predict a paradigm shift in image-based phenotyping bought about by such deep learning approaches, given sufficient training sets.", "title": "" }, { "docid": "75233d6d94fec1f43fa02e8043470d4d", "text": "Out-of-autoclave (OoA) prepreg materials and methods have gained acceptance over the past decade because of the ability to produce autoclave-quality components under vacuum-bag-only (VBO) cure. To achieve low porosity and tight dimensional tolerances, VBO prepregs rely on specific microstructural features and processing techniques. Furthermore, successful cure is contingent upon appropriate material property and process parameter selection. In this article, we review the existing literature on VBO prepreg processing to summarize and synthesize knowledge on these issues. First, the context, development, and defining properties of VBO prepregs are presented. The key processing phenomena and the influence on quality are subsequently described. Finally, cost and environmental performance are considered. Throughout, we highlight key considerations for VBO prepreg processing and identify areas where further study is required.", "title": "" }, { "docid": "2901aaa10d8e7aa23f372f4e715686d5", "text": "This article describes a model of communication known as crisis and emergency risk communication (CERC). The model is outlined as a merger of many traditional notions of health and risk communication with work in crisis and disaster communication. The specific kinds of communication activities that should be called for at various stages of disaster or crisis development are outlined. Although crises are by definition uncertain, equivocal, and often chaotic situations, the CERC model is presented as a tool health communicators can use to help manage these complex events.", "title": "" } ]
scidocsrr
0b8742ea9f684f8439af828120db0df2
Learning beyond datasets : Knowledge Graph Augmented Neural Networks for Natural language Processing
[ { "docid": "3bb905351ce1ea2150f37059ed256a90", "text": "A major assumption in many machine learning and data mining algorithms is that the training and future data must be in the same feature space and have the same distribution. However, in many real-world applications, this assumption may not hold. For example, we sometimes have a classification task in one domain of interest, but we only have sufficient training data in another domain of interest, where the latter data may be in a different feature space or follow a different data distribution. In such cases, knowledge transfer, if done successfully, would greatly improve the performance of learning by avoiding much expensive data-labeling efforts. In recent years, transfer learning has emerged as a new learning framework to address this problem. This survey focuses on categorizing and reviewing the current progress on transfer learning for classification, regression, and clustering problems. In this survey, we discuss the relationship between transfer learning and other related machine learning techniques such as domain adaptation, multitask learning and sample selection bias, as well as covariate shift. We also explore some potential future issues in transfer learning research.", "title": "" }, { "docid": "4e2fbac1742c7afe9136e274150d6ee9", "text": "Recently, knowledge graph embedding, which projects symbolic entities and relations into continuous vector space, has become a new, hot topic in artificial intelligence. This paper addresses a new issue of multiple relation semantics that a relation may have multiple meanings revealed by the entity pairs associated with the corresponding triples, and proposes a novel generative model for embedding, TransG. The new model can discover latent semantics for a relation and leverage a mixture of relation-specific component vectors to embed a fact triple. To the best of our knowledge, this is the first generative model for knowledge graph embedding, which is able to deal with multiple relation semantics. Extensive experiments show that the proposed model achieves substantial improvements against the state-of-the-art baselines.", "title": "" } ]
[ { "docid": "4236e1b86150a9557b518b789418f048", "text": "Sleep stage classification constitutes an important preliminary exam in the diagnosis of sleep disorders. It is traditionally performed by a sleep expert who assigns to each 30 s of the signal of a sleep stage, based on the visual inspection of signals such as electroencephalograms (EEGs), electrooculograms (EOGs), electrocardiograms, and electromyograms (EMGs). We introduce here the first deep learning approach for sleep stage classification that learns end-to-end without computing spectrograms or extracting handcrafted features, that exploits all multivariate and multimodal polysomnography (PSG) signals (EEG, EMG, and EOG), and that can exploit the temporal context of each 30-s window of data. For each modality, the first layer learns linear spatial filters that exploit the array of sensors to increase the signal-to-noise ratio, and the last layer feeds the learnt representation to a softmax classifier. Our model is compared to alternative automatic approaches based on convolutional networks or decisions trees. Results obtained on 61 publicly available PSG records with up to 20 EEG channels demonstrate that our network architecture yields the state-of-the-art performance. Our study reveals a number of insights on the spatiotemporal distribution of the signal of interest: a good tradeoff for optimal classification performance measured with balanced accuracy is to use 6 EEG with 2 EOG (left and right) and 3 EMG chin channels. Also exploiting 1 min of data before and after each data segment offers the strongest improvement when a limited number of channels are available. As sleep experts, our system exploits the multivariate and multimodal nature of PSG signals in order to deliver the state-of-the-art classification performance with a small computational cost.", "title": "" }, { "docid": "94ea3cbf3df14d2d8e3583cb4714c13f", "text": "The emergence of computers as an essential tool in scientific research has shaken the very foundations of differential modeling. Indeed, the deeply-rooted abstraction of smoothness, or differentiability, seems to inherently clash with a computer's ability of storing only finite sets of numbers. While there has been a series of computational techniques that proposed discretizations of differential equations, the geometric structures they are supposed to simulate are often lost in the process.", "title": "" }, { "docid": "9869bc5dfc8f20b50608f0d68f7e49ba", "text": "Automated discovery of early visual concepts from raw image data is a major open challenge in AI research. Addressing this problem, we propose an unsupervised approach for learning disentangled representations of the underlying factors of variation. We draw inspiration from neuroscience, and show how this can be achieved in an unsupervised generative model by applying the same learning pressures as have been suggested to act in the ventral visual stream in the brain. By enforcing redundancy reduction, encouraging statistical independence, and exposure to data with transform continuities analogous to those to which human infants are exposed, we obtain a variational autoencoder (VAE) framework capable of learning disentangled factors. Our approach makes few assumptions and works well across a wide variety of datasets. Furthermore, our solution has useful emergent properties, such as zero-shot inference and an intuitive understanding of “objectness”.", "title": "" }, { "docid": "e645deb8bfd17dd8ef657ef0a0e0e960", "text": "HR Tool Employee engagement refers to the level of commitment workers make to their employer, seen in their willingness to stay at the firm and to go beyond the call of duty.1 Firms want employees that are highly motivated and feel they have a real stake in the company’s success. Such employees are willing to finish tasks in their own time and see a strong link between the firm’s success and their own career prospects. In short, motivated, empowered employees work hand in hand with employers in an atmosphere of mutual trust. Companies with engaged workforces have also reported less absenteeism, more engagement with customers, greater employee satisfaction, less mistakes, fewer employees leaving, and naturally higher profits. Such is the power of this concept that former Secretary of State for Business, Peter Mandelson, commissioned David McLeod and Nita Clarke to investigate how much UK competitiveness could be enhanced by wider use of employee engagement. David and Nita concluded that in a world where work tasks have become increasingly similar, engaged employees could give some companies the edge over their rivals. They also identified significant barriers to engagement such as a lack of appreciation for the concept of employee engagement by some companies and managers. Full participation by line managers is particularly crucial. From the employee point of view, it is easy to view engagement as a management fad, particularly if the company fails to demonstrate the necessary commitment. Some also feel that in a recession, employee engagement becomes less of a priority when in Performance Management and Appraisal 8 CHATE R", "title": "" }, { "docid": "2fad2d005416a59ba2d876a297cc5215", "text": "Executive approaches to creativity emphasize that generating creative ideas can be hard and requires mental effort. Few studies, however, have examined effort-related physiological activity during creativity tasks. Using motivational intensity theory as a framework, we examined predictors of effort-related cardiac activity during a creative challenge. A sample of 111 adults completed a divergent thinking task. Sympathetic (PEP and RZ) and parasympathetic (RSA and RMSSD) outcomes were assessed using impedance cardiography. As predicted, people with high creative achievement (measured with the Creative Achievement Questionnaire) showed significantly greater increases in sympathetic activity from baseline to task, reflecting higher effort. People with more creative achievements generated ideas that were significantly more creative, and creative performance correlated marginally with PEP and RZ. The results support the view that creative thought can be a mental challenge.", "title": "" }, { "docid": "d3997f030d5d7287a4c6557681dc7a46", "text": "This paper presents the first use of a computational model of natural logic—a system of logical inference which operates over natural language—for textual inference. Most current approaches to the PASCAL RTE textual inference task achieve robustness by sacrificing semantic precision; while broadly effective, they are easily confounded by ubiquitous inferences involving monotonicity. At the other extreme, systems which rely on first-order logic and theorem proving are precise, but excessively brittle. This work aims at a middle way. Our system finds a low-cost edit sequence which transforms the premise into the hypothesis; learns to classify entailment relations across atomic edits; and composes atomic entailments into a top-level entailment judgment. We provide the first reported results for any system on the FraCaS test suite. We also evaluate on RTE3 data, and show that hybridizing an existing RTE system with our natural logic system yields significant performance gains.", "title": "" }, { "docid": "254b380eacf71429dd1d4d6589c69262", "text": "Big data technology offers unprecedented opportunities to society as a whole and also to its individual members. At the same time, this technology poses significant risks to those it overlooks. In this article, we give an overview of recent technical work on diversity, particularly in selection tasks, discuss connections between diversity and fairness, and identify promising directions for future work that will position diversity as an important component of a data-responsible society. We argue that diversity should come to the forefront of our discourse, for reasons that are both ethical-to mitigate the risks of exclusion-and utilitarian, to enable more powerful, accurate, and engaging data analysis and use.", "title": "" }, { "docid": "e984ca3539c2ea097885771e52bdc131", "text": "This study proposes and tests a novel theoretical mechanism to explain increased selfdisclosure intimacy in text-based computer-mediated communication (CMC) versus face-to-face (FtF) interactions. On the basis of joint effects of perception intensification processes in CMC and the disclosure reciprocity norm, the authors predict a perceptionbehavior intensification effect, according to which people perceive partners’ initial disclosures as more intimate in CMC than FtF and, consequently, reciprocate with more intimate disclosures of their own. An experiment compares disclosure reciprocity in textbased CMC and FtF conversations, in which participants interacted with a confederate who made either intimate or nonintimate disclosures across the two communication media. The utterances generated by the participants are coded for disclosure frequency and intimacy. Consistent with the proposed perception-behavior intensification effect, CMC participants perceive the confederate’s disclosures as more intimate, and, importantly, reciprocate with more intimate disclosures than FtF participants do.", "title": "" }, { "docid": "7bef5a19f6d8f71d4aa12194dd02d0c4", "text": "To build a natural sounding speech synthesis system, it is essential that the text processing component produce an appropriate sequence of phonemic units corresponding to an arbitrary input text. In this paper we discuss our efforts in addressing the issues of Font-to-Akshara mapping, pronunciation rules for Aksharas, text normalization in the context of building text-to-speech systems in Indian languages.", "title": "" }, { "docid": "551f1dca9718125b385794d8e12f3340", "text": "Social media provides increasing opportunities for users to voluntarily share their thoughts and concerns in a large volume of data. While user-generated data from each individual may not provide considerable information, when combined, they include hidden variables, which may convey significant events. In this paper, we pursue the question of whether social media context can provide socio-behavior \"signals\" for crime prediction. The hypothesis is that crowd publicly available data in social media, in particular Twitter, may include predictive variables, which can indicate the changes in crime rates. We developed a model for crime trend prediction where the objective is to employ Twitter content to identify whether crime rates have dropped or increased for the prospective time frame. We also present a Twitter sampling model to collect historical data to avoid missing data over time. The prediction model was evaluated for different cities in the United States. The experiments revealed the correlation between features extracted from the content and crime rate directions. Overall, the study provides insight into the correlation of social content and crime trends as well as the impact of social data in providing predictive indicators.", "title": "" }, { "docid": "4725347f7d04e1ca052ee2b963dd140f", "text": "Classically, the procedure for reverse engineering binary code is to use a disassembler and to manually reconstruct the logic of the original program. Unfortunately, this is not always practical as obfuscation can make the binary extremely large by overcomplicating the program logic or adding bogus code. We present a novel approach, based on extracting semantic information by analyzing the behavior of the execution of a program. As obfuscation consists in manipulating the program while keeping its functionality, we argue that there are some characteristics of the execution that are strictly correlated with the underlying logic of the code and are invariant after applying obfuscation. We aim at highlighting these patterns, by introducing different techniques for processing memory and execution traces. Our goal is to identify interesting portions of the traces by finding patterns that depend on the original semantics of the program. Using this approach the high-level information about the business logic is revealed and the amount of binary code to be analyze is considerable reduced. For testing and simulations we used obfuscated code of cryptographic algorithms, as our focus are DRM system and mobile banking applications. We argue however that the methods presented in this work are generic and apply to other domains were obfuscated code is used.", "title": "" }, { "docid": "2eaebb640d4b4cd74cb548dd209e06a8", "text": "Deep learning models have gained great success in many real-world applications. However, most existing networks are typically designed in heuristic manners, thus lack of rigorous mathematical principles and derivations. Several recent studies build deep structures by unrolling a particular optimization model that involves task information. Unfortunately, due to the dynamic nature of network parameters, their resultant deep propagation networks do not possess the nice convergence property as the original optimization scheme does. This paper provides a novel proximal unrolling framework to establish deep models by integrating experimentally verified network architectures and rich cues of the tasks. More importantly, we prove in theory that 1) the propagation generated by our unrolled deep model globally converges to a critical-point of a given variational energy, and 2) the proposed framework is still able to learn priors from training data to generate a convergent propagation even when task information is only partially available. Indeed, these theoretical results are the best we can ask for, unless stronger assumptions are enforced. Extensive experiments on various real-world applications verify the theoretical convergence and demonstrate the effectiveness of designed deep models.", "title": "" }, { "docid": "2ee8910adbdff2111d64b9a06242050f", "text": "Current technologies to allow continuous monitoring of vital signs in pre-term infants in the hospital require adhesive electrodes or sensors to be in direct contact with the patient. These can cause stress, pain, and also damage the fragile skin of the infants. It has been established previously that the colour and volume changes in superficial blood vessels during the cardiac cycle can be measured using a digital video camera and ambient light, making it possible to obtain estimates of heart rate or breathing rate. Most of the papers in the literature on non-contact vital sign monitoring report results on adult healthy human volunteers in controlled environments for short periods of time. The authors' current clinical study involves the continuous monitoring of pre-term infants, for at least four consecutive days each, in the high-dependency care area of the Neonatal Intensive Care Unit (NICU) at the John Radcliffe Hospital in Oxford. The authors have further developed their video-based, non-contact monitoring methods to obtain continuous estimates of heart rate, respiratory rate and oxygen saturation for infants nursed in incubators. In this Letter, it is shown that continuous estimates of these three parameters can be computed with an accuracy which is clinically useful. During stable sections with minimal infant motion, the mean absolute error between the camera-derived estimates of heart rate and the reference value derived from the ECG is similar to the mean absolute error between the ECG-derived value and the heart rate value from a pulse oximeter. Continuous non-contact vital sign monitoring in the NICU using ambient light is feasible, and the authors have shown that clinically important events such as a bradycardia accompanied by a major desaturation can be identified with their algorithms for processing the video signal.", "title": "" }, { "docid": "0ed5f426be75ebcc85da0c1ab0c1ad65", "text": "The impact of global air pollution on climate and the environment is a new focus in atmospheric science. Intercontinental transport and hemispheric air pollution by ozone jeopardize agricultural and natural ecosystems worldwide and have a strong effect on climate. Aerosols, which are spread globally but have a strong regional imbalance, change global climate through their direct and indirect effects on radiative forcing. In the 1990s, nitrogen oxide emissions from Asia surpassed those from North America and Europe and should continue to exceed them for decades. International initiatives to mitigate global air pollution require participation from both developed and developing countries.", "title": "" }, { "docid": "cc2fd3848c4e035c1d7176abd93fba10", "text": "Cloud computing data enters dynamically provide millions of virtual machines (VMs) in actual cloud markets. In this context, Virtual Machine Placement (VMP) is one of the most challenging problems in cloud infrastructure management, considering the large number of possible optimization criteria and different formulations that could be studied. VMP literature include relevant research topics such as energy efficiency, Service Level Agreement (SLA), Quality of Service (QoS), cloud service pricing schemes and carbon dioxide emissions, all of them with high economical and ecological impact. This work classifies an extensive up-to-date survey of the most relevant VMP literature proposing a novel taxonomy in order to identify research opportunities and define a general vision on this research area.", "title": "" }, { "docid": "65b64f338b0126151a5e8dbcd4a9cf33", "text": "This free executive summary is provided by the National Academies as part of our mission to educate the world on issues of science, engineering, and health. If you are interested in reading the full book, please visit us online at http://www.nap.edu/catalog/9728.html . You may browse and search the full, authoritative version for free; you may also purchase a print or electronic version of the book. If you have questions or just want more information about the books published by the National Academies Press, please contact our customer service department toll-free at 888-624-8373.", "title": "" }, { "docid": "2e976aa51bc5550ad14083d5df7252a8", "text": "This paper presents a 60-dB gain bulk-driven Miller OTA operating at 0.25-V power supply in the 130-nm digital CMOS process. The amplifier operates in the weak-inversion region with input bulk-driven differential pair sporting positive feedback source degeneration for transconductance enhancement. In addition, the distributed layout configuration is used for all the transistors to mitigate the effect of halo implants for higher output impedance. Combining these two approaches, we experimentally demonstrate a high gain of over 60-dB with just 18-nW power consumption from 0.25-V power supply. The use of enhanced bulk-driven differential pair and distributed layout can help overcome some of the constraints imposed by nanometer CMOS process for high performance analog circuits in weak inversion region.", "title": "" }, { "docid": "5ae157937813e060a72ecb918d4dc5d1", "text": "Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud protection, target marketing, network intrusion detection, etc. Conventional knowledge discovery tools are facing two challenges, the overwhelming volume of the streaming data, and the concept drifts. In this paper, we propose a general framework for mining concept-drifting data streams using weighted ensemble classifiers. We train an ensemble of classification models, such as C4.5, RIPPER, naive Beyesian, etc., from sequential chunks of the data stream. The classifiers in the ensemble are judiciously weighted based on their expected classification accuracy on the test data under the time-evolving environment. Thus, the ensemble approach improves both the efficiency in learning the model and the accuracy in performing classification. Our empirical study shows that the proposed methods have substantial advantage over single-classifier approaches in prediction accuracy, and the ensemble framework is effective for a variety of classification models.", "title": "" }, { "docid": "88a2ed90fc39a4ad083aff9fabcf2bc6", "text": "This two-part article provides an overview of the global burden of atherothrombotic cardiovascular disease. Part I initially discusses the epidemiological transition which has resulted in a decrease in deaths in childhood due to infections, with a concomitant increase in cardiovascular and other chronic diseases; and then provides estimates of the burden of cardiovascular (CV) diseases with specific focus on the developing countries. Next, we summarize key information on risk factors for cardiovascular disease (CVD) and indicate that their importance may have been underestimated. Then, we describe overarching factors influencing variations in CVD by ethnicity and region and the influence of urbanization. Part II of this article describes the burden of CV disease by specific region or ethnic group, the risk factors of importance, and possible strategies for prevention.", "title": "" }, { "docid": "e56af4a3a8fbef80493d77b441ee1970", "text": "A new, systematic, simplified design procedure for quasi-Yagi antennas is presented. The design is based on the simple impedance matching among antenna components: i.e., transition, feed, and antenna. This new antenna design is possible due to the newly developed ultra-wideband transition. As design examples, wideband quasi- Yagi antennas are successfully designed and implemented in Ku- and Ka-bands with frequency bandwidths of 53.2% and 29.1%, and antenna gains of 4-5 dBi and 5.2-5.8 dBi, respectively. The design method can be applied to other balanced antennas and their arrays.", "title": "" } ]
scidocsrr
30c84ddbfcd91cf01f3da6474043f8e0
The Chaos Within Sudoku
[ { "docid": "7b170913f315cf5f240958ffbde6697e", "text": "We show that single-digit “Nishio” subproblems in n×n Sudoku puzzles may be solved in time o(2n), faster than previous solutions such as the pattern overlay method. We also show that single-digit deduction in Sudoku is NP-hard.", "title": "" }, { "docid": "0abc7402f2e9a51be82c4ceea9f9ec02", "text": "It's one of the fundamental mathematical problems of our time, and its importance grows with the rise of powerful computers.", "title": "" } ]
[ { "docid": "21af4ea62f07966097c8ab46f7226907", "text": "With the introduction of Microsoft Kinect, there has been considerable interest in creating various attractive and feasible applications in related research fields. Kinect simultaneously captures the depth and color information and provides real-time reliable 3D full-body human-pose reconstruction that essentially turns the human body into a controller. This article presents a finger-writing system that recognizes characters written in the air without the need for an extra handheld device. This application adaptively merges depth, skin, and background models for the hand segmentation to overcome the limitations of the individual models, such as hand-face overlapping problems and the depth-color nonsynchronization. The writing fingertip is detected by a new real-time dual-mode switching method. The recognition accuracy rate is greater than 90 percent for the first five candidates of Chinese characters, English characters, and numbers.", "title": "" }, { "docid": "81f504c4e378d0952231565d3ba4c555", "text": "The alignment problem—establishing links between corresponding phrases in two related sentences—is as important in natural language inference (NLI) as it is in machine translation (MT). But the tools and techniques of MT alignment do not readily transfer to NLI, where one cannot assume semantic equivalence, and for which large volumes of bitext are lacking. We present a new NLI aligner, the MANLI system, designed to address these challenges. It uses a phrase-based alignment representation, exploits external lexical resources, and capitalizes on a new set of supervised training data. We compare the performance of MANLI to existing NLI and MT aligners on an NLI alignment task over the well-known Recognizing Textual Entailment data. We show that MANLI significantly outperforms existing aligners, achieving gains of 6.2% in F1 over a representative NLI aligner and 10.5% over GIZA++.", "title": "" }, { "docid": "ad8c9bc6a3b661eaea101653b4119123", "text": "In three experiments, we studied the influence of foreign language knowledge on native language performance in an exclusively native language context. Trilinguals with Dutch as their native and dominant language (L1), English as their second language (L2), and French as their third language (L3) performed a word association task (Experiment 1) or a lexical decision task (Experiments 2 and 3) in L1. The L1 stimulus words were cognates with their translations in English, cognates with their translations in French, or were noncognates. In Experiments 1 and 2 with trilinguals who were highly proficient in English and relatively low in proficiency in French, we observed shorter word association and lexical decision times to the L1 words that were cognates with English than to the noncognates. In these relatively low-proficiency French speakers, response times (RTs) for the L1 words that were cognates with French did not differ from those for the noncognates. In Experiment 3, we tested Dutch-English-French trilinguals with a higher level of fluency in French (i.e., equally fluent in English and in French). We now observed faster responses on the L1 words that were cognates with French than on the noncognates. Lexical decision times to the cognates with English were also shorter than those to then oncognates. The results indicate that words presented in the dominant language, to naive participants, activate information in the nontarget, and weaker, language in parallel, implying that the multilinguals' processing system is profoundly nonselective with respect to language. A minimal level of nontarget language fluency seems to be required, however, before any weaker language effects become noticeable in L1 processing.", "title": "" }, { "docid": "2ac52b10bc1ea9e69bb20b05f449d398", "text": "The application of game elements a in non-gaming context offers a great potential regarding the engagement of senior citizens with information systems. In this paper, we suggest the application of gamification to routine tasks and leisure activities, namely physical and cognitive therapy, the gamification of real-life activities which are no longer accessible due to age-related changes and the application of game design elements to foster social interaction. Furthermore, we point out important chances and challenges such as the lack of gaming experience among the target audience and highlight possible areas for future work which offer valuable design opportunities for frail elderly audiences.", "title": "" }, { "docid": "4c1da8d356e4f793d76f79d4270ecbd0", "text": "As the proportion of the ageing population in industrialized countries continues to increase, the dermatological concerns of the aged grow in medical importance. Intrinsic structural changes occur as a natural consequence of ageing and are genetically determined. The rate of ageing is significantly different among different populations, as well as among different anatomical sites even within a single individual. The intrinsic rate of skin ageing in any individual can also be dramatically influenced by personal and environmental factors, particularly the amount of exposure to ultraviolet light. Photodamage, which considerably accelerates the visible ageing of skin, also greatly increases the risk of cutaneous neoplasms. As the population ages, dermatological focus must shift from ameliorating the cosmetic consequences of skin ageing to decreasing the genuine morbidity associated with problems of the ageing skin. A better understanding of both the intrinsic and extrinsic influences on the ageing of the skin, as well as distinguishing the retractable aspects of cutaneous ageing (primarily hormonal and lifestyle influences) from the irretractable (primarily intrinsic ageing), is crucial to this endeavour.", "title": "" }, { "docid": "5357d90787090ec822d0b540d09b6c6b", "text": "Providing accurate attendance marking system in real-time is challenging. It is tough to mark the attendance of a student in the large classroom when there are many students attending the class. Many attendance management systems have been implemented in the recent research. However, the attendance management system based on facial recognition still has issues. Thus many research have been conducted to improve system. This paper reviewed the previous works on attendance management system based on facial recognition. This article does not only provide the literature review on the earlier work or related work, but it also provides the deep analysis of Principal Component Analysis, discussion, suggestions for future work.", "title": "" }, { "docid": "28f9a2b2f6f4e90de20c6af78727b131", "text": "The detection and potential removal of duplicates is desirable for a number of reasons, such as to reduce the need for unnecessary storage and computation, and to provide users with uncluttered search results. This paper describes an investigation into the application of scalable simhash and shingle state of the art duplicate detection algorithms for detecting near duplicate documents in the CiteSeerX digital library. We empirically explored the duplicate detection methods and evaluated their performance and application to academic documents and identified good parameters for the algorithms. We also analyzed the types of near duplicates identified by each algorithm. The highest F-scores achieved were 0.91 and 0.99 for the simhash and shingle-based methods respectively. The shingle-based method also identified a larger variety of duplicate types than the simhash-based method.", "title": "" }, { "docid": "af05ec4998302687aae09cc1d5ad4ccd", "text": "The development of wireless portable electronics is moving towards smaller and lighter devices. Although low noise amplifier (LNA) performance is extremely good nowadays, the design engineer still has to make some complex system trades. Many LNA are large, heavy and consume a lot of power. The design of an LNA in radio frequency (RF) circuits requires the trade-off of many important characteristics, such as gain, noise figure (NF), stability, power consumption and complexity. This situation forces designers to make choices in the design of RF circuits. The designed simulation process is done using the Advance Design System (ADS), while FR4 strip board is used for fabrication purposes. A single stage LNA has successfully designed with 7.78 dB forward gain and 1.53 dB noise figure; it is stable along the UNII frequency band.", "title": "" }, { "docid": "83e4ee7cf7a82fcb8cb77f7865d67aa8", "text": "A meta-analysis of the relationship between class attendance in college and college grades reveals that attendance has strong relationships with both class grades (k = 69, N = 21,195, r = .44) and GPA (k = 33, N = 9,243, r = .41). These relationships make class attendance a better predictor of college grades than any other known predictor of academic performance, including scores on standardized admissions tests such as the SAT, high school GPA, study habits, and study skills. Results also show that class attendance explains large amounts of unique variance in college grades because of its relative independence from SAT scores and high school GPA and weak relationship with student characteristics such as conscientiousness and motivation. Mandatory attendance policies appear to have a small positive impact on average grades (k = 3, N = 1,421, d = .21). Implications for theoretical frameworks of student academic performance and educational policy are discussed. Many college instructors exhort their students to attend class as frequently as possible, arguing that high levels of class attendance are likely to increase learning and improve student grades. Such arguments may hold intuitive appeal and are supported by findings linking class attendance to both learning (e.g., Jenne, 1973) and better grades (e.g., Moore et al., 2003), but both students and some educational researchers appear to be somewhat skeptical of the importance of class attendance. This skepticism is reflected in high class absenteeism rates ranging from 18. This article aims to help resolve the debate regarding the importance of class attendance by providing a quantitative review of the literature investigating the relationship of class attendance with both college grades and student characteristics that may influence attendance. 273 At a theoretical level class attendance fits well into frameworks that emphasize the joint role of cognitive ability and motivation in determining learning and work performance (e.g., Kanfer & Ackerman, 1989). Specifically, cognitive ability and motivation influence academic outcomes via two largely distinct mechanisms— one mechanism related to information processing and the other mechanism being behavioral in nature. Cognitive ability influences the degree to which students are able to process, integrate, and remember material presented to them (Humphreys, 1979), a mechanism that explains the substantial predictive validity of SAT scores for college grades (e. & Ervin, 2000). Noncognitive attributes such as conscientiousness and achievement motivation are thought to influence grades via their influence on behaviors that facilitate the understanding and …", "title": "" }, { "docid": "74eb6322d674dec026dc366fbde490bf", "text": "The purpose of this investigation was to assess the effects of stance width and foot rotation angle on three-dimensional knee joint moments during bodyweight squat performance. Twenty-eight participants performed 8 repetitions in 4 conditions differing in stance or foot rotation positions. Knee joint moment waveforms were subjected to principal component analysis. Results indicated that increasing stance width resulted in a larger knee flexion moment magnitude, as well as larger and phase-shifted adduction moment waveforms. The knee's internal rotation moment magnitude was significantly reduced with external foot rotation only under the wide stance condition. Moreover, squat performance with a wide stance and externally rotated feet resulted in a flattening of the internal rotation moment waveform during the middle portion of the movement. However, it is speculated that the differences observed across conditions are not of clinical relevance for young, healthy participants.", "title": "" }, { "docid": "ddae88fd5b053c338be337fd4a228f80", "text": "The semiology of graphics diagrams networks maps that we provide for you will be ultimate to give preference. This reading book is your chosen book to accompany you when in your free time, in your lonely. This kind of book can help you to heal the lonely and get or add the inspirations to be more inoperative. Yeah, book as the widow of the world can be very inspiring manners. As here, this book is also created by an inspiring author that can make influences of you to do more.", "title": "" }, { "docid": "32378690ded8920eb81689fea1ac8c23", "text": "OBJECTIVE\nTo investigate the effect of Beri-honey-impregnated dressing on diabetic foot ulcer and compare it with normal saline dressing.\n\n\nSTUDY DESIGN\nA randomized, controlled trial.\n\n\nPLACE AND DURATION OF STUDY\nSughra Shafi Medical Complex, Narowal, Pakistan and Bhatti International Trust (BIT) Hospital, Affiliated with Central Park Medical College, Lahore, from February 2006 to February 2010.\n\n\nMETHODOLOGY\nPatients with Wagner's grade 1 and 2 ulcers were enrolled. Those patients were divided in two groups; group A (n=179) treated with honey dressing and group B (n=169) treated with normal saline dressing. Outcome measures were calculated in terms of proportion of wounds completely healed (primary outcome), wound healing time, and deterioration of wounds. Patients were followed-up for a maximum of 120 days.\n\n\nRESULTS\nOne hundred and thirty six wounds (75.97%) out of 179 were completely healed with honey dressing and 97 (57.39%) out of 169 wtih saline dressing (p=0.001). The median wound healing time was 18.00 (6 - 120) days (Median with IQR) in group A and 29.00 (7 - 120) days (Median with IQR) in group B (p < 0.001).\n\n\nCONCLUSION\nThe present results showed that honey is an effective dressing agent instead of conventional dressings, in treating patients of diabetic foot ulcer.", "title": "" }, { "docid": "39e7f2015b1f2df4017a4dd0fa4e0012", "text": "The large variety of architectural dimensions in automotive electronics design, for example, bus protocols, number of nodes, sensors and actuators interconnections and power distribution topologies, makes architecture design task a very complex but crucial design step especially for OEMs. This situation motivates the need for a design environment that accommodates the integration of a variety of models in a manner that enables the exploration of design alternatives in an efficient and seamless fashion. Exploring these design alternatives in a virtual environment and evaluating them with respect to metrics such as cost, latency, flexibility and reliability provide an important competitive advantage to OEMs and help minimize integration risks later in the design cycle. In particular, the choice of the degree of decentralization of the architecture has become a crucial issue in automotive electronics. In this paper, we demonstrate how a rigorous methodology (platform-based design) and the Metropolis framework can be used to find the balance between centralized and decentralized architectures", "title": "" }, { "docid": "81765da7a2d708e8f607255e465259de", "text": "Feature-based product modeling is the leading approach for the integrated representation of engineering product data. On the one side, this approach has stimulated the development of formal models and vocabularies, data standards and computational ontologies. On the other side, the current ways to model features is considered problematic since it lacks a principled and uniform methodology for feature representation. This paper reviews the state of art of feature-based modeling approaches by concentrating on how features are conceptualised. It points out the drawbacks of current approaches and proposes an high-level ontology-based perspective to harmonize the definition of feature.", "title": "" }, { "docid": "6936462dee2424b92c7476faed5b5a23", "text": "A significant challenge in scene text detection is the large variation in text sizes. In particular, small text are usually hard to detect. This paper presents an accurate oriented text detector based on Faster R-CNN. We observe that Faster R-CNN is suitable for general object detection but inadequate for scene text detection due to the large variation in text size. We apply feature fusion both in RPN and Fast R-CNN to alleviate this problem and furthermore, enhance model's ability to detect relatively small text. Our text detector achieves comparable results to those state of the art methods on ICDAR 2015 and MSRA-TD500, showing its advantage and applicability.", "title": "" }, { "docid": "933e51f6d297ecb1393688f4165079e1", "text": "Image clustering is one of the challenging tasks in machine learning, and has been extensively used in various applications. Recently, various deep clustering methods has been proposed. These methods take a two-stage approach, feature learning and clustering, sequentially or jointly. We observe that these works usually focus on the combination of reconstruction loss and clustering loss, relatively little work has focused on improving the learning representation of the neural network for clustering. In this paper, we propose a deep convolutional embedded clustering algorithm with inception-like block (DCECI). Specifically, an inception-like block with different type of convolution filters are introduced in the symmetric deep convolutional network to preserve the local structure of convolution layers. We simultaneously minimize the reconstruction loss of the convolutional autoencoders with inception-like block and the clustering loss. Experimental results on multiple image datasets exhibit the promising performance of our proposed algorithm compared with other competitive methods.", "title": "" }, { "docid": "400be1fdbd0f1aebfb0da220fd62e522", "text": "Understanding users' interactions with highly subjective content---like artistic images---is challenging due to the complex semantics that guide our preferences. On the one hand one has to overcome `standard' recommender systems challenges, such as dealing with large, sparse, and long-tailed datasets. On the other, several new challenges present themselves, such as the need to model content in terms of its visual appearance, or even social dynamics, such as a preference toward a particular artist that is independent of the art they create. In this paper we build large-scale recommender systems to model the dynamics of a vibrant digital art community, Behance, consisting of tens of millions of interactions (clicks and 'appreciates') of users toward digital art. Methodologically, our main contributions are to model (a) rich content, especially in terms of its visual appearance; (b) temporal dynamics, in terms of how users prefer 'visually consistent' content within and across sessions; and (c) social dynamics, in terms of how users exhibit preferences both towards certain art styles, as well as the artists themselves.", "title": "" }, { "docid": "981e88bd1f4187972f8a3d04960dd2dd", "text": "The purpose of this study is to examine the appropriateness and effectiveness of the assistive use of robot projector based augmented reality (AR) to children’s dramatic activity. A system that employ a mobile robot mounted with a projector-camera is used to help manage children’s dramatic activity by projecting backdrops and creating a synthetic video imagery, where e.g. children’s faces is replaced with graphic characters. In this Delphi based study, a panel consist of 33 professionals include 11children education experts (college professors majoring in early childhood education), children field educators (kindergarten teachers and principals), and 11 AR and robot technology experts. The experts view the excerpts from the video taken from the actual usage situation. In the first stage of survey, we collect the panel's perspectives on applying the latest new technologies for instructing dramatic activity to children using an open ended questionnaire. Based on the results of the preliminary survey, the subsequent questionnaires (with 5 point Likert scales) are developed for the second and third in-depth surveys. In the second survey, 36 questions is categorized into 5 areas: (1) developmental and educational values, (2) impact on the teacher's role, (3) applicability and special considerations in the kindergarten, (4) external environment and required support, and (5) criteria for the selection of the story in the drama activity. The third survey mainly investigate how AR or robots can be of use in children’s dramatic activity in other ways (than as originally given) and to other educational domains. The surveys show that experts most appreciated the use of AR and robot for positive educational and developmental effects due to the children’s keen interests and in turn enhanced immersion into the dramatic activity. Consequently, the experts recommended that proper stories, scenes and technological realizations need to be selected carefully, in the light of children’s development, while lever aging on strengths of the technologies used.", "title": "" }, { "docid": "fc4fe91aab968227cf718e7a83393d4e", "text": "People may look dramatically different by changing their hair color, hair style, when they grow older, in a different era style, or a different country or occupation. Some of those may transfigure appearance and inspire creative changes, some not, but how would we know without physically trying? We present a system that enables automatic synthesis of limitless numbers of appearances. A user inputs one or more photos (as many as they like) of his or her face, text queries an appearance of interest (just like they'd search an image search engine) and gets as output the input person in the queried appearance. Rather than fixing the number of queries or a dataset our system utilizes all the relevant and searchable images on the Internet, estimates a doppelgänger set for the inputs, and utilizes it to generate composites. We present a large number of examples on photos taken with completely unconstrained imaging conditions.", "title": "" }, { "docid": "f0500185d2d3b1daa8ea436cd37f19a6", "text": "Previous studies have shown that low-intensity resistance training with restricted muscular venous blood flow (Kaatsu) causes muscle hypertrophy and strength gain. To investigate the effects of daily physical activity combined with Kaatsu, we examined the acute and chronic effects of walk training with and without Kaatsu on MRI-measured muscle size and maximum dynamic (one repetition maximum) and isometric strength, along with blood hormonal parameters. Nine men performed Kaatsu-walk training, and nine men performed walk training alone (control-walk). Training was conducted two times a day, 6 days/wk, for 3 wk using five sets of 2-min bouts (treadmill speed at 50 m/min), with a 1-min rest between bouts. Mean oxygen uptake during Kaatsu-walk and control-walk exercise was 19.5 (SD 3.6) and 17.2 % (SD 3.1) of treadmill-determined maximum oxygen uptake, respectively. Serum growth hormone was elevated (P < 0.01) after acute Kaatsu-walk exercise but not in control-walk exercise. MRI-measured thigh muscle cross-sectional area and muscle volume increased by 4-7%, and one repetition maximum and maximum isometric strength increased by 8-10% in the Kaatsu-walk group. There was no change in muscle size and dynamic and isometric strength in the control-walk group. Indicators of muscle damage (creatine kinase and myoglobin) and resting anabolic hormones did not change in both groups. The results suggest that the combination of leg muscle blood flow restriction with slow-walk training induces muscle hypertrophy and strength gain, despite the minimal level of exercise intensity. Kaatsu-walk training may be a potentially useful method for promoting muscle hypertrophy, covering a wide range of the population, including the frail and elderly.", "title": "" } ]
scidocsrr
131fc6f7c981d79a9cfd38ee25c56041
Exploiting Context for Rumour Detection in Social Media
[ { "docid": "e4dd72a52d4961f8d4d8ee9b5b40d821", "text": "Social media users spend several hours a day to read, post and search for news on microblogging platforms. Social media is becoming a key means for discovering news. However, verifying the trustworthiness of this information is becoming even more challenging. In this study, we attempt to address the problem of rumor detection and belief investigation on Twitter. Our definition of rumor is an unverifiable statement, which spreads misinformation or disinformation. We adopt a supervised rumors classification task using the standard dataset. By employing the Tweet Latent Vector (TLV) feature, which creates a 100-d vector representative of each tweet, we increased the rumor retrieval task precision up to 0.972. We also introduce the belief score and study the belief change among the rumor posters between 2010 and 2016.", "title": "" }, { "docid": "91f5c7b130a7eadef8df1b596cda1eaf", "text": "It is well-established that within crisis-related communications, rumors are likely to emerge. False rumors, i.e. misinformation, can be detrimental to crisis communication and response; it is therefore important not only to be able to identify messages that propagate rumors, but also corrections or denials of rumor content. In this work, we explore the task of automatically classifying rumor stances expressed in crisisrelated content posted on social media. Utilizing a dataset of over 4,300 manually coded tweets, we build a supervised machine learning model for this task, achieving an accuracy over 88% across a diverse set of rumors of different types.", "title": "" } ]
[ { "docid": "55fcc765be689166b0a44eef1a8f26b6", "text": "A key goal of computer vision researchers is to create automated face recognition systems that can equal, and eventually surpass, human performance. To this end, it is imperative that computational researchers know of the key findings from experimental studies of face recognition by humans. These findings provide insights into the nature of cues that the human visual system relies upon for achieving its impressive performance and serve as the building blocks for efforts to artificially emulate these abilities. In this paper, we present what we believe are 19 basic results, with implications for the design of computational systems. Each result is described briefly and appropriate pointers are provided to permit an in-depth study of any particular result", "title": "" }, { "docid": "b1f29f32ecc6aa2404cad271427675f2", "text": "RATIONALE\nAnti-N-methyl-D-aspartate (NMDA) receptor encephalitis is an autoimmune disorder that can be controlled and reversed by immunotherapy. The presentation of NMDA receptor encephalitis varies, but NMDA receptor encephalitis is seldom reported in patients with both bilateral teratomas and preexisting brain injury.\n\n\nPATIENT CONCERNS\nA 28-year-old female with a history of traumatic intracranial hemorrhage presented acute psychosis, seizure, involuntary movement, and conscious disturbance with a fulminant course. Anti-NMDA receptor antibody was identified in both serum and cerebrospinal fluid, confirming the diagnosis of anti-NMDA receptor encephalitis. Bilateral teratomas were also identified during tumor survey. DIAGNOSES:: anti-N-methyl-D-aspartate receptor encephalitis.\n\n\nINTERVENTIONS\nTumor resection and immunotherapy were performed early during the course.\n\n\nOUTCOMES\nThe patient responded well to tumor resection and immunotherapy. Compared with other reports in the literature, her symptoms rapidly improved without further relapse.\n\n\nLESSONS\nThis case report demonstrates that bilateral teratomas may be related to high anybody titers and that the preexisting head injury may be responsible for lowering the threshold of neurological deficits. Early diagnosis and therapy are crucial for a good prognosis in such patients.", "title": "" }, { "docid": "14fd4aa6b9937c7718a82f278f167d77", "text": "Spatially-varying reflectance and small geometric variations play a vital role in the appearance of real-world surfaces. Consequently, robust, automatic capture of such models is highly desirable; however, current systems require either specialized hardware, long capture times, user intervention, or rely heavily on heuristics. We describe an acquisition setup that utilizes only portable commodity hardware (an LCD display, an SLR camera) and contains no moving parts. In particular, a laptop screen can be used for illumination. Our setup, aided by a carefully constructed image formation model, automatically produces realistic spatially-varying reflectance parameters over a wide range of materials from diffuse to almost mirror-like specular surfaces, while requiring relatively few photographs. We believe our system is the first to offer such generality, while requiring only standard office equipment and no user intervention or parameter tuning. Our results exhibit a good qualitative match to photographs taken under novel viewing and lighting conditions for a range of materials.", "title": "" }, { "docid": "a9bf5a992b226527bf01dc078d3b7686", "text": "From 2008 to 2013, a prevention intervention against malaria based on indoor residual spraying (IRS) was implemented in Benin. From 2008 to 2012, Ficam M®, a bendiocarb-containing product was used for house spraying, in association with pirimiphos methyl EC (Actellic EC) in 2013. This operation aimed to strengthen the effectiveness of treated nets so as to expedite the achievement of Millennium Development Goals (MDGs): the reduction of morbidity and mortality due to malaria by 75 % from 2000 to 2015. Monitoring and evaluation (M&E) was implemented in order to evaluate the impact of IRS intervention on malaria transmission. Anopheles gambiae s.l. populations were sampled by human landing catch. In addition, window exit traps and pyrethrum spray catches were performed to assess exophagic behaviour of Anopheles vectors the main malaria vector in the treated areas. The residual activity of insecticide in the treated walls was also assessed using WHO bioassay test. The purpose of this project was to draw attention to new challenges and future prospects for the success of IRS in Benin. The main strength of the intervention was a large-scale operation in which more than 80 % of the houses were treated due to the strong adhesion of population. In addition, a significant reduction of the EIR in areas under IRS were observed. However, there were many challenges including the high cost of IRS implementation and the identification of suitable areas to implement IRS. This was because of the low and short residual effect of the insecticides recommended for IRS and the management strategy for vector resistance to insecticides. This indicated that challenges are accompanied by suggested solutions. For the cost of IRS to be accessible to states, then local organizations need to be created in partnership with the National Malaria Control Programme (NMCP) in order to ensure relevant planning and implementation of IRS. As an anticipatory measure against vector resistance, this paper proposes various methods, such as periodic IRS based on a combination of two or three insecticides of different classes used in rotation every two or three years.", "title": "" }, { "docid": "e6aab5125ddb5beb83c31874cf4119d0", "text": "Contextual information and word orders are proved valuable for text classification task. To make use of local word order information, n-grams are commonly used features in several models, such as linear models. However, these models commonly suffer the data sparsity problem and are difficult to represent large size region. The discrete or distributed representations of n-grams can be regarded as region embeddings, which are representations of fixed size regions. In this paper, we propose two novel text classification models that learn task specific region embeddings without hand crafted features, hence the drawbacks of n-grams can be overcome. In our model, each word has two attributes, a commonly used word embedding, and an additional local context unit which is used to interact with the word’s local context. Both the units and word embeddings are used to generate representations of regions, and are learned as model parameters. Finally, bag of region embeddings of a document is fed to a linear classifier. Experimental results show that our proposed methods achieve state-of-the-art performance on several benchmark datasets. We provide visualizations and analysis illustrating that our proposed local context unit can capture the syntactic and semantic information.", "title": "" }, { "docid": "65fcb62ad5183e29cb8d2307f473b840", "text": "Influence through information and feedback has been one of the main approaches of persuasive technology. We propose another approach based on behavioral economics research on decision-making. This approach involves designing the presentation and timing of choices to encourage people to make self-beneficial decisions. We applied three behavioral economics persuasion techniques - the default option strategy, the planning strategy, and the asymmetric choice strategy - to promote healthy snacking in the workplace. We tested the strategies in three experimental case studies using a human snack deliverer, a robot, and a snack ordering website. The default and the planning strategies were effective, but they worked differently depending on whether the participants had healthy dietary lifestyles or not. We discuss designs for persuasive technologies that apply behavioral economics.", "title": "" }, { "docid": "1ff4d4588826459f1d8d200d658b9907", "text": "BACKGROUND\nHealth promotion organizations are increasingly embracing social media technologies to engage end users in a more interactive way and to widely disseminate their messages with the aim of improving health outcomes. However, such technologies are still in their early stages of development and, thus, evidence of their efficacy is limited.\n\n\nOBJECTIVE\nThe study aimed to provide a current overview of the evidence surrounding consumer-use social media and mobile software apps for health promotion interventions, with a particular focus on the Australian context and on health promotion targeted toward an Indigenous audience. Specifically, our research questions were: (1) What is the peer-reviewed evidence of benefit for social media and mobile technologies used in health promotion, intervention, self-management, and health service delivery, with regard to smoking cessation, sexual health, and otitis media? and (2) What social media and mobile software have been used in Indigenous-focused health promotion interventions in Australia with respect to smoking cessation, sexual health, or otitis media, and what is the evidence of their effectiveness and benefit?\n\n\nMETHODS\nWe conducted a scoping study of peer-reviewed evidence for the effectiveness of social media and mobile technologies in health promotion (globally) with respect to smoking cessation, sexual health, and otitis media. A scoping review was also conducted for Australian uses of social media to reach Indigenous Australians and mobile apps produced by Australian health bodies, again with respect to these three areas.\n\n\nRESULTS\nThe review identified 17 intervention studies and seven systematic reviews that met inclusion criteria, which showed limited evidence of benefit from these interventions. We also found five Australian projects with significant social media health components targeting the Indigenous Australian population for health promotion purposes, and four mobile software apps that met inclusion criteria. No evidence of benefit was found for these projects.\n\n\nCONCLUSIONS\nAlthough social media technologies have the unique capacity to reach Indigenous Australians as well as other underserved populations because of their wide and instant disseminability, evidence of their capacity to do so is limited. Current interventions are neither evidence-based nor widely adopted. Health promotion organizations need to gain a more thorough understanding of their technologies, who engages with them, why they engage with them, and how, in order to be able to create successful social media projects.", "title": "" }, { "docid": "e2f7084f75a7b77602c113501dcd384d", "text": "The fuzzy vault is a promising cryptosystem for the protection of fingerprint templates. However it requires the alignment of the query template to the enrolled one. Most existing implementations either rely on the extraction of the core which is not a guaranteed task, or use publicly available helper data which may leak information about the protected minutiae. We propose a new alignment approach for the fingerprint fuzzy vault based on distortion invariant minutiae features. Experimental results show improvements in genuine and false accept rates over previous implementations.", "title": "" }, { "docid": "a4343ae3aa7d793e5c8483550c04a623", "text": "The availability of massive data and computing power allowing for effective data driven neural approaches is having a major impact on machine learning and information retrieval research, but these models have a basic problem with efficiency. Current neural ranking models are implemented as multistage rankers: for efficiency reasons, the neural model only re-ranks the top ranked documents retrieved by a first-stage efficient ranker in response to a given query. Neural ranking models learn dense representations causing essentially every query term to match every document term, making it highly inefficient or intractable to rank the whole collection. The reliance on a first stage ranker creates a dual problem: First, the interaction and combination effects are not well understood. Second, the first stage ranker serves as a \"gate-keeper\" or filter, effectively blocking the potential of neural models to uncover new relevant documents. In this work, we propose a standalone neural ranking model (SNRM) by introducing a sparsity property to learn a latent sparse representation for each query and document. This representation captures the semantic relationship between the query and documents, but is also sparse enough to enable constructing an inverted index for the whole collection. We parameterize the sparsity of the model to yield a retrieval model as efficient as conventional term based models. Our model gains in efficiency without loss of effectiveness: it not only outperforms the existing term matching baselines, but also performs similarly to the recent re-ranking based neural models with dense representations. Our model can also take advantage of pseudo-relevance feedback for further improvements. More generally, our results demonstrate the importance of sparsity in neural IR models and show that dense representations can be pruned effectively, giving new insights about essential semantic features and their distributions.", "title": "" }, { "docid": "b641c2dad36c5e065e0524812a7bd572", "text": "In recent years word-embedding models have gained great popularity due to their remarkable performance on several tasks, including word analogy questions and caption generation. An unexpected “sideeffect” of such models is that their vectors often exhibit compositionality, i.e., adding two word-vectors results in a vector that is only a small angle away from the vector of a word representing the semantic composite of the original words, e.g., “man” + “royal” = “king”. This work provides a theoretical justification for the presence of additive compositionality in word vectors learned using the Skip-Gram model. In particular, it shows that additive compositionality holds in an even stricter sense (small distance rather than small angle) under certain assumptions on the process generating the corpus. As a corollary, it explains the success of vector calculus in solving word analogies. When these assumptions do not hold, this work describes the correct non-linear composition operator. Finally, this work establishes a connection between the Skip-Gram model and the Sufficient Dimensionality Reduction (SDR) framework of Globerson and Tishby: the parameters of SDR models can be obtained from those of Skip-Gram models simply by adding information on symbol frequencies. This shows that SkipGram embeddings are optimal in the sense of Globerson and Tishby and, further, implies that the heuristics commonly used to approximately fit Skip-Gram models can be used to fit SDR models.", "title": "" }, { "docid": "1a834cb0c5d72c6bc58c4898d318cfc2", "text": "This paper proposes a novel single-stage high-power-factor ac/dc converter with symmetrical topology. The circuit topology is derived from the integration of two buck-boost power-factor-correction (PFC) converters and a full-bridge series resonant dc/dc converter. The switch-utilization factor is improved by using two active switches to serve in the PFC circuits. A high power factor at the input line is assured by operating the buck-boost converters at discontinuous conduction mode. With symmetrical operation and elaborately designed circuit parameters, zero-voltage switching on all the active power switches of the converter can be retained to achieve high circuit efficiency. The operation modes, design equations, and design steps for the circuit parameters are proposed. A prototype circuit designed for a 200-W dc output was built and tested to verify the analytical predictions. Satisfactory performances are obtained from the experimental results.", "title": "" }, { "docid": "f833db8a1e61634f1ff20be721bd7c64", "text": "Low-rank modeling has many important applications in computer vision and machine learning. While the matrix rank is often approximated by the convex nuclear norm, the use of nonconvex low-rank regularizers has demonstrated better empirical performance. However, the resulting optimization problem is much more challenging. Recent state-of-the-art requires an expensive full SVD in each iteration. In this paper, we show that for many commonly-used nonconvex low-rank regularizers, the singular values obtained from the proximal operator can be automatically threshold. This allows the proximal operator to be efficiently approximated by the power method. We then develop a fast proximal algorithm and its accelerated variant with inexact proximal step. It can be guaranteed that the squared distance between consecutive iterates converges at a rate of , where is the number of iterations. Furthermore, we show the proposed algorithm can be parallelized, and the resultant algorithm achieves nearly linear speedup w.r.t. the number of threads. Extensive experiments are performed on matrix completion and robust principal component analysis. Significant speedup over the state-of-the-art is observed.", "title": "" }, { "docid": "00ed53e43725d782b38c185faa2c8fd2", "text": "In this paper we evaluate tensegrity probes on the basis of the EDL phase performance of the probe in the context of a mission to Titan. Tensegrity probes are structurally designed around tension networks and are composed of tensile and compression elements. Such probes have unique physical force distribution properties and can be both landing and mobility platforms, allowing for dramatically simpler mission profile and reduced costs. Our concept is to develop a tensegrity probe in which the tensile network can be actively controlled to enable compact stowage for launch followed by deployment in preparation for landing. Due to their natural compliance and structural force distribution properties, tensegrity probes can safely absorb significant impact forces, enabling high speed Entry, Descent, and Landing (EDL) scenarios where the probe itself acts much like an airbag. However, unlike an airbag which must be discarded after a single use, the tensegrity probe can actively control its shape to provide compliant rolling mobility while still maintaining its ability to safely absorb impact shocks that might occur during exploration. (See Figure 1) This combination of functions from a single structure enables compact and light-weight planetary exploration missions with the capabilities of traditional wheeled rovers, but with the mass and cost similar or less than a stationary probe. In this paper we cover this new mission concept and tensegrity probe technologies for compact storage, EDL, and surface mobility, with an focus on analyzing the landing phase performance and ability to protect and deliver scientific payloads. The analysis is then supported with results from physical prototype drop-tests.", "title": "" }, { "docid": "dd9d776dbc470945154d460921005204", "text": "The Ant Colony System (ACS) is, next to Ant Colony Optimization (ACO) and the MAX-MIN Ant System (MMAS), one of the most efficient metaheuristic algorithms inspired by the behavior of ants. In this article we present three novel parallel versions of the ACS for the graphics processing units (GPUs). To the best of our knowledge, this is the first such work on the ACS which shares many key elements of the ACO and the MMAS, but differences in the process of building solutions and updating the pheromone trails make obtaining an efficient parallel version for the GPUs a difficult task. The proposed parallel versions of the ACS differ mainly in their implementations of the pheromone memory. The first two use the standard pheromone matrix, and the third uses a novel selective pheromone memory. Computational experiments conducted on several Travelling Salesman Problem (TSP) instances of sizes ranging from 198 to 2392 cities showed that the parallel ACS on Nvidia Kepler GK104 GPU (1536 CUDA cores) is able to obtain a speedup up to 24.29x vs the sequential ACS running on a single core of Intel Xeon E5-2670 CPU. The parallel ACS with the selective pheromone memory achieved speedups up to 16.85x, but in most cases the obtained solutions were of significantly better quality than for the sequential ACS.", "title": "" }, { "docid": "0f613e9c6d2a6ca47d5ed0e6b853735e", "text": "We introduce a novel approach for automatically classifying the sentiment of Twitter messages. These messages are classified as either positive or negative with respect to a query term. This is useful for consumers who want to research the sentiment of products before purchase, or companies that want to monitor the public sentiment of their brands. There is no previous research on classifying sentiment of messages on microblogging services like Twitter. We present the results of machine learning algorithms for classifying the sentiment of Twitter messages using distant supervision. Our training data consists of Twitter messages with emoticons, which are used as noisy labels. This type of training data is abundantly available and can be obtained through automated means. We show that machine learning algorithms (Naive Bayes, Maximum Entropy, and SVM) have accuracy above 80% when trained with emoticon data. This paper also describes the preprocessing steps needed in order to achieve high accuracy. The main contribution of this paper is the idea of using tweets with emoticons for distant supervised learning.", "title": "" }, { "docid": "e994dad1ef65d8b90f70e0adebfffd1e", "text": "One of the reasons large-scale software development is difficult is the number of dependencies that software engineers face. These dependencies create a need for communication and coordination that requires continuous effort by developers. Empirical studies, including our own, suggest that technical dependencies among software components create social dependencies among the software developers implementing those components. Based on this observation, we developed Ariadne, a plug-in for Eclipse. Ariadne analyzes software projects for dependencies and collects authorship information about projects relying on configuration management repositories. Ariadne can \"translate\" technical dependencies among components into social dependencies among developers. We have created visualizations to convey dependency information and the presence of coordination problems identified in our previous work. We believe the information conveyed in the visualizations will prove useful for software developers.", "title": "" }, { "docid": "9ca27ddd53d13db68a5f2c4477c13967", "text": "Humans have a remarkable ability to use physical commonsense and predict the effect of collisions. But do they understand the underlying factors? Can they predict if the underlying factors have changed? Interestingly, in most cases humans can predict the effects of similar collisions with different conditions such as changes in mass, friction, etc. It is postulated this is primarily because we learn to model physics with meaningful latent variables. This does not imply we can estimate the precise values of these meaningful variables (estimate exact values of mass or friction). Inspired by this observation, we propose an interpretable intuitive physics model where specific dimensions in the bottleneck layers correspond to different physical properties. In order to demonstrate that our system models these underlying physical properties, we train our model on collisions of different shapes (cube, cone, cylinder, spheres etc.) and test on collisions of unseen combinations of shapes. Furthermore, we demonstrate our model generalizes well even when similar scenes are simulated with different underlying properties.", "title": "" }, { "docid": "990067864c123b45e5c3d06ef1a0cf7d", "text": "BACKGROUND\nRetrospective single-centre series have shown the feasibility of sentinel lymph-node (SLN) identification in endometrial cancer. We did a prospective, multicentre cohort study to assess the detection rate and diagnostic accuracy of the SLN procedure in predicting the pathological pelvic-node status in patients with early stage endometrial cancer.\n\n\nMETHODS\nPatients with International Federation of Gynecology and Obstetrics (FIGO) stage I-II endometrial cancer had pelvic SLN assessment via cervical dual injection (with technetium and patent blue), and systematic pelvic-node dissection. All lymph nodes were histopathologically examined and SLNs were serial sectioned and examined by immunochemistry. The primary endpoint was estimation of the negative predictive value (NPV) of sentinel-node biopsy per hemipelvis. This is an ongoing study for which recruitment has ended. The study is registered with ClinicalTrials.gov, number NCT00987051.\n\n\nFINDINGS\nFrom July 5, 2007, to Aug 4, 2009, 133 patients were enrolled at nine centres in France. No complications occurred after injection of technetium colloid and no anaphylactic reactions were noted after patent blue injection. No surgical complications were reported during SLN biopsy, including procedures that involved conversion to open surgery. At least one SLN was detected in 111 of the 125 eligible patients. 19 of 111 (17%) had pelvic-lymph-node metastases. Five of 111 patients (5%) had an associated SLN in the para-aortic area. Considering the hemipelvis as the unit of analysis, NPV was 100% (95% CI 95-100) and sensitivity 100% (63-100). Considering the patient as the unit of analysis, three patients had false-negative results (two had metastatic nodes in the contralateral pelvic area and one in the para-aortic area), giving an NPV of 97% (95% CI 91-99) and sensitivity of 84% (62-95). All three of these patients had type 2 endometrial cancer. Immunohistochemistry and serial sectioning detected metastases undiagnosed by conventional histology in nine of 111 (8%) patients with detected SLNs, representing nine of the 19 patients (47%) with metastases. SLN biopsy upstaged 10% of patients with low-risk and 15% of those with intermediate-risk endometrial cancer.\n\n\nINTERPRETATION\nSLN biopsy with cervical dual labelling could be a trade-off between systematic lymphadenectomy and no dissection at all in patients with endometrial cancer of low or intermediate risk. Moreover, our study suggests that SLN biopsy could provide important data to tailor adjuvant therapy.\n\n\nFUNDING\nDirection Interrégionale de Recherche Clinique, Ile-de-France, Assistance Publique-Hôpitaux de Paris.", "title": "" }, { "docid": "e5b2857bfe745468453ef9dabbf5c527", "text": "We assume that a high-dimensional datum, like an image, is a compositional expression of a set of properties, with a complicated non-linear relationship between the datum and its properties. This paper proposes a factorial mixture prior for capturing latent properties, thereby adding structured compositionality to deep generative models. The prior treats a latent vector as belonging to Cartesian product of subspaces, each of which is quantized separately with a Gaussian mixture model. Some mixture components can be set to represent properties as observed random variables whenever labeled properties are present. Through a combination of stochastic variational inference and gradient descent, a method for learning how to infer discrete properties in an unsupervised or semi-supervised way is outlined and empirically evaluated.", "title": "" } ]
scidocsrr
6468ad0ba7effeeb5f870e355139ca48
Linked Stream Data Processing
[ { "docid": "24da291ca2590eb614f94f8a910e200d", "text": "CQL, a continuous query language, is supported by the STREAM prototype data stream management system (DSMS) at Stanford. CQL is an expressive SQL-based declarative language for registering continuous queries against streams and stored relations. We begin by presenting an abstract semantics that relies only on “black-box” mappings among streams and relations. From these mappings we define a precise and general interpretation for continuous queries. CQL is an instantiation of our abstract semantics using SQL to map from relations to relations, window specifications derived from SQL-99 to map from streams to relations, and three new operators to map from relations to streams. Most of the CQL language is operational in the STREAM system. We present the structure of CQL's query execution plans as well as details of the most important components: operators, interoperator queues, synopses, and sharing of components among multiple operators and queries. Examples throughout the paper are drawn from the Linear Road benchmark recently proposed for DSMSs. We also curate a public repository of data stream applications that includes a wide variety of queries expressed in CQL. The relative ease of capturing these applications in CQL is one indicator that the language contains an appropriate set of constructs for data stream processing.", "title": "" } ]
[ { "docid": "8fc89fce21bd4f8dced2265b9a8cdfe7", "text": "With the rapid development of 3GPP and its related techniques, evaluation of system level performance is in great need. However, LTE system level simulator is secured as commercial secrets in most 3GPP members. In this paper, we introduce our Matlab-based LTE system level simulator according to 3GPP specifications and related proposals. We mainly focus on channel model and physical abstract of transmission. Brief introduction of every part is given and physical concept and analysis are given.", "title": "" }, { "docid": "ad860674746dcf04156b3576174a9120", "text": "Predicting the popularity dynamics of Twitter hashtags has a broad spectrum of applications. Existing works have primarily focused on modeling the popularity of individual tweets rather than the underlying hashtags. As a result, they fail to consider several realistic factors contributing to hashtag popularity. In this paper, we propose Large Margin Point Process (LMPP), a probabilistic framework that integrates hashtag-tweet influence and hashtaghashtag competitions, the two factors which play important roles in hashtag propagation. Furthermore, while considering the hashtag competitions, LMPP looks into the variations of popularity rankings of the competing hashtags across time. Extensive experiments on seven real datasets demonstrate that LMPP outperforms existing popularity prediction approaches by a significant margin. Additionally, LMPP can accurately predict the relative rankings of competing hashtags, offering additional advantage over the state-of-the-art baselines.", "title": "" }, { "docid": "b7956722389df722029b005d0f7566a2", "text": "Social media platforms such as Twitter are becoming increasingly mainstream which provides valuable user-generated information by publishing and sharing contents. Identifying interesting and useful contents from large text-streams is a crucial issue in social media because many users struggle with information overload. Retweeting as a forwarding function plays an important role in information propagation where the retweet counts simply reflect a tweet's popularity. However, the main reason for retweets may be limited to personal interests and satisfactions. In this paper, we use a topic identification as a proxy to understand a large number of tweets and to score the interestingness of an individual tweet based on its latent topics. Our assumption is that fascinating topics generate contents that may be of potential interest to a wide audience. We propose a novel topic model called Trend Sensitive-Latent Dirichlet Allocation (TS-LDA) that can efficiently extract latent topics from contents by modeling temporal trends on Twitter over time. The experimental results on real world data from Twitter demonstrate that our proposed method outperforms several other baseline methods. With the rise of the Internet, blogs, and mobile devices, social media has also evolved into an information provider by publishing and sharing user-generated contents. By analyzing textual data which represents the thoughts and communication between users, it is possible to understand the public needs and concerns about what constitutes valuable information from an academic, marketing , and policy-making perspective. Twitter (http://twitter.com) is one of the social media platforms that enables its users to generate and consume useful information about issues and trends from text streams in real-time. Twitter and its 500 million registered users produce over 340 million tweets, which are text-based messages of up to 140 characters, per day 1. Also, users subscribe to other users in order to view their followers' relationships and timelines which show tweets in reverse chronological order. Although tweets may contain valuable information, many do not and are not interesting to users. A large number of tweets can overwhelm users when they check their Twitter timeline. Thus, finding and recommending tweets that are of potential interest to users from a large volume of tweets that is accumulated in real-time is a crucial but challenging task. A simple but effective way to solve these problems is to use the number of retweets. A retweet is a function that allows a user to re-post another user's tweet and other information such …", "title": "" }, { "docid": "cb2e602af2467b3d8ad7abdd98e6ddfd", "text": "The ephemeral content popularity seen with many content delivery applications can make indiscriminate on-demand caching in edge networks highly inefficient, since many of the content items that are added to the cache will not be requested again from that network. In this paper, we address the problem of designing and evaluating more selective edge-network caching policies. The need for such policies is demonstrated through an analysis of a dataset recording YouTube video requests from users on an edge network over a 20-month period. We then develop a novel workload modelling approach for such applications and apply it to study the performance of alternative edge caching policies, including indiscriminate caching and <italic>cache on <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math> <alternatives><inline-graphic xlink:href=\"carlsson-ieq1-2614805.gif\"/></alternatives></inline-formula></italic>th <italic>request</italic> for different <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math><alternatives> <inline-graphic xlink:href=\"carlsson-ieq2-2614805.gif\"/></alternatives></inline-formula>. The latter policies are found able to greatly reduce the fraction of the requested items that are inserted into the cache, at the cost of only modest increases in cache miss rate. Finally, we quantify and explore the potential room for improvement from use of other possible predictors of further requests. We find that although room for substantial improvement exists when comparing performance to that of a perfect “oracle” policy, such improvements are unlikely to be achievable in practice.", "title": "" }, { "docid": "edcdae3f9da761cedd52273ccd850520", "text": "Extracting information from Web pages requires the ability to work at Web scale in terms of the number of documents, the number of domains and domain complexity. Recent approaches have used existing knowledge bases to learn to extract information with promising results. In this paper we propose the use of distant supervision for relation extraction from the Web. Distant supervision is a method which uses background information from the Linking Open Data cloud to automatically label sentences with relations to create training data for relation classifiers. Although the method is promising, existing approaches are still not suitable for Web extraction as they suffer from three main issues: data sparsity, noise and lexical ambiguity. Our approach reduces the impact of data sparsity by making entity recognition tools more robust across domains, as well as extracting relations across sentence boundaries. We reduce the noise caused by lexical ambiguity by employing statistical methods to strategically select training data. Our experiments show that using a more robust entity recognition approach and expanding the scope of relation extraction results in about 8 times the number of extractions, and that strategically selecting training data can result in an error reduction of about 30%.", "title": "" }, { "docid": "7acfd4b984ea4ce59f95221463c02551", "text": "An autopilot system includes several modules, and the software architecture has a variety of programs. As we all know, it is necessary that there exists one brand with a compatible sensor system till now, owing to complexity and variety of sensors before. In this paper, we apply (Robot Operating System) ROS-based distributed architecture. Deep learning methods also adopted by perception modules. Experimental results demonstrate that the system can reduce the dependence on the hardware effectively, and the sensor involved is convenient to achieve well the expected functionalities. The system adapts well to some specific driving scenes, relatively fixed and simple driving environment, such as the inner factories, bus lines, parks, highways, etc. This paper presents the case study of autopilot system based on ROS and deep learning, especially convolution neural network (CNN), from the perspective of system implementation. And we also introduce the algorithm and realization process including the core module of perception, decision, control and system management emphatically.", "title": "" }, { "docid": "e1095273f4d65e31ea53d068c3dee348", "text": "We present a source localization method based on a sparse representation of sensor measurements with an overcomplete basis composed of samples from the array manifold. We enforce sparsity by imposing penalties based on the /spl lscr//sub 1/-norm. A number of recent theoretical results on sparsifying properties of /spl lscr//sub 1/ penalties justify this choice. Explicitly enforcing the sparsity of the representation is motivated by a desire to obtain a sharp estimate of the spatial spectrum that exhibits super-resolution. We propose to use the singular value decomposition (SVD) of the data matrix to summarize multiple time or frequency samples. Our formulation leads to an optimization problem, which we solve efficiently in a second-order cone (SOC) programming framework by an interior point implementation. We propose a grid refinement method to mitigate the effects of limiting estimates to a grid of spatial locations and introduce an automatic selection criterion for the regularization parameter involved in our approach. We demonstrate the effectiveness of the method on simulated data by plots of spatial spectra and by comparing the estimator variance to the Crame/spl acute/r-Rao bound (CRB). We observe that our approach has a number of advantages over other source localization techniques, including increased resolution, improved robustness to noise, limitations in data quantity, and correlation of the sources, as well as not requiring an accurate initialization.", "title": "" }, { "docid": "a959b14468625cb7692de99a986937c4", "text": "In this paper, we describe a novel method for searching and comparing 3D objects. The method encodes the geometric and topological information in the form of a skeletal graph and uses graph matching techniques to match the skeletons and to compare them. The skeletal graphs can be manually annotated to refine or restructure the search. This helps in choosing between a topological similarity and a geometric (shape) similarity. A feature of skeletal matching is the ability to perform part-matching, and its inherent intuitiveness, which helps in defining the search and in visualizing the results. Also, the matching results, which are presented in a per-node basis can be used for driving a number of registration algorithms, most of which require a good initial guess to perform registration. In this paper, we also describe a visualization tool to aid in the selection and specification of the matched objects.", "title": "" }, { "docid": "22e559b9536b375ded6516ceb93652ef", "text": "In this paper we explore the linguistic components of toxic behavior by using crowdsourced data from over 590 thousand cases of accused toxic players in a popular match-based competition game, League of Legends. We perform a series of linguistic analyses to gain a deeper understanding of the role communication plays in the expression of toxic behavior. We characterize linguistic behavior of toxic players and compare it with that of typical players in an online competition game. We also find empirical support describing how a player transitions from typical to toxic behavior. Our findings can be helpful to automatically detect and warn players who may become toxic and thus insulate potential victims from toxic playing in advance.", "title": "" }, { "docid": "bc4d9587ba33464d74302045336ddc38", "text": "Deep learning is a popular technique in modern online and offline services. Deep neural network based learning systems have made groundbreaking progress in model size, training and inference speed, and expressive power in recent years, but to tailor the model to specific problems and exploit data and problem structures is still an ongoing research topic. We look into two types of deep ‘‘multi-’’ objective learning problems: multi-view learning, referring to learning from data represented by multiple distinct feature sets, and multi-label learning, referring to learning from data instances belonging to multiple class labels that are not mutually exclusive. Research endeavors of both problems attempt to base on existing successful deep architectures and make changes of layers, regularization terms or even build hybrid systems to meet the problem constraints. In this report we first explain the original artificial neural network (ANN) with the backpropagation learning algorithm, and also its deep variants, e.g. deep belief network (DBN), convolutional neural network (CNN) and recurrent neural network (RNN). Next we present a survey of some multi-view and multi-label learning frameworks based on deep neural networks. At last we introduce some applications of deep multi-view and multi-label learning, including e-commerce item categorization, deep semantic hashing, dense image captioning, and our preliminary work on x-ray scattering image classification.", "title": "" }, { "docid": "6c2b19b2888d00fccb1eae37352d653d", "text": "Between June 1985 and January 1987, the Therac-25 medical electron accelerator was involved in six massive radiation overdoses. As a result, several people died and others were seriously injured. A detailed investigation of the factors involved in the software-related overdoses and attempts by users, manufacturers, and government agencies to deal with the accidents is presented. The authors demonstrate the complex nature of accidents and the need to investigate all aspects of system development and operation in order to prevent future accidents. The authors also present some lessons learned in terms of system engineering, software engineering, and government regulation of safety-critical systems containing software components.<<ETX>>", "title": "" }, { "docid": "121a388391c12de1329e74fdeebdaf10", "text": "In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the course of March, 2016--March, 2017, we identify 788,000 potential victims of off-the-shelf keyloggers; 12.4 million potential victims of phishing kits; and 1.9 billion usernames and passwords exposed via data breaches and traded on blackmarket forums. Using this dataset, we explore to what degree the stolen passwords---which originate from thousands of online services---enable an attacker to obtain a victim's valid email credentials---and thus complete control of their online identity due to transitive trust. Drawing upon Google as a case study, we find 7--25% of exposed passwords match a victim's Google account. For these accounts, we show how hardening authentication mechanisms to include additional risk signals such as a user's historical geolocations and device profiles helps to mitigate the risk of hijacking. Beyond these risk metrics, we delve into the global reach of the miscreants involved in credential theft and the blackhat tools they rely on. We observe a remarkable lack of external pressure on bad actors, with phishing kit playbooks and keylogger capabilities remaining largely unchanged since the mid-2000s.", "title": "" }, { "docid": "3c3980cb427c2630016f26f18cbd4ab9", "text": "MOS (mean opinion score) subjective quality studies are used to evaluate many signal processing methods. Since laboratory quality studies are time consuming and expensive, researchers often run small studies with less statistical significance or use objective measures which only approximate human perception. We propose a cost-effective and convenient measure called crowdMOS, obtained by having internet users participate in a MOS-like listening study. Workers listen and rate sentences at their leisure, using their own hardware, in an environment of their choice. Since these individuals cannot be supervised, we propose methods for detecting and discarding inaccurate scores. To automate crowdMOS testing, we offer a set of freely distributable, open-source tools for Amazon Mechanical Turk, a platform designed to facilitate crowdsourcing. These tools implement the MOS testing methodology described in this paper, providing researchers with a user-friendly means of performing subjective quality evaluations without the overhead associated with laboratory studies. Finally, we demonstrate the use of crowdMOS using data from the Blizzard text-to-speech competition, showing that it delivers accurate and repeatable results.", "title": "" }, { "docid": "2fe45390c2e54c72f6575e291fd2db94", "text": "Green start-ups contribute towards a transition to a more sustainable economy by developing sustainable and environmentally friendly innovation and bringing it to the market. Due to specific product/service characteristics, entrepreneurial motivation and company strategies that might differ from that of other start-ups, these companies might struggle even more than usual with access to finance in the early stages. This conceptual paper seeks to explain these challenges through the theoretical lenses of entrepreneurial finance and behavioural finance. While entrepreneurial finance theory contributes to a partial understanding of green start-up finance, behavioural finance is able to solve a remaining explanatory deficit produced by entrepreneurial finance theory. Although some behavioural finance theorists are suggesting that the current understanding of economic rationality underlying behavioural finance research is inadequate, most scholars have not yet challenged these assumptions, which constrict a comprehensive and realistic description of the reality of entrepreneurial finance in green start-ups. The aim of the paper is thus, first, to explore the specifics of entrepreneurial finance in green start-ups and, second, to demonstrate the need for a more up-to-date conception of rationality in behavioural finance theory in order to enable realistic empirical research in this field.", "title": "" }, { "docid": "a4fdd4d5a489fb909fc808ad9d924f76", "text": "Analyzing and explaining relationships between entities in a knowledge graph is a fundamental problem with many applications. Prior work has been limited to extracting the most informative subgraph connecting two entities of interest. This paper extends and generalizes the state of the art by considering the relationships between two sets of entities given at query time. Our method, coined ESPRESSO, explains the connection between these sets in terms of a small number of relatedness cores: dense sub-graphs that have strong relations with both query sets. The intuition for this model is that the cores correspond to key events in which entities from both sets play a major role. For example, to explain the relationships between US politicians and European politicians, our method identifies events like the PRISM scandal and the Syrian Civil War as relatedness cores. Computing cores of bounded size is NP-hard. This paper presents efficient approximation algorithms. Our experiments with real-life knowledge graphs demonstrate the practical viability of our approach and, through user studies, the superior output quality compared to state-of-the-art baselines.", "title": "" }, { "docid": "a9015698a5df36a2557b97838e6e05f9", "text": "The evaluation of whole-sentence semantic structures plays an important role in semantic parsing and large-scale semantic structure annotation. However, there is no widely-used metric to evaluate wholesentence semantic structures. In this paper, we present smatch, a metric that calculates the degree of overlap between two semantic feature structures. We give an efficient algorithm to compute the metric and show the results of an inter-annotator agreement study.", "title": "" }, { "docid": "1c0eaeea7e1bfc777bb6e391eb190b59", "text": "We review machine learning (ML)-based optical performance monitoring (OPM) techniques in optical communications. Recent applications of ML-assisted OPM in different aspects of fiber-optic networking including cognitive fault detection and management, network equipment failure prediction, and dynamic planning and optimization of software-defined networks are also discussed.", "title": "" }, { "docid": "1164e5b54ce970b55cf65cca0a1fbcb1", "text": "We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse authorization policies to be enforced by the Linux kernel. It consists of a kernel module which encapsulates an authorization policy, and hooks into the kernel module placed at appropriate locations in the Linux kernel. The kernel enforces the authorization policy using hook calls. In current practice, hooks are placed manually in the kernel. This approach is tedious, and as prior work has shown, is prone to security holes.Our technique uses static analysis of the Linux kernel and the kernel module to automate hook placement. Given a non-hook-placed version of the Linux kernel, and a kernel module that implements an authorization policy, our technique infers the set of operations authorized by each hook, and the set of operations performed by each function in the kernel. It uses this information to infer the set of hooks that must guard each kernel function. We describe the design and implementation of a prototype tool called TAHOE (Tool for Authorization Hook Placement) that uses this technique. We demonstrate the effectiveness of TAHOE by using it with the LSM implementation of security-enhanced Linux (selinux). While our exposition in this paper focuses on hook placement for LSM, our technique can be used to place hooks in other LSM-like architectures as well.", "title": "" }, { "docid": "13685fa8e74d57d05d5bce5b1d3d4c93", "text": "Children left behind by parents who are overseas Filipino workers (OFW) benefit from parental migration because their financial status improves. However, OFW families might emphasize the economic benefits to compensate for their separation, which might lead to materialism among children left behind. Previous research indicates that materialism is associated with lower well-being. The theory is that materialism focuses attention on comparing one's possessions to others, making one constantly dissatisfied and wanting more. Research also suggests that gratitude mediates this link, with the focus on acquiring more possessions that make one less grateful for current possessions. This study explores the links between materialism, gratitude, and well-being among 129 adolescent children of OFWs. The participants completed measures of materialism, gratitude, and well-being (life satisfaction, self-esteem, positive and negative affect). Results showed that gratitude mediated the negative relationship between materialism and well-being (and its positive relationship with negative affect). Children of OFWs who have strong materialist orientation seek well-being from possessions they do not have and might find it difficult to be grateful of their situation, contributing to lower well-being. The findings provide further evidence for the mediated relationship between materialism and well-being in a population that has not been previously studied in the related literature. The findings also point to two possible targets for psychosocial interventions for families and children of OFWs.", "title": "" } ]
scidocsrr
95c59e3a429233fd83bde1c55fa2c103
Cognitive , metacognitive , and motivational aspects of problem solving
[ { "docid": "c56c71775a0c87f7bb6c59d6607e5280", "text": "A correlational study examined relationships between motivational orientation, self-regulated learning, and classroom academic performance for 173 seventh graders from eight science and seven English classes. A self-report measure of student self-efficacy, intrinsic value, test anxiety, self-regulation, and use of learning strategies was administered, and performance data were obtained from work on classroom assignments. Self-efficacy and intrinsic value were positively related to cognitive engagement and performance. Regression analyses revealed that, depending on the outcome measure, self-regulation, self-efficacy, and test anxiety emerged as the best predictors of performance. Intrinsic value did not have a direct influence on performance but was strongly related to self-regulation and cognitive strategy use, regardless of prior achievement level. The implications of individual differences in motivational orientation for cognitive engagement and self-regulation in the classroom are discussed.", "title": "" }, { "docid": "f71d0084ebb315a346b52c7630f36fb2", "text": "A theory of motivation and emotion is proposed in which causal ascriptions play a key role. It is first documented that in achievement-related contexts there are a few dominant causal perceptions. The perceived causes of success and failure share three common properties: locus, stability, and controllability, with intentionality and globality as other possible causal structures. The perceived stability of causes influences changes in expectancy of success; all three dimensions of causality affect a variety of common emotional experiences, including anger, gratitude, guilt, hopelessness, pity, pride, and shame. Expectancy and affect, in turn, are presumed to guide motivated behavior. The theory therefore relates the structure of thinking to the dynamics of feeling and action. Analysis of a created motivational episode involving achievement strivings is offered, and numerous empirical observations are examined from this theoretical position. The strength of the empirical evidence, the capability of this theory to address prevalent human emotions, and the potential generality of the conception are stressed.", "title": "" } ]
[ { "docid": "6c1a1e47ce91b2d9ae60a0cfc972b7e4", "text": "We investigate automatic classification of speculative language (‘hedging’), in biomedical text using weakly supervised machine learning. Our contributions include a precise description of the task with annotation guidelines, analysis and discussion, a probabilistic weakly supervised learning model, and experimental evaluation of the methods presented. We show that hedge classification is feasible using weakly supervised ML, and point toward avenues for future research.", "title": "" }, { "docid": "b7715fb5c6fb19363cb1bdaf92981643", "text": "The composition and antifungal activity of clove essential oil (EO), obtained from Syzygium aromaticum, were studied. Clove oil was obtained commercially and analysed by GC and GC-MS. The EO analysed showed a high content of eugenol (85.3 %). MICs, determined according to Clinical and Laboratory Standards Institute protocols, and minimum fungicidal concentration were used to evaluate the antifungal activity of the clove oil and its main component, eugenol, against Candida, Aspergillus and dermatophyte clinical and American Type Culture Collection strains. The EO and eugenol showed inhibitory activity against all the tested strains. To clarify its mechanism of action on yeasts and filamentous fungi, flow cytometric and inhibition of ergosterol synthesis studies were performed. Propidium iodide rapidly penetrated the majority of the yeast cells when the cells were treated with concentrations just over the MICs, meaning that the fungicidal effect resulted from an extensive lesion of the cell membrane. Clove oil and eugenol also caused a considerable reduction in the quantity of ergosterol, a specific fungal cell membrane component. Germ tube formation by Candida albicans was completely or almost completely inhibited by oil and eugenol concentrations below the MIC values. The present study indicates that clove oil and eugenol have considerable antifungal activity against clinically relevant fungi, including fluconazole-resistant strains, deserving further investigation for clinical application in the treatment of fungal infections.", "title": "" }, { "docid": "e06b2385b1b9a81b9678fa5be485151a", "text": "We propose a new weight compensation mechanism with a non-circular pulley and a spring. We show the basic principle and numerical design method to derive the shape of the non-circular pulley. After demonstration of the weight compensation for an inverted/ordinary pendulum system, we extend the same mechanism to a parallel five-bar linkage system, analyzing the required torques using transposed Jacobian matrices. Finally, we develop a three degree of freedom manipulator with relatively small output actuators and verified that the weight compensation mechanism significantly contributes to decrease static torques to keep the same posture within manipulator's work space.", "title": "" }, { "docid": "356361bf2ca0e821250e4a32d299d498", "text": "DRAM has been a de facto standard for main memory, and advances in process technology have led to a rapid increase in its capacity and bandwidth. In contrast, its random access latency has remained relatively stagnant, as it is still around 100 CPU clock cycles. Modern computer systems rely on caches or other latency tolerance techniques to lower the average access latency. However, not all applications have ample parallelism or locality that would help hide or reduce the latency. Moreover, applications' demands for memory space continue to grow, while the capacity gap between last-level caches and main memory is unlikely to shrink. Consequently, reducing the main-memory latency is important for application performance. Unfortunately, previous proposals have not adequately addressed this problem, as they have focused only on improving the bandwidth and capacity or reduced the latency at the cost of significant area overhead.\n We propose asymmetric DRAM bank organizations to reduce the average main-memory access latency. We first analyze the access and cycle times of a modern DRAM device to identify key delay components for latency reduction. Then we reorganize a subset of DRAM banks to reduce their access and cycle times by half with low area overhead. By synergistically combining these reorganized DRAM banks with support for non-uniform bank accesses, we introduce a novel DRAM bank organization with center high-aspect-ratio mats called CHARM. Experiments on a simulated chip-multiprocessor system show that CHARM improves both the instructions per cycle and system-wide energy-delay product up to 21% and 32%, respectively, with only a 3% increase in die area.", "title": "" }, { "docid": "948257544ca485b689d8663aaba63c5d", "text": "This paper presents a new single-pass shadow mapping technique that achieves better quality than the approaches based on perspective warping, such as perspective, light-space, and trapezoidal shadow maps. The proposed technique is appropriate for real-time rendering of large virtual environments that include dynamic objects. By performing operations in camera space, this solution successfully handles the general and the dueling frustum cases and produces high-quality shadows even for extremely large scenes. This paper also presents a fast nonlinear projection technique for shadow map stretching that enables complete utilization of the shadow map by eliminating wastage. The application of stretching results in a significant reduction in unwanted perspective aliasing, commonly found in all shadow mapping techniques. Technique is compared with other shadow mapping techniques, and the benefits of the proposed method are presented. The proposed shadow mapping technique is simple and flexible enough to handle most of the special scenarios. An API for a generic shadow mapping solution is presented. This API simplifies the generation of fast and high-quality shadows.", "title": "" }, { "docid": "2ceb6aae1478e42ffae56895e17a9e14", "text": "Proposed in 1994, the “QED project” was one of the seminally influential initiatives in automated reasoning: It envisioned the formalization of “all of mathematics” and the assembly of these formalizations in a single coherent database. Even though it never led to the concrete system, communal resource, or even joint research envisioned in the QED manifesto, the idea lives on and shapes the research agendas of a significant part of the community This paper surveys a decade of work on representation languages and knowledge management tools for mathematical knowledge conducted in the KWARC research group at Jacobs University Bremen. It assembles the various research strands into a coherent agenda for realizing the QED dream with modern insights and technologies.", "title": "" }, { "docid": "ad3970fe4a43977f521b9c8a68d32647", "text": "Current key initiatives in deep-space optical communications are treated in terms of historical context, contemporary trends, and prospects for the future. An architectural perspective focusing on high-level drivers, systems, and related operations concepts is provided. Detailed subsystem and component topics are not addressed. A brief overview of past ideas and architectural concepts sets the stage for current developments. Current requirements that might drive a transition from radio frequencies to optical communications are examined. These drivers include mission demand for data rates and/or data volumes; spectrum to accommodate such data rates; and desired power, mass, and cost benefits. As is typical, benefits come with associated challenges. For optical communications, these include atmospheric effects, link availability, pointing, and background light. The paper describes how NASA's Space Communication and Navigation Office will respond to the drivers, achieve the benefits, and mitigate the challenges, as documented in its Optical Communications Roadmap. Some nontraditional architectures and operations concepts are advanced in an effort to realize benefits and mitigate challenges as quickly as possible. Radio frequency communications is considered as both a competitor to and a partner with optical communications. The paper concludes with some suggestions for two affordable first steps that can yet evolve into capable architectures that will fulfill the vision inherent in optical communications.", "title": "" }, { "docid": "c1dbf418f72ad572b3b745a94fe8fbf7", "text": "In this work we show how to integrate prior statistical knowledge, obtained through principal components analysis (PCA), into a convolutional neural network in order to obtain robust predictions even when dealing with corrupted or noisy data. Our network architecture is trained end-to-end and includes a specifically designed layer which incorporates the dataset modes of variation discovered via PCA and produces predictions by linearly combining them. We also propose a mechanism to focus the attention of the CNN on specific regions of interest of the image in order to obtain refined predictions. We show that our method is effective in challenging segmentation and landmark localization tasks.", "title": "" }, { "docid": "a26d98c1f9cb219f85153e04120053a7", "text": "The purpose of this paper is to examine the academic and athletic motivation and identify the factors that determine the academic performance among university students in the Emirates of Dubai. The study examined motivation based on non-traditional measure adopting a scale to measure both academic as well as athletic motivation. Keywords-academic performance, academic motivation, athletic performance, university students, business management, academic achievement, career motivation, sports motivation", "title": "" }, { "docid": "6e36dda80f462c23bb7f6224e741e13d", "text": "Usual way of character's animation is the use of motion captured data. Acquired bones' orientations are blended together according to user input in real-time. Although this massively used method gives a nice results, practical experience show how important is to have a system for interactive direct manipulation of character's skeleton in order to satisfy various tasks in Cartesian space. For this purpose, various methods for solving inverse kinematics problem are used. This paper presents three of such methods: Algebraical method based on limbs positioning; iterative optimization method based on Jacobian pseudo-inversion; and heuristic CCD iterative method. The paper describes them all in detail and discusses practical scope of their use in real-time applications.", "title": "" }, { "docid": "479b2ba292c60ac2441586ac3670e4b8", "text": "Educational Goals of Course(s): i. Explore and evaluate Multi-Objective Evolutionary algorithm (MOEA) space, Multi-Objective Problem (MOP) space, and parameter space along with MOEA performance comparisons ii. Motivate the student to investigate new areas of MOEA design, implementation, and performance metrics iii. Developed an ability to utilize and improve MOEA performance across a wide variety of application problem domains.", "title": "" }, { "docid": "a1046f5282cf4057fd143fdce79c6990", "text": "Rheumatoid arthritis is a multisystem disease with underlying immune mechanisms. Osteoarthritis is a debilitating, progressive disease of diarthrodial joints associated with the aging process. Although much is known about the pathogenesis of rheumatoid arthritis and osteoarthritis, our understanding of some immunologic changes remains incomplete. This study tries to examine the numeric changes in the T cell subsets and the alterations in the levels of some cytokines and adhesion molecules in these lesions. To accomplish this goal, peripheral blood and synovial fluid samples were obtained from 24 patients with rheumatoid arthritis, 15 patients with osteoarthritis and six healthy controls. The counts of CD4 + and CD8 + T lymphocytes were examined using flow cytometry. The levels of some cytokines (TNF-α, IL1-β, IL-10, and IL-17) and a soluble intercellular adhesion molecule-1 (sICAM-1) were measured in the sera and synovial fluids using enzyme linked immunosorbant assay. We found some variations in the counts of T cell subsets, the levels of cytokines and sICAM-1 adhesion molecule between the healthy controls and the patients with arthritis. High levels of IL-1β, IL-10, IL-17 and TNF-α (in the serum and synovial fluid) were observed in arthritis compared to the healthy controls. In rheumatoid arthritis, a high serum level of sICAM-1 was found compared to its level in the synovial fluid. A high CD4+/CD8+ T cell ratio was found in the blood of the patients with rheumatoid arthritis. In rheumatoid arthritis, the cytokine levels correlated positively with some clinicopathologic features. To conclude, the development of rheumatoid arthritis and osteoarthritis is associated with alteration of the levels of some cytokines. The assessment of these immunologic changes may have potential prognostic roles.", "title": "" }, { "docid": "d8ead5d749b9af092adf626245e8178a", "text": "This paper describes a LIN (Local Interconnect Network) Transmitter designed in a BCD HV technology. The key design target is to comply with EMI (electromagnetic interference) specification limits. The two main aspects are low EME (electromagnetic emission) and sufficient immunity against RF disturbance. A gate driver is proposed which uses a certain current summation network for lowering the slew rate on the one hand and being reliable against radio frequency (RF) disturbances within the automotive environment on the other hand. Nowadays the low cost single wire LIN Bus is used for establishing communication between sensors, actuators and other components.", "title": "" }, { "docid": "c45d911aea9d06208a4ef273c9ab5ff3", "text": "A wide range of research has used face data to estimate a person's engagement, in applications from advertising to student learning. An interesting and important question not addressed in prior work is if face-based models of engagement are generalizable and context-free, or do engagement models depend on context and task. This research shows that context-sensitive face-based engagement models are more accurate, at least in the space of web-based tools for trauma recovery. Estimating engagement is important as various psychological studies indicate that engagement is a key component to measure the effectiveness of treatment and can be predictive of behavioral outcomes in many applications. In this paper, we analyze user engagement in a trauma-recovery regime during two separate modules/tasks: relaxation and triggers. The dataset comprises of 8M+ frames from multiple videos collected from 110 subjects, with engagement data coming from 800+ subject self-reports. We build an engagement prediction model as sequence learning from facial Action Units (AUs) using Long Short Term Memory (LSTMs). Our experiments demonstrate that engagement prediction is contextual and depends significantly on the allocated task. Models trained to predict engagement on one task are only weak predictors for another and are much less accurate than context-specific models. Further, we show the interplay of subject mood and engagement using a very short version of Profile of Mood States (POMS) to extend our LSTM model.", "title": "" }, { "docid": "0719942bf0fc7ddf03b4caf6402dec30", "text": "Recent years have seen a renewed interest in the harvesting and conversion of solar energy. Among various technologies, the direct conversion of solar to chemical energy using photocatalysts has received significant attention. Although heterogeneous photocatalysts are almost exclusively semiconductors, it has been demonstrated recently that plasmonic nanostructures of noble metals (mainly silver and gold) also show significant promise. Here we review recent progress in using plasmonic metallic nanostructures in the field of photocatalysis. We focus on plasmon-enhanced water splitting on composite photocatalysts containing semiconductor and plasmonic-metal building blocks, and recently reported plasmon-mediated photocatalytic reactions on plasmonic nanostructures of noble metals. We also discuss the areas where major advancements are needed to move the field of plasmon-mediated photocatalysis forward.", "title": "" }, { "docid": "54c6e02234ce1c0f188dcd0d5ee4f04c", "text": "The World Wide Web is a vast resource for information. At the same time it is extremely distributed. A particular type of data such as restaurant lists may be scattered across thousands of independent information sources in many di erent formats. In this paper, we consider the problem of extracting a relation for such a data type from all of these sources automatically. We present a technique which exploits the duality between sets of patterns and relations to grow the target relation starting from a small sample. To test our technique we use it to extract a relation of (author,title) pairs from the World Wide Web.", "title": "" }, { "docid": "635d981a3f54735ccea336feb0ead45b", "text": "Keyphrase is an efficient representation of the main idea of documents. While background knowledge can provide valuable information about documents, they are rarely incorporated in keyphrase extraction methods. In this paper, we propose WikiRank, an unsupervised method for keyphrase extraction based on the background knowledge from Wikipedia. Firstly, we construct a semantic graph for the document. Then we transform the keyphrase extraction problem into an optimization problem on the graph. Finally, we get the optimal keyphrase set to be the output. Our method obtains improvements over other state-of-art models by more than 2% in F1-score.", "title": "" }, { "docid": "0ca588e42d16733bc8eef4e7957e01ab", "text": "Three-dimensional (3D) finite element (FE) models are commonly used to analyze the mechanical behavior of the bone under different conditions (i.e., before and after arthroplasty). They can provide detailed information but they are numerically expensive and this limits their use in cases where large or numerous simulations are required. On the other hand, 2D models show less computational cost, but the precision of results depends on the approach used for the simplification. Two main questions arise: Are the 3D results adequately represented by a 2D section of the model? Which approach should be used to build a 2D model that provides reliable results compared to the 3D model? In this paper, we first evaluate if the stem symmetry plane used for generating the 2D models of bone-implant systems adequately represents the results of the full 3D model for stair climbing activity. Then, we explore three different approaches that have been used in the past for creating 2D models: (1) without side-plate (WOSP), (2) with variable thickness side-plate and constant cortical thickness (SPCT), and (3) with variable thickness side-plate and variable cortical thickness (SPVT). From the different approaches investigated, a 2D model including a side-plate best represents the results obtained with the full 3D model with much less computational cost. The side-plate needs to have variable thickness, while the cortical bone thickness can be kept constant.", "title": "" }, { "docid": "f6b6b175f556e7ae88661b057eb1c373", "text": "Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service providers with the key have exclusive rights on the data. Especially with popular cloud services, control over the privacy of the sensitive data is lost. Even when the keys are not shared, the encrypted material is shared with a third party that does not necessarily need to access the content. Moreover, untrusted servers, providers, and cloud operators can keep identifying elements of users long after users end the relationship with the services. Indeed, Homomorphic Encryption (HE), a special kind of encryption scheme, can address these concerns as it allows any third party to operate on the encrypted data without decrypting it in advance. Although this extremely useful feature of the HE scheme has been known for over 30 years, the first plausible and achievable Fully Homomorphic Encryption (FHE) scheme, which allows any computable function to perform on the encrypted data, was introduced by Craig Gentry in 2009. Even though this was a major achievement, different implementations so far demonstrated that FHE still needs to be improved significantly to be practical on every platform. Therefore, this survey focuses on HE and FHE schemes. First, we present the basics of HE and the details of the well-known Partially Homomorphic Encryption (PHE) and Somewhat Homomorphic Encryption (SWHE), which are important pillars for achieving FHE. Then, the main FHE families, which have become the base for the other follow-up FHE schemes, are presented. Furthermore, the implementations and recent improvements in Gentry-type FHE schemes are also surveyed. Finally, further research directions are discussed. This survey is intended to give a clear knowledge and foundation to researchers and practitioners interested in knowing, applying, and extending the state-of-the-art HE, PHE, SWHE, and FHE systems.", "title": "" }, { "docid": "a5082b49cc584548ac066b9c6ffb2452", "text": "In this paper we review the algorithm development and applications in high resolution shock capturing methods, level set methods and PDE based methods in computer vision and image processing. The emphasis is on Stanley Osher's contribution in these areas and the impact of his work. We will start with shock capturing methods and will review the Engquist-Osher scheme, TVD schemes, entropy conditions, ENO and WENO schemes and numerical schemes for Hamilton-Jacobi type equations. Among level set methods we will review level set calculus, numerical techniques, uids and materials, variational approach, high codimension motion, geometric optics, and the computation of discontinuous solutions to Hamilton-Jacobi equations. Among computer vision and image processing we will review the total variation model for image denoising, images on implicit surfaces, and the level set method in image processing and computer vision.", "title": "" } ]
scidocsrr
062f10247fe246bb6bead6cee3365796
Deep Multi-camera People Detection
[ { "docid": "7ba3f13f58c4b25cc425b706022c1f2b", "text": "Detecting pedestrian has been arguably addressed as a special topic beyond general object detection. Although recent deep learning object detectors such as Fast/Faster R-CNN [1,2] have shown excellent performance for general object detection, they have limited success for detecting pedestrian, and previous leading pedestrian detectors were in general hybrid methods combining hand-crafted and deep convolutional features. In this paper, we investigate issues involving Faster R-CNN [2] for pedestrian detection. We discover that the Region Proposal Network (RPN) in Faster R-CNN indeed performs well as a stand-alone pedestrian detector, but surprisingly, the downstream classifier degrades the results. We argue that two reasons account for the unsatisfactory accuracy: (i) insufficient resolution of feature maps for handling small instances, and (ii) lack of any bootstrapping strategy for mining hard negative examples. Driven by these observations, we propose a very simple but effective baseline for pedestrian detection, using an RPN followed by boosted forests on shared, high-resolution convolutional feature maps. We comprehensively evaluate this method on several benchmarks (Caltech, INRIA, ETH, and KITTI), presenting competitive accuracy and good speed. Code will be made publicly available.", "title": "" }, { "docid": "fd14b9e25affb05fd9b05036f3ce350b", "text": "Recent advances in pedestrian detection are attained by transferring the learned features of Convolutional Neural Network (ConvNet) to pedestrians. This ConvNet is typically pre-trained with massive general object categories (e.g. ImageNet). Although these features are able to handle variations such as poses, viewpoints, and lightings, they may fail when pedestrian images with complex occlusions are present. Occlusion handling is one of the most important problem in pedestrian detection. Unlike previous deep models that directly learned a single detector for pedestrian detection, we propose DeepParts, which consists of extensive part detectors. DeepParts has several appealing properties. First, DeepParts can be trained on weakly labeled data, i.e. only pedestrian bounding boxes without part annotations are provided. Second, DeepParts is able to handle low IoU positive proposals that shift away from ground truth. Third, each part detector in DeepParts is a strong detector that can detect pedestrian by observing only a part of a proposal. Extensive experiments in Caltech dataset demonstrate the effectiveness of DeepParts, which yields a new state-of-the-art miss rate of 11:89%, outperforming the second best method by 10%.", "title": "" }, { "docid": "7883bbf8857d65712b96601486ba40e8", "text": "In this paper we study the use of convolutional neural networks (convnets) for the task of pedestrian detection. Despite their recent diverse successes, convnets historically underperform compared to other pedestrian detectors. We deliberately omit explicitly modelling the problem into the network (e.g. parts or occlusion modelling) and show that we can reach competitive performance without bells and whistles. In a wide range of experiments we analyse small and big convnets, their architectural choices, parameters, and the influence of different training data, including pretraining on surrogate tasks. We present the best convnet detectors on the Caltech and KITTI dataset. On Caltech our convnets reach top performance both for the Caltech1x and Caltech10x training setup. Using additional data at training time our strongest convnet model is competitive even to detectors that use additional data (optical flow) at test time.", "title": "" }, { "docid": "6c7156d5613e1478daeb08eecb17c1e2", "text": "The idea behind the experiments in section 4.1 of the main paper is to demonstrate that, within a single framework, varying the features can replicate the jump in detection performance over a ten-year span (2004 2014), i.e. the jump in performance between VJ and the current state-of-the-art. See figure 1 for results on INRIA and Caltech-USA of the following methods (all based on SquaresChnFtrs, described in section 4 of the paper):", "title": "" } ]
[ { "docid": "79a22c3ad6845d469fc09f2b3ac52027", "text": "Locking devices are widely used in robotics, for instance to lock springs, joints or to reconfigure robots. This review paper classifies the locking devices currently described in literature and preforms a comparative study. Designers can therefore better determine which locking device best matches the needs of their application. The locking devices are divided into three main categories based on different locking principles: mechanical locking, friction-based locking and singularity locking. Different locking devices in each category can be passive or active. Based on an extensive literature survey, the paper summarizes the findings by comparing different locking devices on a set of properties of an ideal locking device.", "title": "" }, { "docid": "8f39f96243879ebc047ea17e3db3012d", "text": "The paper presents a new angle of arrival (AoA) positioning technique for long term evolution (LTE) cellular systems. The method quantifies the directional correlation between TX antenna bore-sight and different multiple-input-multiple-output (MIMO) pre-coder indices. This correlation is used to develop an AoA positioning method that only builds on functionality and hardware available in standard LTE base stations. Measurements from a Swedish test network indicate that the method performs as expected.", "title": "" }, { "docid": "3332bf8d62c1176b8f5f0aa2bb045d24", "text": "BACKGROUND\nInfectious mononucleosis caused by the Epstein-Barr virus has been associated with increased risk of multiple sclerosis. However, little is known about the characteristics of this association.\n\n\nOBJECTIVE\nTo assess the significance of sex, age at and time since infectious mononucleosis, and attained age to the risk of developing multiple sclerosis after infectious mononucleosis.\n\n\nDESIGN\nCohort study using persons tested serologically for infectious mononucleosis at Statens Serum Institut, the Danish Civil Registration System, the Danish National Hospital Discharge Register, and the Danish Multiple Sclerosis Registry.\n\n\nSETTING\nStatens Serum Institut.\n\n\nPATIENTS\nA cohort of 25 234 Danish patients with mononucleosis was followed up for the occurrence of multiple sclerosis beginning on April 1, 1968, or January 1 of the year after the diagnosis of mononucleosis or after a negative Paul-Bunnell test result, respectively, whichever came later and ending on the date of multiple sclerosis diagnosis, death, emigration, or December 31, 1996, whichever came first.\n\n\nMAIN OUTCOME MEASURE\nThe ratio of observed to expected multiple sclerosis cases in the cohort (standardized incidence ratio).\n\n\nRESULTS\nA total of 104 cases of multiple sclerosis were observed during 556,703 person-years of follow-up, corresponding to a standardized incidence ratio of 2.27 (95% confidence interval, 1.87-2.75). The risk of multiple sclerosis was persistently increased for more than 30 years after infectious mononucleosis and uniformly distributed across all investigated strata of sex and age. The relative risk of multiple sclerosis did not vary by presumed severity of infectious mononucleosis.\n\n\nCONCLUSIONS\nThe risk of multiple sclerosis is increased in persons with prior infectious mononucleosis, regardless of sex, age, and time since infectious mononucleosis or severity of infection. The risk of multiple sclerosis may be increased soon after infectious mononucleosis and persists for at least 30 years after the infection.", "title": "" }, { "docid": "bb77f2d4b85aaaee15284ddf7f16fb18", "text": "We present a demonstration of WalkCompass, a system to appear in the MobiSys 2014 main conference. WalkCompass exploits smartphone sensors to estimate the direction in which a user is walking. We find that several smartphone localization systems in the recent past, including our own, make a simplifying assumption that the user's walking direction is known. In trying to relax this assumption, we were not able to find a generic solution from past work. While intuition suggests that the walking direction should be detectable through the accelerometer, in reality this direction gets blended into various other motion patterns during the act of walking, including up and down bounce, side-to-side sway, swing of arms or legs, etc. WalkCompass analyzes the human walking dynamics to estimate the dominating forces and uses this knowledge to find the heading direction of the pedestrian. In the demonstration we will show the performance of this system when the user holds the smartphone on the palm. A collection of YouTube videos of the demo is posted at http://synrg.csl.illinois.edu/projects/ localization/walkcompass.", "title": "" }, { "docid": "48036770f56e84df8b05c198e8a89018", "text": "Advances in low power VLSI design, along with the potentially low duty cycle of wireless sensor nodes open up the possibility of powering small wireless computing devices from scavenged ambient power. A broad review of potential power scavenging technologies and conventional energy sources is first presented. Low-level vibrations occurring in common household and office environments as a potential power source are studied in depth. The goal of this paper is not to suggest that the conversion of vibrations is the best or most versatile method to scavenge ambient power, but to study its potential as a viable power source for applications where vibrations are present. Different conversion mechanisms are investigated and evaluated leading to specific optimized designs for both capacitive MicroElectroMechancial Systems (MEMS) and piezoelectric converters. Simulations show that the potential power density from piezoelectric conversion is significantly higher. Experiments using an off-the-shelf PZT piezoelectric bimorph verify the accuracy of the models for piezoelectric converters. A power density of 70 mW/cm has been demonstrated with the PZT bimorph. Simulations show that an optimized design would be capable of 250 mW/cm from a vibration source with an acceleration amplitude of 2.5 m/s at 120 Hz. q 2002 Elsevier Science B.V.. All rights reserved.", "title": "" }, { "docid": "14b36f57ccc2d4814e8855fd7e3b102c", "text": "The functions of Klotho (KL) are multifaceted and include the regulation of aging and mineral metabolism. It was originally identified as the gene responsible for premature aging-like symptoms in mice and was subsequently shown to function as a coreceptor in the fibroblast growth factor (FGF) 23 signaling pathway. The discovery of KL as a partner for FGF23 led to significant advances in understanding of the molecular mechanisms underlying phosphate and vitamin D metabolism, and simultaneously clarified the pathogenic roles of the FGF23 signaling pathway in human diseases. These novel insights led to the development of new strategies to combat disorders associated with the dysregulated metabolism of phosphate and vitamin D, and clinical trials on the blockade of FGF23 signaling in X-linked hypophosphatemic rickets are ongoing. Molecular and functional insights on KL and FGF23 have been discussed in this review and were extended to how dysregulation of the FGF23/KL axis causes human disorders associated with abnormal mineral metabolism.", "title": "" }, { "docid": "749dd1398938c5517858384c616ecaff", "text": "An asymmetric wideband dual-polarized bilateral tapered slot antenna (DBTSA) is proposed in this letter for wireless EMC measurements. The DBTSA is formed by two bilateral tapered slot antennas designed with low cross polarization. With careful design, the achieved DBTSA not only has a wide operating frequency band, but also maintains a single main-beam from 700 MHz to 20 GHz. This is a significant improvement compared to the conventional dual-polarized tapered slot antennas, which suffer from main-beam split in the high-frequency band. The innovative asymmetric configuration of the proposed DBTSA significantly reduces the field coupling between the two antenna elements, so that low cross polarization and high port isolation are obtained across the entire frequency range. All these intriguing characteristics make the proposed DBTSA a good candidate for a dual-polarized sensor antenna for wireless EMC measurements.", "title": "" }, { "docid": "1c2f9c3ed21ab5e3e6a0b17ae8bfc059", "text": "The purpose of this study is to analyze the relationship among Person Organization Fit (POF), Organizational Commitment (OC) and Knowledge Sharing Attitude (KSA). The paper develops a conceptual frame based on a theory and literature review. A quantitative approach has been used to measure the level of POF and OC as well as to explore the relationship of these variables with KSA & with each other by using a sample of 315 academic managers of public sector institutions of higher education. POF has a positive relationship with OC and KSA. A positive relationship also exists between OC and KSA. It would be an effective contribution in the existing body of knowledge. Managers and other stakeholders may be helped to recognize the significance of POF, OC and KSA as well as their relationship with each other for ensuring selection of employee’s best fitted in the organization and for creating and maintaining a conducive environment for improving organizational commitment and knowledge sharing of the employees which will ultimately result in enhanced efficacy and effectiveness of the organization.", "title": "" }, { "docid": "f2c2bf0a5d369c1eb80947ab416f10e2", "text": "JPC makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, JPC make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by JPC The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. JPC shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.", "title": "" }, { "docid": "3a32081b698d684219153d94eb0f07b1", "text": "Understanding human behaviors is a challenging problem in computer vision that has recently seen important advances. Human behavior understanding combines image and signal processing, feature extraction, machine learning, and 3-D geometry. Application scenarios range from surveillance to indexing and retrieval, from patient care to industrial safety and sports analysis. Given the broad set of techniques used in video-based behavior understanding and the fast progress in this area, in this paper we organize and survey the corresponding literature, define unambiguous key terms, and discuss links among fundamental building blocks ranging from human detection to action and interaction recognition. The advantages and the drawbacks of the methods are critically discussed, providing a comprehensive coverage of key aspects of video-based human behavior understanding, available datasets for experimentation and comparisons, and important open research issues.", "title": "" }, { "docid": "fdd01ae46b9c57eada917a6e74796141", "text": "This paper presents a high-level discussion of dexterity in robotic systems, focusing particularly on manipulation and hands. While it is generally accepted in the robotics community that dexterity is desirable and that end effectors with in-hand manipulation capabilities should be developed, there has been little, if any, formal description of why this is needed, particularly given the increased design and control complexity required. This discussion will overview various definitions of dexterity used in the literature and highlight issues related to specific metrics and quantitative analysis. It will also present arguments regarding why hand dexterity is desirable or necessary, particularly in contrast to the capabilities of a kinematically redundant arm with a simple grasper. Finally, we overview and illustrate the various classes of in-hand manipulation, and review a number of dexterous manipulators that have been previously developed. We believe this work will help to revitalize the dialogue on dexterity in the manipulation community and lead to further formalization of the concepts discussed here.", "title": "" }, { "docid": "f1f08c43fdf29222a61f343390291000", "text": "This paper describes the way of Market Basket Analysis implementation to Six Sigma methodology. Data Mining methods provide a lot of opportunities in the market sector. Basket Market Analysis is one of them. Six Sigma methodology uses several statistical methods. With implementation of Market Basket Analysis (as a part of Data Mining) to Six Sigma (to one of its phase), we can improve the results and change the Sigma performance level of the process. In our research we used GRI (General Rule Induction) algorithm to produce association rules between products in the market basket. These associations show a variety between the products. To show the dependence between the products we used a Web plot. The last algorithm in analysis was C5.0. This algorithm was used to build rule-based profiles.", "title": "" }, { "docid": "1f770561b6f535e36dfb5e43326780a5", "text": "The Red Brick WarehouseTMis a commercial Relational Database Management System designed specifically for query, decision support, and data warehouse applications. Red Brick Warehouse is a software-only system providing ANSI SQL support in an open cliendserver environment. Red Brick Warehouse is distinguished from traditional RDBMS products by an architecture optimized to deliver high performance in read-mostly, high-intensity query applications. In these applications, the workload is heavily biased toward complex SQL SELECT operations that read but do not update the database. The average unit of work is very large, and typically involves multi-table joins, aggregation, duplicate elimination, and sorting. Multi-user concurrency is moderate, with typical systems supporting 50 to 500 concurrent user sessions. Query databases are often very large, with tables ranging from 100 million to many billion rows and occupying 50 Gigabytes to 2 Terabytes, Databases are populated by massive bulk-load operations on an hourly, daily, or weekly cycle. Time-series and historical data are maintained for months or years. Red Brick Warehouse makes use of parallel processing as well as other specialized algorithms to achieve outstanding performance and scalability on cost-effective hardware platforms.", "title": "" }, { "docid": "e9d8610e08e812c3fb2ec6e7fada3de8", "text": "This paper proposed two efficient pilot contamination reduction schemes based on the TDD massive MIMO system model: the directional pilot scheme and the multicell processing (MCP) scheme. Closed expressions of the user throughput are also derived. According to the simulation results obtained, we can know that the capability of the massive MIMO system can be significantly improved and the robustness is also achieved through the proposed scheme. Due to a lack of good strategies for pilot contamination reduction, the proposed schemes in this paper provide some new solutions for this problem with strong innovation.", "title": "" }, { "docid": "48f2e91304f7e4dbec5e5cc1f509d38e", "text": "This paper presents on-going research to define the basic models and architecture patterns for federated access control in heterogeneous (multi-provider) multi-cloud and inter-cloud environment. The proposed research contributes to the further definition of Intercloud Federation Framework (ICFF) which is a part of the general Intercloud Architecture Framework (ICAF) proposed by authors in earlier works. ICFF attempts to address the interoperability and integration issues in provisioning on-demand multi-provider multi-domain heterogeneous cloud infrastructure services. The paper describes the major inter-cloud federation scenarios that in general involve two types of federations: customer-side federation that includes federation between cloud based services and customer campus or enterprise infrastructure, and provider-side federation that is created by a group of cloud providers to outsource or broker their resources when provisioning services to customers. The proposed federated access control model uses Federated Identity Management (FIDM) model that can be also supported by the trusted third party entities such as Cloud Service Broker (CSB) and/or trust broker to establish dynamic trust relations between entities without previously existing trust. The research analyses different federated identity management scenarios, defines the basic architecture patterns and the main components of the distributed federated multi-domain Authentication and Authorisation infrastructure.", "title": "" }, { "docid": "9051f952259ddd4393e9d14dbac6fe6a", "text": "Doubly fed induction generators (DFIGs) are widely used in variable-speed wind turbines. Despite the well-accepted performance of DFIGs, these generators are highly sensible to grid faults. Hence, the presence of grid faults must be considered in the design of any control system to be deployed on DFIGs. Sliding mode control (SMC) is a useful alternative for electric machinery control since SMC offers fast dynamic response and less sensitivity to parameter variations and disturbances. Additionally, the natural outputs of SMC are discontinuous signals allowing direct switching of power electronic devices. In this paper, a grid-voltage-oriented SMC is proposed and tested under low voltage grid faults. Unlike other nonmodulated techniques such as direct torque control, there is not a necessity of modifying the controller structure for withstanding low depth voltage dips. For stator natural flux cancelation, the torque and reactive power references are modified to inject a demagnetizing current. Simulation results demonstrate the demagnetization of the natural flux component as well as a robust tracking control under balanced and unbalanced voltage dips.", "title": "" }, { "docid": "89eaafb816877a6c4139c30aea0ac8d8", "text": "We have developed several digital heritage interfaces that utilize Web3D, virtual and augmented reality technologies for visualizing digital heritage in an interactive manner through the use of several different input devices. We propose in this paper an integration of these technologies to provide a novel multimodal mixed reality interface that facilitates the implementation of more interesting digital heritage exhibitions. With such exhibitions participants can switch dynamically between virtual web-based environments to indoor augmented reality environments as well as make use of various multimodal interaction techniques to better explore heritage information in the virtual museum. The museum visitor can potentially experience their digital heritage in the physical sense in the museum, then explore further through the web, visualize this heritage in the round (3D on the web), take that 3D artifact into the augmented reality domain (the real world) and explore it further using various multimodal interfaces.", "title": "" }, { "docid": "ac4edd65e7d81beb66b2f9d765b4ad30", "text": "This paper is concerned with actively predicting search intent from user browsing behavior data. In recent years, great attention has been paid to predicting user search intent. However, the prediction was mostly passive because it was performed only after users submitted their queries to search engines. It is not considered why users issued these queries, and what triggered their information needs. According to our study, many information needs of users were actually triggered by what they have browsed. That is, after reading a page, if a user found something interesting or unclear, he/she might have the intent to obtain further information and accordingly formulate a search query. Actively predicting such search intent can benefit both search engines and their users. In this paper, we propose a series of technologies to fulfill this task. First, we extract all the queries that users issued after reading a given page from user browsing behavior data. Second, we learn a model to effectively rank these queries according to their likelihoods of being triggered by the page. Third, since search intents can be quite diverse even if triggered by the same page, we propose an optimization algorithm to diversify the ranked list of queries obtained in the second step, and then suggest the list to users. We have tested our approach on large-scale user browsing behavior data obtained from a commercial search engine. The experimental results have shown that our approach can predict meaningful queries for a given page, and the search performance for these queries can be significantly improved by using the triggering page as contextual information.", "title": "" }, { "docid": "9d7a67f2cd12a6fd033ad102fb9c526e", "text": "We begin by pretraining the source task model, fS , using the task loss on the labeled source data. Next, we perform pixel-level adaptation using our image space GAN losses together with semantic consistency and cycle consistency losses. This yeilds learned parameters for the image transformations, GS!T and GT!S , image discriminators, DS and DT , as well as an initial setting of the task model, fT , which is trained using pixel transformed source images and the corresponding source pixel labels. Finally, we perform feature space adpatation in order to update the target semantic model, fT , to have features which are aligned between the source images mapped into target style and the real target images. During this phase, we learn the feature discriminator, Dfeat and use this to guide the representation update to fT . In general, our method could also perform phases 2 and 3 simultaneously, but this would require more GPU memory then available at the time of these experiments.", "title": "" }, { "docid": "05834e213bfb407bf844fa4a70b64e16", "text": "Parametric image segmentation consists of finding a label field that defines a partition of an image into a set of nonoverlapping regions and the parameters of the models that describe the variation of some property within each region. A new Bayesian formulation for the solution of this problem is presented, based on the key idea of using a doubly stochastic prior model for the label field, which allows one to find exact optimal estimators for both this field and the model parameters by the minimization of a differentiable function. An efficient minimization algorithm and comparisons with existing methods on synthetic images are presented, as well as examples of realistic applications to the segmentation of Magnetic Resonance volumes and to motion segmentation.", "title": "" } ]
scidocsrr
22ad268ada2c230126faa965804de169
Phase distribution of software development effort
[ { "docid": "2e9b2eccefe56b9cbf8d5793cc3f1cbb", "text": "This paper summarizes several classes of software cost estimation models and techniques: parametric models, expertise-based techniques, learning-oriented techniques, dynamics-based models, regression-based models, and composite-Bayesian techniques for integrating expertisebased and regression-based models. Experience to date indicates that neural-net and dynamics-based techniques are less mature than the other classes of techniques, but that all classes of techniques are challenged by the rapid pace of change in software technology. The primary conclusion is that no single technique is best for all situations, and that a careful comparison of the results of several approaches is most likely to produce realistic estimates.", "title": "" } ]
[ { "docid": "56a7243414824a2e4ab3993dc3a90fbe", "text": "The primary objectives of periodontal therapy are to maintain and to obtain health and integrity of the insertion apparatus and to re-establish esthetics by means of the quantitative and qualitative restoration of the gingival margin. Esthetics can be considered essential to the success of any dental procedure. However, in cleft lip and palate patients gingival esthetics do not play a relevant role, since most patients present little gingiva exposure (Mikami, 1990). The treatment protocol for cleft palate patients is complex and often requires a myriad of surgical and rehabilitative procedures that last until adulthood. In order to rehabilitate these patients and provide them with adequate physical and psychological conditions for a good quality of life, plastic surgery has been taking place since the 19th century, with the development of new techniques. By the age of six months the patients have undergone lip repair procedures (Bill, 1956; Jolleys, 1954), followed by palatoplasty at the age of 1218 months. As a consequence of these surgical interventions, the formation of innumerous scars and fibrous tissue in the anterior region may cause some sequels, such as orofacial growth alterations (Quarta and Koch, 1989; Ozawa, 2001), a shallow vestibule with lack of attached gingiva and gingival margin mobility (Falcone, 1966). A shallow vestibule in the cleft lip and palate patient is associated with the contraction of the upper lip during healing (Iino et al, 2001), which causes deleterious effects on growth, facial expression, speech, orthodontic and prosthetic treatment problems, diminished keratinized gingiva, bone graft resorption and changes in the upper lip muscle pattern. The surgical protocol at the Hospital for Rehabilitation of Craniofacial Anomalies (HRCA) in Bauru consists of carrying out primary surgeries (cheiloplasty and palatoplasty) during the first months of Periodontal Health Re-Establishment in Cleft Lip and Palate Patients through Vestibuloplasty Associated with Free Gingival Graft", "title": "" }, { "docid": "a947380864130c898d15d7d34280825f", "text": "Automatic oil tank detection plays a very important role for remote sensing image processing. To accomplish the task, a hierarchical oil tank detector with deep surrounding features is proposed in this paper. The surrounding features extracted by the deep learning model aim at making the oil tanks more easily to recognize, since the appearance of oil tanks is a circle and this information is not enough to separate targets from the complex background. The proposed method is divided into three modules: 1) candidate selection; 2) feature extraction; and 3) classification. First, a modified ellipse and line segment detector (ELSD) based on gradient orientation is used to select candidates in the image. Afterward, the feature combing local and surrounding information together is extracted to represent the target. Histogram of oriented gradients (HOG) which can reliably capture the shape information is extracted to characterize the local patch. For the surrounding area, the convolutional neural network (CNN) trained in ImageNet Large Scale Visual Recognition Challenge 2012 (ILSVRC2012) contest is applied as a blackbox feature extractor to extract rich surrounding feature. Then, the linear support vector machine (SVM) is utilized as the classifier to give the final output. Experimental results indicate that the proposed method is robust under different complex backgrounds and has high detection rate with low false alarm.", "title": "" }, { "docid": "c0ec2818c7f34359b089acc1df5478c6", "text": "Methods We searched Medline from Jan 1, 2009, to Nov 19, 2013, limiting searches to phase 3, randomised trials of patients with atrial fi brillation who were randomised to receive new oral anticoagulants or warfarin, and trials in which both effi cacy and safety outcomes were reported. We did a prespecifi ed meta-analysis of all 71 683 participants included in the RE-LY, ROCKET AF, ARISTOTLE, and ENGAGE AF–TIMI 48 trials. The main outcomes were stroke and systemic embolic events, ischaemic stroke, haemorrhagic stroke, all-cause mortality, myocardial infarction, major bleeding, intracranial haemorrhage, and gastrointestinal bleeding. We calculated relative risks (RRs) and 95% CIs for each outcome. We did subgroup analyses to assess whether diff erences in patient and trial characteristics aff ected outcomes. We used a random-eff ects model to compare pooled outcomes and tested for heterogeneity.", "title": "" }, { "docid": "5ae974ffec58910ea3087aefabf343f8", "text": "With the ever-increasing use of multimedia contents through electronic commerce and on-line services, the problems associated with the protection of intellectual property, management of large database and indexation of content are becoming more prominent. Watermarking has been considered as efficient means to these problems. Although watermarking is a powerful tool, there are some issues with the use of it, such as the modification of the content and its security. With respect to this, identifying content itself based on its own features rather than watermarking can be an alternative solution to these problems. The aim of fingerprinting is to provide fast and reliable methods for content identification. In this paper, we present a new approach for image fingerprinting using the Radon transform to make the fingerprint robust against affine transformations. Since it is quite easy with modern computers to apply affine transformations to audio, image and video, there is an obvious necessity for affine transformation resilient fingerprinting. Experimental results show that the proposed fingerprints are highly robust against most signal processing transformations. Besides robustness, we also address other issues such as pairwise independence, database search efficiency and key dependence of the proposed method. r 2003 Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "2f3046369c717cc3dc15632fc163a429", "text": "We propose FaceVR, a novel image-based method that enables video teleconferencing in VR based on self-reenactment. State-of-the-art face tracking methods in the VR context are focused on the animation of rigged 3D avatars (Li et al. 2015; Olszewski et al. 2016). Although they achieve good tracking performance, the results look cartoonish and not real. In contrast to these model-based approaches, FaceVR enables VR teleconferencing using an image-based technique that results in nearly photo-realistic outputs. The key component of FaceVR is a robust algorithm to perform real-time facial motion capture of an actor who is wearing a head-mounted display (HMD), as well as a new data-driven approach for eye tracking from monocular videos. Based on reenactment of a prerecorded stereo video of the person without the HMD, FaceVR incorporates photo-realistic re-rendering in real time, thus allowing artificial modifications of face and eye appearances. For instance, we can alter facial expressions or change gaze directions in the prerecorded target video. In a live setup, we apply these newly introduced algorithmic components.", "title": "" }, { "docid": "de630d018f3ff24fad06976e8dc390fa", "text": "A critical first step in navigation of unmanned aerial vehicles is the detection of the horizon line. This information can be used for adjusting flight parameters, attitude estimation as well as obstacle detection and avoidance. In this paper, a fast and robust technique for precise detection of the horizon is presented. Our approach is to apply convolutional neural networks to the task, training them to detect the sky and ground regions as well as the horizon line in flight videos. Thorough experiments using large datasets illustrate the significance and accuracy of this technique for various types of terrain as well as seasonal conditions.", "title": "" }, { "docid": "ab231cbc45541b5bdbd0da82571b44ca", "text": "ABSTRACT Evidence of Sedona magnetic anomaly and brainwave EEG synchronization can be demonstrated with portable equipment on site in the field, during sudden magnetic events. Previously, we have demonstrated magnetic anomaly charts recorded in both known and unrecognized Sedona vortex activity locations. We have also shown a correlation or amplification of vortex phenomena with Schumann Resonance. Adding the third measurable parameter of brain wave activity, we demonstrate resonance and amplification among them. We suggest tiny magnetic crystals, biogenic magnetite, make human beings highly sensitive to ELF field fluctuations. Biological Magnetite could act as a transducer of both low frequency magnetic fields and RF fields.", "title": "" }, { "docid": "53e74115eceda124c28975cdaa8e4088", "text": "Current state-of-the-art motion planners rely on samplingbased planning to explore the problem space for a solution. However, sampling valid configurations in narrow or cluttered workspaces remains a challenge. If a valid path for the robot correlates to a path in the workspace, then the planning process can employ a representation of the workspace that captures its salient topological features. Prior approaches have investigated exploiting geometric decompositions of the workspace to bias sampling; while beneficial in some environments, complex narrow passages remain challenging to navigate. In this work, we present Dynamic Region-biased RRT, a novel samplingbased planner that guides the exploration of a Rapidly-exploring Random Tree (RRT) by moving sampling regions along an embedded graph that captures the workspace topology. These sampling regions are dynamically created, manipulated, and destroyed to greedily bias sampling through unexplored passages that lead to the goal. We show that our approach reduces online planning time compared with related methods on a set of maze-like problems.", "title": "" }, { "docid": "0d7ce42011c48232189c791e71c289f5", "text": "RECENT WORK in virtue ethics, particularly sustained reflection on specific virtues, makes it possible to argue that the classical list of cardinal virtues (prudence, justice, temperance, and fortitude) is inadequate, and that we need to articulate the cardinal virtues more correctly. With that end in view, the first section of this article describes the challenges of espousing cardinal virtues today, the second considers the inadequacy of the classical listing of cardinal virtues, and the third makes a proposal. Since virtues, no matter how general, should always relate to concrete living, the article is framed by a case.", "title": "" }, { "docid": "84e71d32b1f40eb59d63a0ec6324d79b", "text": "Typically a classifier trained on a given dataset (source domain) does not performs well if it is tested on data acquired in a different setting (target domain). This is the problem that domain adaptation (DA) tries to overcome and, while it is a well explored topic in computer vision, it is largely ignored in robotic vision where usually visual classification methods are trained and tested in the same domain. Robots should be able to deal with unknown environments, recognize objects and use them in the correct way, so it is important to explore the domain adaptation scenario also in this context. The goal of the project is to define a benchmark and a protocol for multimodal domain adaptation that is valuable for the robot vision community. With this purpose some of the state-of-the-art DA methods are selected: Deep Adaptation Network (DAN), Domain Adversarial Training of Neural Network (DANN), Automatic Domain Alignment Layers (AutoDIAL) and Adversarial Discriminative Domain Adaptation (ADDA). Evaluations have been done using different data types: RGB only, depth only and RGB-D over the following datasets, designed for the robotic community: RGB-D Object Dataset (ROD), Web Object Dataset (WOD), Autonomous Robot Indoor Dataset (ARID), Big Berkeley Instance Recognition Dataset (BigBIRD) and Active Vision Dataset. Although progresses have been made on the formulation of effective adaptation algorithms and more realistic object datasets are available, the results obtained show that, training a sufficiently good object classifier, especially in the domain adaptation scenario, is still an unsolved problem. Also the best way to combine depth with RGB informations to improve the performance is a point that needs to be investigated more.", "title": "" }, { "docid": "73e1b088461da774889ec2bd7ee2f524", "text": "In this paper, we propose a method for obtaining sentence-level embeddings. While the problem of securing word-level embeddings is very well studied, we propose a novel method for obtaining sentence-level embeddings. This is obtained by a simple method in the context of solving the paraphrase generation task. If we use a sequential encoder-decoder model for generating paraphrase, we would like the generated paraphrase to be semantically close to the original sentence. One way to ensure this is by adding constraints for true paraphrase embeddings to be close and unrelated paraphrase candidate sentence embeddings to be far. This is ensured by using a sequential pair-wise discriminator that shares weights with the encoder that is trained with a suitable loss function. Our loss function penalizes paraphrase sentence embedding distances from being too large. This loss is used in combination with a sequential encoder-decoder network. We also validated our method by evaluating the obtained embeddings for a sentiment analysis task. The proposed method results in semantic embeddings and outperforms the state-of-the-art on the paraphrase generation and sentiment analysis task on standard datasets. These results are also shown to be statistically significant.", "title": "" }, { "docid": "8c03df6650b3e400bc5447916d01820a", "text": "People called night owls habitually have late bedtimes and late times of arising, sometimes suffering a heritable circadian disturbance called delayed sleep phase syndrome (DSPS). Those with DSPS, those with more severe progressively-late non-24-hour sleep-wake cycles, and those with bipolar disorder may share genetic tendencies for slowed or delayed circadian cycles. We searched for polymorphisms associated with DSPS in a case-control study of DSPS research participants and a separate study of Sleep Center patients undergoing polysomnography. In 45 participants, we resequenced portions of 15 circadian genes to identify unknown polymorphisms that might be associated with DSPS, non-24-hour rhythms, or bipolar comorbidities. We then genotyped single nucleotide polymorphisms (SNPs) in both larger samples, using Illumina Golden Gate assays. Associations of SNPs with the DSPS phenotype and with the morningness-eveningness parametric phenotype were computed for both samples, then combined for meta-analyses. Delayed sleep and \"eveningness\" were inversely associated with loci in circadian genes NFIL3 (rs2482705) and RORC (rs3828057). A group of haplotypes overlapping BHLHE40 was associated with non-24-hour sleep-wake cycles, and less robustly, with delayed sleep and bipolar disorder (e.g., rs34883305, rs34870629, rs74439275, and rs3750275 were associated with n=37, p=4.58E-09, Bonferroni p=2.95E-06). Bright light and melatonin can palliate circadian disorders, and genetics may clarify the underlying circadian photoperiodic mechanisms. After further replication and identification of the causal polymorphisms, these findings may point to future treatments for DSPS, non-24-hour rhythms, and possibly bipolar disorder or depression.", "title": "" }, { "docid": "da7fc676542ccc6f98c36334d42645ae", "text": "Extracting the defects of the road pavement in images is difficult and, most of the time, one image is used alone. The difficulties of this task are: illumination changes, objects on the road, artefacts due to the dynamic acquisition. In this work, we try to solve some of these problems by using acquisitions from different points of view. In consequence, we present a new methodology based on these steps : the detection of defects in each image, the matching of the images and the merging of the different extractions. We show the increase in performances and more particularly how the false detections are reduced.", "title": "" }, { "docid": "347e7b80b2b0b5cd5f0736d62fa022ae", "text": "This article presents the results of an interview study on how people perceive and play social network games on Facebook. During recent years, social games have become the biggest genre of games if measured by the number of registered users. These games are designed to cater for large audiences in their design principles and values, a free-to-play revenue model and social network integration that make them easily approachable and playable with friends. Although these games have made the headlines and have been seen to revolutionize the game industry, we still lack an understanding of how people perceive and play them. For this article, we interviewed 18 Finnish Facebook users from a larger questionnaire respondent pool of 134 people. This study focuses on a user-centric approach, highlighting the emergent experiences and the meaning-making of social games players. Our findings reveal that social games are usually regarded as single player games with a social twist, and as suffering partly from their design characteristics, while still providing a wide spectrum of playful experiences for different needs. The free-to-play revenue model provides an easy access to social games, but people disagreed with paying for additional content for several reasons.", "title": "" }, { "docid": "6f0faf1a90d9f9b19fb2e122a26a0f77", "text": "Social media shatters the barrier to communicate anytime anywhere for people of all walks of life. The publicly available, virtually free information in social media poses a new challenge to consumers who have to discern whether a piece of information published in social media is reliable. For example, it can be difficult to understand the motivations behind a statement passed from one user to another, without knowing the person who originated the message. Additionally, false information can be propagated through social media, resulting in embarrassment or irreversible damages. Provenance data associated with a social media statement can help dispel rumors, clarify opinions, and confirm facts. However, provenance data about social media statements is not readily available to users today. Currently, providing this data to users requires changing the social media infrastructure or offering subscription services. Taking advantage of social media features, research in this nascent field spearheads the search for a way to provide provenance data to social media users, thus leveraging social media itself by mining it for the provenance data. Searching for provenance data reveals an interesting problem space requiring the development and application of new metrics in order to provide meaningful provenance data to social media users. This lecture reviews the current research on information provenance, explores exciting research opportunities to address pressing needs, and shows how data mining can enable a social media user to make informed judgements about statements published in social media.", "title": "" }, { "docid": "cf21fd00999dff7d974f39b99e71bb13", "text": "Taking r > 0, let π2r(x) denote the number of prime pairs (p, p+ 2r) with p ≤ x. The prime-pair conjecture of Hardy and Littlewood (1923) asserts that π2r(x) ∼ 2C2r li2(x) with an explicit constant C2r > 0. There seems to be no good conjecture for the remainders ω2r(x) = π2r(x)−2C2r li2(x) that corresponds to Riemann’s formula for π(x)−li(x). However, there is a heuristic approximate formula for averages of the remainders ω2r(x) which is supported by numerical results.", "title": "" }, { "docid": "ed66f39bda7ccd5c76f64543b5e3abd6", "text": "BACKGROUND\nLoeys-Dietz syndrome is a recently recognized multisystemic disorder caused by mutations in the genes encoding the transforming growth factor-beta receptor. It is characterized by aggressive aneurysm formation and vascular tortuosity. We report the musculoskeletal demographic, clinical, and imaging findings of this syndrome to aid in its diagnosis and treatment.\n\n\nMETHODS\nWe retrospectively analyzed the demographic, clinical, and imaging data of sixty-five patients with Loeys-Dietz syndrome seen at one institution from May 2007 through December 2008.\n\n\nRESULTS\nThe patients had a mean age of twenty-one years, and thirty-six of the sixty-five patients were less than eighteen years old. Previous diagnoses for these patients included Marfan syndrome (sixteen patients) and Ehlers-Danlos syndrome (two patients). Spinal and foot abnormalities were the most clinically important skeletal findings. Eleven patients had talipes equinovarus, and nineteen patients had cervical anomalies and instability. Thirty patients had scoliosis (mean Cobb angle [and standard deviation], 30 degrees +/- 18 degrees ). Two patients had spondylolisthesis, and twenty-two of thirty-three who had computed tomography scans had dural ectasia. Thirty-five patients had pectus excavatum, and eight had pectus carinatum. Combined thumb and wrist signs were present in approximately one-fourth of the patients. Acetabular protrusion was present in approximately one-third of the patients and was usually mild. Fourteen patients had previous orthopaedic procedures, including scoliosis surgery, cervical stabilization, clubfoot correction, and hip arthroplasty. Features of Loeys-Dietz syndrome that are important clues to aid in making this diagnosis include bifid broad uvulas, hypertelorism, substantial joint laxity, and translucent skin.\n\n\nCONCLUSIONS\nPatients with Loeys-Dietz syndrome commonly present to the orthopaedic surgeon with cervical malformations, spinal and foot deformities, and findings in the craniofacial and cutaneous systems.\n\n\nLEVEL OF EVIDENCE\nTherapeutic Level IV. See Instructions to Authors for a complete description of levels of evidence.", "title": "" }, { "docid": "20705a14783c89ac38693b2202363c1f", "text": "This paper analyzes the effect of employee recognition, pay, and benefits on job satisfaction. In this cross-sectional study, survey responses from university students in the U.S. (n = 457), Malaysia (n = 347) and Vietnam (n = 391) were analyzed. Employee recognition, pay, and benefits were found to have a significant impact on job satisfaction, regardless of home country income level (high, middle or low income) and culture (collectivist or individualist). However, the effect of benefits on job satisfaction was significantly more important for U.S. respondents than for respondents from Malaysia and Vietnam. The authors conclude that both financial and nonfinancial rewards have a role in influencing job satisfaction, which ultimately impacts employee performance. Theoretical and practical implications for developing effective recruitment and retention policies for employees are also discussed.", "title": "" }, { "docid": "d3e8dce306eb20a31ac6b686364d0415", "text": "Lung diseases are the deadliest disease in the world. The computer aided detection system in lung diseases needed accurate lung segmentation to preplan the pulmonary treatment and surgeries. The researchers undergone the lung segmentation need a deep study and understanding of the traditional and recent papers developed in the lung segmentation field so that they can continue their research journey in an efficient way with successful outcomes. The need of reviewing the research papers is now a most wanted one for researches so this paper makes a survey on recent trends of pulmonary lung segmentation. Seven recent papers are carried out to analyze the performance characterization of themselves. The working methods, purpose for development, name of algorithm and drawbacks of the method are taken into consideration for the survey work. The tables and charts are drawn based on the reviewed papers. The study of lung segmentation research is more helpful to new and fresh researchers who are committed their research in lung segmentation.", "title": "" }, { "docid": "43f9e6edee92ddd0b9dfff885b69f64d", "text": "In this paper, we present a scalable and exact solution for probabilistic linear discriminant analysis (PLDA). PLDA is a probabilistic model that has been shown to provide state-of-the-art performance for both face and speaker recognition. However, it has one major drawback: At training time estimating the latent variables requires the inversion and storage of a matrix whose size grows quadratically with the number of samples for the identity (class). To date, two approaches have been taken to deal with this problem, to 1) use an exact solution that calculates this large matrix and is obviously not scalable with the number of samples or 2) derive a variational approximation to the problem. We present a scalable derivation which is theoretically equivalent to the previous nonscalable solution and thus obviates the need for a variational approximation. Experimentally, we demonstrate the efficacy of our approach in two ways. First, on labeled faces in the wild, we illustrate the equivalence of our scalable implementation with previously published work. Second, on the large Multi-PIE database, we illustrate the gain in performance when using more training samples per identity (class), which is made possible by the proposed scalable formulation of PLDA.", "title": "" } ]
scidocsrr
288953db1746430bc33b3c5c3df583c9
Denoising image sequences does not require motion estimation
[ { "docid": "69b631f179ea3c521f1dde75be537279", "text": "A conceptually simple but effective noise smoothing algorithm is described. This filter is motivated by the sigma probability of the Gaussian distribution, and it smooths the image noise by averaging only those neighborhood pixels which have the intensities within a fixed sigma range of the center pixel. Consequently, image edges are preserved, and subtle details and thin tines such as roads are retained. The characteristics of this smoothing algorithm are analyzed and compared with several other known filtering algorithms by their ability to retain subtle details, preserving edge shapes, sharpening ramp edges, etc. The comparison also indicates that the sigma filter is the most computationally efficient filter among those evaluated. The filter can be easily extended into several forms which can be used in contrast enhancement, image segmentation, and smoothing signal-dependent noisy images. Several test images 128 X 128 and 256 X 256 pixels in size are used to substantiate its characteristics. The algorithm can be easily extended to 3-D image smoothing.", "title": "" }, { "docid": "b5453d9e4385d5a5ff77997ad7e3f4f0", "text": "We propose a new measure, the method noise, to evaluate and compare the performance of digital image denoising methods. We first compute and analyze this method noise for a wide class of denoising algorithms, namely the local smoothing filters. Second, we propose a new algorithm, the nonlocal means (NL-means), based on a nonlocal averaging of all pixels in the image. Finally, we present some experiments comparing the NL-means algorithm and the local smoothing filters.", "title": "" } ]
[ { "docid": "24167db00908c65558e8034d94dfb8da", "text": "Due to the wide variety of devices used in computer network systems, cybersecurity plays a major role in securing and improving the performance of the network or system. Although cybersecurity has received a large amount of global interest in recent years, it remains an open research space. Current security solutions in network-based cyberspace provide an open door to attackers by communicating first before authentication, thereby leaving a black hole for an attacker to enter the system before authentication. This article provides an overview of cyberthreats, traditional security solutions, and the advanced security model to overcome current security drawbacks.", "title": "" }, { "docid": "c0ee14083f779e3f4115f8b5fd822f67", "text": "The booming popularity of smartphones is partly a result of application markets where users can easily download wide range of third-party applications. However, due to the open nature of markets, especially on Android, there have been several privacy and security concerns with these applications. On Google Play, as with most other markets, users have direct access to natural-language descriptions of those applications, which give an intuitive idea of the functionality including the security-related information of those applications. Google Play also provides the permissions requested by applications to access security and privacy-sensitive APIs on the devices. Users may use such a list to evaluate the risks of using these applications. To best assist the end users, the descriptions should reflect the need for permissions, which we term description-to-permission fidelity. In this paper, we present a system AutoCog to automatically assess description-to-permission fidelity of applications. AutoCog employs state-of-the-art techniques in natural language processing and our own learning-based algorithm to relate description with permissions. In our evaluation, AutoCog outperforms other related work on both performance of detection and ability of generalization over various permissions by a large extent. On an evaluation of eleven permissions, we achieve an average precision of 92.6% and an average recall of 92.0%. Our large-scale measurements over 45,811 applications demonstrate the severity of the problem of low description-to-permission fidelity. AutoCog helps bridge the long-lasting usability gap between security techniques and average users.", "title": "" }, { "docid": "85353c8d4d414875cc08a0757d1d6430", "text": "Contacts : creechch@umich.edu, jskumaar@umich.edu, lprobert@umich.edu, tilbury@umich.edu, xijyang@umich.edu, anujkp@umich.edu, kate.tsui@tri.global Summary Our long term goal is to promote mutual trust based on the expectations of both a pedestrian and an autonomous vehicle (AV). Our first step to accomplishing this is to propose a user study that leverages virtual reality (VR) to examine the effects of an autonomous vehicle’s driving behavior and situational characteristics on a pedestrian’s trust.", "title": "" }, { "docid": "50f5e103666426113af680a0c2494921", "text": "The security of information systems is the most important principle that can also be said that the most difficult, because security must be maintained throughout the system. At the beginning of this article we are going to introduce basic principles of security. The securities of distributed systems are divided into two parts: A portion of the communication between users and processes is concerned with examining issues such as authentication, message integrity and encryption will be discussed. In the next section, we will examine the guaranteed access permissions to resources in distributed systems. In addition to traditional access solutions, access control in mobile codes will be examined.", "title": "" }, { "docid": "9b10757ca3ca84784033c20f064078b7", "text": "Snafu, or Snake Functions, is a modular system to host, execute and manage language-level functions offered as stateless (micro-)services to diverse external triggers. The system interfaces resemble those of commercial FaaS providers but its implementation provides distinct features which make it overall useful to research on FaaS and prototyping of FaaSbased applications. This paper argues about the system motivation in the presence of already existing alternatives, its design and architecture, the open source implementation and collected metrics which characterise the system.", "title": "" }, { "docid": "de38d178143e555170ecbc99f0495739", "text": "In this article, we present a real-time 3D hybrid beamforming approach for 5G wireless networks. One of the key concepts in 5G cellular systems is the small cell network, which settles the high mobile traffic demand and provides uniform user-experienced data rates. The overall capacity of the small cell network can be enhanced with the enabling technology of 3D hybrid beamforming. This study validates the feasibility of 3D hybrid beamforming, mostly for link-level performance, through the implementation of a real-time testbed using a SDR platform and fabricated antenna array. Based on the measured data, we also investigate system-level performance to verify the gain of the proposed smart small cell system over LTE systems by performing system-level simulations based on a 3D ray-tracing tool.", "title": "" }, { "docid": "fd721261c29395867ce3966bdaeeaa7a", "text": "Cutaneous saltation provides interesting possibilities for applications. An illusion of vibrotactile mediolateral movement was elicited to a left dorsal forearm to investigate emotional (i.e., pleasantness) and cognitive (i.e., continuity) experiences to vibrotactile stimulation. Twelve participants were presented with nine saltatory stimuli delivered to a linearly aligned row of three vibrotactile actuators separated by 70 mm in distance. The stimuli were composed of three temporal parameters of 12, 24 and 48 ms for both burst duration and inter-burst interval to form all nine possible uniform pairs. First, the stimuli were ranked by the participants using a special three-step procedure. Second, the participants rated the stimuli using two nine-point bipolar scales measuring the pleasantness and continuity of each stimulus, separately. The results showed especially the interval between two successive bursts was a significant factor for saltation. Moreover, the temporal parameters seemed to affect more the experienced continuity of the stimuli compared to pleasantness. These findings encourage us to continue to further study the saltation and the effect of different parameters for subjective experience.", "title": "" }, { "docid": "269e1c0d737beafd10560360049c6ee3", "text": "There is no doubt that Social media has gained wider acceptability and usability and is also becoming probably the most important communication tools among students especially at the higher level of educational pursuit. As much as social media is viewed as having bridged the gap in communication that existed. Within the social media Facebook, Twitter and others are now gaining more and more patronage. These websites and social forums are way of communicating directly with other people socially. Social media has the potentials of influencing decision-making in a very short time regardless of the distance. On the bases of its influence, benefits and demerits this study is carried out in order to highlight the potentials of social media in the academic setting by collaborative learning and improve the students' academic performance. The results show that collaborative learning positively and significantly with interactive with peers, interactive with teachers and engagement which impact the students’ academic performance.", "title": "" }, { "docid": "5c8242eabf1df5fb6c61f490dd2e3e5d", "text": "In recent years, the capabilities and roles of Unmanned Aerial Vehicles (UAVs) have rapidly evolved, and their usage in military and civilian areas is extremely popular as a result of the advances in technology of robotic systems such as processors, sensors, communications, and networking technologies. While this technology is progressing, development and maintenance costs of UAVs are decreasing relatively. The focus is changing from use of one large UAV to use of multiple UAVs, which are integrated into teams that can coordinate to achieve high-level goals. This level of coordination requires new networking models that can be set up on highly mobile nodes such as UAVs in the fleet. Such networking models allow any two nodes to communicate directly if they are in the communication range, or indirectly through a number of relay nodes such as UAVs. Setting up an ad-hoc network between flying UAVs is a challenging issue, and requirements can differ from traditional networks, Mobile Ad-hoc Networks (MANETs) and Vehicular Ad-hoc Networks (VANETs) in terms of node mobility, connectivity, message routing, service quality, application areas, etc. This paper O. K. Sahingoz (B) Computer Engineering Department, Turkish Air Force Academy, Yesilyurt, Istanbul, 34149, Turkey e-mail: sahingoz@hho.edu.tr identifies the challenges with using UAVs as relay nodes in an ad-hoc manner, introduces network models of UAVs, and depicts open research issues with analyzing opportunities and future work.", "title": "" }, { "docid": "9e9be149fc44552b6ac9eb2d90d4a4ba", "text": "In this work, a level set energy for segmenting the lungs from digital Posterior-Anterior (PA) chest x-ray images is presented. The primary challenge in using active contours for lung segmentation is local minima due to shading effects and presence of strong edges due to the rib cage and clavicle. We have used the availability of good contrast at the lung boundaries to extract a multi-scale set of edge/corner feature points and drive our active contour model using these features. We found these features when supplemented with a simple region based data term and a shape term based on the average lung shape, able to handle the above local minima issues. The algorithm was tested on 1130 clinical images, giving promising results.", "title": "" }, { "docid": "ff4c2f1467a141894dbe76491bc06d3b", "text": "Railways is the major means of transport in most of the countries. Rails are the backbone of the track structure and should be protected from defects. Surface defects are irregularities in the rails caused due to the shear stresses between the rails and wheels of the trains. This type of defects should be detected to avoid rail fractures. The objective of this paper is to propose an innovative technique to detect the surface defect on rail heads. In order to identify the defects, it is essential to extract the rails from the background and further enhance the image for thresholding. The proposed method uses Binary Image Based Rail Extraction (BIBRE) algorithm to extract the rails from the background. The extracted rails are enhanced to achieve uniform background with the help of direct enhancement method. The direct enhancement method enhance the image by enhancing the brightness difference between objects and their backgrounds. The enhanced rail image uses Gabor filters to identify the defects from the rails. The Gabor filters maximizes the energy difference between defect and defect less surface. Thresholding is done based on the energy of the defects. From the thresholded image the defects are identified and a message box is generated when there is a presence of defects.", "title": "" }, { "docid": "404acd9265ae921e7454d4348ae45bda", "text": "Wepresent a bitmap printingmethod and digital workflow usingmulti-material high resolution Additive Manufacturing (AM). Material composition is defined based on voxel resolution and used to fabricate a design object with locally varying material stiffness, aiming to satisfy the design objective. In this workflowvoxel resolution is set by theprinter’s native resolution, eliminating theneed for slicing andpath planning. Controlling geometry and material property variation at the resolution of the printer provides significantly greater control over structure–property–function relationships. To demonstrate the utility of the bitmap printing approach we apply it to the design of a customized prosthetic socket. Pressuresensing elements are concurrently fabricated with the socket, providing possibilities for evaluation of the socket’s fit. The level of control demonstrated in this study cannot be achieved using traditional CAD tools and volume-based AM workflows, implying that new CAD workflows must be developed in order to enable designers to harvest the capabilities of AM. © 2014 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "b5a8577b02f7f44e9fc5abd706e096d4", "text": "Automotive Safety Integrity Level (ASIL) decomposition is a technique presented in the ISO 26262: Road Vehicles Functional Safety standard. Its purpose is to satisfy safety-critical requirements by decomposing them into less critical ones. This procedure requires a system-level validation, and the elements of the architecture to which the decomposed requirements are allocated must be analyzed in terms of Common-Cause Faults (CCF). In this work, we present a generic method for a bottomup ASIL decomposition, which can be used during the development of a new product. The system architecture is described in a three-layer model, from which fault trees are generated, formed by the application, resource, and physical layers and their mappings. A CCF analysis is performed on the fault trees to verify the absence of possible common faults between the redundant elements and to validate the ASIL decomposition.", "title": "" }, { "docid": "2be043b09e6dd631b5fe6f9eed44e2ec", "text": "This article aims to contribute to a critical research agenda for investigating the democratic implications of citizen journalism and social news. The article calls for a broad conception of ‘citizen journalism’ which is (1) not an exclusively online phenomenon, (2) not confined to explicitly ‘alternative’ news sources, and (3) includes ‘metajournalism’ as well as the practices of journalism itself. A case is made for seeing democratic implications not simply in the horizontal or ‘peer-to-peer’ public sphere of citizen journalism networks, but also in the possibility of a more ‘reflexive’ culture of news consumption through citizen participation. The article calls for a research agenda that investigates new forms of gatekeeping and agendasetting power within social news and citizen journalism networks and, drawing on the example of three sites, highlights the importance of both formal and informal status differentials and of the software ‘code’ structuring these new modes of news", "title": "" }, { "docid": "4551c05bbf8969d310d548d5a773f584", "text": "Optical testing of advanced CMOS circuits successfully exploits the near-infrared photon emission by hot-carriers in transistor channels (see EMMI (Ng et al., 1999) and PICA (Kash and Tsang, 1997) (Song et al., 2005) techniques). However, due to the continuous scaling of features size and supply voltage, spontaneous emission is becoming fainter and optical circuit diagnostics becomes more challenging. Here we present the experimental characterization of hot-carrier luminescence emitted by transistors in four CMOS technologies from two different manufacturers. Aim of the research is to gain a better perspective on emission trends and dependences on technological parameters. In particular, we identify luminescence changes due to short-channel effects (SCE) and we ascertain that, for each technology node, there are two operating regions, for short- and long-channels. We highlight the emission reduction of p-FETs compared to n-FETs, due to a \"red-shift\" (lower energy) of the hot-carrier distribution. Eventually, we give perspectives about emission trends in actual and future technology nodes, showing that luminescence dramatically decreases with voltage, but it recovers strength when moving from older to more advanced technology generations. Such results extend the applicability of optical testing techniques, based on present single-photon detectors, to future low-voltage chips", "title": "" }, { "docid": "612c5bfb0878588e5362d17a4ebc47ef", "text": "There are two key issues in successfully solving the image restoration problem: 1) estimation of the regularization parameter that balances data fidelity with the regularity of the solution and 2) development of efficient numerical techniques for computing the solution. In this paper, we derive a fast algorithm that simultaneously estimates the regularization parameter and restores the image. The new approach is based on the total-variation (TV) regularized strategy and Morozov's discrepancy principle. The TV norm is represented by the dual formulation that changes the minimization problem into a minimax problem. A proximal point method is developed to compute the saddle point of the minimax problem. By adjusting the regularization parameter adaptively in each iteration, the solution is guaranteed to satisfy the discrepancy principle. We will give the convergence proof of our algorithm and numerically show that it is better than some state-of-the-art methods in terms of both speed and accuracy.", "title": "" }, { "docid": "562cf2d0bc59f0fde4d7377f1d5058a2", "text": "The fields of neuroscience and artificial intelligence (AI) have a long and intertwined history. In more recent times, however, communication and collaboration between the two fields has become less commonplace. In this article, we argue that better understanding biological brains could play a vital role in building intelligent machines. We survey historical interactions between the AI and neuroscience fields and emphasize current advances in AI that have been inspired by the study of neural computation in humans and other animals. We conclude by highlighting shared themes that may be key for advancing future research in both fields.", "title": "" }, { "docid": "0e4917e7a9e1abe867811f8454cbcdc0", "text": "Long videos can be played much faster than real-time by recording only one frame per second or by dropping all but one frame each second, i.e., by creating a timelapse. Unstable hand-held moving videos can be stabilized with a number of recently described methods. Unfortunately, creating a stabilized timelapse, or hyperlapse, cannot be achieved through a simple combination of these two methods. Two hyperlapse methods have been previously demonstrated: one with high computational complexity and one requiring special sensors. We present an algorithm for creating hyperlapse videos that can handle significant high-frequency camera motion and runs in real-time on HD video. Our approach does not require sensor data, thus can be run on videos captured on any camera. We optimally select frames from the input video that best match a desired target speed-up while also resulting in the smoothest possible camera motion. We evaluate our approach using several input videos from a range of cameras and compare these results to existing methods.", "title": "" }, { "docid": "5a77a8a9e0a1ec5284d07140fff06f66", "text": "Among the many challenges facing modern space physics today is the need for a visualisation and analysis package which can examine the results from the diversity of numerical and empirical computer models as well as observational data. Magnetohydrodynamic (MHD) models represent the latest numerical models of the complex Earth’s space environment and have the unique ability to span the enormous distances present in the magnetosphere from several hundred kilometres to several thousand kilometres above the Earth surface. This feature enables scientist to study complex structures of processes where otherwise only point measurements from satellites or ground-based instruments are available. Only by combining these observational data and the MHD simulations it is possible to enlarge the scope of the point-to-point observations and to fill the gaps left by measurements in order to get a full 3-D representation of the processes in our geospace environment. In this paper we introduce the VisAn MHD toolbox for Matlab as a tool for the visualisation and analysis of observational data and MHD simulations. We have created an easy to use tool which is capable of highly sophisticated visualisations and data analysis of the results from a diverse set of MHD models in combination with in situ measurements from satellites and groundbased instruments. The toolbox is being released under an open-source licensing agreement to facilitate and encourage community use and contribution.", "title": "" }, { "docid": "95b93b1c67349e98fe803ee120193329", "text": "This paper tackles the problem of segmenting things that could move from 3D laser scans of urban scenes. In particular, we wish to detect instances of classes of interest in autonomous driving applications - cars, pedestrians and bicyclists - amongst significant background clutter. Our aim is to provide the layout of an end-to-end pipeline which, when fed by a raw stream of 3D data, produces distinct groups of points which can be fed to downstream classifiers for categorisation. We postulate that, for the specific classes considered in this work, solving a binary classification task (i.e. separating the data into foreground and background first) outperforms approaches that tackle the multi-class problem directly. This is confirmed using custom and third-party datasets gathered of urban street scenes. While our system is agnostic to the specific clustering algorithm deployed we explore the use of a Euclidean Minimum Spanning Tree for an end-to-end segmentation pipeline and devise a RANSAC-based edge selection criterion.", "title": "" } ]
scidocsrr
cdc0255545fed60d1857d1ca046a8f60
Solid-State Thermal Management for Lithium-Ion EV Batteries
[ { "docid": "d1ba66a0c84fccad40d63a2bf7f5dd54", "text": "Thermal management of batteries in electric vehicles (EVs) and hybrid electric vehicles (HEVs) is essential for effective operation in all climates. This has been recognized in the design of battery modules and packs for pre-production prototype or production EVs and HEVs. Designs are evolving and various issues are being addressed. There are trade-offs between performance, functionality, volume, mass, cost, maintenance, and safety. In this paper, we will review some of the issues and associated solutions for battery thermal management and what information is needed for proper design of battery management systems. We will discuss such topics as active cooling versus passive cooling, liquid cooling versus air cooling, cooling and heating versus cooling only systems, and relative needs of thermal management for VRLA, NiMH, and Li-Ion batteries.", "title": "" } ]
[ { "docid": "7e848e98909c69378f624ce7db31dbfa", "text": "Phenotypically identical cells can dramatically vary with respect to behavior during their lifespan and this variation is reflected in their molecular composition such as the transcriptomic landscape. Single-cell transcriptomics using next-generation transcript sequencing (RNA-seq) is now emerging as a powerful tool to profile cell-to-cell variability on a genomic scale. Its application has already greatly impacted our conceptual understanding of diverse biological processes with broad implications for both basic and clinical research. Different single-cell RNA-seq protocols have been introduced and are reviewed here-each one with its own strengths and current limitations. We further provide an overview of the biological questions single-cell RNA-seq has been used to address, the major findings obtained from such studies, and current challenges and expected future developments in this booming field.", "title": "" }, { "docid": "da5362ac9f2a8d4e7ea4126797da6d5f", "text": "Generating a novel and descriptive caption of an image is drawing increasing interests in computer vision, natural language processing, and multimedia communities. In this work, we propose an end-to-end trainable deep bidirectional LSTM (Bi-LSTM (Long Short-Term Memory)) model to address the problem. By combining a deep convolutional neural network (CNN) and two separate LSTM networks, our model is capable of learning long-term visual-language interactions by making use of history and future context information at high-level semantic space. We also explore deep multimodal bidirectional models, in which we increase the depth of nonlinearity transition in different ways to learn hierarchical visual-language embeddings. Data augmentation techniques such as multi-crop, multi-scale, and vertical mirror are proposed to prevent overfitting in training deep models. To understand how our models “translate” image to sentence, we visualize and qualitatively analyze the evolution of Bi-LSTM internal states over time. The effectiveness and generality of proposed models are evaluated on four benchmark datasets: Flickr8K, Flickr30K, MSCOCO, and Pascal1K datasets. We demonstrate that Bi-LSTM models achieve highly competitive performance on both caption generation and image-sentence retrieval even without integrating an additional mechanism (e.g., object detection, attention model). Our experiments also prove that multi-task learning is beneficial to increase model generality and gain performance. We also demonstrate the performance of transfer learning of the Bi-LSTM model significantly outperforms previous methods on the Pascal1K dataset.", "title": "" }, { "docid": "db1d5903d2d49d995f5d3b6dd0681323", "text": "Diffusion tensor imaging (DTI) is an exciting new MRI modality that can reveal detailed anatomy of the white matter. DTI also allows us to approximate the 3D trajectories of major white matter bundles. By combining the identified tract coordinates with various types of MR parameter maps, such as T2 and diffusion properties, we can perform tract-specific analysis of these parameters. Unfortunately, 3D tract reconstruction is marred by noise, partial volume effects, and complicated axonal structures. Furthermore, changes in diffusion anisotropy under pathological conditions could alter the results of 3D tract reconstruction. In this study, we created a white matter parcellation atlas based on probabilistic maps of 11 major white matter tracts derived from the DTI data from 28 normal subjects. Using these probabilistic maps, automated tract-specific quantification of fractional anisotropy and mean diffusivity were performed. Excellent correlation was found between the automated and the individual tractography-based results. This tool allows efficient initial screening of the status of multiple white matter tracts.", "title": "" }, { "docid": "86aca69fa9d46e27a26c586962d9309f", "text": "FX&MM MAY ISSUE 2010 To subscribe online visit: www.fx-mm.com REVERSE FACTORING – BENEFITS FOR ALL A growing number of transaction banks are implementing supplier finance programmes for their large credit-worthy customers who wish to support their supply chain partners. Reverse factoring is the most popular model, enabling banks to provide suppliers with finance at a lower cost than they would normally achieve through direct credit facilities. The credit arbitrage is achieved by the bank securing an undertaking from the buyer (who has a higher credit rating than the suppliers) to settle all invoices at maturity. By financing the buyer’s approved payables, the bank mitigates transaction and fraud risk. In addition to the lower borrowing costs and the off balance sheet treatment of these receivables purchase programmes, a further attraction for suppliers invoicing in foreign currencies is that by taking early payment they protect themselves against foreign exchange fluctuations. In return, the buyer ensures a more stable and robust supply chain, can choose to negotiate lower costs of goods and extend Days Payable Outstanding, improving working capital. Given the compelling benefits of reverse factoring, the market challenge is to drive these new programmes into mainstream acceptance.", "title": "" }, { "docid": "1171b827d9057796a0dccc86ae414ea1", "text": "The diffusion of new digital technologies renders digital transformation relevant for nearly every industry. Therefore, the maturity of firms in mastering this fundamental organizational change is increasingly discussed in practice-oriented literature. These studies, however, suffer from some shortcomings. Most importantly, digital maturity is typically described along a linear scale, thus assuming that all firms do and need to proceed through the same path. We challenge this assumption and derive a more differentiated classification scheme based on a comprehensive literature review as well as an exploratory analysis of a survey on digital transformation amongst 327 managers. Based on these findings we propose two scales for describing a firm’s digital maturity: first, the impact that digital transformation has on a specific firm; second, the readiness of the firm to master the upcoming changes. We demonstrate the usefulness of this two scale measure by empirically deriving five digital maturity clusters as well as further empirical evidence. Our framework illuminates the monolithic block of digital maturity by allowing for a more differentiated firm-specific assessment – thus, it may serve as a first foundation for future research on digital maturity.", "title": "" }, { "docid": "fc03ae4a9106e494d1b74451ca22190b", "text": "With emergencies being, unfortunately, part of our lives, it is crucial to efficiently plan and allocate emergency response facilities that deliver effective and timely relief to people most in need. Emergency Medical Services (EMS) allocation problems deal with locating EMS facilities among potential sites to provide efficient and effective services over a wide area with spatially distributed demands. It is often problematic due to the intrinsic complexity of these problems. This paper reviews covering models and optimization techniques for emergency response facility location and planning in the literature from the past few decades, while emphasizing recent developments. We introduce several typical covering models and their extensions ordered from simple to complex, including Location Set Covering Problem (LSCP), Maximal Covering Location Problem (MCLP), Double Standard Model (DSM), Maximum Expected Covering Location Problem (MEXCLP), and Maximum Availability Location Problem (MALP) models. In addition, recent developments on hypercube queuing models, dynamic allocation models, gradual covering models, and cooperative covering models are also presented in this paper. The corresponding optimization X. Li (B) · Z. Zhao · X. Zhu Department of Industrial and Information Engineering, University of Tennessee, 416 East Stadium Hall, Knoxville, TN 37919, USA e-mail: Xueping.Li@utk.edu Z. Zhao e-mail: zzhao8@utk.edu X. Zhu e-mail: xzhu5@utk.edu T. Wyatt College of Nursing, University of Tennessee, 200 Volunteer Boulevard, Knoxville, TN 37996-4180, USA e-mail: twaytt@utk.edu", "title": "" }, { "docid": "22e3a0e31a70669f311fb51663a76f9c", "text": "A communication infrastructure is an essential part to the success of the emerging smart grid. A scalable and pervasive communication infrastructure is crucial in both construction and operation of a smart grid. In this paper, we present the background and motivation of communication infrastructures in smart grid systems. We also summarize major requirements that smart grid communications must meet. From the experience of several industrial trials on smart grid with communication infrastructures, we expect that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission. The consumers can minimize their expense on energy by adjusting their intelligent home appliance operations to avoid the peak hours and utilize the renewable energy instead. We further explore the challenges for a communication infrastructure as the part of a complex smart grid system. Since a smart grid system might have over millions of consumers and devices, the demand of its reliability and security is extremely critical. Through a communication infrastructure, a smart grid can improve power reliability and quality to eliminate electricity blackout. Security is a challenging issue since the on-going smart grid systems facing increasing vulnerabilities as more and more automation, remote monitoring/controlling and supervision entities are interconnected.", "title": "" }, { "docid": "c63465c12bbf8474293c839f9ad73307", "text": "Maintaining the balance or stability of legged robots in natural terrains is a challenging problem. Besides the inherent unstable characteristics of legged robots, the sources of instability are the irregularities of the ground surface and also the external pushes. In this paper, a push recovery framework for restoring the robot balance against external unknown disturbances will be demonstrated. It is assumed that the magnitude of exerted pushes is not large enough to use a reactive stepping strategy. In the comparison with previous methods, which a simplified model such as point mass model is used as the model of the robot for studying the push recovery problem, the whole body dynamic model will be utilized in present work. This enhances the capability of the robot to exploit all of the DOFs to recover its balance. To do so, an explicit dynamic model of a quadruped robot will be derived. The balance controller is based on the computation of the appropriate acceleration of the main body. It is calculated to return the robot to its desired position after the perturbation. This acceleration should be chosen under the stability and friction conditions. To calculate main body acceleration, an optimization problem is defined so that the stability, friction condition considered as its constraints. The simulation results show the effectiveness of the proposed algorithm. The robot can restore its balance against the large disturbance solely through the adjustment of the position and orientation of main body.", "title": "" }, { "docid": "4147094e444521bcca3b24eceeabf45f", "text": "Application designers must decide whether to store large objects (BLOBs) in a filesystem or in a database. Generally, this decision is based on factors such as application simplicity or manageability. Often, system performance affects these factors. Folklore tells us that databases efficiently handle large numbers of small objects, while filesystems are more efficient for large objects. Where is the break-even point? When is accessing a BLOB stored as a file cheaper than accessing a BLOB stored as a database record? Of course, this depends on the particular filesystem, database system, and workload in question. This study shows that when comparing the NTFS file system and SQL Server 2005 database system on a create, {read, replace}* delete workload, BLOBs smaller than 256KB are more efficiently handled by SQL Server, while NTFS is more efficient BLOBS larger than 1MB. Of course, this break-even point will vary among different database systems, filesystems, and workloads. By measuring the performance of a storage server workload typical of web applications which use get/put protocols such as WebDAV [WebDAV], we found that the break-even point depends on many factors. However, our experiments suggest that storage age, the ratio of bytes in deleted or replaced objects to bytes in live objects, is dominant. As storage age increases, fragmentation tends to increase. The filesystem we study has better fragmentation control than the database we used, suggesting the database system would benefit from incorporating ideas from filesystem architecture. Conversely, filesystem performance may be improved by using database techniques to handle small files. Surprisingly, for these studies, when average object size is held constant, the distribution of object sizes did not significantly affect performance. We also found that, in addition to low percentage free space, a low ratio of free space to average object size leads to fragmentation and performance degradation.", "title": "" }, { "docid": "a9314b036f107c99545349ccdeb30781", "text": "The development and implementation of language teaching programs can be approached in several different ways, each of which has different implications for curriculum design. Three curriculum approaches are described and compared. Each differs with respect to when issues related to input, process, and outcomes, are addressed. Forward design starts with syllabus planning, moves to methodology, and is followed by assessment of learning outcomes. Resolving issues of syllabus content and sequencing are essential starting points with forward design, which has been the major tradition in language curriculum development. Central design begins with classroom processes and methodology. Issues of syllabus and learning outcomes are not specified in detail in advance and are addressed as the curriculum is implemented. Many of the ‘innovative methods’ of the 1980s and 90s reflect central design. Backward design starts from a specification of learning outcomes and decisions on methodology and syllabus are developed from the learning outcomes. The Common European Framework of Reference is a recent example of backward design. Examples will be given to suggest how the distinction between forward, central and backward design can clarify the nature of issues and trends that have emerged in language teaching in recent years.", "title": "" }, { "docid": "6975d01d114a8ecd45188cb99fd8b770", "text": "Flowerlike α-Fe(2)O(3) nanostructures were synthesized via a template-free microwave-assisted solvothermal method. All chemicals used were low-cost compounds and environmentally benign. These flowerlike α-Fe(2)O(3) nanostructures had high surface area and abundant hydroxyl on their surface. When tested as an adsorbent for arsenic and chromium removal, the flowerlike α-Fe(2)O(3) nanostructures showed excellent adsorption properties. The adsorption mechanism for As(V) and Cr(VI) onto flowerlike α-Fe(2)O(3) nanostructures was elucidated by X-ray photoelectron spectroscopy and synchrotron-based X-ray absorption near edge structure analysis. The results suggested that ion exchange between surface hydroxyl groups and As(V) or Cr(VI) species was accounted for by the adsorption. With maximum capacities of 51 and 30 mg g(-1) for As(V) and Cr(VI), respectively, these low-cost flowerlike α-Fe(2)O(3) nanostructures are an attractive adsorbent for the removal of As(V) and Cr(VI) from water.", "title": "" }, { "docid": "39e9fe27f70f54424df1feec453afde3", "text": "Ontology is a sub-field of Philosophy. It is the study of the nature of existence and a branch of metaphysics concerned with identifying the kinds of things that actually exists and how to describe them. It describes formally a domain of discourse. Ontology is used to capture knowledge about some domain of interest and to describe the concepts in the domain and also to express the relationships that hold between those concepts. Ontology consists of finite list of terms (or important concepts) and the relationships among the terms (or Classes of Objects). Relationships typically include hierarchies of classes. It is an explicit formal specification of conceptualization and the science of describing the kind of entities in the world and how they are related (W3C). Web Ontology Language (OWL) is a language for defining and instantiating web ontologies (a W3C Recommendation). OWL ontology includes description of classes, properties and their instances. OWL is used to explicitly represent the meaning of terms in vocabularies and the relationships between those terms. Such representation of terms and their interrelationships is called ontology. OWL has facilities for expressing meaning and semantics and the ability to represent machine interpretable content on the Web. OWL is designed for use by applications that need to process the content of information instead of just presenting information to humans. This is used for knowledge representation and also is useful to derive logical consequences from OWL formal semantics.", "title": "" }, { "docid": "4e56d4b3fe5ed2285487ea98915a359c", "text": "A 1.2 V 60 GHz 120 mW phase-locked loop employing a quadrature differential voltage-controlled oscillator, a programmable charge pump, and a frequency quadrupler is presented. Implemented in a 90 m CMOS process and operating at 60 GHz with a 1.2 V supply, the PLL achieves a phase noise of −91 dBc/Hz at a frequency offset of 1 MHz.", "title": "" }, { "docid": "3c6ced0f3778c2d3c123a1752c50d276", "text": "Business intelligence (BI) has been referred to as the process of making better decisions through the use of people, processes, data and related tools and methodologies. Data mining is the extraction of hidden stating information from large databases. It is a powerful new technology with large potential to help the company's to focus on the most necessary information in the data warehouse. This study gives us an idea of how data mining is applied in exhibiting business intelligence thereby helping the organizations to make better decisions. Keywords-Business intelligence, data mining, database, information technology, management information system ——————————  ——————————", "title": "" }, { "docid": "53562dbb7087c83c6c84875e5e784b1b", "text": "ALIZE is an open-source platform for speaker recognition. The ALIZE library implements a low-level statistical engine based on the well-known Gaussian mixture modelling. The toolkit includes a set of high level tools dedicated to speaker recognition based on the latest developments in speaker recognition such as Joint Factor Analysis, Support Vector Machine, i-vector modelling and Probabilistic Linear Discriminant Analysis. Since 2005, the performance of ALIZE has been demonstrated in series of Speaker Recognition Evaluations (SREs) conducted by NIST and has been used by many participants in the last NISTSRE 2012. This paper presents the latest version of the corpus and performance on the NIST-SRE 2010 extended task.", "title": "" }, { "docid": "16b95a93fdbf0e86f4b08dca125bbcc4", "text": "We propose a generative machine comprehension model that learns jointly to ask and answer questions based on documents. The proposed model uses a sequence-to-sequence framework that encodes the document and generates a question (answer) given an answer (question). Significant improvement in model performance is observed empirically on the SQuAD corpus, confirming our hypothesis that the model benefits from jointly learning to perform both tasks. We believe the joint model’s novelty offers a new perspective on machine comprehension beyond architectural engineering, and serves as a first step towards autonomous information seeking.", "title": "" }, { "docid": "87f93c4d02b23b5d9488645bd39e49b8", "text": "Information fusion is a field of research that strives to establish theories, techniques and tools that exploit synergies in data retrieved from multiple sources. In many real-world applications huge amounts of data need to be gathered, evaluated and analyzed in order to make the right decisions. An important key element of information fusion is the adequate presentation of the data that guides decision-making processes efficiently. This is where theories and tools developed in information visualization, visual data mining and human computer interaction (HCI) research can be of great support. This report presents an overview of information fusion and information visualization, highlighting the importance of the latter in information fusion research. Information visualization techniques that can be used in information fusion are presented and analyzed providing insights into its strengths and weakness. Problems and challenges regarding the presentation of information that the decision maker faces in the ground situation awareness scenario (GSA) lead to open questions that are assumed to be the focus of further research.", "title": "" }, { "docid": "a9399439831a970fcce8e0101696325f", "text": "We describe the design, implementation, and evaluation of EMBERS, an automated, 24x7 continuous system for forecasting civil unrest across 10 countries of Latin America using open source indicators such as tweets, news sources, blogs, economic indicators, and other data sources. Unlike retrospective studies, EMBERS has been making forecasts into the future since Nov 2012 which have been (and continue to be) evaluated by an independent T&E team (MITRE). Of note, EMBERS has successfully forecast the June 2013 protests in Brazil and Feb 2014 violent protests in Venezuela. We outline the system architecture of EMBERS, individual models that leverage specific data sources, and a fusion and suppression engine that supports trading off specific evaluation criteria. EMBERS also provides an audit trail interface that enables the investigation of why specific predictions were made along with the data utilized for forecasting. Through numerous evaluations, we demonstrate the superiority of EMBERS over baserate methods and its capability to forecast significant societal happenings.", "title": "" }, { "docid": "13a7fc51cd38d08fca983bc9eb9f7522", "text": "Supply chain relationships play a significant role in supply chain management to respond to dynamic export market changes. If the dyadic exporter-producer relationships are still weak, they impede the emergence of a high performance supply chain within an export market. This paper develops a conceptual framework for understanding how exporter-producer relationships include not only the relationship system but also network and transaction systems; and thus introduces a more integrated way of looking at supply chain management based on information sharing as a key process between exporters and producers. To achieve this aim, supply chain relationships are reviewed from the perspectives of relationship marketing theory, network theory and transaction cost theory. Findings from previous research are discussed to provide a better understanding of how these relationships have evolved. A conceptual framework is built by offering a central proposition that specific dimensions of relationships, networks and transactions are the key antecedents of information sharing, which in turn influences export performance in supply chain management.", "title": "" }, { "docid": "8e7cef98d1d3404dd5101ddde88489ef", "text": "The present experiments were designed to determine the efficacy of metomidate hydrochloride as an alternative anesthetic with potential cortisol blocking properties for channel catfish Ictalurus punctatus. Channel catfish (75 g) were exposed to concentrations of metomidate ranging from 0.5 to 16 ppm for a period of 60 min. At 16-ppm metomidate, mortality occurred in 65% of the catfish. No mortalities were observed at concentrations of 8 ppm or less. The minimum concentration of metomidate producing desirable anesthetic properties was 6 ppm. At this concentration, acceptable induction and recovery times were observed in catfish ranging from 3 to 810 g average body weight. Plasma cortisol levels during metomidate anesthesia (6 ppm) were compared to fish anesthetized with tricaine methanesulfonate (100 ppm), quinaldine (30 ppm) and clove oil (100 ppm). Cortisol levels of catfish treated with metomidate and clove oil remained at baseline levels during 30 min of anesthesia (P>0.05). Plasma cortisol levels of tricaine methanesulfonate and quinaldine anesthetized catfish peaked approximately eightand fourfold higher (P< 0.05), respectively, than fish treated with metomidate. These results suggest that the physiological disturbance of channel catfish during routine-handling procedures and stress-related research could be reduced through the use of metomidate as an anesthetic. D 2003 Elsevier Science B.V. All rights reserved.", "title": "" } ]
scidocsrr
af3a593a7e03efd0851b2f6783c9d6cf
A High-Efficiency 24 GHz Rectenna Development Towards Millimeter-Wave Energy Harvesting and Wireless Power Transmission
[ { "docid": "ba3f3ca8a34e1ea6e54fe9dde673b51f", "text": "This paper proposes a high-efficiency dual-band on-chip rectifying antenna (rectenna) at 35 and 94 GHz for wireless power transmission. The rectenna is designed in slotline (SL) and finite-width ground coplanar waveguide (FGCPW) transmission lines in a CMOS 0.13-μm process. The rectenna comprises a high gain linear tapered slot antenna (LTSA), an FGCPW to SL transition, a bandpass filter, and a full-wave rectifier. The LTSA achieves a VSWR=2 fractional bandwidth of 82% and 41%, and a gain of 7.4 and 6.5 dBi at the frequencies of 35 and 94 GHz. The measured power conversion efficiencies are 53% and 37% in free space at 35 and 94 GHz, while the incident radiation power density is 30 mW/cm2 . The fabricated rectenna occupies a compact size of 2.9 mm2.", "title": "" }, { "docid": "aa9450cdbdb1162015b4d931c32010fb", "text": "The design of a low-cost rectenna for low-power applications is presented. The rectenna is designed with the use of analytical models and closed-form analytical expressions. This allows for a fast design of the rectenna system. To acquire a small-area rectenna, a layered design is proposed. Measurements indicate the validity range of the analytical models.", "title": "" } ]
[ { "docid": "443df7fa37723021c2079fd524f199ab", "text": "OBJECTIVE\nCircumcision, performed for religious or medical reasons is the procedure of surgical excision of the skin covering the glans penis, preputium in a certain shape and dimension so as to expose the tip of the glans penis. Short- and long- term complication rates of up to 50% have been reported, varying due to the recording system of different countries in which the procedure has been accepted as a widely performed simple surgical procedure. In this study, treatment procedures in patients presented to our clinic with complications after circumcision are described and methods to decrease the rate of the complications are reviewed.\n\n\nMATERIAL AND METODS\nCases that presented to our clinic between 2010 and 2013 with early complications of circumcision were retrospectively reviewed. Cases with acceptedly major complications as excess skin excision, skin necrosis and total amputation of the glans were included in the study, while cases with minor complications such as bleeding, hematoma and infection were excluded from the study.\n\n\nRESULTS\nRepair with full- thickness skin grafts was performed in patients with excess skin excision. In cases with skin necrosis, following the debridement of the necrotic skin, primary repair or repair with full- thickness graft was performed in cases where full- thickness skin defects developed and other cases with partial skin loss were left to secondary healing. Repair with an inguinal flap was performed in the case with glans amputation.\n\n\nCONCLUSION\nCircumcisions performed by untrained individuals are to be blamed for the complications of circumcision reported in this country. The rate of complications increases during the \"circumcision feasts\" where multiple circumcisions were performed. This also predisposes to transmission of various diseases, primarily hepatitis B/C and AIDS. Circumcision is a surgical procedure that should be performed by specialists under appropriate sterile circumstances in which the rate of complications would be decreased. The child may be exposed to recurrent psychosocial and surgical trauma when it is performed by incompetent individuals.", "title": "" }, { "docid": "b3166dafafda819052f1d40ef04cc304", "text": "Convolutional neural networks (CNNs) have been widely deployed in the fields of computer vision and pattern recognition because of their high accuracy. However, large convolution operations are computing intensive and often require a powerful computing platform such as a graphics processing unit. This makes it difficult to apply CNNs to portable devices. The state-of-the-art CNNs, such as MobileNetV2 and Xception, adopt depthwise separable convolution to replace the standard convolution for embedded platforms, which significantly reduces operations and parameters with only limited loss in accuracy. This highly structured model is very suitable for field-programmable gate array (FPGA) implementation. In this brief, a scalable high performance depthwise separable convolution optimized CNN accelerator is proposed. The accelerator can be fit into an FPGA of different sizes, provided the balancing between hardware resources and processing speed. As an example, MobileNetV2 is implemented on Arria 10 SoC FPGA, and the results show this accelerator can classify each picture from ImageNet in 3.75 ms, which is about 266.6 frames per second. The FPGA design achieves 20x speedup if compared to CPU.", "title": "" }, { "docid": "f6a1d7b206ca2796d4e91f3e8aceeed8", "text": "Objective To develop a classifier that tackles the problem of determining the risk of a patient of suffering from a cardiovascular disease within the next ten years. The system has to provide both a diagnosis and an interpretable model explaining the decision. In this way, doctors are able to analyse the usefulness of the information given by the system. Methods Linguistic fuzzy rule-based classification systems are used, since they provide a good classification rate and a highly interpretable model. More specifically, a new methodology to combine fuzzy rule-based classification systems with interval-valued fuzzy sets is proposed, which is composed of three steps: 1) the modelling of the linguistic labels of the classifier using interval-valued fuzzy sets; 2) the use of theKα operator in the inference process and 3) the application of a genetic tuning to find the best ignorance degree that each interval-valued fuzzy set represents as well as the best value for the parameter α of theKα operator in each rule. Results Correspondingauthor. Tel:+34-948166048. Fax:+34-948168924 Email addresses: joseantonio.sanz@unavarra.es (Jośe Antonio Sanz ), mikel.galar@unavarra.es (Mikel Galar),aranzazu.jurio@unavarra.es (Aranzazu Jurio), antonio.brugos@unavarra.es (Antonio Brugos), miguel.pagola@unavarra.es (Miguel Pagola),bustince@unavarra.es (Humberto Bustince) Preprint submitted to Elsevier November 13, 2013 © 2013. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/", "title": "" }, { "docid": "db1d5903d2d49d995f5d3b6dd0681323", "text": "Diffusion tensor imaging (DTI) is an exciting new MRI modality that can reveal detailed anatomy of the white matter. DTI also allows us to approximate the 3D trajectories of major white matter bundles. By combining the identified tract coordinates with various types of MR parameter maps, such as T2 and diffusion properties, we can perform tract-specific analysis of these parameters. Unfortunately, 3D tract reconstruction is marred by noise, partial volume effects, and complicated axonal structures. Furthermore, changes in diffusion anisotropy under pathological conditions could alter the results of 3D tract reconstruction. In this study, we created a white matter parcellation atlas based on probabilistic maps of 11 major white matter tracts derived from the DTI data from 28 normal subjects. Using these probabilistic maps, automated tract-specific quantification of fractional anisotropy and mean diffusivity were performed. Excellent correlation was found between the automated and the individual tractography-based results. This tool allows efficient initial screening of the status of multiple white matter tracts.", "title": "" }, { "docid": "77585b41d973e470680a1254fe21b5a6", "text": "The recent developments in technology have made noteworthy positive impacts on the human computer interaction (HCI). It is now possible to interact with computers using voice commands, touchscreen, eye movement etc. This paper compiles some of the innovative HCI progresses in the modern desktop and mobile computing and identifies some future research directions.", "title": "" }, { "docid": "8f3c0a8098ae76755b0e2f1dc9cfc8ea", "text": "This paper presents a new approach to structural topology optimization. We represent the structural boundary by a level set model that is embedded in a scalar function of a higher dimension. Such level set models are flexible in handling complex topological changes and are concise in describing the boundary shape of the structure. Furthermore, a wellfounded mathematical procedure leads to a numerical algorithm that describes a structural optimization as a sequence of motions of the implicit boundaries converging to an optimum solution and satisfying specified constraints. The result is a 3D topology optimization technique that demonstrates outstanding flexibility of handling topological changes, fidelity of boundary representation and degree of automation. We have implemented the algorithm with the use of several robust and efficient numerical techniques of level set methods. The benefit and the advantages of the proposed method are illustrated with several 2D examples that are widely used in the recent literature of topology optimization, especially in the homogenization based methods. 2002 Elsevier Science B.V. All rights reserved.", "title": "" }, { "docid": "7def0b8cfb68a8190184840c5c6e7e2f", "text": "Fast and accurate localization of software defects continues to be a difficult problem since defects can emanate from a large variety of sources and can often be intricate in nature. In this paper, we show how version histories of a software project can be used to estimate a prior probability distribution for defect proneness associated with the files in a given version of the project. Subsequently, these priors are used in an IR (Information Retrieval) framework to determine the posterior probability of a file being the cause of a bug. We first present two models to estimate the priors, one from the defect histories and the other from the modification histories, with both types of histories as stored in the versioning tools. Referring to these as the base models, we then extend them by incorporating a temporal decay into the estimation of the priors. We show that by just including the base models, the mean average precision (MAP) for bug localization improves by as much as 30%. And when we also factor in the time decay in the estimates of the priors, the improvements in MAP can be as large as 80%.", "title": "" }, { "docid": "7f13071811b935ed7ea87159bab091c1", "text": "This paper presents the development of an underactuated compliant gripper using a biocompatible super elastic alloy, namely Nitinol. This gripper has two ngers with ve phalanges each and can be used as the end-e ector of an endoscopic instrument. Optimization procedures are required to obtain the geometry of the transmission mechanism because of its underactuated nature and its underlying complexity. A driving mechanism further incorporated in the gripper to distribute actuation to both ngers and accomplish the grasping of asymmetrical objects without requiring supplementary inputs is also discussed. Finally, the results of numerical simulations with di erent materials and di erent grasped objects are presented and discussed. ∗e-mail: mario.doria@polymtl.ca †Corresponding author: Deparment of Mechanical Engineering, École Polytechnique de Montréal, Montréal, QC, H3T 1J4, Canada, phone: 514-340-4711 #3329; fax: 514-340-5867; e-mail: lionel.birglen@polymtl.ca 1 Pr ep rin t o f a pa pe r fr om th e A SM E Jo urn al of Me dic al De vic es , V ol. 3, no . 1 , M arc h 2 00 9.", "title": "" }, { "docid": "c7d3381b32e6a6bbe3ea9d9b870ce1d2", "text": "Software defect prediction plays an important role in improving software quality and it help to reducing time and cost for software testing. Machine learning focuses on the development of computer programs that can teach themselves to grow and change when exposed to new data. The ability of a machine to improve its performance based on previous results. Machine learning improves efficiency of human learning, discover new things or structure that is unknown to humans and find important information in a document. For that purpose, different machine learning techniques are used to remove the unnecessary, erroneous data from the dataset. Software defect prediction is seen as a highly important ability when planning a software project and much greater effort is needed to solve this complex problem using a software metrics and defect dataset. Metrics are the relationship between the numerical value and it applied on the software therefore it is used for predicting defect. The primary goal of this survey paper is to understand the existing techniques for predicting software defect.", "title": "" }, { "docid": "ecea888d3b2d6b9ce0a26a4af6382db8", "text": "Business Process Management (BPM) research resulted in a plethora of methods, techniques, and tools to support the design, enactment, management, and analysis of operational business processes. This survey aims to structure these results and provides an overview of the state-of-the-art in BPM. In BPM the concept of a process model is fundamental. Process models may be used to configure information systems, but may also be used to analyze, understand, and improve the processes they describe. Hence, the introduction of BPM technology has both managerial and technical ramifications, and may enable significant productivity improvements, cost savings, and flow-time reductions. The practical relevance of BPM and rapid developments over the last decade justify a comprehensive survey.", "title": "" }, { "docid": "01800567648367a34aa80a3161a21871", "text": "Single-image haze-removal is challenging due to limited information contained in one single image. Previous solutions largely rely on handcrafted priors to compensate for this deficiency. Recent convolutional neural network (CNN) models have been used to learn haze-related priors but they ultimately work as advanced image filters. In this paper we propose a novel semantic approach towards single image haze removal. Unlike existing methods, we infer color priors based on extracted semantic features. We argue that semantic context can be exploited to give informative cues for (a) learning color prior on clean image and (b) estimating ambient illumination. This design allowed our model to recover clean images from challenging cases with strong ambiguity, e.g. saturated illumination color and sky regions in image. In experiments, we validate our approach upon synthetic and real hazy images, where our method showed superior performance over state-of-the-art approaches, suggesting semantic information facilitates the haze removal task.", "title": "" }, { "docid": "96a04e4fd170642fc0973808eb217ec0", "text": "Feeding provides substrate for energy metabolism, which is vital to the survival of every living animal and therefore is subject to intense regulation by brain homeostatic and hedonic systems. Over the last decade, our understanding of the circuits and molecules involved in this process has changed dramatically, in large part due to the availability of animal models with genetic lesions. In this review, we examine the role played in homeostatic regulation of feeding by systemic mediators such as leptin and ghrelin, which act on brain systems utilizing neuropeptide Y, agouti-related peptide, melanocortins, orexins, and melanin concentrating hormone, among other mediators. We also examine the mechanisms for taste and reward systems that provide food with its intrinsically reinforcing properties and explore the links between the homeostatic and hedonic systems that ensure intake of adequate nutrition.", "title": "" }, { "docid": "2d39c5b6af85365ef9727b1ca554c583", "text": "Given the wealth of literature on the topic supported by solutions to practical problems, we would expect the bootstrap to be an off-the-shelf tool for signal processing problems as are maximum likelihood and least-squares methods. This is not the case, and we wonder why a signal processing practitioner would not resort to the bootstrap for inferential problems. We may attribute the situation to some confusion when the engineer attempts to discover the bootstrap paradigm in an overwhelming body of statistical literature. Our aim is to give a short tutorial of bootstrap methods supported by real-life applications. This pragmatic approach is to serve as a practical guide rather than a comprehensive treatment, which can be found elsewhere. However, for the bootstrap to be successful, we need to identify which resampling scheme is most appropriate.", "title": "" }, { "docid": "5d8ed6cfb091f33769319fd01875d451", "text": "This paper presents the design of a tunable dual-band bandpass filter based on evanescent-mode cavity resonators with two capacitive loadings which result in two independently tunable resonant frequencies. Small filter size is achieved since the two modes share the same physical volume of a single cavity. In addition, the internal and external couplings of the filter can be controlled independently at the two passbands to create flexible frequency responses. An example of the proposed filter design is prototyped in a substrate-integrated fashion having two tunable passbands, a lower tuning band of 1.156-1.741 GHz with 3-dB bandwidth of 76-156MHz and insertion loss of 3.137-1.109 dB, and an upper tuning band of 2.242-3.648 GHz with 3-dB bandwidth of 125-553MHz and insertion loss of 7.551-1.299 dB.", "title": "" }, { "docid": "d6b221435bb3953b087e7aaca1e3be6a", "text": "This paper reports on AnnieWAY, an autonomous vehicle that is capable of driving through urban scenarios and that has successfully entered the finals of the DARPA Urban Challenge 2007 competition. After describing the main challenges imposed and the major hardware components, we outline the underlying software structure and focus on selected algorithms. A recent laser scanner plays the prominent role in the perception of the environment. It measures range and reflectivity for each pixel. While the former is used to provide 3D scene geometry, the latter allows robust lane marker detection. Mission and maneuver selection is conducted via a concurrent hierarchical state machine that specifically ascertains behavior in accordance with California traffic rules. We conclude with a report of the results achieved during the competition.", "title": "" }, { "docid": "d5a0702c1e6195be4185e9eb7b183aff", "text": "A sensitive and simple color sensor for indole vapors has been developed based on the Ehrlich-type reaction in solid polymer film. Upon 60-min exposure of the film sensor to the air containing 5 - 100 ppb of indole vapors, pink or magenta color could be recognized by the naked eyes. Alternatively, a trial gas detector tube has been prepared by mixing the reagents with sea sand. When air (100 mL) was pumped through the detector tube, indole vapors above 20 ppb could be detected within 1 min. The sensing was selective to the vapors of indoles and pyrroles, and other VOCs or ambient moisture did not interfere.", "title": "" }, { "docid": "f480c08eea346215ccd01e21e9acfe81", "text": "In the era of big data, recommender system (RS) has become an effective information filtering tool that alleviates information overload for Web users. Collaborative filtering (CF), as one of the most successful recommendation techniques, has been widely studied by various research institutions and industries and has been applied in practice. CF makes recommendations for the current active user using lots of users’ historical rating information without analyzing the content of the information resource. However, in recent years, data sparsity and high dimensionality brought by big data have negatively affected the efficiency of the traditional CF-based recommendation approaches. In CF, the context information, such as time information and trust relationships among the friends, is introduced into RS to construct a training model to further improve the recommendation accuracy and user’s satisfaction, and therefore, a variety of hybrid CF-based recommendation algorithms have emerged. In this paper, we mainly review and summarize the traditional CF-based approaches and techniques used in RS and study some recent hybrid CF-based recommendation approaches and techniques, including the latest hybrid memory-based and model-based CF recommendation algorithms. Finally, we discuss the potential impact that may improve the RS and future direction. In this paper, we aim at introducing the recent hybrid CF-based recommendation techniques fusing social networks to solve data sparsity and high dimensionality and provide a novel point of view to improve the performance of RS, thereby presenting a useful resource in the state-of-the-art research result for future researchers.", "title": "" }, { "docid": "afd378cf5e492a9627e746254586763b", "text": "Gradient-based optimization has enabled dramatic advances in computational imaging through techniques like deep learning and nonlinear optimization. These methods require gradients not just of simple mathematical functions, but of general programs which encode complex transformations of images and graphical data. Unfortunately, practitioners have traditionally been limited to either hand-deriving gradients of complex computations, or composing programs from a limited set of coarse-grained operators in deep learning frameworks. At the same time, writing programs with the level of performance needed for imaging and deep learning is prohibitively difficult for most programmers.\n We extend the image processing language Halide with general reverse-mode automatic differentiation (AD), and the ability to automatically optimize the implementation of gradient computations. This enables automatic computation of the gradients of arbitrary Halide programs, at high performance, with little programmer effort. A key challenge is to structure the gradient code to retain parallelism. We define a simple algorithm to automatically schedule these pipelines, and show how Halide's existing scheduling primitives can express and extend the key AD optimization of \"checkpointing.\"\n Using this new tool, we show how to easily define new neural network layers which automatically compile to high-performance GPU implementations, and how to solve nonlinear inverse problems from computational imaging. Finally, we show how differentiable programming enables dramatically improving the quality of even traditional, feed-forward image processing algorithms, blurring the distinction between classical and deep methods.", "title": "" } ]
scidocsrr
bf13df297bf633e8c7b9ef85c122c3ec
Unbiased Estimation of the Value of an Optimized Policy
[ { "docid": "e5cd8e17db6c3c65320c0581dfecee79", "text": "In this paper we propose methods for estimating heterogeneity in causal effects in experimental and observational studies and for conducting hypothesis tests about the magnitude of differences in treatment effects across subsets of the population. We provide a data-driven approach to partition the data into subpopulations that differ in the magnitude of their treatment effects. The approach enables the construction of valid confidence intervals for treatment effects, even with many covariates relative to the sample size, and without \"sparsity\" assumptions. We propose an \"honest\" approach to estimation, whereby one sample is used to construct the partition and another to estimate treatment effects for each subpopulation. Our approach builds on regression tree methods, modified to optimize for goodness of fit in treatment effects and to account for honest estimation. Our model selection criterion anticipates that bias will be eliminated by honest estimation and also accounts for the effect of making additional splits on the variance of treatment effect estimates within each subpopulation. We address the challenge that the \"ground truth\" for a causal effect is not observed for any individual unit, so that standard approaches to cross-validation must be modified. Through a simulation study, we show that for our preferred method honest estimation results in nominal coverage for 90% confidence intervals, whereas coverage ranges between 74% and 84% for nonhonest approaches. Honest estimation requires estimating the model with a smaller sample size; the cost in terms of mean squared error of treatment effects for our preferred method ranges between 7-22%.", "title": "" } ]
[ { "docid": "4eb9808144e04bf0c01121f2ec7261d2", "text": "The rise of multicore computing has greatly increased system complexity and created an additional burden for software developers. This burden is especially troublesome when it comes to optimizing software on modern computing systems. Autonomic or adaptive computing has been proposed as one method to help application programmers handle this complexity. In an autonomic computing environment, system services monitor applications and automatically adapt their behavior to increase the performance of the applications they support. Unfortunately, applications often run as performance black-boxes and adaptive services must infer application performance from low-level information or rely on system-specific ad hoc methods. This paper proposes a standard framework, Application Heartbeats, which applications can use to communicate both their current and target performance and which autonomic services can use to query these values.\n The Application Heartbeats framework is designed around the well-known idea of a heartbeat. At important points in the program, the application registers a heartbeat. In addition, the interface allows applications to express their performance in terms of a desired heart rate and/or a desired latency between specially tagged heartbeats. Thus, the interface provides a standard method for an application to directly communicate its performance and goals while allowing autonomic services access to this information. Thus, Heartbeat-enabled applications are no longer performance black-boxes. This paper presents the Applications Heartbeats interface, characterizes two reference implementations (one suitable for clusters and one for multicore), and illustrates the use of Heartbeats with several examples of systems adapting behavior based on feedback from heartbeats.", "title": "" }, { "docid": "645faf32f40732d291e604d7240f0546", "text": "Fault Diagnostics and Prognostics has been an increasing interest in recent years, as a result of the increased degree of automation and the growing demand for higher performance, efficiency, reliability and safety in industrial systems. On-line fault detection and isolation methods have been developed for automated processes. These methods include data mining methodologies, artificial intelligence methodologies or combinations of the two. Data Mining is the statistical approach of extracting knowledge from data. Artificial Intelligence is the science and engineering of making intelligent machines, especially intelligent computer programs. Activities in AI include searching, recognizing patterns and making logical inferences. This paper focuses on the various techniques used for Fault Diagnostics and Prognostics in Industry application domains.", "title": "" }, { "docid": "e05e91be6ca5423d795f17be8a1cec10", "text": "A novel active gate driver (AGD) for silicon carbide (SiC) MOSFET is studied in this paper. The gate driver (GD) increases the gate resistance value during the voltage plateau area of the gate-source voltage, in both turn-on and turn-off transitions. The proposed AGD is validated in both simulation and experimental environments and in hard-switching conditions. The simulation is evaluated in MATLAB/Simulink with 100 kHz of switching frequency and 600 V of dc-bus, whereas, the experimental part was realised at 100 kHz and 100 V of dc-bus. The results show that the gate driver can reduce the over-voltage and ringing, with low switching losses.", "title": "" }, { "docid": "c13bf429abfb718e6c3557ae71f45f8f", "text": "Researchers who study punishment and social control, like those who study other social phenomena, typically seek to generalize their findings from the data they have to some larger context: in statistical jargon, they generalize from a sample to a population. Generalizations are one important product of empirical inquiry. Of course, the process by which the data are selected introduces uncertainty. Indeed, any given dataset is but one of many that could have been studied. If the dataset had been different, the statistical summaries would have been different, and so would the conclusions, at least by a little. How do we calibrate the uncertainty introduced by data collection? Nowadays, this question has become quite salient, and it is routinely answered using wellknown methods of statistical inference, with standard errors, t-tests, and P-values, culminating in the “tabular asterisks” of Meehl (1978). These conventional answers, however, turn out to depend critically on certain rather restrictive assumptions, for instance, random sampling.1 When the data are generated by random sampling from a clearly defined population, and when the goal is to estimate population parameters from sample statistics, statistical inference can be relatively straightforward. The usual textbook formulas apply; tests of statistical significance and confidence intervals follow. If the random-sampling assumptions do not apply, or the parameters are not clearly defined, or the inferences are to a population that is only vaguely defined, the calibration of uncertainty offered by contemporary statistical technique is in turn rather questionable.2 Thus, investigators who use conventional statistical technique", "title": "" }, { "docid": "e6332552fb29765414020ee97184cc07", "text": "In A History of God, Karen Armstrong describes a division, made by fourth century Christians, between kerygma and dogma: 'religious truth … capable of being expressed and defined clearly and logically,' versus 'religious insights [that] had an inner resonance that could only be apprehended by each individual in his own time during … contemplation' (Armstrong, 1993, p.114). This early dual-process theory had its roots in Plato and Aristotle, who suggested a division between 'philosophy,' which could be 'expressed in terms of reason and thus capable of proof,' and knowledge contained in myths, 'which eluded scientific demonstration' (Armstrong, 1993, 113–14). This division—between what can be known and reasoned logically versus what can only be experienced and apprehended—continued to influence Western culture through the centuries, and arguably underlies our current dual-process theories of reasoning. In psychology, the division between these two forms of understanding have been described in many different ways. The underlying theme of 'overtly reasoned' versus 'perceived, intuited' often ties these dual process theories together. In Western culture, the latter form of thinking has often been maligned (Dijksterhuis and Nordgren, 2006; Gladwell, 2005; Lieberman, 2000). Recently, cultural psychologists have suggested that although the distinction itself—between reasoned and intuited knowl-edge—may have precedents in the intellectual traditions of other cultures, the privileging of the former rather than the latter may be peculiar to Western cultures The Chinese philosophical tradition illustrates this difference of emphasis. Instead of an epistemology that was guided by abstract rules, 'the Chinese in esteeming what was immediately percepti-ble—especially visually perceptible—sought intuitive instantaneous understanding through direct perception' (Nakamura, 1960/1988, p.171). Taoism—the great Chinese philosophical school besides Confucianism—developed an epistemology that was particularly oriented towards concrete perception and direct experience (Fung, 1922; Nakamura, 1960/1988). Moreover, whereas the Greeks were concerned with definitions and devising rules for the purposes of classification, for many influential Taoist philosophers, such as Chuang Tzu, '… the problem of … how terms and attributes are to be delimited, leads one in precisely the wrong direction. Classifying or limiting knowledge fractures the greater knowledge' (Mote, 1971, p.102).", "title": "" }, { "docid": "7064d73864a64e2b76827e3252390659", "text": "Abstmct-In his original paper on the subject, Shannon found upper and lower bounds for the entropy of printed English based on the number of trials required for a subject to guess subsequent symbols in a given text. The guessing approach precludes asymptotic consistency of either the upper or lower bounds except for degenerate ergodic processes. Shannon’s technique of guessing the next symbol is altered by having the subject place sequential bets on the next symbol of text. lf S,, denotes the subject’s capital after n bets at 27 for 1 odds, and lf it is assumed that the subject hnows the underlying prpbabillty distribution for the process X, then the entropy estimate ls H,(X) =(l -(l/n) log,, S,) log, 27 bits/symbol. If the subject does npt hnow the true probabllty distribution for the stochastic process, then Z&(X! ls an asymptotic upper bound for the true entropy. ff X is stationary, EH,,(X)+H(X), H(X) bell the true entropy of the process. Moreovzr, lf X is ergodic, then by the SLOW McMilhm-Brebnan theorem H,,(X)+H(X) with probability one. Preliminary indications are that English text has au entropy of approximately 1.3 bits/symbol, which agrees well with Shannon’s estimate.", "title": "" }, { "docid": "2bdefbc66ae89ce8e48acf0d13041e0a", "text": "We introduce an ac transconductance dispersion method (ACGD) to profile the oxide traps in an MOSFET without needing a body contact. The method extracts the spatial distribution of oxide traps from the frequency dependence of transconductance, which is attributed to charge trapping as modulated by an ac gate voltage. The results from this method have been verified by the use of the multifrequency charge pumping (MFCP) technique. In fact, this method complements the MFCP technique in terms of the trap depth that each method is capable of probing. We will demonstrate the method with InP passivated InGaAs substrates, along with electrically stressed Si N-MOSFETs.", "title": "" }, { "docid": "8dee3ada764a40fce6b5676287496ccd", "text": "We study the problem of video-to-video synthesis, whose goal is to learn a mapping function from an input source video (e.g., a sequence of semantic segmentation masks) to an output photorealistic video that precisely depicts the content of the source video. While its image counterpart, the image-to-image translation problem, is a popular topic, the video-to-video synthesis problem is less explored in the literature. Without modeling temporal dynamics, directly applying existing image synthesis approaches to an input video often results in temporally incoherent videos of low visual quality. In this paper, we propose a video-to-video synthesis approach under the generative adversarial learning framework. Through carefully-designed generators and discriminators, coupled with a spatio-temporal adversarial objective, we achieve high-resolution, photorealistic, temporally coherent video results on a diverse set of input formats including segmentation masks, sketches, and poses. Experiments on multiple benchmarks show the advantage of our method compared to strong baselines. In particular, our model is capable of synthesizing 2K resolution videos of street scenes up to 30 seconds long, which significantly advances the state-of-the-art of video synthesis. Finally, we apply our method to future video prediction, outperforming several competing systems. Code, models, and more results are available at our website.", "title": "" }, { "docid": "6659c5b954c14003e6e62c557fffa0f2", "text": "Existing language models such as n-grams for software code often fail to capture a long context where dependent code elements scatter far apart. In this paper, we propose a novel approach to build a language model for software code to address this particular issue. Our language model, partly inspired by human memory, is built upon the powerful deep learning-based Long Short Term Memory architecture that is capable of learning long-term dependencies which occur frequently in software code. Results from our intrinsic evaluation on a corpus of Java projects have demonstrated the effectiveness of our language model. This work contributes to realizing our vision for DeepSoft, an end-to-end, generic deep learning-based framework for modeling software and its development process.", "title": "" }, { "docid": "734fc66c7c745498ca6b2b7fc6780919", "text": "In this paper, we investigate the use of an unsupervised label clustering technique and demonstrate that it enables substantial improvements in visual relationship prediction accuracy on the Person in Context (PIC) dataset. We propose to group object labels with similar patterns of relationship distribution in the dataset into fewer categories. Label clustering not only mitigates both the large classification space and class imbalance issues, but also potentially increases data samples for each clustered category. We further propose to incorporate depth information as an additional feature into the instance segmentation model. The additional depth prediction path supplements the relationship prediction model in a way that bounding boxes or segmentation masks are unable to deliver. We have rigorously evaluated the proposed techniques and performed various ablation analysis to validate the benefits of them.", "title": "" }, { "docid": "0dd8e07502ed70b38fe6eb478115f5a8", "text": "Department of Psychology Iowa State University, Ames, IA, USA Over the last 30 years, the video game industry has grown into a multi-billion dollar business. More children and adults are spending time playing computer games, consoles games, and online games than ever before. Violence is a dominant theme in most of the popular video games. This article reviews the current literature on effects of violent video game exposure on aggression-related variables. Exposure to violent video games causes increases in aggressive behavior, cognitions, and affect. Violent video game exposure also causes increases in physiological desensitization to real-life violence and decreases in helping behavior. The current video game literature is interpreted in terms of the general aggression model (GAM). Differences between violent video game exposure and violent television are also discussed.", "title": "" }, { "docid": "b078c459182501c52f38400e363cb2ca", "text": "Design considerations for piezoelectric-based energy harvesters for MEMS-scale sensors are presented, including a review of past work. Harvested ambient vibration energy can satisfy power needs of advanced MEMS-scale autonomous sensors for numerous applications, e.g., structural health monitoring. Coupled 1-D and modal (beam structure) electromechanical models are presented to predict performance, especially power, from measured low-level ambient vibration sources. Models are validated by comparison to prior published results and tests of a MEMS-scale device. A non-optimized prototype low-level ambient MEMS harvester producing 30 μW/cm3 is designed and modeled. A MEMS fabrication process for the prototype device is presented based on past work.", "title": "" }, { "docid": "1846bbaac13e4a8d5c34b1657a5b634c", "text": "Technology advancement entails an analog design scenario in which sophisticated signal processing algorithms are deployed in mixed-mode and radio frequency circuits to compensate for deterministic and random deficiencies of process technologies. This article reviews one such approach of applying a common communication technique, equalization, to correct for nonlinear distortions in analog circuits, which is analogized as non-ideal communication channels. The efficacy of this approach is showcased by a few latest advances in data conversion and RF transmission integrated circuits, where unprecedented energy efficiency, circuit linearity, and post-fabrication adaptability have been attained with low-cost digital processing.", "title": "" }, { "docid": "46658067ffc4fd2ecdc32fbaaa606170", "text": "Adolescent resilience research differs from risk research by focusing on the assets and resources that enable some adolescents to overcome the negative effects of risk exposure. We discuss three models of resilience-the compensatory, protective, and challenge models-and describe how resilience differs from related concepts. We describe issues and limitations related to resilience and provide an overview of recent resilience research related to adolescent substance use, violent behavior, and sexual risk behavior. We then discuss implications that resilience research has for intervention and describe some resilience-based interventions.", "title": "" }, { "docid": "05049ac85552c32f2c98d7249a038522", "text": "Remote sensing tools are increasingly being used to survey forest structure. Most current methods rely on GPS signals, which are available in above-canopy surveys or in below-canopy surveys of open forests, but may be absent in below-canopy environments of dense forests. We trialled a technology that facilitates mobile surveys in GPS-denied below-canopy forest environments. The platform consists of a battery-powered UAV mounted with a LiDAR. It lacks a GPS or any other localisation device. The vehicle is capable of an 8 min flight duration and autonomous operation but was remotely piloted in the present study. We flew the UAV around a 20 m × 20 m patch of roadside trees and developed postprocessing software to estimate the diameter-at-breast-height (DBH) of 12 trees that were detected by the LiDAR. The method detected 73% of trees greater than 200 mm DBH within 3 m of the flight path. Smaller and more distant trees could not be detected reliably. The UAV-based DBH estimates of detected trees were positively correlated with the humanbased estimates (R = 0.45, p = 0.017) with a median absolute error of 18.1%, a root-meansquare error of 25.1% and a bias of −1.2%. We summarise the main current limitations of this technology and outline potential solutions. The greatest gains in precision could be achieved through use of a localisation device. The long-term factor limiting the deployment of below-canopy UAV surveys is likely to be battery technology.", "title": "" }, { "docid": "7252372bdacaa69b93e52a7741c8f4c2", "text": "This paper introduces a novel type of actuator that is investigated by ESA for force-reflection to a wearable exoskeleton. The actuator consists of a DC motor that is relocated from the joint by means of Bowden cable transmissions. The actuator shall support the development of truly ergonomic and compact wearable man-machine interfaces. Important Bowden cable transmission characteristics are discussed, which dictate a specific hardware design for such an actuator. A first prototype is shown, which was used to analyze these basic characteristics of the transmissions and to proof the overall actuation concept. A second, improved prototype is introduced, which is currently used to investigate the achievable performance as a master actuator in a master-slave control with force-feedback. Initial experimental results are presented, which show good actuator performance in a 4 channel control scheme with a slave joint. The actuator features low movement resistance in free motion and can reflect high torques during hard contact situations. High contact stability can be achieved. The actuator seems therefore well suited to be implemented into the ESA exoskeleton for space-robotic telemanipulation", "title": "" }, { "docid": "87baf6381f4297b6e9af7659ef111f5c", "text": "Indonesian Sign Language System (ISLS) has been used widely by Indonesian for translating the sign language of disabled people to many applications, including education or entertainment. ISLS consists of static and dynamic gestures in representing words or sentences. However, individual variations in performing sign language have been a big challenge especially for developing automatic translation. The accuracy of recognizing the signs will decrease linearly with the increase of variations of gestures. This research is targeted to solve these issues by implementing the multimodal methods: leap motion and Myo armband controllers (EMG electrodes). By combining these two data and implementing Naïve Bayes classifier, we hypothesized that the accuracy of gesture recognition system for ISLS then can be increased significantly. The data streams captured from hand-poses were based on time-domain series method which will warrant the generated data synchronized accurately. The selected features for leap motion data would be based on fingers positions, angles, and elevations, while for the Myo armband would be based on electrical signal generated by eight channels of EMG electrodes relevant to the activities of linked finger’s and forearm muscles. This study will investigate the accuracy of gesture recognition by using either single modal or multimodal for translating Indonesian sign language. For multimodal strategy, both features datasets were merged into a single dataset which was then used for generating a model for each hand gesture. The result showed that there was a significant improvement on its accuracy, from 91% for single modal using leap motion to 98% for multi-modal (combined with Myo armband). The confusion matrix of multimodal method also showed better performance than the single-modality. Finally, we concluded that the implementation of multi-modal controllers for ISLS’s gesture recognition showed better accuracy and performance compared of single modality of using only leap motion controller.", "title": "" }, { "docid": "098da928abe37223e0eed0c6bf0f5747", "text": "With the proliferation of social media, fashion inspired from celebrities, reputed designers as well as fashion influencers has shortned the cycle of fashion design and manufacturing. However, with the explosion of fashion related content and large number of user generated fashion photos, it is an arduous task for fashion designers to wade through social media photos and create a digest of trending fashion. Designers do not just wish to have fashion related photos at one place but seek search functionalities that can let them search photos with natural language queries such as ‘red dress’, ’vintage handbags’, etc in order to spot the trends. This necessitates deep parsing of fashion photos on social media to localize and classify multiple fashion items from a given fashion photo. While object detection competitions such as MSCOCO have thousands of samples for each of the object categories, it is quite difficult to get large labeled datasets for fast fashion items. Moreover, state-of-the-art object detectors [2, 7, 9] do not have any functionality to ingest large amount of unlabeled data available on social media in order to fine tune object detectors with labeled datasets. In this work, we show application of a generic object detector [11], that can be pretrained in an unsupervised manner, on 24 categories from recently released Open Images V4 dataset. We first train the base architecture of the object detector using unsupervisd learning on 60K unlabeled photos from 24 categories gathered from social media, and then subsequently fine tune it on 8.2K labeled photos from Open Images V4 dataset. On 300 × 300 image inputs, we achieve 72.7% mAP on a test dataset of 2.4K photos while performing 11% to 17% better as compared to the state-of-the-art object detectors. We show that this improvement is due to our choice of architecture that lets us do unsupervised learning and that performs significantly better in identifying small objects. 1", "title": "" }, { "docid": "59d6765507415b0365f3193843d01459", "text": "Password typing is the most widely used identity verification method in World Wide Web based Electronic Commerce. Due to its simplicity, however, it is vulnerable to imposter attacks. Keystroke dynamics and password checking can be combined to result in a more secure verification system. We propose an autoassociator neural network that is trained with the timing vectors of the owner's keystroke dynamics and then used to discriminate between the owner and an imposter. An imposter typing the correct password can be detected with very high accuracy using the proposed approach. This approach can be effectively implemented by a Java applet and used in the World Wide Web.", "title": "" }, { "docid": "f77982f55dfd6f188b8fb09e7c36c695", "text": "Bisimulation is the primitive notion of equivalence between concurrent processes in Milner's Calculus of Communicating Systems (CCS); there is a nontrivial game-like protocol for distinguishing nonbisimular processes. In contrast, process distinguishability in Hoare's theory of Communicating Sequential Processes (CSP) is determined solely on the basis of traces of visible actions. We examine what additional operations are needed to explain bisimulation similarly—specifically in the case of finitely branching processes without silent moves. We formulate a general notion of Structured Operational Semantics for processes with Guarded recursion (GSOS), and demonstrate that bisimulation does not agree with trace congruence with respect to any set of GSOS-definable contexts. In justifying the generality and significance of GSOS's, we work out some of the basic proof theoretic facts which justify the SOS discipline.", "title": "" } ]
scidocsrr
39745f121b40e98c9612f0fa82981def
Development of grip amplified glove using bi-articular mechanism with pneumatic artificial rubber muscle
[ { "docid": "5da1f0692a71e4dde4e96009b99e0c13", "text": "The McKibben artificial muscle is a pneumatic actuator whose properties include a very high force to weight ratio. This characteristic makes it very attractive for a wide range of applications such as mobile robots and prosthetic appliances for the disabled. Typical applications often require a significant number of repeated contractions and extensions or cycles of the actuator. This repeated action leads to fatigue and failure of the actuator, yielding a life span that is often shorter than its more common robotic counterparts such as electric motors or pneumatic cylinders. In this paper, we develop a model that predicts the maximum number of life cycles of the actuator based on available uniaxial tensile properties of the actuator’s inner bladder. Experimental results, which validate the model, reveal McKibben actuators fabricated with natural latex rubber bladders have a fatigue limit 24 times greater than actuators fabricated with synthetic silicone rubber at large contraction ratios.", "title": "" }, { "docid": "26a2a78909393566ef618a7d56b342d3", "text": "The purpose of this study is to develop a wearable power assist device for hand grasping in order to support activity of daily living (ADL) safely and easily. In this paper, the mechanism of the developed power assist device is described, and then the effectiveness of this device is discussed experimentally.", "title": "" } ]
[ { "docid": "785b9b8522d2957fc5ecf53bf3c408e0", "text": "Clinical trial investigators often record a great deal of baseline data on each patient at randomization. When reporting the trial's findings such baseline data can be used for (i) subgroup analyses which explore whether there is evidence that the treatment difference depends on certain patient characteristics, (ii) covariate-adjusted analyses which aim to refine the analysis of the overall treatment difference by taking account of the fact that some baseline characteristics are related to outcome and may be unbalanced between treatment groups, and (iii) baseline comparisons which compare the baseline characteristics of patients in each treatment group for any possible (unlucky) differences. This paper examines how these issues are currently tackled in the medical journals, based on a recent survey of 50 trial reports in four major journals. The statistical ramifications are explored, major problems are highlighted and recommendations for future practice are proposed. Key issues include: the overuse and overinterpretation of subgroup analyses; the underuse of appropriate statistical tests for interaction; inconsistencies in the use of covariate-adjustment; the lack of clear guidelines on covariate selection; the overuse of baseline comparisons in some studies; the misuses of significance tests for baseline comparability, and the need for trials to have a predefined statistical analysis plan for all these uses of baseline data.", "title": "" }, { "docid": "0f5c1d2503a2845e409d325b085bf600", "text": "We present Accel, a novel semantic video segmentation system that achieves high accuracy at low inference cost by combining the predictions of two network branches: (1) a reference branch that extracts high-detail features on a reference keyframe, and warps these features forward using frame-to-frame optical flow estimates, and (2) an update branch that computes features of adjustable quality on the current frame, performing a temporal update at each video frame. The modularity of the update branch, where feature subnetworks of varying layer depth can be inserted (e.g. ResNet-18 to ResNet-101), enables operation over a new, state-of-the-art accuracy-throughput trade-off spectrum. Over this curve, Accel models achieve both higher accuracy and faster inference times than the closest comparable single-frame segmentation networks. In general, Accel significantly outperforms previous work on efficient semantic video segmentation, correcting warping-related error that compounds on datasets with complex dynamics. Accel is end-to-end trainable and highly modular: the reference network, the optical flow network, and the update network can each be selected independently, depending on application requirements, and then jointly fine-tuned. The result is a robust, general system for fast, high-accuracy semantic segmentation on video.", "title": "" }, { "docid": "5c496d19a841360fc874ef6989b3a6b4", "text": "The electronic circuit breaker used in DC microgrids are required to work within their safe operating areas bounded by temperature, voltage and current limits. Traditional approach managed to protect these switches through rapid current cut-off operations at over-load or fault situations, but failing to avoid the disturbance induced by transient current surges or noises which are not harmful to the grid operations. Aiming to increase the quality of circuit breaker operations and furthermore improve its reliability, this paper proposed a SiC MOSFET based DC circuit breaker based on the variable time-delay protection scheme. The cutoff operations only take place after proper delay time, which are precisely catered according to the transient thermal properties of SiC devices and the properties of DC loads. The proposed scheme has been implemented with hardware prototype and experimentally verified under different fault situations.", "title": "" }, { "docid": "bed3e58bc8e69242e6e00c7d13dabb93", "text": "The convergence of online learning algorithms is analyzed using the tools of the stochastic approximation theory, and proved under very weak conditions. A general framework for online learning algorithms is first presented. This framework encompasses the most common online learning algorithms in use today, as illustrated by several examples. The stochastic approximation theory then provides general results describing the convergence of all these learning algorithms at once. Revised version, May 2018.", "title": "" }, { "docid": "d3e45d254e7a09432b8f4b7729e44fa3", "text": "In this paper, an approach of estimating signal parameters via rotational invariance technique (ESPRIT) is proposed for two-dimensional (2-D) localization of incoherently distributed (ID) sources in large-scale/massive multiple-input multiple-output (MIMO) systems. The traditional ESPRIT-based methods are valid only for one-dimensional (1-D) localization of the ID sources. By contrast, in the proposed approach the signal subspace is constructed for estimating the nominal azimuth and elevation direction-of-arrivals and the angular spreads. The proposed estimator enjoys closed-form expressions and hence it bypasses the searching over the entire feasible field. Therefore, it imposes significantly lower computational complexity than the conventional 2-D estimation approaches. Our analysis shows that the estimation performance of the proposed approach improves when the large-scale/massive MIMO systems are employed. The approximate Cramér-Rao bound of the proposed estimator for the 2-D localization is also derived. Numerical results demonstrate that albeit the proposed estimation method is comparable with the traditional 2-D estimators in terms of performance, it benefits from a remarkably lower computational complexity.", "title": "" }, { "docid": "a23fd89da025d456f9fe3e8a47595c6a", "text": "Mobile devices are especially vulnerable nowadays to malware attacks, thanks to the current trend of increased app downloads. Despite the significant security and privacy concerns it received, effective malware detection (MD) remains a significant challenge. This paper tackles this challenge by introducing a streaminglized machine learning-based MD framework, StormDroid: (i) The core of StormDroid is based on machine learning, enhanced with a novel combination of contributed features that we observed over a fairly large collection of data set; and (ii) we streaminglize the whole MD process to support large-scale analysis, yielding an efficient and scalable MD technique that observes app behaviors statically and dynamically. Evaluated on roughly 8,000 applications, our combination of contributed features improves MD accuracy by almost 10% compared with state-of-the-art antivirus systems; in parallel our streaminglized process, StormDroid, further improves efficiency rate by approximately three times than a single thread.", "title": "" }, { "docid": "e259e255f9acf3fa1e1429082e1bf1de", "text": "In this work we describe an autonomous soft-bodied robot that is both self-contained and capable of rapid, continuum-body motion. We detail the design, modeling, fabrication, and control of the soft fish, focusing on enabling the robot to perform rapid escape responses. The robot employs a compliant body with embedded actuators emulating the slender anatomical form of a fish. In addition, the robot has a novel fluidic actuation system that drives body motion and has all the subsystems of a traditional robot onboard: power, actuation, processing, and control. At the core of the fish's soft body is an array of fluidic elastomer actuators. We design the fish to emulate escape responses in addition to forward swimming because such maneuvers require rapid body accelerations and continuum-body motion. These maneuvers showcase the performance capabilities of this self-contained robot. The kinematics and controllability of the robot during simulated escape response maneuvers are analyzed and compared with studies on biological fish. We show that during escape responses, the soft-bodied robot has similar input-output relationships to those observed in biological fish. The major implication of this work is that we show soft robots can be both self-contained and capable of rapid body motion.", "title": "" }, { "docid": "4c82ba56d6532ddc57c2a2978de7fe5a", "text": "This paper presents a Model Reference Adaptive System (MRAS) based speed sensorless estimation of vector controlled Induction Motor Drive. MRAS based techniques are one of the best methods to estimate the rotor speed due to its performance and straightforward stability approach. Depending on the type of tuning signal driving the adaptation mechanism, MRAS estimators are classified into rotor flux based MRAS, back e.m.f based MRAS, reactive power based MRAS and artificial neural network based MRAS. In this paper, the performance of the rotor flux based MRAS for estimating the rotor speed was studied. Overview on the IM mathematical model is briefly summarized to establish a physical basis for the sensorless scheme used. Further, the theoretical basis of indirect field oriented vector control is explained in detail and it is implemented in MATLAB/SIMULINK.", "title": "" }, { "docid": "a730a3c079e9cdb2c77fa945cbc8f685", "text": "In the last 30 years a sea of change has occurred in the outlook for these cancers. Chemotherapy has allowed better local and systemic control5, 6. Better imaging with CT and MRI has allowed the surgeon to accurately define the extent and therefore plan tumor resection. Advances in bioengineering have provided exciting options for reconstruction and the world has moved from amputation to limb salvage. In osteosarcoma, survival improved from dismal 10-20% to 50-70%7, 8. Long term studies showed that limb salvage operations, performed with wide margins and chemotherapy did not compromise the survival or local control compared to an amputation9-14.", "title": "" }, { "docid": "6993271cf5ef62ced8fa93519720b355", "text": "Vehicle-to-grid (V2G) has been proposed as a way to increase the adoption rate of electric vehicles (EVs). Unidirectional V2G is especially attractive because it requires little if any additional infrastructure other than communication between the EV and an aggregator. The aggregator in turn combines the capacity of many EVs to bid into energy markets. In this work an algorithm for unidirectional regulation is developed for use by an aggregator. Several smart charging algorithms are used to set the point about which the rate of charge varies while performing regulation. An aggregator profit maximization algorithm is formulated with optional system load and price constraints analogous to the smart charging algorithms. Simulations on a hypothetical group of 10 000 commuter EVs in the Pacific Northwest verify that the optimal algorithms increase aggregator profits while reducing system load impacts and customer costs.", "title": "" }, { "docid": "fed4de5870b41715d7f9abc0714db99d", "text": "This paper presents an approach to stereovision applied to small water vehicles. By using a small low-cost computer and inexpensive off-the-shelf components, we were able to develop an autonomous driving system capable of following other vehicle and moving along paths delimited by coloured buoys. A pair of webcams was used and, with an ultrasound sensor, we were also able to implement a basic frontal obstacle avoidance system. With the help of the stereoscopic system, we inferred the position of specific objects that serve as references to the ASV guidance. The final system is capable of identifying and following targets in a distance of over 5 meters. This system was integrated with the framework already existent and shared by all the vehicles used in the OceanSys research group at INESC - DEEC/FEUP.", "title": "" }, { "docid": "a12c4e820254b07f322727affe23cb9d", "text": "Attributed network embedding has been widely used in modeling real-world systems. The obtained low-dimensional vector representations of nodes preserve their proximity in terms of both network topology and node attributes, upon which different analysis algorithms can be applied. Recent advances in explanation-based learning and human-in-the-loop models show that by involving experts, the performance of many learning tasks can be enhanced. It is because experts have a better cognition in the latent information such as domain knowledge, conventions, and hidden relations. It motivates us to employ experts to transform their meaningful cognition into concrete data to advance network embedding. However, learning and incorporating the expert cognition into the embedding remains a challenging task. Because expert cognition does not have a concrete form, and is difficult to be measured and laborious to obtain. Also, in a real-world network, there are various types of expert cognition such as the comprehension of word meaning and the discernment of similar nodes. It is nontrivial to identify the types that could lead to a significant improvement in the embedding. In this paper, we study a novel problem of exploring expert cognition for attributed network embedding and propose a principled framework NEEC. We formulate the process of learning expert cognition as a task of asking experts a number of concise and general queries. Guided by the exemplar theory and prototype theory in cognitive science, the queries are systematically selected and can be generalized to various real-world networks. The returned answers from the experts contain their valuable cognition. We model them as new edges and directly add into the attributed network, upon which different embedding methods can be applied towards a more informative embedding representation. Experiments on real-world datasets verify the effectiveness and efficiency of NEEC.", "title": "" }, { "docid": "02842ef0acfed3d59612ce944b948adf", "text": "One of the common modalities for observing mental activity is electroencephalogram (EEG) signals. However, EEG recording is highly susceptible to various sources of noise and to inter subject differences. In order to solve these problems we present a deep recurrent neural network (RNN) architecture to learn robust features and predict the levels of cognitive load from EEG recordings. Using a deep learning approach, we first transform the EEG time series into a sequence of multispectral images which carries spatial information. Next, we train our recurrent hybrid network to learn robust representations from the sequence of frames. The proposed approach preserves spectral, spatial and temporal structures and extracts features which are less sensitive to variations along each dimension. Our results demonstrate cognitive memory load prediction across four different levels with an overall accuracy of 92.5% during the memory task execution and reduce classification error to 7.61% in comparison to other state-of-art techniques.", "title": "" }, { "docid": "bfc0a8c7d5fb816b9d8b8a0600893536", "text": "Meta-parameters in reinforcement learning should be tuned to the environmental dynamics and the animal performance. Here, we propose a biologically plausible meta-reinforcement learning algorithm for tuning these meta-parameters in a dynamic, adaptive manner. We tested our algorithm in both a simulation of a Markov decision task and in a non-linear control task. Our results show that the algorithm robustly finds appropriate meta-parameter values, and controls the meta-parameter time course, in both static and dynamic environments. We suggest that the phasic and tonic components of dopamine neuron firing can encode the signal required for meta-learning of reinforcement learning.", "title": "" }, { "docid": "a9d1cdfd844a7347d255838d5eb74b03", "text": "An economy based on the exchange of capital, assets and services between individuals has grown significantly, spurred by proliferation of internet-based platforms that allow people to share underutilized resources and trade with reasonably low transaction costs. The movement toward this economy of “sharing” translates into market efficiencies that bear new products, reframe established services, have positive environmental effects, and may generate overall economic growth. This emerging paradigm, entitled the collaborative economy, is disruptive to the conventional company-driven economic paradigm as evidenced by the large number of peer-to-peer based services that have captured impressive market shares sectors ranging from transportation and hospitality to banking and risk capital. The panel explores economic, social, and technological implications of the collaborative economy, how digital technologies enable it, and how the massive sociotechnical systems embodied in these new peer platforms may evolve in response to the market and social forces that drive this emerging ecosystem.", "title": "" }, { "docid": "c999bd0903b53285c053c76f9fcc668f", "text": "In this paper, a bibliographical review on reconfigurable (active) fault-tolerant control systems (FTCS) is presented. The existing approaches to fault detection and diagnosis (FDD) and fault-tolerant control (FTC) in a general framework of active fault-tolerant control systems (AFTCS) are considered and classified according to different criteria such as design methodologies and applications. A comparison of different approaches is briefly carried out. Focuses in the field on the current research are also addressed with emphasis on the practical application of the techniques. In total, 376 references in the open literature, dating back to 1971, are compiled to provide an overall picture of historical, current, and future developments in this area. # 2008 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "3392de7e3182420e882617f0baff389a", "text": "BACKGROUND\nIndividuals who initiate cannabis use at an early age, when the brain is still developing, might be more vulnerable to lasting neuropsychological deficits than individuals who begin use later in life.\n\n\nMETHODS\nWe analyzed neuropsychological test results from 122 long-term heavy cannabis users and 87 comparison subjects with minimal cannabis exposure, all of whom had undergone a 28-day period of abstinence from cannabis, monitored by daily or every-other-day observed urine samples. We compared early-onset cannabis users with late-onset users and with controls, using linear regression controlling for age, sex, ethnicity, and attributes of family of origin.\n\n\nRESULTS\nThe 69 early-onset users (who began smoking before age 17) differed significantly from both the 53 late-onset users (who began smoking at age 17 or later) and from the 87 controls on several measures, most notably verbal IQ (VIQ). Few differences were found between late-onset users and controls on the test battery. However, when we adjusted for VIQ, virtually all differences between early-onset users and controls on test measures ceased to be significant.\n\n\nCONCLUSIONS\nEarly-onset cannabis users exhibit poorer cognitive performance than late-onset users or control subjects, especially in VIQ, but the cause of this difference cannot be determined from our data. The difference may reflect (1). innate differences between groups in cognitive ability, antedating first cannabis use; (2). an actual neurotoxic effect of cannabis on the developing brain; or (3). poorer learning of conventional cognitive skills by young cannabis users who have eschewed academics and diverged from the mainstream culture.", "title": "" }, { "docid": "9ff6d7a36646b2f9170bd46d14e25093", "text": "Psychedelic drugs such as LSD and psilocybin are often claimed to be capable of inducing life-changing experiences described as mystical or transcendental, especially if high doses are taken. The present study examined possible enduring effects of such experiences by comparing users of psychedelic drugs (n = 88), users of nonpsychedelic illegal drugs (e.g., marijuana, amphetamines) (n = 29) and non illicit drug-using social drinkers (n = 66) on questionnaire measures of values, beliefs and emotional empathy. Samples were obtained from Israel (n = 110) and Australia (n = 73) in a cross-cultural comparison to see if values associated with psychedelic drug use transcended culture of origin. Psychedelic users scored significantly higher on mystical beliefs (e.g., oneness with God and the universe) and life values of spirituality and concern for others than the other groups, and lower on the value of financial prosperity, irrespective of culture of origin. Users of nonpsychedelic illegal drugs scored significantly lower on a measure of coping ability than both psychedelic users and non illicit drug users. Both groups of illegal drug users scored significantly higher on empathy than non illicit drug users. Results are discussed in the context of earlier findings from Pahnke (1966) and Doblin (1991) of the transformative effect of psychedelic experiences, although the possibility remains that present findings reflect predrug characteristics of those who chose to take psychedelic drugs rather than effects of the drugs themselves.", "title": "" }, { "docid": "3a03ad3bc42f899e050491b04c01b78c", "text": "A passive/active L/S-band (PALS) microwave aircraft instrument to measure ocean salinity and soil moisture has been built and tested. Because the L-band brightness temperatures associated with salinity changes are expected to be small, it was necessary to build a very sensitive and stable system. This new instrument has dual-frequency, dual polarization radiometer and radar sensors. The antenna is a high beam efficiency conical horn. The PALS instrument was installed on the NCAR C-130 aircraft and soil moisture measurements were made in support of the Southern Great Plains 1999 experiment in Oklahoma from July 8–14, 1999. Data taken before and after a rainstorm showed significant changes in the brightness temperatures, polarization ratios and radar backscatter, as a function of soil moisture. Salinity measurement missions were flown on July 17–19, 1999, southeast of Norfolk, VA, over the Gulf Stream. The measurements indicated a clear and repeatable salinity signal during these three days, which was in good agreement with the Cape Hatteras ship salinity data. Data was also taken in the open ocean and a small decrease of 0.2 K was measured in the brightness temperature, which corresponded to the salinity increase of 0.4 psu measured by the M/V Oleander vessel.", "title": "" } ]
scidocsrr
ff7dd30ab3dc135d1b1248443dfd301a
Citation count prediction as a link prediction problem
[ { "docid": "908baa7a1004a372f1e8e42f037e0501", "text": "Scientists depend on literature search to find prior work that is relevant to their research ideas. We introduce a retrieval model for literature search that incorporates a wide variety of factors important to researchers, and learns the weights of each of these factors by observing citation patterns. We introduce features like topical similarity and author behavioral patterns, and combine these with features from related work like citation count and recency of publication. We present an iterative process for learning weights for these features that alternates between retrieving articles with the current retrieval model, and updating model weights by training a supervised classifier on these articles. We propose a new task for evaluating the resulting retrieval models, where the retrieval system takes only an abstract as its input and must produce as output the list of references at the end of the abstract's article. We evaluate our model on a collection of journal, conference and workshop articles from the ACL Anthology Reference Corpus. Our model achieves a mean average precision of 28.7, a 12.8 point improvement over a term similarity baseline, and a significant improvement both over models using only features from related work and over models without our iterative learning.", "title": "" } ]
[ { "docid": "314cdc9c802e23b7fde95fa29b4debcb", "text": "Authorship attribution is a growing field, moving from beginnings in linguistics to recent advances in text mining. Through this change came an increase in the capability of authorship attribution methods both in their accuracy and the ability to consider more difficult problems. Research into authorship attribution in the 19th century considered it difficult to determine the authorship of a document of fewer than 1000 words. By the 1990s this values had decreased to less than 500 words and in the early 21st century it was considered possible to determine the authorship of a document in 250 words. The need for this ever decreasing limit is exemplified by the trend towards many shorter communications rather than fewer longer communications, such as the move from traditional multi-page handwritten letters to shorter, more focused emails. This trend has also been shown in online crime, where many attacks such as phishing or bullying are performed using very concise language. Cybercrime messages have long been hosted on Internet Relay Chats (IRCs) which have allowed members to hide behind screen names and connect anonymously. More recently, Twitter and other short message based web services have been used as a hosting ground for online crimes. This paper presents some evaluations of current techniques and identifies some new preprocessing methods that can be used to enable authorship to be determined at rates significantly better than chance for documents of 140 characters or less, a format popularised by the micro-blogging website Twitter1. We show that the SCAP methodology performs extremely well on twitter messages and even with restrictions on the types of information allowed, such as the recipient of directed messages, still perform significantly higher than chance. Further to this, we show that 120 tweets per user is an important threshold, at which point adding more tweets per user gives a small but non-significant increase in accuracy.", "title": "" }, { "docid": "eed6db13b57d9e510c22b4a95936ea5b", "text": "Today data mining is widely used by companies with a strong consumer focus like retail, financial, communication and marketing organizations. Here technically data mining is the process of extraction of required information from huge databases. It allows users to analyze data from many different dimensions or angles, categorize it and summarize the relationships identified. The ultimate goal of this paper is to propose a methodology for the improvement in DB-SCAN algorithm to improve clustering accuracy. The proposed improvement is based on back propagation algorithm to calculate Euclidean distance in the dynamic manner. Also this paper shows the obtained results of implemented proposed and existing methods and it compares the results in terms of its execution time and accuracy.", "title": "" }, { "docid": "1f3985e9c8bbad7279ee7ebfda74a8a8", "text": "Adversarial perturbations of normal images are usually imperceptible to humans, but they can seriously confuse state-of-the-art machine learning models. What makes them so special in the eyes of image classifiers? In this paper, we show empirically that adversarial examples mainly lie in the low probability regions of the training distribution, regardless of attack types and targeted models. Using statistical hypothesis testing, we find that modern neural density models are surprisingly good at detecting imperceptible image perturbations. Based on this discovery, we devised PixelDefend, a new approach that purifies a maliciously perturbed image by moving it back towards the distribution seen in the training data. The purified image is then run through an unmodified classifier, making our method agnostic to both the classifier and the attacking method. As a result, PixelDefend can be used to protect already deployed models and be combined with other model-specific defenses. Experiments show that our method greatly improves resilience across a wide variety of state-of-the-art attacking methods, increasing accuracy on the strongest attack from 63% to 84% for Fashion MNIST and from 32% to 70% for CIFAR-10.", "title": "" }, { "docid": "22bd367cdda112e715f7c5535bc72ebb", "text": "This paper introduces a complete side channel analysis toolbox, inclusive of the analog capture hardware, target device, capture software, and analysis software. The highly modular design allows use of the hardware and software with a variety of existing systems. The hardware uses a synchronous capture method which greatly reduces the required sample rate, while also reducing the data storage requirement, and improving synchronization of traces. The synchronous nature of the hardware lends itself to fault injection, and a module to generate glitches of programmable width is also provided. The entire design (hardware and software) is open-source, and maintained in a publicly available repository. Several long example capture traces are provided for researchers looking to evaluate standard cryptographic implementations.", "title": "" }, { "docid": "702b17315116a6435e4b9befc5155218", "text": "The paper reviews SERDES technology for storage area networking. A concept of a data switch is introduced to illustrate important role played by switching and backplane SERDES ICs. Selected state-of-the-art devices: 10 Gb/s line side SERDES and backplane drivers are discussed in detail. Particular emphasis is placed on challenges associated with design of high-speed mixed-signal circuitry.", "title": "" }, { "docid": "ba4faa0390c2c75aab79822a1e523e71", "text": "The number of linked data sources and the size of the linked open data graph keep growing every day. As a consequence, semantic RDF services are more and more confronted to various “big data” problems. Query processing is one of them and needs to be efficiently addressed with executions over scalable, highly available and fault tolerant frameworks. Data management systems requiring these properties are rarely built from scratch but are rather designed on top of an existing cluster computing engine. In this work, we consider the processing of SPARQL queries with Apache Spark. We propose and compare five different query processing approaches based on different join execution models and Spark components. A detailed experimentation, on real-world and synthetic data sets, emphasizes that two approaches tailored for the RDF data model outperform the other ones on all major query shapes, i.e., star, snowflake, chain and hybrid.", "title": "" }, { "docid": "46ae0bea85996747e06c1c18bd606340", "text": "In this paper, two accurate models for interdigital capacitors and shunt inductive stubs in coplanar-waveguide structures are presented and validated over the entire W-band frequency range. Using these models, a novel bandpass filter (BPF) and a miniaturized high-pass filter are designed and fabricated. By inserting interdigital capacitors in BPF resonators, an out-of-band transmission null is introduced, which improves rejection level up to 17 dB over standard designs of similar filters. A high-pass filter is also designed, using semilumped-element models in order to miniaturize the filter structure. It is shown that a fifth-order high-pass filter can be built with a maximum dimension of less than /spl lambda//sub g//3. Great agreement between simulated and measured responses of these filters is demonstrated.", "title": "" }, { "docid": "ec0da5cea716d1270b2143ffb6c610d6", "text": "This study focuses on the development of a web-based Attendance Register System or formerly known as ARS. The development of this system is motivated due to the fact that the students’ attendance records are one of the important elements that reflect their academic achievements in the higher academic institutions. However, the current practice implemented in most of the higher academic institutions in Malaysia is becoming more prone to human errors and frauds. Assisted by the System Development Life Cycle (SDLC) methodology, the ARS has been built using the web-based applications such as PHP, MySQL and Apache to cater the recording and reporting of the students’ attendances. The development of this prototype system is inspired by the feasibility study done in Universiti Teknologi MARA, Malaysia where 550 respondents have taken part in answering the questionnaires. From the analysis done, it has revealed that a more systematic and revolutionary system is indeed needed to be reinforced in order to improve the process of recording and reporting the attendances in the higher academic institution. ARS can be easily accessed by the lecturers via the Web and most importantly, the reports can be generated in realtime processing, thus, providing invaluable information about the students’ commitments in attending the classes. This paper will discuss in details the development of ARS from the feasibility study until the design phase.", "title": "" }, { "docid": "a89c471c0ad38741eaf48a83970da456", "text": "Phenotypic and functional heterogeneity arise among cancer cells within the same tumour as a consequence of genetic change, environmental differences and reversible changes in cell properties. Some cancers also contain a hierarchy in which tumorigenic cancer stem cells differentiate into non-tumorigenic progeny. However, it remains unclear what fraction of cancers follow the stem-cell model and what clinical behaviours the model explains. Studies using lineage tracing and deep sequencing could have implications for the cancer stem-cell model and may help to determine the extent to which it accounts for therapy resistance and disease progression.", "title": "" }, { "docid": "d15add461f0ca58de13b3dc975f7fef7", "text": "A frequency compensation technique improving characteristic of power supply rejection ratio (PSRR) for two-stage operational amplifiers is presented. This technique is applicable to most known two-stage amplifier configurations. The detailed small-signal analysis of an exemplary amplifier with the proposed compensation and a comparison to its basic version reveal several benefits of the technique which can be effectively exploited in continuous-time filter designs. This comparison shows the possibility of PSRR bandwidth broadening of more than a decade, significant reduction of chip area, the unity-gain bandwidth and power consumption improvement. These benefits are gained at the cost of a non-monotonic phase characteristic of the open-loop differential voltage gain and limitation of a close-loop voltage gain. A prototype-integrated circuit, fabricated based on 0.35 mm complementary metal-oxide semiconductor technology, was used for the technique verification. Two pairs of amplifiers with the classical Miller compensation and a cascoded input stage were measured and compared to their improved counterparts. The measurement data fully confirm the theoretically predicted advantages of the proposed compensation technique.", "title": "" }, { "docid": "a8b26d719b7512634383c71c1e57c960", "text": "The method of finding high-quality answers has significant impact on user satisfaction in community question answering systems. However, due to the lexical gap between questions and answers as well as spam typically existing in user-generated content, filtering and ranking answers is very challenging. Previous solutions mainly focus on generating redundant features, or finding textual clues using machine learning techniques; none of them ever consider questions and their answers as relational data but instead model them as independent information. Moreover, they only consider the answers of the current question, and ignore any previous knowledge that would be helpful to bridge the lexical and semantic gap. We assume that answers are connected to their questions with various types of latent links, i.e. positive indicating high-quality answers, negative links indicating incorrect answers or user-generated spam, and propose an analogical reasoning-based approach which measures the analogy between the new question-answer linkages and those of relevant knowledge which contains only positive links; the candidate answer which has the most analogous link is assumed to be the best answer. We conducted experiments based on 29.8 million Yahoo!Answer question-answer threads and showed the effectiveness of our approach.", "title": "" }, { "docid": "e910310c5cc8357c570c6c4110c4e94f", "text": "Epistemic planning can be used for decision making in multi-agent situations with distributed knowledge and capabilities. Dynamic Epistemic Logic (DEL) has been shown to provide a very natural and expressive framework for epistemic planning. In this paper, we aim to give an accessible introduction to DEL-based epistemic planning. The paper starts with the most classical framework for planning, STRIPS, and then moves towards epistemic planning in a number of smaller steps, where each step is motivated by the need to be able to model more complex planning scenarios.", "title": "" }, { "docid": "77281793a88329ca2cf9fd8eeaf01524", "text": "This paper describes a new circuit integrated on silicon, which generates temperature-independent bias currents. Such a circuit is firstly employed to obtain a current reference with first-order temperature compensation, then it is modified to obtain second-order temperature compensation. The operation principle of the new circuits is described and the relationships between design and technology process parameters are derived. These circuits have been designed by a 0.35 /spl mu/m BiCMOS technology process and the thermal drift of the reference current has been evaluated by computer simulations. They show good thermal performance and in particular, the new second-order temperature-compensated current reference has a mean temperature drift of only 28 ppm//spl deg/C in the temperature range between -30/spl deg/C and 100/spl deg/C.", "title": "" }, { "docid": "c44420fbcf9e6da8e22c616a14707f45", "text": "This article discusses the impact of artificially intelligent computers to the process of design, play and educational activities. A computational process which has the necessary intelligence and creativity to take a proactive role in such activities can not only support human creativity but also foster it and prompt lateral thinking. The argument is made both from the perspective of human creativity, where the computational input is treated as an external stimulus which triggers re-framing of humans’ routines and mental associations, but also from the perspective of computational creativity where human input and initiative constrains the search space of the algorithm, enabling it to focus on specific possible solutions to a problem rather than globally search for the optimal. The article reviews four mixed-initiative tools (for design and educational play) based on how they contribute to human-machine co-creativity. These paradigms serve different purposes, afford different human interaction methods and incorporate different computationally creative processes. Assessing how co-creativity is facilitated on a per-paradigm basis strengthens the theoretical argument and provides an initial seed for future work in the burgeoning domain of mixed-initiative interaction.", "title": "" }, { "docid": "ddfd1bc1ca748bee286df92f8850286c", "text": "The rapid growth of Location-based Social Networks (LBSNs) provides a great opportunity to satisfy the strong demand for personalized Point-of-Interest (POI) recommendation services. However, with the tremendous increase of users and POIs, POI recommender systems still face several challenging problems: (1) the hardness of modeling complex user-POI interactions from sparse implicit feedback; (2) the difficulty of incorporating the geographical context information. To cope with these challenges, we propose a novel autoencoder-based model to learn the complex user-POI relations, namely SAE-NAD, which consists of a self-attentive encoder (SAE) and a neighbor-aware decoder (NAD). In particular, unlike previous works equally treat users' checked-in POIs, our self-attentive encoder adaptively differentiates the user preference degrees in multiple aspects, by adopting a multi-dimensional attention mechanism. To incorporate the geographical context information, we propose a neighbor-aware decoder to make users' reachability higher on the similar and nearby neighbors of checked-in POIs, which is achieved by the inner product of POI embeddings together with the radial basis function (RBF) kernel. To evaluate the proposed model, we conduct extensive experiments on three real-world datasets with many state-of-the-art methods and evaluation metrics. The experimental results demonstrate the effectiveness of our model.", "title": "" }, { "docid": "d0641206af1afeab7143fa82d56ba727", "text": "This paper outlines possible evolution trends of e-learning, supported by most recent advancements in the World Wide Web. Specifically, we consider a situation in which the Semantic Web technology and tools are widely adopted, and fully integrated within a context of applications exploiting the Internet of Things paradigm. Such a scenario will dramatically impact on learning activities, as well as on teaching strategies and instructional design methodology. In particular, the models characterized by learning pervasiveness and interactivity will be greatly empowered.", "title": "" }, { "docid": "275a5302219385f22706b483ecc77a74", "text": "This paper describes a bilingual text-to-speech (TTS) system, Microsoft Mulan, which switches between Mandarin and English smoothly and which maintains the sentence level intonation even for mixed-lingual texts. Mulan is constructed on the basis of the Soft Prediction Only prosodic strategy and the Prosodic-Constraint Orient unit-selection strategy. The unitselection module of Mulan is shared across languages. It is insensitive to language identity, even though the syllable is used as the smallest unit in Mandarin, and the phoneme in English. Mulan has a unique module, the language-dispatching module, which dispatches texts to the language-specific front-ends and merges the outputs of the two front-ends together. The mixed texts are “uttered” out with the same voice. According to our informal listening test, the speech synthesized with Mulan sounds quite natural. Sample waves can be heard at: http://research.microsoft.com/~echang/projects/tts/mulan.htm.", "title": "" }, { "docid": "0337a08aff1a1dce4d758ed1b720f414", "text": "Recently, two forms of virtue-related humor, benevolent and corrective, have been introduced. Benevolent humor treats human weaknesses and wrongdoings benevolently, while corrective humor aims at correcting and bettering them. Twelve marker items for benevolent and corrective humor (the BenCor) were developed, and it was demonstrated that they fill the gap between humor as temperament and virtue. The present study investigates responses to the BenCor from 25 samples in 22 countries (overall N = 7,226). The psychometric properties of the BenCor were found to be sufficient in most of the samples, including internal consistency, unidimensionality, and factorial validity. Importantly, benevolent and corrective humor were clearly established as two positively related, yet distinct dimensions of virtue-related humor. Metric measurement invariance was supported across the 25 samples, and scalar invariance was supported across six age groups (from 18 to 50+ years) and across gender. Comparisons of samples within and between four countries (Malaysia, Switzerland, Turkey, and the UK) showed that the item profiles were more similar within than between countries, though some evidence for regional differences was also found. This study thus supported, for the first time, the suitability of the 12 marker items of benevolent and corrective humor in different countries, enabling a cumulative cross-cultural research and eventually applications of humor aiming at the good.", "title": "" }, { "docid": "009c628d26b06d7a1daf3eac104b2fe4", "text": "A neutral templating route for preparing mesoporous molecular sieves is demonstrated based on hydrogen-bonding interactions and self-assembly between neutral primary amine micelles (S degrees ) and neutral inorganic precursors (l degrees ). The S degrees l degrees templating pathway produces ordered mesoporous materials with thicker framework walls, smaller x-ray scattering domain sizes, and substantially improved textural mesoporosities in comparison with M41S materials templated by quaternary ammonium cations of equivalent chain length. This synthetic strategy also allows for the facile, environmentally benign recovery of the cost-intensive template by simple solvent extraction methods. The S degrees 1 degrees templating route provides for the synthesis of other oxide mesostructures (such as aluminas) that may be less readily accessible by electrostatic templating pathways.", "title": "" } ]
scidocsrr
58c8bc749e0e26e1cae2a5987eaffe5c
The importance of the label hierarchy in hierarchical multi-label classification
[ { "docid": "97b7065942b53f2d873c80f32242cd00", "text": "Hierarchical multilabel classification (HMC) allows an instance to have multiple labels residing in a hierarchy. A popular loss function used in HMC is the H-loss, which penalizes only the first classification mistake along each prediction path. However, the H-loss metric can only be used on tree-structured label hierarchies, but not on DAG hierarchies. Moreover, it may lead to misleading predictions as not all misclassifications in the hierarchy are penalized. In this paper, we overcome these deficiencies by proposing a hierarchy-aware loss function that is more appropriate for HMC. Using Bayesian decision theory, we then develop a Bayes-optimal classifier with respect to this loss function. Instead of requiring an exhaustive summation and search for the optimal multilabel, the proposed classification problem can be efficiently solved using a greedy algorithm on both tree-and DAG-structured label hierarchies. Experimental results on a large number of real-world data sets show that the proposed algorithm outperforms existing HMC methods.", "title": "" } ]
[ { "docid": "fd8574edb4fc609ade520fff36fac8cd", "text": "A large share of websites today allow users to contribute and manage user-generated content. This content is often in textual form and involves names, terms, and keywords that can be ambiguous and difficult to interpret for other users. Semantic annotation can be used to tackle such issues, but this technique has been adopted by only a few websites. This may be attributed to a lack of a standard web input component that allows users to simply and efficiently annotate text. In this paper, we introduce an autocomplete-enabled annotation box that supports users in associating their text with DBpedia resources as they type. This web component can replace existing input fields and does not require particular user skills. Furthermore, it can be used by semantic web developers as a user interface for advanced semantic search and data processing back-ends. Finally, we validate the approach with a preliminary user study.", "title": "" }, { "docid": "b10a0f8d888d4ecfc0e0d154ae7416dc", "text": "The purpose of this study was to investigate the differences in the viscoelastic properties of human tendon structures (tendon and aponeurosis) in the medial gastrocnemius muscle between men (n=16) and women (n=13). The elongation of the tendon and aponeurosis of the medial gastrocnemius muscle was measured directly by ultrasonography, while the subjects performed ramp isometric plantar flexion up to the voluntary maximum, followed by a ramp relaxation. The relationship between the estimated muscle force (Fm) and tendon elongation (L) during the ascending phase was fitted to a linear regression, the slope of which was defined as stiffness. The percentage of the area within the Fm-L loop to the area beneath the curve during the ascending phase was calculated as hysteresis. The L values at force production levels beyond 50 N were significantly greater for women than for men. The maximum strain (100×ΔL/initial tendon length) was significantly greater in women [9.5 (1.1)%] than in men [8.1 (1.6)%]. The stiffness and Young's modulus were significantly lower in women [16.5 (3.4) N/mm, 277 (25) MPa] than in men [25.9 (7.0) N/mm, 356 (32) MPa]. Furthermore, the hysteresis was significantly lower in women [11.1 (5.9)%] than in men [18.7 (8.5)%, P=0.048]. These results suggest that there are gender differences in the viscoelastic properties of tendon structures and that these might in part account for previously observed performance differences between the genders.", "title": "" }, { "docid": "55694b963cde47e9aecbeb21fb0e79cf", "text": "The rise of Uber as the global alternative taxi operator has attracted a lot of interest recently. Aside from the media headlines which discuss the new phenomenon, e.g. on how it has disrupted the traditional transportation industry, policy makers, economists, citizens and scientists have engaged in a discussion that is centred around the means to integrate the new generation of the sharing economy services in urban ecosystems. In this work, we aim to shed new light on the discussion, by taking advantage of a publicly available longitudinal dataset that describes the mobility of yellow taxis in New York City. In addition to movement, this data contains information on the fares paid by the taxi customers for each trip. As a result we are given the opportunity to provide a first head to head comparison between the iconic yellow taxi and its modern competitor, Uber, in one of the world’s largest metropolitan centres. We identify situations when Uber X, the cheapest version of the Uber taxi service, tends to be more expensive than yellow taxis for the same journey. We also demonstrate how Uber’s economic model effectively takes advantage of well known patterns in human movement. Finally, we take our analysis a step further by proposing a new mobile application that compares taxi prices in the city to facilitate traveller’s taxi choices, hoping to ultimately to lead to a reduction of commuter costs. Our study provides a case on how big datasets that become public can improve urban services for consumers by offering the opportunity for transparency in economic sectors that lack up to date regulations.", "title": "" }, { "docid": "1415e7053edc09e149a5bcc124aa2cf0", "text": "Accurate medical image segmentation is essential for diagnosis, surgical planning and many other applications. Convolutional Neural Networks (CNNs) have become the state-of-the-art automatic segmentation methods. However, fully automatic results may still need to be refined to become accurate and robust enough for clinical use. We propose a deep learning-based interactive segmentation method to improve the results obtained by an automatic CNN and to reduce user interactions during refinement for higher accuracy. We use one CNN to obtain an initial automatic segmentation, on which user interactions are added to indicate mis-segmentations. Another CNN takes as input the user interactions with the initial segmentation and gives a refined result. We propose to combine user interactions with CNNs through geodesic distance transforms, and propose a resolution-preserving network that gives a better dense prediction. In addition, we integrate user interactions as hard constraints into a back-propagatable Conditional Random Field. We validated the proposed framework in the context of 2D placenta segmentation from fetal MRI and 3D brain tumor segmentation from FLAIR images. Experimental results show our method achieves a large improvement from automatic CNNs, and obtains comparable and even higher accuracy with fewer user interventions and less time compared with traditional interactive methods.", "title": "" }, { "docid": "4d3baff85c302b35038f35297a8cdf90", "text": "Most speech recognition applications in use today rely heavily on confidence measure for making optimal decisions. In this paper, we aim to answer the question: what can be done to improve the quality of confidence measure if we cannot modify the speech recognition engine? The answer provided in this paper is a post-processing step called confidence calibration, which can be viewed as a special adaptation technique applied to confidence measure. Three confidence calibration methods have been developed in this work: the maximum entropy model with distribution constraints, the artificial neural network, and the deep belief network. We compare these approaches and demonstrate the importance of key features exploited: the generic confidence-score, the application-dependent word distribution, and the rule coverage ratio. We demonstrate the effectiveness of confidence calibration on a variety of tasks with significant normalized cross entropy increase and equal error rate reduction.", "title": "" }, { "docid": "d93abfdc3bc20a23e533f3ad2e30b9c9", "text": "Over the past few years, the realm of embedded systems has expanded to include a wide variety of products, ranging from digital cameras, to sensor networks, to medical imaging systems. Consequently, engineers strive to create ever smaller and faster products, many of which have stringent power requirements. Coupled with increasing pressure to decrease costs and time-to-market, the design constraints of embedded systems pose a serious challenge to embedded systems designers. Reconfigurable hardware can provide a flexible and efficient platform for satisfying the area, performance, cost, and power requirements of many embedded systems. This article presents an overview of reconfigurable computing in embedded systems, in terms of benefits it can provide, how it has already been used, design issues, and hurdles that have slowed its adoption.", "title": "" }, { "docid": "3fa0911a8e65461a0c1014cc481293bb", "text": "Researchers are using emerging technologies to develop novel play environments, while established computer and console game markets continue to grow rapidly. Even so, evaluating the success of interactive play environments is still an open research challenge. Both subjective and objective techniques fall short due to limited evaluative bandwidth; there remains no corollary in play environments to task performance with productivity systems. This paper presents a method of modeling user emotional state, based on a user's physiology, for users interacting with play technologies. Modeled emotions are powerful because they capture usability and playability through metrics relevant to ludic experience; account for user emotion; are quantitative and objective; and are represented continuously over a session. Furthermore, our modeled emotions show the same trends as reported emotions for fun, boredom, and excitement; however, the modeled emotions revealed differences between three play conditions, while the differences between the subjective reports failed to reach significance.", "title": "" }, { "docid": "ac3223b0590216936cc2f48f6a61dc40", "text": "It is greatly demanded that to develop a kind of stably stair climbing mobile vehicle to assist the physically handicapped in moving outdoors. In this paper, we first propose a novel leg-wheel hybrid stair-climbing vehicle, \"Zero Carrier\", which consists of eight unified prismatic-joint legs, four of which attached active wheels and other four attached passive casters. Zero Carrier can be designed lightweight, compact, powerful, together with its significant stability on stair climbing motion, since its mechanism is mostly concentrated in its eight simplified legs. We discuss the leg mechanism and control method of the first trial model, Zero Carrier I, and verify its performance based on the experiments of stair climbing and moving over obstacles performed by Zero Carrier I", "title": "" }, { "docid": "752a9661f174499c2aa4a4fa70d5b46b", "text": "Energy is an important consideration in the design and deployment of wireless sensor networks (WSNs) since sensor nodes are typically powered by batteries with limited capacity. Since the communication unit on a wireless sensor node is the major power consumer, data compression is one of possible techniques that can help reduce the amount of data exchanged between wireless sensor nodes resulting in power saving. However, wireless sensor networks possess significant limitations in communication, processing, storage, bandwidth, and power. Thus, any data compression scheme proposed for WSNs must be lightweight. In this paper, we present an adaptive lossless data compression (ALDC) algorithm for wireless sensor networks. Our proposed ALDC scheme performs compression losslessly using multiple code options. Adaptive compression schemes allow compression to dynamically adjust to a changing source. The data sequence to be compressed is partitioned into blocks, and the optimal compression scheme is applied for each block. Using various real-world sensor datasets we demonstrate the merits of our proposed compression algorithm in comparison with other recently proposed lossless compression algorithms for WSNs.", "title": "" }, { "docid": "492c5a20c4ef5b7a3ea08083ecf66bce", "text": "We present the design for an absorbing metamaterial (MM) with near unity absorbance A(omega). Our structure consists of two MM resonators that couple separately to electric and magnetic fields so as to absorb all incident radiation within a single unit cell layer. We fabricate, characterize, and analyze a MM absorber with a slightly lower predicted A(omega) of 96%. Unlike conventional absorbers, our MM consists solely of metallic elements. The substrate can therefore be optimized for other parameters of interest. We experimentally demonstrate a peak A(omega) greater than 88% at 11.5 GHz.", "title": "" }, { "docid": "88130a65e625f85e527d63a0d2a446d4", "text": "Test-Driven Development (TDD) is an agile practice that is widely accepted and advocated by most agile methods and methodologists. In this paper, we report on a longitudinal case study of an IBM team who has sustained use of TDD for five years and over ten releases of a Java-implemented product. The team worked from a design and wrote tests incrementally before or while they wrote code and, in the process, developed a significant asset of automated tests. The IBM team realized sustained quality improvement relative to a pre-TDD project and consistently had defect density below industry standards. As a result, our data indicate that the TDD practice can aid in the production of high quality products. This quality improvement would compensate for the moderate perceived productivity losses. Additionally, the use of TDD may decrease the degree to which code complexity increases as software ages.", "title": "" }, { "docid": "e347eadb8df6386e70171d73388b8ace", "text": "An ultra-large voltage conversion ratio converter is proposed by integrating a switched-capacitor circuit with a coupled inductor technology. The proposed converter can be seen as an equivalent parallel connection to the load of a basic boost converter and a number of forward converters, each one containing a switched-capacitor circuit. All the stages are activated by the boost switch. A single active switch is required, with no need of extreme duty-ratio values. The leakage energy of the coupled inductor is recycled to the load. The inrush current problem of switched capacitors is restrained by the leakage inductance of the coupled-inductor. The above features are the reason for the high efficiency performance. The operating principles and steady state analyses of continuous, discontinuous and boundary conduction modes are discussed in detail. To verify the performance of the proposed converter, a 200 W/20 V to 400 V prototype was implemented. The maximum measured efficiency is 96.4%. The full load efficiency is 95.1%.", "title": "" }, { "docid": "5378e05d2d231969877131a011b3606a", "text": "Environmental, health, and safety (EHS) concerns are receiving considerable attention in nanoscience and nanotechnology (nano) research and development (R&D). Policymakers and others have urged that research on nano's EHS implications be developed alongside scientific research in the nano domain rather than subsequent to applications. This concurrent perspective suggests the importance of early understanding and measurement of the diffusion of nano EHS research. The paper examines the diffusion of nano EHS publications, defined through a set of search terms, into the broader nano domain using a global nanotechnology R&D database developed at Georgia Tech. The results indicate that nano EHS research is growing rapidly although it is orders of magnitude smaller than the broader nano S&T domain. Nano EHS work is moderately multidisciplinary, but gaps in biomedical nano EHS's connections with environmental nano EHS are apparent. The paper discusses the implications of these results for the continued monitoring and development of the cross-disciplinary utilization of nano EHS research.", "title": "" }, { "docid": "53ab91cdff51925141c43c4bc1c6aade", "text": "Floods are the most common natural disasters, and cause significant damage to life, agriculture and economy. Research has moved on from mathematical modeling or physical parameter based flood forecasting schemes, to methodologies focused around algorithmic approaches. The Internet of Things (IoT) is a field of applied electronics and computer science where a system of devices collects data in real time and transfers it through a Wireless Sensor Network (WSN) to the computing device for analysis. IoT generally combines embedded system hardware techniques along with data science or machine learning models. In this work, an IoT and machine learning based embedded system is proposed to predict the probability of floods in a river basin. The model uses a modified mesh network connection over ZigBee for the WSN to collect data, and a GPRS module to send the data over the internet. The data sets are evaluated using an artificial neural network model. The results of the analysis which are also appended show a considerable improvement over the currently existing methods.", "title": "" }, { "docid": "68c7509ec0261b1ddccef7e3ad855629", "text": "This research comprehensively illustrates the design, implementation and evaluation of a novel marker less environment tracking technology for an augmented reality based indoor navigation application, adapted to efficiently operate on a proprietary head-mounted display. Although the display device used, Google Glass, had certain pitfalls such as short battery life, slow processing speed, and lower quality visual display but the tracking technology was able to complement these limitations by rendering a very efficient, precise, and intuitive navigation experience. The performance assessments, conducted on the basis of efficiency and accuracy, substantiated the utility of the device for everyday navigation scenarios, whereas a later conducted subjective evaluation of handheld and wearable devices also corroborated the wearable as the preferred device for indoor navigation.", "title": "" }, { "docid": "6e4dfb4c6974543246003350b5e3e07f", "text": "Zero-shot object detection is an emerging research topic that aims to recognize and localize previously ‘unseen’ objects. This setting gives rise to several unique challenges, e.g., highly imbalanced positive vs. negative instance ratio, ambiguity between background and unseen classes and the proper alignment between visual and semantic concepts. Here, we propose an end-to-end deep learning framework underpinned by a novel loss function that puts more emphasis on difficult examples to avoid class imbalance. We call our objective the ‘Polarity loss’ because it explicitly maximizes the gap between positive and negative predictions. Such a margin maximizing formulation is important as it improves the visual-semantic alignment while resolving the ambiguity between background and unseen. Our approach is inspired by the embodiment theories in cognitive science, that claim human semantic understanding to be grounded in past experiences (seen objects), related linguistic concepts (word dictionary) and the perception of the physical world (visual imagery). To this end, we learn to attend to a dictionary of related semantic concepts that eventually refines the noisy semantic embeddings and helps establish a better synergy between visual and semantic domains. Our extensive results on MS-COCO and Pascal VOC datasets show as high as 14× mAP improvement over state of the art.1", "title": "" }, { "docid": "49a54c57984c3feaef32b708ae328109", "text": "While it has a long history, the last 30 years have brought considerable advances to the discipline of forensic anthropology worldwide. Every so often it is essential that these advances are noticed and trends assessed. It is also important to identify those research areas that are needed for the forthcoming years. The purpose of this special issue is to examine some of the examples of research that might identify the trends in the 21st century. Of the 14 papers 5 dealt with facial features and identification such as facial profile determination and skull-photo superimposition. Age (fetus and cranial thickness), sex (supranasal region, arm and leg bones) and stature (from the arm bones) estimation were represented by five articles. Others discussed the estimation of time since death, skull color and diabetes, and a case study dealing with a mummy and skeletal analysis in comparison with DNA identification. These papers show that age, sex, and stature are still important issues of the discipline. Research on the human face is moving from hit and miss case studies to a more scientifically sound direction. A lack of studies on trauma and taphonomy is very clear. Anthropologists with other scientists can develop research areas to make the identification process more reliable. Research should include the assessment of animal attacks on human remains, factors affecting decomposition rates, and aging of the human face. Lastly anthropologists should be involved in the education of forensic pathologists about osteological techniques and investigators regarding archaeology of crime scenes.", "title": "" }, { "docid": "eaf7b6b0cc18453538087cc90254dbd8", "text": "We present a real-time system that renders antialiased hard shadows using irregular z-buffers (IZBs). For subpixel accuracy, we use 32 samples per pixel at roughly twice the cost of a single sample. Our system remains interactive on a variety of game assets and CAD models while running at 1080p and 2160p and imposes no constraints on light, camera or geometry, allowing fully dynamic scenes without precomputation. Unlike shadow maps we introduce no spatial or temporal aliasing, smoothly animating even subpixel shadows from grass or wires.\n Prior irregular z-buffer work relies heavily on GPU compute. Instead we leverage the graphics pipeline, including hardware conservative raster and early-z culling. We observe a duality between irregular z-buffer performance and shadow map quality; this allows common shadow map algorithms to reduce our cost. Compared to state-of-the-art ray tracers, we spawn similar numbers of triangle intersections per pixel yet completely rebuild our data structure in under 2 ms per frame.", "title": "" }, { "docid": "8742ca1440f2913f61d0be3f5415c682", "text": "Fluid-phase endocytosis (pinocytosis) is highly active in amoebae of the cellular slime mould Dictyostelium discoideum as it provides an efficient entry of nutrients in axenic strains. Detailed kinetic analyses were conducted using fluorescein-labeled dextran (FITC-dextran) as fluid-phase marker and pH probe. Cells were first pulsed with FITC-dextran during a short period then chased by suspension in probe-free medium. Chase kinetics were characterized by a lag phase of about 40 min before pseudo-first order FITC-dextran efflux and thus reflected the progression of the probe cohort through the various endosomal compartments along the endosomal pathway. Temporal evolution of endo-lysosomal pH showed a rapid acidification (T1/2 approximately 10 min) to pH 5.0 followed by an increase up to pH 6.2 to 6.3. The effects of cycloheximide and caffeine, two inhibitors of endocytosis in Dictyostelium amoebae, on the evolution of endosomal pH during fluid-phase endocytosis, have been investigated. Cycloheximide fully blocked the cellular transit of FITC-dextran but acidification of endo-lysosomal compartments still took place. Caffeine increased endo-lysosomal pH, probably as a consequence of an elevation of cytosolic [Ca2+]. Furthermore, it allowed the functional identification of a caffeine-insensitive terminal segment of the endocytic pathway. It corresponded to a recycling, postlysosomal compartment at pH 6.2 to 6.3 with an apparent volume of 160 microns 3/amoebae.", "title": "" }, { "docid": "fb89fd2d9bf526b8bc7f1433274859a6", "text": "In multidimensional image analysis, there are, and will continue to be, situations wherein automatic image segmentation methods fail, calling for considerable user assistance in the process. The main goals of segmentation research for such situations ought to be (i) to provide ffective controlto the user on the segmentation process while it is being executed, and (ii) to minimize the total user’s time required in the process. With these goals in mind, we present in this paper two paradigms, referred to aslive wireandlive lane, for practical image segmentation in large applications. For both approaches, we think of the pixel vertices and oriented edges as forming a graph, assign a set of features to each oriented edge to characterize its “boundariness,” and transform feature values to costs. We provide training facilities and automatic optimal feature and transform selection methods so that these assignments can be made with consistent effectiveness in any application. In live wire, the user first selects an initial point on the boundary. For any subsequent point indicated by the cursor, an optimal path from the initial point to the current point is found and displayed in real time. The user thus has a live wire on hand which is moved by moving the cursor. If the cursor goes close to the boundary, the live wire snaps onto the boundary. At this point, if the live wire describes the boundary appropriately, the user deposits the cursor which now becomes the new starting point and the process continues. A few points (livewire segments) are usually adequate to segment the whole 2D boundary. In live lane, the user selects only the initial point. Subsequent points are selected automatically as the cursor is moved within a lane surrounding the boundary whose width changes", "title": "" } ]
scidocsrr
2df5ead9048b5e67787022e54562bf66
Applying Sensor-Based Technology to Improve Construction Safety Management
[ { "docid": "8ff8a8ce2db839767adb8559f6d06721", "text": "Indoor environments present opportunities for a rich set of location-aware applications such as navigation tools for humans and robots, interactive virtual games, resource discovery, asset tracking, location-aware sensor networking etc. Typical indoor applications require better accuracy than what current outdoor location systems provide. Outdoor location technologies such as GPS have poor indoor performance because of the harsh nature of indoor environments. Further, typical indoor applications require different types of location information such as physical space, position and orientation. This dissertation describes the design and implementation of the Cricket indoor location system that provides accurate location in the form of user space, position and orientation to mobile and sensor network applications. Cricket consists of location beacons that are attached to the ceiling of a building, and receivers, called listeners, attached to devices that need location. Each beacon periodically transmits its location information in an RF message. At the same time, the beacon also transmits an ultrasonic pulse. The listeners listen to beacon transmissions and measure distances to nearby beacons, and use these distances to compute their own locations. This active-beacon passive-listener architecture is scalable with respect to the number of users, and enables applications that preserve user privacy. This dissertation describes how Cricket achieves accurate distance measurements between beacons and listeners. Once the beacons are deployed, the MAT and AFL algorithms, described in this dissertation, use measurements taken at a mobile listener to configure the beacons with a coordinate assignment that reflects the beacon layout. This dissertation presents beacon interference avoidance and detection algorithms, as well as outlier rejection algorithms to prevent and filter out outlier distance estimates caused by uncoordinated beacon transmissions. The Cricket listeners can measure distances with an accuracy of 5 cm. The listeners can detect boundaries with an accuracy of 1 cm. Cricket has a position estimation accuracy of 10 cm and an orientation accuracy of 3 degrees. Thesis Supervisor: Hari Balakrishnan Title: Associate Professor of Computer Science and Engineering", "title": "" } ]
[ { "docid": "7cfdad39cebb90cac18a8f9ae6a46238", "text": "A malware macro (also called \"macro virus\") is the code that exploits the macro functionality of office documents (especially Microsoft Office’s Excel and Word) to carry out malicious action against the systems of the victims that open the file. This type of malware was very popular during the late 90s and early 2000s. After its rise when it was created as a propagation method of other malware in 2014, macro viruses continue posing a threat to the user that is far from being controlled. This paper studies the possibility of improving macro malware detection via machine learning techniques applied to the properties of the code.", "title": "" }, { "docid": "af6b26efef62f3017a0eccc5d2ae3c33", "text": "Universal, intelligent, and multifunctional devices controlling power distribution and measurement will become the enabling technology of the Smart Grid ICT. In this paper, we report on a novel automation architecture which supports distributed multiagent intelligence, interoperability, and configurability and enables efficient simulation of distributed automation systems. The solution is based on the combination of IEC 61850 object-based modeling and interoperable communication with IEC 61499 function block executable specification. Using the developed simulation environment, we demonstrate the possibility of multiagent control to achieve self-healing grid through collaborative fault location and power restoration.", "title": "" }, { "docid": "6fb0aac60ec74b5efca4eeda22be979d", "text": "Images captured in hazy or foggy weather conditions are seriously degraded by the scattering of atmospheric particles, which directly influences the performance of outdoor computer vision systems. In this paper, a fast algorithm for single image dehazing is proposed based on linear transformation by assuming that a linear relationship exists in the minimum channel between the hazy image and the haze-free image. First, the principle of linear transformation is analyzed. Accordingly, the method of estimating a medium transmission map is detailed and the weakening strategies are introduced to solve the problem of the brightest areas of distortion. To accurately estimate the atmospheric light, an additional channel method is proposed based on quad-tree subdivision. In this method, average grays and gradients in the region are employed as assessment criteria. Finally, the haze-free image is obtained using the atmospheric scattering model. Numerous experimental results show that this algorithm can clearly and naturally recover the image, especially at the edges of sudden changes in the depth of field. It can, thus, achieve a good effect for single image dehazing. Furthermore, the algorithmic time complexity is a linear function of the image size. This has obvious advantages in running time by guaranteeing a balance between the running speed and the processing effect.", "title": "" }, { "docid": "35de54ee9d3d4c117cf4c1d8fc4f4e87", "text": "On the purpose of managing process models to make them more practical and effective in enterprises, a construction of BPMN-based Business Process Model Base is proposed. Considering Business Process Modeling Notation (BPMN) is used as a standard of process modeling, based on BPMN, the process model transformation is given, and business blueprint modularization management methodology is used for process management. Therefore, BPMN-based Business Process Model Base provides a solution of business process modeling standardization, management and execution so as to enhance the business process reuse.", "title": "" }, { "docid": "9a6249777e0137121df0c02cffe63b73", "text": "With the goal of supporting close-range observation tasks of a spherical amphibious robot, such as ecological observations and intelligent surveillance, a moving target detection and tracking system was designed and implemented in this study. Given the restrictions presented by the amphibious environment and the small-sized spherical amphibious robot, an industrial camera and vision algorithms using adaptive appearance models were adopted to construct the proposed system. To handle the problem of light scattering and absorption in the underwater environment, the multi-scale retinex with color restoration algorithm was used for image enhancement. Given the environmental disturbances in practical amphibious scenarios, the Gaussian mixture model was used to detect moving targets entering the field of view of the robot. A fast compressive tracker with a Kalman prediction mechanism was used to track the specified target. Considering the limited load space and the unique mechanical structure of the robot, the proposed vision system was fabricated with a low power system-on-chip using an asymmetric and heterogeneous computing architecture. Experimental results confirmed the validity and high efficiency of the proposed system. The design presented in this paper is able to meet future demands of spherical amphibious robots in biological monitoring and multi-robot cooperation.", "title": "" }, { "docid": "dd1fd4f509e385ea8086a45a4379a8b5", "text": "As we move towards large-scale object detection, it is unrealistic to expect annotated training data for all object classes at sufficient scale, and so methods capable of unseen object detection are required. We propose a novel zero-shot method based on training an end-to-end model that fuses semantic attribute prediction with visual features to propose object bounding boxes for seen and unseen classes. While we utilize semantic features during training, our method is agnostic to semantic information for unseen classes at test-time. Our method retains the efficiency and effectiveness of YOLO [1] for objects seen during training, while improving its performance for novel and unseen objects. The ability of state-of-art detection methods to learn discriminative object features to reject background proposals also limits their performance for unseen objects. We posit that, to detect unseen objects, we must incorporate semantic information into the visual domain so that the learned visual features reflect this information and leads to improved recall rates for unseen objects. We test our method on PASCAL VOC and MS COCO dataset and observed significant improvements on the average precision of unseen classes.", "title": "" }, { "docid": "72cff051b5d2bcd8eaf41b6e9ae9eca9", "text": "We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particular subset of the data. Our method consists of two steps: we first use a \"local anomaly detector\" to identify individual records with anomalous attribute values, and then detect patterns where the number of anomalous records is higher than expected. Given the set of anomalies flagged by the local anomaly detector, we search over all subsets of the data defined by any set of fixed values of a subset of the attributes, in order to detect self-similar patterns of anomalies. We wish to detect any such subset of the test data which displays a significant increase in anomalous activity as compared to the normal behavior of the system (as indicated by the training data). We perform significance testing to determine if the number of anomalies in any subset of the test data is significantly higher than expected, and propose an efficient algorithm to perform this test over all such subsets of the data. We show that this algorithm is able to accurately detect anomalous patterns in real-world hospital, container shipping and network intrusion data.", "title": "" }, { "docid": "0890227418a3fca80f280f9fa810f6a3", "text": "OBJECTIVE\nTo update the likelihood ratio for trisomy 21 in fetuses with absent nasal bone at the 11-14-week scan.\n\n\nMETHODS\nUltrasound examination of the fetal profile was carried out and the presence or absence of the nasal bone was noted immediately before karyotyping in 5918 fetuses at 11 to 13+6 weeks. Logistic regression analysis was used to examine the effect of maternal ethnic origin and fetal crown-rump length (CRL) and nuchal translucency (NT) on the incidence of absent nasal bone in the chromosomally normal and trisomy 21 fetuses.\n\n\nRESULTS\nThe fetal profile was successfully examined in 5851 (98.9%) cases. In 5223/5851 cases the fetal karyotype was normal and in 628 cases it was abnormal. In the chromosomally normal group the incidence of absent nasal bone was related first to the ethnic origin of the mother, being 2.2% for Caucasians, 9.0% for Afro-Caribbeans and 5.0% for Asians; second to fetal CRL, being 4.7% for CRL of 45-54 mm, 3.4% for CRL of 55-64 mm, 1.4% for CRL of 65-74 mm and 1% for CRL of 75-84 mm; and third to NT, being 1.6% for NT < or = 95th centile, 2.7% for NT > 95th centile-3.4 mm, 5.4% for NT 3.5-4.4 mm, 6% for NT 4.5-5.4 mm and 15% for NT > or = 5.5 mm. In the chromosomally abnormal group there was absent nasal bone in 229/333 (68.8%) cases with trisomy 21 and in 95/295 (32.2%) cases with other chromosomal defects. Logistic regression analysis demonstrated that in the chromosomally normal fetuses significant independent prediction of the likelihood of absent nasal bone was provided by CRL, NT and Afro-Caribbean ethnic group, and in the trisomy 21 fetuses by CRL and NT. The likelihood ratio for trisomy 21 for absent nasal bone was derived by dividing the likelihood in trisomy 21 by that in normal fetuses.\n\n\nCONCLUSION\nAt the 11-14-week scan the incidence of absent nasal bone is related to the presence or absence of chromosomal defects, CRL, NT and ethnic origin.", "title": "" }, { "docid": "d436517b8dd58d67cee91eb3d2c12b93", "text": "The ability to deploy neural networks in real-world, safety-critical systems is severely limited by the presence of adversarial examples: slightly perturbed inputs that are misclassified by the network. In recent years, several techniques have been proposed for training networks that are robust to such examples; and each time stronger attacks have been devised, demonstrating the shortcomings of existing defenses. This highlights a key difficulty in designing an effective defense: the inability to assess a network’s robustness against future attacks. We propose to address this difficulty through formal verification techniques. We construct ground truths: adversarial examples with provably minimal perturbation. We demonstrate how ground truths can serve to assess the effectiveness of attack techniques, by comparing the adversarial examples produced to the ground truths; and also of defense techniques, by measuring the increase in distortion to ground truths in the hardened network versus the original. We use this technique to assess recently suggested attack and defense techniques.", "title": "" }, { "docid": "6cd317113158241a98517ad5a8247174", "text": "Feature Oriented Programming (FOP) is an emerging paradigmfor application synthesis, analysis, and optimization. Atarget application is specified declaratively as a set of features,like many consumer products (e.g., personal computers,automobiles). FOP technology translates suchdeclarative specifications into efficient programs.", "title": "" }, { "docid": "255ede4ccdeeeb32cb09e52fa7d0ca0b", "text": "Advanced neural machine translation (NMT) models generally implement encoder and decoder as multiple layers, which allows systems to model complex functions and capture complicated linguistic structures. However, only the top layers of encoder and decoder are leveraged in the subsequent process, which misses the opportunity to exploit the useful information embedded in other layers. In this work, we propose to simultaneously expose all of these signals with layer aggregation and multi-layer attention mechanisms. In addition, we introduce an auxiliary regularization term to encourage different layers to capture diverse information. Experimental results on widely-used WMT14 English⇒German and WMT17 Chinese⇒English translation data demonstrate the effectiveness and universality of the proposed approach.", "title": "" }, { "docid": "ad49ca31e92eaeb44cbb24206e10c9ee", "text": "PESQ, Perceptual Evaluation of Speech Quality [5], and POLQA, Perceptual Objective Listening Quality Assessment [1] , are standards comprising a test methodology for automated assessment of voice quality of speech as experienced by human beings. The predictions of those objective measures should come as close as possible to subjective quality scores as obtained in subjective listening tests, usually, a Mean Opinion Score (MOS) is predicted. Wavenet [6] is a deep neural network originally developed as a deep generative model of raw audio waveforms. Wavenet architecture is based on dilated causal convolutions, which exhibit very large receptive fields. In this short paper we suggest using the Wavenet architecture, in particular its large receptive filed in order to mimic PESQ algorithm. By doing so we can use it as a differentiable loss function for speech enhancement. 1 Problem formulation and related work In statistics, the Mean Squared Error (MSE) or Peak Signal to Noise Ratio (PSNR) of an estimator are widely used objective measures and are good distortion indicators (loss functions) between the estimators output and the size that we want to estimate. those loss functions are used for many reconstruction tasks. However, PSNR and MSE do not have good correlation with reliable subjective methods such as Mean Opinion Score (MOS) obtained from expert listeners. A more suitable speech quality assessment can by achieved by using tests that aim to achieve high correlation with MOS tests such as PEAQ or POLQA. However those algorithms are hard to represent as a differentiable function such as MSE moreover, as opposed to MSE that measures the average", "title": "" }, { "docid": "c13aff70c3b080cfd5d374639e5ec0e9", "text": "Contemporary vehicles are getting equipped with an increasing number of Electronic Control Units (ECUs) and wireless connectivities. Although these have enhanced vehicle safety and efficiency, they are accompanied with new vulnerabilities. In this paper, we unveil a new important vulnerability applicable to several in-vehicle networks including Control Area Network (CAN), the de facto standard in-vehicle network protocol. Specifically, we propose a new type of Denial-of-Service (DoS), called the bus-off attack, which exploits the error-handling scheme of in-vehicle networks to disconnect or shut down good/uncompromised ECUs. This is an important attack that must be thwarted, since the attack, once an ECU is compromised, is easy to be mounted on safety-critical ECUs while its prevention is very difficult. In addition to the discovery of this new vulnerability, we analyze its feasibility using actual in-vehicle network traffic, and demonstrate the attack on a CAN bus prototype as well as on two real vehicles. Based on our analysis and experimental results, we also propose and evaluate a mechanism to detect and prevent the bus-off attack.", "title": "" }, { "docid": "a94f066ec5db089da7fd19ac30fe6ee3", "text": "Information Centric Networking (ICN) is a new networking paradigm in which the ne twork provides users with content instead of communicatio n channels between hosts. Software Defined Networking (SDN) is an approach that promises to enable the co ntinuous evolution of networking architectures. In this paper we propose and discuss solutions to support ICN by using SDN concepts. We focus on an ICN framework called CONET, which groun ds its roots in the CCN/NDN architecture and can interwork with its implementation (CCNx). Altho ugh some details of our solution have been specifically designed for the CONET architecture, i ts general ideas and concepts are applicable to a c lass of recent ICN proposals, which follow the basic mod e of operation of CCN/NDN. We approach the problem in two complementary ways. First we discuss a general and long term solution based on SDN concepts without taking into account specific limit ations of SDN standards and equipment. Then we focus on an experiment to support ICN functionality over a large scale SDN testbed based on OpenFlow, developed in the context of the OFELIA Eu ropean research project. The current OFELIA testbed is based on OpenFlow 1.0 equipment from a v ariety of vendors, therefore we had to design the experiment taking into account the features that ar e currently available on off-the-shelf OpenFlow equipment.", "title": "" }, { "docid": "7cc362ec57b9b4a8f0e5d9beaf0ed02f", "text": "Conclusions Trading Framework Deep Learning has become a robust machine learning tool in recent years, and models based on deep learning has been applied to various fields. However, applications of deep learning in the field of computational finance are still limited[1]. In our project, Long Short Term Memory (LSTM) Networks, a time series version of Deep Neural Networks model, is trained on the stock data in order to forecast the next day‘s stock price of Intel Corporation (NASDAQ: INTC): our model predicts next day’s adjusted closing price based on information/features available until the present day. Based on the predicted price, we trade the Intel stock according to the strategy that we developed, which is described below. Locally Weighted Regression has also been performed in lieu of the unsupervised learning model for comparison.", "title": "" }, { "docid": "dd79b1a2269971167c91d42fca98bb55", "text": "The relationship between berry chemical composition, region of origin and quality grade was investigated for Chardonnay grapes sourced from vineyards located in seven South Australian Geographical Indications (GI). Measurements of basic chemical parameters, amino acids, elements, and free and bound volatiles were conducted for grapes collected during 2015 and 2016. Multiple factor analysis (MFA) was used to determine the sets of data that best discriminated each GI and quality grade. Important components for the discrimination of grapes based on GI were 2-phenylethanol, benzyl alcohol and C6 compounds, as well as Cu, Zn, and Mg, titratable acidity (TA), total soluble solids (TSS), and pH. Discriminant analysis (DA) based on MFA results correctly classified 100% of the samples into GI in 2015 and 2016. Classification according to grade was achieved based on the results for elements such as Cu, Na, Fe, volatiles including C6 and aryl alcohols, hydrolytically-released volatiles such as (Z)-linalool oxide and vitispirane, pH, TSS, alanine and proline. Correct classification through DA according to grade was 100% for both vintages. Significant correlations were observed between climate, GI, grade, and berry composition. Climate influenced the synthesis of free and bound volatiles as well as amino acids, sugars, and acids, as a result of higher temperatures and precipitation.", "title": "" }, { "docid": "b3db73c0398e6c0e6a90eac45bb5821f", "text": "The task of video grounding, which temporally localizes a natural language description in a video, plays an important role in understanding videos. Existing studies have adopted strategies of sliding window over the entire video or exhaustively ranking all possible clip-sentence pairs in a presegmented video, which inevitably suffer from exhaustively enumerated candidates. To alleviate this problem, we formulate this task as a problem of sequential decision making by learning an agent which regulates the temporal grounding boundaries progressively based on its policy. Specifically, we propose a reinforcement learning based framework improved by multi-task learning and it shows steady performance gains by considering additional supervised boundary information during training. Our proposed framework achieves state-ofthe-art performance on ActivityNet’18 DenseCaption dataset (Krishna et al. 2017) and Charades-STA dataset (Sigurdsson et al. 2016; Gao et al. 2017) while observing only 10 or less clips per video.", "title": "" }, { "docid": "0eabd9e8a9468ebb308e1f578578c8b1", "text": "Textual documents created and distributed on the Internet are ever changing in various forms. Most of existing works are devoted to topic modeling and the evolution of individual topics, while sequential relations of topics in successive documents published by a specific user are ignored. In this paper, in order to characterize and detect personalized and abnormal behaviors of Internet users, we propose Sequential Topic Patterns (STPs) and formulate the problem of mining User-aware Rare Sequential Topic Patterns (URSTPs) in document streams on the Internet. They are rare on the whole but relatively frequent for specific users, so can be applied in many real-life scenarios, such as real-time monitoring on abnormal user behaviors. We present a group of algorithms to solve this innovative mining problem through three phases: preprocessing to extract probabilistic topics and identify sessions for different users, generating all the STP candidates with (expected) support values for each user by pattern-growth, and selecting URSTPs by making user-aware rarity analysis on derived STPs. Experiments on both real (Twitter) and synthetic datasets show that our approach can indeed discover special users and interpretable URSTPs effectively and efficiently, which significantly reflect users' characteristics.", "title": "" }, { "docid": "fd2da8187978c334d5fe265b4df14487", "text": "Monopulse is a classical radar technique [1] of precise direction finding of a source or target. The concept can be used both in radar applications as well as in modern communication techniques. The information contained in antenna sidelobes normally disturbs the determination of DOA in the case of a classical monopulse system. The suitable combination of amplitudeand phase-monopulse algorithm leads to the novel complex monopulse algorithm (CMP), which also can utilise information from the sidelobes by using the phase shift of the signals in the sidelobes in relation to the mainlobes.", "title": "" }, { "docid": "4d6bd155102e7431d17f651dc124ffc2", "text": "Probiotic microorganisms are generally considered to beneficially affect host health when used in adequate amounts. Although generally used in dairy products, they are also widely used in various commercial food products such as fermented meats, cereals, baby foods, fruit juices, and ice creams. Among lactic acid bacteria, Lactobacillus and Bifidobacterium are the most commonly used bacteria in probiotic foods, but they are not resistant to heat treatment. Probiotic food diversity is expected to be greater with the use of probiotics, which are resistant to heat treatment and gastrointestinal system conditions. Bacillus coagulans (B. coagulans) has recently attracted the attention of researchers and food manufacturers, as it exhibits characteristics of both the Bacillus and Lactobacillus genera. B. coagulans is a spore-forming bacterium which is resistant to high temperatures with its probiotic activity. In addition, a large number of studies have been carried out on the low-cost microbial production of industrially valuable products such as lactic acid and various enzymes of B. coagulans which have been used in food production. In this review, the importance of B. coagulans in food industry is discussed. Moreover, some studies on B. coagulans products and the use of B. coagulans as a probiotic in food products are summarized.", "title": "" } ]
scidocsrr
0a3a922b9c9b58b3fd13d369a4e171c8
MSER-Based Real-Time Text Detection and Tracking
[ { "docid": "9185a7823e699c758dde3a81f7d6d86d", "text": "Reading text from photographs is a challenging problem that has received a significant amount of attention. Two key components of most systems are (i) text detection from images and (ii) character recognition, and many recent methods have been proposed to design better feature representations and models for both. In this paper, we apply methods recently developed in machine learning -- specifically, large-scale algorithms for learning the features automatically from unlabeled data -- and show that they allow us to construct highly effective classifiers for both detection and recognition to be used in a high accuracy end-to-end system.", "title": "" } ]
[ { "docid": "8b060d80674bd3f329a675f1a3f4bce2", "text": "Smartphones are ubiquitous devices that offer endless possibilities for health-related applications such as Ambient Assisted Living (AAL). They are rich in sensors that can be used for Human Activity Recognition (HAR) and monitoring. The emerging problem now is the selection of optimal combinations of these sensors and existing methods to accurately and efficiently perform activity recognition in a resource and computationally constrained environment. To accomplish efficient activity recognition on mobile devices, the most discriminative features and classification algorithms must be chosen carefully. In this study, sensor fusion is employed to improve the classification results of a lightweight classifier. Furthermore, the recognition performance of accelerometer, gyroscope and magnetometer when used separately and simultaneously on a feature-level sensor fusion is examined to gain valuable knowledge that can be used in dynamic sensing and data collection. Six ambulatory activities, namely, walking, running, sitting, standing, walking upstairs and walking downstairs, are inferred from low-sensor data collected from the right trousers pocket of the subjects and feature selection is performed to further optimize resource use.", "title": "" }, { "docid": "0a0f826f1a8fa52d61892632fd403502", "text": "We show that sequence information can be encoded into highdimensional fixed-width vectors using permutations of coordinates. Computational models of language often represent words with high-dimensional semantic vectors compiled from word-use statistics. A word’s semantic vector usually encodes the contexts in which the word appears in a large body of text but ignores word order. However, word order often signals a word’s grammatical role in a sentence and thus tells of the word’s meaning. Jones and Mewhort (2007) show that word order can be included in the semantic vectors using holographic reduced representation and convolution. We show here that the order information can be captured also by permuting of vector coordinates, thus providing a general and computationally light alternative to convolution.", "title": "" }, { "docid": "ce9b9cc57277b635262a5d4af999dc32", "text": "Age invariant face recognition has received increasing attention due to its great potential in real world applications. In spite of the great progress in face recognition techniques, reliably recognizing faces across ages remains a difficult task. The facial appearance of a person changes substantially over time, resulting in significant intra-class variations. Hence, the key to tackle this problem is to separate the variation caused by aging from the person-specific features that are stable. Specifically, we propose a new method, called Hidden Factor Analysis (HFA). This method captures the intuition above through a probabilistic model with two latent factors: an identity factor that is age-invariant and an age factor affected by the aging process. Then, the observed appearance can be modeled as a combination of the components generated based on these factors. We also develop a learning algorithm that jointly estimates the latent factors and the model parameters using an EM procedure. Extensive experiments on two well-known public domain face aging datasets: MORPH (the largest public face aging database) and FGNET, clearly show that the proposed method achieves notable improvement over state-of-the-art algorithms.", "title": "" }, { "docid": "6e7098f39a8b860307dba52dcc7e0d42", "text": "The paper presents an experimental algorithm to detect conventionalized metaphors implicit in the lexical data in a resource like WordNet, where metaphors are coded into the senses and so would never be detected by any algorithm based on the violation of preferences, since there would always be a constraint satisfied by such senses. We report an implementation of this algorithm, which was implemented first the preference constraints in VerbNet. We then derived in a systematic way a far more extensive set of constraints based on WordNet glosses, and with this data we reimplemented the detection algorithm and got a substantial improvement in recall. We suggest that this technique could contribute to improve the performance of existing metaphor detection strategies that do not attempt to detect conventionalized metaphors. The new WordNet-derived data is of wider significance because it also contains adjective constraints, unlike any existing lexical resource, and can be applied to any language with a semantic parser (and", "title": "" }, { "docid": "e49515145975eadccc20b251d56f0140", "text": "High mortality of nestling cockatiels (Nymphicus hollandicus) was observed in one breeding flock in Slovakia. The nestling mortality affected 50% of all breeding pairs. In general, all the nestlings in affected nests died. Death occurred suddenly in 4to 6-day-old birds, most of which had full crops. No feather disorders were diagnosed in this flock. Two dead nestlings were tested by nested PCR for the presence of avian polyomavirus (APV) and Chlamydophila psittaci and by single-round PCR for the presence of beak and feather disease virus (BFDV). After the breeding season ended, a breeding pair of cockatiels together with their young one and a fledgling budgerigar (Melopsittacus undulatus) were examined. No clinical alterations were observed in these birds. Haemorrhages in the proventriculus and irregular foci of yellow liver discoloration were found during necropsy in the young cockatiel and the fledgling budgerigar. Microscopy revealed liver necroses and acute haemolysis in the young cockatiel and confluent liver necroses and heart and kidney haemorrhages in the budgerigar. Two dead cockatiel nestlings, the young cockatiel and the fledgling budgerigar were tested positive for APV, while the cockatiel adults were negative. The presence of BFDV or Chlamydophila psittaci DNA was detected in none of the birds. The specificity of PCR was confirmed by the sequencing of PCR products amplified from the samples from the young cockatiel and the fledgling budgerigar. The sequences showed 99.6–100% homology with the previously reported sequences. To our knowledge, this is the first report of APV infection which caused a fatal disease in parent-raised cockatiel nestlings and merely subclinical infection in budgerigar nestlings.", "title": "" }, { "docid": "30c96eb397b515f6b3e4d05c071413d1", "text": "Thin-film solar cells have the potential to significantly decrease the cost of photovoltaics. Light trapping is particularly critical in such thin-film crystalline silicon solar cells in order to increase light absorption and hence cell efficiency. In this article we investigate the suitability of localized surface plasmons on silver nanoparticles for enhancing the absorbance of silicon solar cells. We find that surface plasmons can increase the spectral response of thin-film cells over almost the entire solar spectrum. At wavelengths close to the band gap of Si we observe a significant enhancement of the absorption for both thin-film and wafer-based structures. We report a sevenfold enhancement for wafer-based cells at =1200 nm and up to 16-fold enhancement at =1050 nm for 1.25 m thin silicon-on-insulator SOI cells, and compare the results with a theoretical dipole-waveguide model. We also report a close to 12-fold enhancement in the electroluminescence from ultrathin SOI light-emitting diodes and investigate the effect of varying the particle size on that enhancement. © 2007 American Institute of Physics. DOI: 10.1063/1.2734885", "title": "" }, { "docid": "3f5706c0aedb5f66497a564105c3dea0", "text": "The scientific study of hate speech, from a computer science point of view, is recent. This survey organizes and describes the current state of the field, providing a structured overview of previous approaches, including core algorithms, methods, and main features used. This work also discusses the complexity of the concept of hate speech, defined in many platforms and contexts, and provides a unifying definition. This area has an unquestionable potential for societal impact, particularly in online communities and digital media platforms. The development and systematization of shared resources, such as guidelines, annotated datasets in multiple languages, and algorithms, is a crucial step in advancing the automatic detection of hate speech.", "title": "" }, { "docid": "9faa8b39898eaa4ca0a0c23d29e7a0ff", "text": "Highly emphasized in entrepreneurial practice, business models have received limited attention from researchers. No consensus exists regarding the definition, nature, structure, and evolution of business models. Still, the business model holds promise as a unifying unit of analysis that can facilitate theory development in entrepreneurship. This article synthesizes the literature and draws conclusions regarding a number of these core issues. Theoretical underpinnings of a firm's business model are explored. A sixcomponent framework is proposed for characterizing a business model, regardless of venture type. These components are applied at three different levels. The framework is illustrated using a successful mainstream company. Suggestions are made regarding the manner in which business models might be expected to emerge and evolve over time. a c Purchase Export", "title": "" }, { "docid": "7670b1eea992a1e83d3ebc1464563d60", "text": "The present work was conducted to demonstrate a method that could be used to assess the hypothesis that children with specific language impairment (SLI) often respond more slowly than unimpaired children on a range of tasks. The data consisted of 22 pairs of mean response times (RTs) obtained from previously published studies; each pair consisted of a mean RT for a group of children with SLI for an experimental condition and the corresponding mean RT for a group of children without SLI. If children with SLI always respond more slowly than unimpaired children and by an amount that does not vary across tasks, then RTs for children with SLI should increase linearly as a function of RTs for age-matched control children without SLI. This result was obtained and is consistent with the view that differences in processing speed between children with and without SLI reflect some general (i.e., non-task specific) component of cognitive processing. Future applications of the method are suggested.", "title": "" }, { "docid": "95050a66393b41978cf136c1c99b1922", "text": "In this paper, we explore a new way to provide context-aware assistance for indoor navigation using a wearable vision system. We investigate how to represent the cognitive knowledge of wayfinding based on first-person-view videos in real-time and how to provide context-aware navigation instructions in a human-like manner. Inspired by the human cognitive process of wayfinding, we propose a novel cognitive model that represents visual concepts as a hierarchical structure. It facilitates efficient and robust localization based on cognitive visual concepts. Next, we design a prototype system that provides intelligent context-aware assistance based on the cognitive indoor navigation knowledge model. We conducted field tests and evaluated the system's efficacy by benchmarking it against traditional 2D maps and human guidance. The results show that context-awareness built on cognitive visual perception enables the system to emulate the efficacy of a human guide, leading to positive user experience.", "title": "" }, { "docid": "4292a60a5f76fd3e794ce67d2ed6bde3", "text": "If two translation systems differ differ in performance on a test set, can we trust that this indicates a difference in true system quality? To answer this question, we describe bootstrap resampling methods to compute statistical significance of test results, and validate them on the concrete example of the BLEU score. Even for small test sizes of only 300 sentences, our methods may give us assurances that test result differences are real.", "title": "" }, { "docid": "024b739dc047e17310fe181591fcd335", "text": "In this paper, a Ka-Band patch sub-array structure for millimeter-wave phased array applications is demonstrated. The conventional corner truncated patch is modified to improve the impedance and CP bandwidth alignment. A new sub-array feed approach is introduced to reduce complexity of the feed line between elements and increase the radiation efficiency. A sub-array prototype is built and tested. Good agreement with the theoretical results is obtained.", "title": "" }, { "docid": "b1c0fb9a020d8bc85b23f696586dd9d3", "text": "Most instances of real-life language use involve discourses in which several sentences or utterances are coherently linked through the use of repeated references. Repeated reference can take many forms, and the choice of referential form has been the focus of much research in several related fields. In this article we distinguish between three main approaches: one that addresses the ‘why’ question – why are certain forms used in certain contexts; one that addresses the ‘how’ question – how are different forms processed; and one that aims to answer both questions by seriously considering both the discourse function of referential expressions, and the cognitive mechanisms that underlie their processing cost. We argue that only the latter approach is capable of providing a complete view of referential processing, and that in so doing it may also answer a more profound ‘why’ question – why does language offer multiple referential forms. Coherent discourse typically involves repeated references to previously mentioned referents, and these references can be made with different forms. For example, a person mentioned in discourse can be referred to by a proper name (e.g., Bill), a definite description (e.g., the waiter), or a pronoun (e.g., he). When repeated reference is made to a referent that was mentioned in the same sentence, the choice and processing of referential form may be governed by syntactic constraints such as binding principles (Chomsky 1981). However, in many cases of repeated reference to a referent that was mentioned in the same sentence, and in all cases of repeated reference across sentences, the choice and processing of referential form reflects regular patterns and preferences rather than strong syntactic constraints. The present article focuses on the factors that underlie these patterns. Considerable research in several disciplines has aimed to explain how speakers and writers choose which form they should use to refer to objects and events in discourse, and how listeners and readers process different referential forms (e.g., Chafe 1976; Clark & Wilkes 1986; Kintsch 1988; Gernsbacher 1989; Ariel 1990; Gordon, Grosz & Gilliom 1993; Gundel, Hedberg & Zacharski 1993; Garrod & Sanford 1994; Gordon & Hendrick 1998; Almor 1999; Cowles & Garnham 2005). One of the central observations in this research is that there exists an inverse relation between the specificity of the referential", "title": "" }, { "docid": "1df103aef2a4a5685927615cfebbd1ea", "text": "While human subjects lift small objects using the precision grip between the tips of the fingers and thumb the ratio between the grip force and the load force (i.e. the vertical lifting force) is adapted to the friction between the object and the skin. The present report provides direct evidence that signals in tactile afferent units are utilized in this adaptation. Tactile afferent units were readily excited by small but distinct slips between the object and the skin revealed as vibrations in the object. Following such afferent slip responses the force ratio was upgraded to a higher, stable value which provided a safety margin to prevent further slips. The latency between the onset of the a slip and the appearance of the ratio change (74 ±9 ms) was about half the minimum latency for intended grip force changes triggered by cutaneous stimulation of the fingers. This indicated that the motor responses were automatically initiated. If the subjects were asked to very slowly separate their thumb and the opposing finger while the object was held in air, grip force reflexes originating from afferent slip responses appeared to counteract the voluntary command, but the maintained upgrading of the force ratio was suppressed. In experiments with weak electrical cutaneous stimulation delivered through the surfaces of the object it was established that tactile input alone could trigger the upgrading of the force ratio. Although, varying in responsiveness, each of the three types of tactile units which exhibit a pronounced dynamic sensitivity (FA I, FA II and SA I units) could reliably signal these slips. Similar but generally weaker afferent responses, sometimes followed by small force ratio changes, also occurred in the FA I and the SA I units in the absence of detectable vibrations events. In contrast to the responses associated with clear vibratory events, the weaker afferent responses were probably caused by localized frictional slips, i.e. slips limited to small fractions of the skin area in contact with the object. Indications were found that the early adjustment to a new frictional condition, which may appear soon (ca. 0.1–0.2 s) after the object is initially gripped, might depend on the vigorous responses in the FA I units during the initial phase of the lifts (see Westling and Johansson 1987). The role of the tactile input in the adaptation of the force coordination to the frictional condition is discussed.", "title": "" }, { "docid": "562ec4c39f0d059fbb9159ecdecd0358", "text": "In this paper, we propose the factorized hidden layer FHL approach to adapt the deep neural network DNN acoustic models for automatic speech recognition ASR. FHL aims at modeling speaker dependent SD hidden layers by representing an SD affine transformation as a linear combination of bases. The combination weights are low-dimensional speaker parameters that can be initialized using speaker representations like i-vectors and then reliably refined in an unsupervised adaptation fashion. Therefore, our method provides an efficient way to perform both adaptive training and test-time adaptation. Experimental results have shown that the FHL adaptation improves the ASR performance significantly, compared to the standard DNN models, as well as other state-of-the-art DNN adaptation approaches, such as training with the speaker-normalized CMLLR features, speaker-aware training using i-vector and learning hidden unit contributions LHUC. For Aurora 4, FHL achieves 3.8% and 2.3% absolute improvements over the standard DNNs trained on the LDA + STC and CMLLR features, respectively. It also achieves 1.7% absolute performance improvement over a system that combines the i-vector adaptive training with LHUC adaptation. For the AMI dataset, FHL achieved 1.4% and 1.9% absolute improvements over the sequence-trained CMLLR baseline systems, for the IHM and SDM tasks, respectively.", "title": "" }, { "docid": "074567500751d814eef4ba979dc3cc8d", "text": "Reinforcement learning is a learning paradigm concerned with learning to control a system so as to maximize a numerical performance measure that expresses a long-term objective. What distinguishes reinforcement learning from supervised learning is that only partial feedback is given to the learner about the learner’s predictions. Further, the predictions may have long term effects through influencing the future state of the controlled system. Thus, time plays a special role. The goal in reinforcement learning is to develop efficient learning algorithms, as well as to understand the algorithms’ merits and limitations. Reinforcement learning is of great interest because of the large number of practical applications that it can be used to address, ranging from problems in artificial intelligence to operations research or control engineering. In this book, we focus on those algorithms of reinforcement learning that build on the powerful theory of dynamic programming. We give a fairly comprehensive catalog of learning problems,", "title": "" }, { "docid": "7b945d65f37fbd80b7cf1a5fad526360", "text": "from these individual steps to produce global behavior, usually averaged over time. Computer science provides the key elements to describe mechanistic steps: algorithms and programming languages [3]. Following the metaphor of molecules as processes introduced in [4], process calculi have been identified as a promising tool to model biological systems that are inherently complex, concurrent, and driven by the interactions of their subsystems. Visualization in Process Algebra Models of Biological Systems", "title": "" }, { "docid": "f935bdde9d4571f50e47e48f13bfc4b8", "text": "BACKGROUND\nThe incidence of microcephaly in Brazil in 2015 was 20 times higher than in previous years. Congenital microcephaly is associated with genetic factors and several causative agents. Epidemiological data suggest that microcephaly cases in Brazil might be associated with the introduction of Zika virus. We aimed to detect and sequence the Zika virus genome in amniotic fluid samples of two pregnant women in Brazil whose fetuses were diagnosed with microcephaly.\n\n\nMETHODS\nIn this case study, amniotic fluid samples from two pregnant women from the state of Paraíba in Brazil whose fetuses had been diagnosed with microcephaly were obtained, on the recommendation of the Brazilian health authorities, by ultrasound-guided transabdominal amniocentesis at 28 weeks' gestation. The women had presented at 18 weeks' and 10 weeks' gestation, respectively, with clinical manifestations that could have been symptoms of Zika virus infection, including fever, myalgia, and rash. After the amniotic fluid samples were centrifuged, DNA and RNA were extracted from the purified virus particles before the viral genome was identified by quantitative reverse transcription PCR and viral metagenomic next-generation sequencing. Phylogenetic reconstruction and investigation of recombination events were done by comparing the Brazilian Zika virus genome with sequences from other Zika strains and from flaviviruses that occur in similar regions in Brazil.\n\n\nFINDINGS\nWe detected the Zika virus genome in the amniotic fluid of both pregnant women. The virus was not detected in their urine or serum. Tests for dengue virus, chikungunya virus, Toxoplasma gondii, rubella virus, cytomegalovirus, herpes simplex virus, HIV, Treponema pallidum, and parvovirus B19 were all negative. After sequencing of the complete genome of the Brazilian Zika virus isolated from patient 1, phylogenetic analyses showed that the virus shares 97-100% of its genomic identity with lineages isolated during an outbreak in French Polynesia in 2013, and that in both envelope and NS5 genomic regions, it clustered with sequences from North and South America, southeast Asia, and the Pacific. After assessing the possibility of recombination events between the Zika virus and other flaviviruses, we ruled out the hypothesis that the Brazilian Zika virus genome is a recombinant strain with other mosquito-borne flaviviruses.\n\n\nINTERPRETATION\nThese findings strengthen the putative association between Zika virus and cases of microcephaly in neonates in Brazil. Moreover, our results suggest that the virus can cross the placental barrier. As a result, Zika virus should be considered as a potential infectious agent for human fetuses. Pathogenesis studies that confirm the tropism of Zika virus for neuronal cells are warranted.\n\n\nFUNDING\nConsellho Nacional de Desenvolvimento e Pesquisa (CNPq), Fundação de Amparo a Pesquisa do Estado do Rio de Janeiro (FAPERJ).", "title": "" }, { "docid": "f2f7b7152de3b83cc476e38eb6265fdf", "text": "The discrimination of textures is a critical aspect of identi\"cation in digital imagery. Texture features generated by Gabor \"lters have been increasingly considered and applied to image analysis. Here, a comprehensive classi\"cation and segmentation comparison of di!erent techniques used to produce texture features using Gabor \"lters is presented. These techniques are based on existing implementations as well as new, innovative methods. The functional characterization of the \"lters as well as feature extraction based on the raw \"lter outputs are both considered. Overall, using the Gabor \"lter magnitude response given a frequency bandwidth and spacing of one octave and orientation bandwidth and spacing of 303 augmented by a measure of the texture complexity generated preferred results. ( 2000 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.", "title": "" }, { "docid": "24ac33300d3ea99441068c20761e8305", "text": "Purpose – The purpose of this research is to examine the critical success factors of mobile web site adoption. Design/methodology/approach – Based on the valid responses collected from a questionnaire survey, the structural equation modelling technique was employed to examine the research model. Findings – The results indicate that system quality is the main factor affecting perceived ease of use, whereas information quality is the main factor affecting perceived usefulness. Service quality has significant effects on trust and perceived ease of use. Perceived usefulness, perceived ease of use and trust determine user satisfaction. Practical implications – Mobile service providers need to improve the system quality, information quality and service quality of mobile web sites to enhance user satisfaction. Originality/value – Previous research has mainly focused on e-commerce web site success and seldom examined the factors affecting mobile web site success. This research fills the gap. The research draws on information systems success theory, the technology acceptance model and trust theory as the theoretical bases.", "title": "" } ]
scidocsrr
b1f90aaed78173f6b84b12939c939421
Condition Monitoring of Railway Turnouts and Other Track Components Using Machine Vision TRB 11-1442
[ { "docid": "1f4ca34b4032902a27ed55e505e2b8ba", "text": "Monitoring the structural health of railcars is important to ensure safe and efficient railroad operation. The structural integrity of freight cars depends on the health of certain structural components within their underframes. These components serve two principal functions: supporting the car body and lading and transmitting longitudinal buff and draft forces. Although railcars are engineered to withstand large static, dynamic and cyclical loads, they can still develop a variety of structural defects. As a result, Federal Railroad Administration (FRA) regulations and individual railroad mechanical department practices require periodic inspection of railcars to detect mechanical and structural damage or defects. These inspections are primarily a manual process that relies on the acuity, knowledge and endurance of qualified inspection personnel. Enhancements to the process are possible through machine-vision technology, which uses computer algorithms to convert digital image data of railcar underframes into useful information. This paper describes research investigating the feasibility of an automated inspection system capable of detecting structural defects in freight car underframes and presents an inspection approach using machine-vision techniques including multi-scale image segmentation. A preliminary image collection system has been developed, field trials conducted and algorithms developed that can analyze the images and identify certain underframe components, assessing aspects of their condition. The development of this technology, in conjunction with additional preventive maintenance systems, has the potential to provide more objective information on railcar condition, improved utilization of railcar inspection and repair resources, increased train and employee safety, and improvements to overall railroad network efficiency. Schlake et al. 09-2863 4 INTRODUCTION In the United States, railcars undergo regular mechanical inspections as required by Federal Railroad Administration (FRA) regulations and as dictated by railroad mechanical department practices. These mechanical inspections address numerous components on the railcar including several underbody components that are critically important to the structural integrity of the railcar. The primary structural component, the center sill, runs longitudinally along the center of the car, forming the backbone of the underframe and transmitting buff and draft forces through the car (1). In addition to the center sill, several other structural components are critical to load transfer, including the side sills, body bolsters, and crossbearers. The side sills are longitudinal members similar to the center sill but run along either side of the car. Body bolsters are transverse members near each end of the car that transfer the car’s load from the car body to the trucks. Crossbearers are transverse members that connect the side sills to the center sill and help distribute the load between the longitudinal members of the car. These components work together as a system to help maintain the camber and structural integrity of the car. Mechanical Regulations and Inspection Procedures FRA Mechanical Regulations require the inspection of center sills for breaks, cracks, and buckling, and the inspection of sidesills, crossbearers, and body bolsters for breaks, as well as other selected inspection items (2). Every time a car departs a yard or industrial facility it is required under the FRA regulations to be visually inspected by either a carman or train crew member for possible defects that would adversely affect the safe operation of the train. The current railcar inspection process is tedious, labor intensive, and in general lacks the level of objectivity that may be achievable through the use of technology. In order to effectively detect structural defects, car inspectors would need to walk around the entire car and crawl underneath with a flashlight to view each structural component. Due to time constraints associated with typical pre-departure mechanical inspections, cars are only inspected with this level of scrutiny in car repair shops before undergoing major repairs. In addition to the inherent challenges of manual inspections, records of these inspections are generally not retained unless a billable repair is required, making it difficult to track the health of a car over time or to perform a trend analysis. As a result, the maintenance of railcar structural components is almost entirely reactive rather than predictive, making repairs and maintenance less efficient. Technology Driven Train Inspection (TDTI) The Association of American Railroads (AAR) along with the Transportation Technology Center, Inc. (TTCI) has initiated a program intended to provide safer, more efficient, and traceable means of rolling stock inspection (3). The object of the Technology Driven Train Inspection (TDTI) program is to identify, develop, and apply new technologies to enhance the efficiency and effectiveness of the railcar inspection, maintenance, and repair process. Examples of these new technologies include the automated inspection of railcar trucks, safety appliances and passenger car undercarriages (4, 5, 6). The ultimate objective of TDTI is to implement a network of automatic wayside inspection systems capable of inspecting and monitoring the North American Schlake et al. 09-2863 5 freight car fleet in order to maintain compliance with FRA regulations and railroadspecific maintenance and operational standards. Automated Structural Component Inspection System (ASCIS) One aspect of the TDTI initiative is the development of the Automated Structural Component Inspection System (ASCIS), which is currently underway at the University of Illinois at Urbana-Champaign (UIUC). ASCIS focuses on developing technology to aid in the inspection of freight car bodies for defective structural components through the use of machine vision. A machine-vision system collects data using digital cameras, organizes and analyzes the images using computer algorithms, and outputs useful information, such as the type and location of defects, to the appropriate repair personnel. The computer algorithms use visual cues to locate areas of interest on the freight car and then analyze each component to determine its variance from the baseline case. While manual inspections are subject to inaccuracies and delays due to time constraints and human fatigue, ASCIS will work collectively with other automated inspection systems (e.g. machine vision systems for inspecting safety appliances, truck components, brake shoes, etc.) to inspect freight cars efficiently and objectively and will not suffer from monotony or fatigue. ASCIS will also maintain health records of every car that undergoes inspection, allowing potential structural defects to be monitored so that components are repaired prior to failure. Additionally, applying these new technologies to the inspection process has the potential to enhance safety and efficiency for both train crew members and mechanical personnel. A primary benefit of ASCIS and other automated inspection systems is the facilitation of preventive, or condition-based, maintenance. Condition-based maintenance involves the monitoring of certain parameters related to component health or degradation and the subsequent corrective actions taken prior to component failure (7). Despite the advantages of condition-based maintenance, current structural component repair and billing practices engender corrective maintenance, which does not occur until after a critical defect is detected. Due to the reactive nature of corrective maintenance, repairs cannot be planned as effectively, resulting in higher expenses and less efficient repairs. For example, it is more economical to patch a cracked crossbearer before it breaks than to replace a fully broken crossbearer. Having recognized the need for preventative maintenance, railroads have begun implementing other technologies similar to ASCIS that monitor subtle indicators of railcar component health (e.g. Truck Performance Detectors and the AAR’s Fully Automated Car Train Inspection System FactISTM) (8). REGULATORY COMPLIANCE The FRA regulations for freight car bodies form the basis for which components will be inspected by ASCIS. Section 215.121 of Title 49 in the U.S. Code of Federal Regulations (CFR) governs the inspection of freight car bodies and two of the six parts in this section pertain to the inspection of structural components (2). According to the regulations, the center sill may not be broken, cracked more than 6 inches, or bent/buckled more than 2.5 inches in any 6 foot length. Specific parameters are established for the allowable magnitude of cracks or buckling because these defects may undermine the integrity of the sill, resulting in a center sill failure (9). Therefore, these regulations are intended to Schlake et al. 09-2863 6 identify potentially hazardous cars so that they will be repaired before an in-service failure. FRA structural component inspection data from the last eight years shows that on average 59% of the structural component defects are comprised of broken, cracked, bent, or buckled center sills, while the remaining 41% represent defective side sills, body bolsters, or crossbearers (Figure 1). FIGURE 1 Average number of yearly structural defects recorded by FRA inspectors as a percentage of all cars inspected in a year. Based on these data and guidance from the AAR, the primary focus of ASCIS will be on the inspection of center sills and the secondary focus will be on the inspection of the other structural components. The final goal of ASCIS is to provide data and trending information for the implementation of condition-based maintenance on all freight car structural components.", "title": "" }, { "docid": "e560cd7561d4f518cdab6bd1f5441de8", "text": "Rail inspection is a very important task in railway maintenance, and it is periodically needed for preventing dangerous situations. Inspection is operated manually by trained human operator walking along the track searching for visual anomalies. This monitoring is unacceptable for slowness and lack of objectivity, as the results are related to the ability of the observer to recognize critical situations. The correspondence presents a patent-pending real-time Visual Inspection System for Railway (VISyR) maintenance, and describes how presence/absence of the fastening bolts that fix the rails to the sleepers is automatically detected. VISyR acquires images from a digital line-scan camera. Data are simultaneously preprocessed according to two discrete wavelet transforms, and then provided to two multilayer perceptron neural classifiers (MLPNCs). The \"cross validation\" of these MLPNCs avoids (practically-at-all) false positives, and reveals the presence/absence of the fastening bolts with an accuracy of 99.6% in detecting visible bolts and of 95% in detecting missing bolts. A field-programmable gate array-based architecture performs these tasks in 8.09 mus, allowing an on-the-fly analysis of a video sequence acquired at 200 km/h", "title": "" } ]
[ { "docid": "7448defe73a531018b11ac4b4b38b4cb", "text": "Calcium oxalate crystalluria is a problem of growing concern in dogs. A few reports have discussed acute kidney injury by oxalates in dogs, describing ultrastructural findings in particular. We evaluated the possibility of deposition of calcium oxalate crystals in renal tissue and its probable consequences. Six dogs were intravenously injected with 0.5 M potassium oxalate (KOx) for seven consecutive days. By the end of the experiment, ultrasonography revealed a significant increase in the renal mass and renal parenchymal echogenicity. Serum creatinine and blood urea nitrogen levels were gradually increased. The histopathological features of the kidneys were assessed by both light and electron microscopy, which showed CaOx crystal deposition accompanied by morphological changes in the renal tissue of KOx injected dogs. Canine renal oxalosis provides a good model to study the biological and pathological changes induced upon damage of renal tissue by KOx injection.", "title": "" }, { "docid": "759140ad09a5a8ce5c5e1ca78e238de1", "text": "Various issues make framework development harder than regular development. Building product lines and frameworks requires increased coordination and communication between stakeholders and across the organization.\n The difficulty of building the right abstractions ranges from understanding the domain models, selecting and evaluating the framework architecture, to designing the right interfaces, and adds to the complexity of a framework project.", "title": "" }, { "docid": "3505170ccc81058b75e2073f8080b799", "text": "Indoor Location Based Services (LBS), such as indoor navigation and tracking, still have to deal with both technical and non-technical challenges. For this reason, they have not yet found a prominent position in people’s everyday lives. Reliability and availability of indoor positioning technologies, the availability of up-to-date indoor maps, and privacy concerns associated with location data are some of the biggest challenges to their development. If these challenges were solved, or at least minimized, there would be more penetration into the user market. This paper studies the requirements of LBS applications, through a survey conducted by the authors, identifies the current challenges of indoor LBS, and reviews the available solutions that address the most important challenge, that of providing seamless indoor/outdoor positioning. The paper also looks at the potential of emerging solutions and the technologies that may help to handle this challenge.", "title": "" }, { "docid": "c43b77b56a6e2cb16a6b85815449529d", "text": "We propose a new method for clustering multivariate time series. A univariate time series can be represented by a fixed-length vector whose components are statistical features of the time series, capturing the global structure. These descriptive vectors, one for each component of the multivariate time series, are concatenated, before being clustered using a standard fast clustering algorithm such as k-means or hierarchical clustering. Such statistical feature extraction also serves as a dimension-reduction procedure for multivariate time series. We demonstrate the effectiveness and simplicity of our proposed method by clustering human motion sequences: dynamic and high-dimensional multivariate time series. The proposed method based on univariate time series structure and statistical metrics provides a novel, yet simple and flexible way to cluster multivariate time series data efficiently with promising accuracy. The success of our method on the case study suggests that clustering may be a valuable addition to the tools available for human motion pattern recognition research.", "title": "" }, { "docid": "c6d2371a165acc46029eb4ad42df3270", "text": "Video game playing is a popular activity and its enjoyment among frequent players has been associated with absorption and immersion experiences. This paper examines how immersion in the video game environment can influence the player during the game and afterwards (including fantasies, thoughts, and actions). This is what is described as Game Transfer Phenomena (GTP). GTP occurs when video game elements are associated with real life elements triggering subsequent thoughts, sensations and/or player actions. To investigate this further, a total of 42 frequent video game players aged between 15 and 21 years old were interviewed. Thematic analysis showed that many players experienced GTP, where players appeared to integrate elements of video game playing into their real lives. These GTP were then classified as either intentional or automatic experiences. Results also showed that players used video games for interacting with others as a form of amusement, modeling or mimicking video game content, and daydreaming about video games. Furthermore, the findings demonstrate how video games triggered intrusive thoughts, sensations, impulses, reflexes, visual illusions, and dissociations. DOI: 10.4018/ijcbpl.2011070102 16 International Journal of Cyber Behavior, Psychology and Learning, 1(3), 15-33, July-September 2011 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. 24/7 activity (e.g., Ng & Weimer-Hastings, 2005; Chappell, Eatough, Davies, & Griffiths, 2006; Grüsser, Thalemann, & Griffiths, 2007). Today’s video games have evolved due to technological advance, resulting in high levels of realism and emotional design that include diversity, experimentation, and (perhaps in some cases) sensory overload. Furthermore, video games have been considered as fantasy triggers because they offer ‘what if’ scenarios (Baranowski, Buday, Thompson, & Baranowski, 2008). What if the player could become someone else? What if the player could inhabit an improbable world? What if the player could interact with fantasy characters or situations (Woolley, 1995)? Entertainment media content can be very effective in capturing the minds and eliciting emotions in the individual. Research about novels, films, fairy tales and television programs has shown that entertainment can generate emotions such as joy, awe, compassion, fear and anger (Oatley, 1999; Tan 1996; Valkenburg Cantor & Peeters, 2000, cited in Jansz et al., 2005). Video games also have the capacity to generate such emotions and have the capacity for players to become both immersed in, and dissociated from, the video game. Dissociation and Immersion It is clear that dissociation is a somewhat “fuzzy” concept as there is no clear accepted definition of what it actually constitutes (Griffiths, Wood, Parke, & Parke, 2006). Most would agree that dissociation is a form of altered state of consciousness. However, dissociative behaviours lie on a continuum and range from individuals losing track of time, feeling like they are someone else, blacking out, not recalling how they got somewhere or what they did, and being in a trance like state (Griffiths et al., 2006). Studies have found that dissociation is related to an extensive involvement in fantasizing, and daydreaming (Giesbrecht, Geraerts, & Merckelbach, 2007). Dissociative phenomena of the non-pathological type include absorption and imaginative involvement (Griffith et al., 2006) and are psychological phenomena that can occur during video game playing. Anyone can, to some degree, experience dissociative states in their daily lives (Giesbrecht et al., 2007). Furthermore, these states can happen episodically and can be situationally triggered (Griffiths et al., 2006). When people become engaged in games they may experience psychological absorption. More commonly known as ‘immersion’, this refers to when individual logical integration of thoughts, feelings and experiences is suspended (Funk, Chan, Brouwer, & Curtiss, 2006; Wood, Griffiths, & Parke, 2007). This can incur an altered state of consciousness such as altered time perception and change in degree of control over cognitive functioning (Griffiths et al., 2006). Video game enjoyment has been associated with absorption and immersion experiences (IJsselsteijn, Kort, de Poels, Jurgelionis, & Belotti, 2007). How an individual can get immersed in video games has been explained by the phenomenon of ‘flow’ (Csikszentmihalyi, 1988). Flow refers to the optimum experience a person achieves when performing an activity (e.g., video game playing) and may be induced, in part, by the structural characteristics of the activity itself. Structural characteristics of video games (i.e., the game elements that are incorporated into the game by the games designers) are usually based on a balance between skill and challenge (Wood et al., 2004; King, Delfabbro, & Griffiths, 2010), and help make playing video games an intrinsically rewarding activity (Csikszentmihalyi, 1988; King, et al. 2010). Studying Video Game Playing Studying the effects of video game playing requires taking in consideration four independent dimensions suggested by Gentile and Stone (2005); amount, content, form, and mechanism. The amount is understood as the time spent playing and gaming habits. Content refers to the message and topic delivered by the video game. Form focuses on the types of activity necessary to perform in the video game. The mechanism refers to the input-output devices used, which 17 more pages are available in the full version of this document, which may be purchased using the \"Add to Cart\" button on the product's webpage: www.igi-global.com/article/game-transfer-phenomena-videogame/58041?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Communications and Social Science, InfoSciCommunications, Online Engagement, and Media eJournal Collection, InfoSci-Educational Leadership, Administration, and Technologies eJournal Collection, InfoSci-Healthcare Administration, Clinical Practice, and Bioinformatics eJournal Collection, InfoSci-Select, InfoSci-Journal Disciplines Library Science, Information Studies, and Education, InfoSci-Journal Disciplines Medicine, Healthcare, and Life Science. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2", "title": "" }, { "docid": "350dc562863b8702208bfb41c6ceda6a", "text": "THE use of formal devices for assessing function is becoming standard in agencies serving the elderly. In the Gerontological Society's recent contract study on functional assessment (Howell, 1968), a large assortment of rating scales, checklists, and other techniques in use in applied settings was easily assembled. The present state of the trade seems to be one in which each investigator or practitioner feels an inner compusion to make his own scale and to cry that other existent scales cannot possibly fit his own setting. The authors join this company in presenting two scales first standardized on their own population (Lawton, 1969). They take some comfort, however, in the fact that one scale, the Physical Self-Maintenance Scale (PSMS), is largely a scale developed and used by other investigators (Lowenthal, 1964), which was adapted for use in our own institution. The second of the scales, the Instrumental Activities of Daily Living Scale (IADL), taps a level of functioning heretofore inadequately represented in attempts to assess everyday functional competence. Both of the scales have been tested further for their usefulness in a variety of types of institutions and other facilities serving community-resident older people. Before describing in detail the behavior measured by these two scales, we shall briefly describe the schema of competence into which these behaviors fit (Lawton, 1969). Human behavior is viewed as varying in the degree of complexity required for functioning in a variety of tasks. The lowest level is called life maintenance, followed by the successively more complex levels of func-", "title": "" }, { "docid": "34993e22f91f3d5b31fe0423668a7eb1", "text": "K-means as a clustering algorithm has been studied in intrusion detection. However, with the deficiency of global search ability it is not satisfactory. Particle swarm optimization (PSO) is one of the evolutionary computation techniques based on swarm intelligence, which has high global search ability. So K-means algorithm based on PSO (PSO-KM) is proposed in this paper. Experiment over network connection records from KDD CUP 1999 data set was implemented to evaluate the proposed method. A Bayesian classifier was trained to select some fields in the data set. The experimental results clearly showed the outstanding performance of the proposed method", "title": "" }, { "docid": "66c493b14b7ab498e67f6d29cf91733a", "text": "A digitally controlled low-dropout voltage regulator (LDO) that can perform fast-transient and autotuned voltage is introduced in this paper. Because there are still several arguments regarding the digital implementation on the LDOs, pros and cons of the digital control are first discussed in this paper to illustrate its opportunity in the LDO applications. Following that, the architecture and configuration of the digital scheme are demonstrated. The working principles and design flows of the functional algorithms are also illustrated and then verified by the simulation before the circuit implementation. The proposed LDO was implemented by the 0.18-μm manufacturing process for the performance test. Experimental results show that the LDO's output voltage Vout can accurately perform the dynamic voltage scaling function at various Vout levels (1/2, 5/9, 2/3, and 5/6 of the input voltage VDD) from a wide VDD range (from 1.8 to 0.9 V). The transient time is within 2 μs and the voltage spikes are within 50 mV when a 1-μF output capacitor is used. Test of the autotuning algorithm shows that the proposed LDO is able to work at its optimal performance under various uncertain conditions.", "title": "" }, { "docid": "3951a6cc64278db2ba0873d0012ed157", "text": "In this paper, a conformal wideband circularly polarized (CP) antenna is presented for endoscopic capsule application over the 915-MHz Industrial, Scientific, and Medical (902–928 MHz) band. The thickness of the antenna is only 0.2 mm, which can be wrapped inside a capsule’s inner wall. By cutting meandered slots on the patch, using open-end slots on the ground, and utilizing two long arms, the proposed antenna obtains a significant size reduction. In the conformal form, the antenna volume measures only 66.7 mm3. A single-layer homogeneous muscle phantom box is used for the initial design and optimization with parametric studies. The effect of the internal components inside a capsule is discussed in analyzing the antenna’s performance and to realize a more practical scenario. In addition, a realistic human body model in a Remcom XFdtd simulation environment is considered to evaluate the antenna characteristics and CP purity, and to specify the specific absorption rate limit in different organs along the gastrointestinal tract. The performance of the proposed antenna is experimentally validated by using a minced pork muscle phantom and by using an American Society for Testing and Materials phantom immersed in a liquid solution. For measurements, a new technique applying a printed 3-D capsule is devised. From simulations and measurements, we found that the impedance bandwidth of the proposed antenna is more than 20% and with a maximum simulated axial ratio bandwidth of around 29.2% in homogeneous tissue. Finally, a wireless communication link at a data rate of 78 Mb/s is calculated by employing link-budget analysis.", "title": "" }, { "docid": "5398b76e55bce3c8e2c1cd89403b8bad", "text": "To cite: He A, Kwatra SG, Kazi N, et al. BMJ Case Rep Published online: [please include Day Month Year] doi:10.1136/bcr-2016215335 DESCRIPTION A woman aged 45 years presented for evaluation of skin lesions. She reported an 8–9-year history of occasionally tender, waxing-and-waning skin nodules refractory to dapsone, prednisone and methotrexate. Examination revealed multiple indurated subcutaneous nodules distributed on the upper extremities, with scattered patches of lipoatrophy in areas of nodule regression (figure 1). Her medical history was unremarkable; CBC and CMP were within normal limits, with no history of radiotherapy or evidence of internal organ involvement. She had a positive ANA titre (1:160, speckled), but negative anti-dsDNA, anti-Smith, anti-Ro and anti-La antibodies. Differential diagnosis included erythema nodosum (EN), erythema induratum of Bazin (EIB), lupus profundus (LP) and cutaneous lymphoma. Initial wedge biopsy in 2008 disclosed a predominantly lobular panniculitic process with some septal involvement (figure 2A). Broad zones of necrosis were present (figure 2B). The infiltrate consisted of a pleomorphic population of lymphocytes with occasional larger atypical lymphocytes (figure 2C). There were foci of adipocyte rimming by the atypical lymphocytes (figure 2C). Immunophenotyping revealed predominance of CD3+ T cells with some CD20+ B-cell aggregates. The atypical cells stained CD4 and CD8 in approximately equal ratios. TIA-1 was positive in many of the atypical cells but not prominently enough to render a diagnosis of cytotoxic T-cell lymphoma. T-cell receptor PCR studies showed polyclonality. Subsequent biopsies performed annually after treatment with prednisone in 2008 and 2010, dapsone in 2009 and methotrexate in 2012 showed very similar pathological and molecular features. Adipocyte rimming and TCR polyclonality persisted. EN is characterised by subcutaneous nodules on the lower extremities in association with elevated erythrocyte sedimentation rate (ESR) and C reactive protein (CRP), influenza-like prodrome preceding nodule formation and self-limiting course. Histologically, EN shows a mostly septal panniculitis with radial granulomas. EN was ruled out on the basis of normal ESR (6) and CRP (<0.1), chronic relapsing course and predominantly lobular panniculitis process histologically. EIB typically presents with violaceous nodules located on the posterior lower extremities, with arms rarely affected, of patients with a history of tuberculosis (TB). Histologically, EIB shows granulomatous inflammation with focal necrosis, vasculitis and septal fibrosis. Our patient had no evidence or history of TB infection and presented with nodules of a different clinical morphology. Ultimately, this constellation of histological and immunophenotypic findings showed an atypical panniculitic T-lymphocytic infiltrate. Although the lesion showed a lobular panniculitis with features that could be seen in subcutaneous panniculitis-like T-cell lymphoma (SPTCL), the presence of plasma cells, absence of CD8 and TIA restriction and T-cell polyclonality did not definitively support that", "title": "" }, { "docid": "0afde87c9fb4fb21c6bad3196ef433d0", "text": "Blockchain and verifiable identities have a lot of potential in future distributed software applications e.g. smart cities, eHealth, autonomous vehicles, networks, etc. In this paper, we proposed a novel technique, namely VeidBlock, to generate verifiable identities by following a reliable authentication process. These entities are managed by using the concepts of blockchain ledger and distributed through an advance mechanism to protect them against tampering. All identities created using VeidBlock approach are verifiable and anonymous therefore it preserves user's privacy in verification and authentication phase. As a proof of concept, we implemented and tested the VeidBlock protocols by integrating it in a SDN based infrastructure. Analysis of the test results yield that all components successfully and autonomously performed initial authentication and locally verified all the identities of connected components.", "title": "" }, { "docid": "8869cab615e5182c7c03f074ead081f7", "text": "This article introduces the principal concepts of multimedia cloud computing and presents a novel framework. We address multimedia cloud computing from multimedia-aware cloud (media cloud) and cloud-aware multimedia (cloud media) perspectives. First, we present a multimedia-aware cloud, which addresses how a cloud can perform distributed multimedia processing and storage and provide quality of service (QoS) provisioning for multimedia services. To achieve a high QoS for multimedia services, we propose a media-edge cloud (MEC) architecture, in which storage, central processing unit (CPU), and graphics processing unit (GPU) clusters are presented at the edge to provide distributed parallel processing and QoS adaptation for various types of devices.", "title": "" }, { "docid": "74da516d4a74403ac5df760b0b656b1f", "text": "In this paper a novel and effective approach for automated audio classification is presented that is based on the fusion of different sets of features, both visual and acoustic. A number of different acoustic and visual features of sounds are evaluated and compared. These features are then fused in an ensemble that produces better classification accuracy than other state-of-the-art approaches. The visual features of sounds are built starting from the audio file and are taken from images constructed from different spectrograms, a gammatonegram, and a rhythm image. These images are divided into subwindows from which a set of texture descriptors are extracted. For each feature descriptor a different Support Vector Machine (SVM) is trained. The SVMs outputs are summed for a final decision. The proposed ensemble is evaluated on three well-known databases of music genre classification (the Latin Music Database, the ISMIR 2004 database, and the GTZAN genre collection), a dataset of Bird vocalization aiming specie recognition, and a dataset of right whale calls aiming whale detection. The MATLAB code for the ensemble of classifiers and for the extraction of the features will be publicly available (https://www.dei.unipd.it/node/2357 +Pattern Recognition and Ensemble Classifiers).", "title": "" }, { "docid": "3dcfd937b9c1ae8ccc04c6a8a99c71f5", "text": "Automatically generated fake restaurant reviews are a threat to online review systems. Recent research has shown that users have difficulties in detecting machine-generated fake reviews hiding among real restaurant reviews. The method used in this work (char-LSTM ) has one drawback: it has difficulties staying in context, i.e. when it generates a review for specific target entity, the resulting review may contain phrases that are unrelated to the target, thus increasing its detectability. In this work, we present and evaluate a more sophisticated technique based on neural machine translation (NMT) with which we can generate reviews that stay on-topic. We test multiple variants of our technique using native English speakers on Amazon Mechanical Turk. We demonstrate that reviews generated by the best variant have almost optimal undetectability (class-averaged F-score 47%). We conduct a user study with experienced users and show that our method evades detection more frequently compared to the state-of-the-art (average evasion 3.2/4 vs 1.5/4) with statistical significance, at level α = 1% (Section 4.3). We develop very effective detection tools and reach average F-score of 97% in classifying these. Although fake reviews are very effective in fooling people, effective automatic detection is still feasible.", "title": "" }, { "docid": "2eb542371eac4ce8fabed599bd5cd2c6", "text": "The purpose of this study was to examine the influence of past travel experience (i.e., number of trips and number of days away from home in last year), and on mature travelers’ quality of life (i.e., self-perceived health and global life satisfaction). A total number of 217 respondents (50+) in a southern state were used in this study. Path analysis (PROC CALIS in SAS) was performed to test the proposed model. An estimation of the proposed theoretical model revealed that the model fit the data. However, the model should be further examined and applied with caution.", "title": "" }, { "docid": "f6fa1c4ce34f627d9d7d1ca702272e26", "text": "One of the most difficult aspects in rhinoplasty is resolving and preventing functional compromise of the nasal valve area reliably. The nasal valves are crucial for the individual breathing competence of the nose. Structural and functional elements contribute to this complex system: the nasolabial angle, the configuration and stability of the alae, the function of the internal nasal valve, the anterior septum symmetrically separating the bilateral airways and giving structural and functional support to the alar cartilage complex and to their junction with the upper lateral cartilages, the scroll area. Subsequently, the open angle between septum and sidewalls is important for sufficient airflow as well as the position and function of the head of the turbinates. The clinical examination of these elements is described. Surgical techniques are more or less well known and demonstrated with patient examples and drawings: anterior septoplasty, reconstruction of tip and dorsum support by septal extension grafts and septal replacement, tip suspension and lateral crural sliding technique, spreader grafts and suture techniques, splay grafts, alar batten grafts, lateral crural extension grafts, and lateral alar suspension. The numerous literature is reviewed.", "title": "" }, { "docid": "ec45ee55ce3bbfefe1a25e012e33390c", "text": "I provide a synthesis of the behavioral finance literature over the past two decades. I review the literature in three parts, namely, (i) empirical and theoretical analyses of patterns in the cross-section of average stock returns, (ii) studies on trading activity, and (iii) research in corporate finance. Behavioral finance is an exciting new field because it presents a number of normative implications for both individual investors and CEOs. The papers reviewed here allow us to learn more about these specific implications.", "title": "" }, { "docid": "91576cdef51f280694d6b20c6fda33da", "text": "State-of-the-art methods treat pedestrian attribute recognition as a multi-label image classification problem. The location information of person attributes is usually eliminated or simply encoded in the rigid splitting of whole body in previous work. In this paper, we formulate the task in a weakly-supervised attribute localization framework. Based on GoogLeNet, firstly, a set of mid-level attribute features are discovered by novelly designed detection layers, where a max-pooling based weakly-supervised object detection technique is used to train these layers with only imagelevel labels without the need of bounding box annotations of pedestrian attributes. Secondly, attribute labels are predicted by regression of the detection response magnitudes. Finally, the locations and rough shapes of pedestrian attributes can be inferred by performing clustering on a fusion of activation maps of the detection layers, where the fusion weights are estimated as the correlation strengths between each attribute and its relevant mid-level features. Extensive experiments are performed on the two currently largest pedestrian attribute datasets, i.e. the PETA dataset and the RAP dataset. Results show that the proposed method has achieved competitive performance on attribute recognition, compared to other state-of-the-art methods. Moreover, the results of attribute localization are visualized to understand the characteristics of the proposed method.", "title": "" }, { "docid": "89189f434e7ffd2110048d43955566de", "text": "This paper describes two techniques for designing phase-frequency detectors (PFDs) with higher operating frequencies (periods of less than 8x the delay of a fan-out-4 inverter (FO-4)) and faster frequency acquisition. Prototypes designed in 0.25-µm CMOS process exhibit operating frequencies of 1.25 GHz ( = 1/(8 ċ FO-4) ) and 1.5 GHz ( = 1/(6.7 ċ FO-4) ) for two techniques respectively whereas a conventional PFD operates < 1 GHz ( = 1/(10 ċ FO-4) ). The two proposed PFDs achieve a capture range of 1.7x and 1.2x the conventional design.", "title": "" }, { "docid": "f4b5b71398e3a40c76b1f58d3f05a83d", "text": "Creativity and innovation in any organization are vital to its successful performance. The authors review the rapidly growing body of research in this area with particular attention to the period 2002 to 2013, inclusive. Conceiving of both creativity and innovation as being integral parts of essentially the same process, we propose a new, integrative definition. We note that research into creativity has typically examined the stage of idea generation, whereas innovation studies have commonly also included the latter phase of idea implementation. The authors discuss several seminal theories of creativity and innovation, then apply a comprehensive levels-of-analysis framework to review extant research into individual, team, organizational, and multi-level innovation. Key measurement characteristics of the reviewed studies are then noted. In conclusion, we propose a guiding framework for future research comprising eleven major themes and sixty specific questions for future studies. INNOVATION AND CREATIVITY 3 INNOVATION AND CREATIVITY IN ORGANIZATIONS: A STATE-OF-THE-SCIENCE REVIEW, PROSPECTIVE COMMENTARY, AND", "title": "" } ]
scidocsrr
05524af7dccb5b0d91040086c2c51573
Mining , Pruning and Visualizing Frequent Patterns for Temporal Event Sequence Analysis
[ { "docid": "f2c8af1f4bcf7115fc671ae9922adbb3", "text": "Extracting insights from temporal event sequences is an important challenge. In particular, mining frequent patterns from event sequences is a desired capability for many domains. However, most techniques for mining frequent patterns are ineffective for real-world data that may be low-resolution, concurrent, or feature many types of events, or the algorithms may produce results too complex to interpret. To address these challenges, we propose Frequence, an intelligent user interface that integrates data mining and visualization in an interactive hierarchical information exploration system for finding frequent patterns from longitudinal event sequences. Frequence features a novel frequent sequence mining algorithm to handle multiple levels-of-detail, temporal context, concurrency, and outcome analysis. Frequence also features a visual interface designed to support insights, and support exploration of patterns of the level-of-detail relevant to users. Frequence's effectiveness is demonstrated with two use cases: medical research mining event sequences from clinical records to understand the progression of a disease, and social network research using frequent sequences from Foursquare to understand the mobility of people in an urban environment.", "title": "" }, { "docid": "5f04fcacc0dd325a1cd3ba5a846fe03f", "text": "Web clickstream data are routinely collected to study how users browse the web or use a service. It is clear that the ability to recognize and summarize user behavior patterns from such data is valuable to e-commerce companies. In this paper, we introduce a visual analytics system to explore the various user behavior patterns reflected by distinct clickstream clusters. In a practical analysis scenario, the system first presents an overview of clickstream clusters using a Self-Organizing Map with Markov chain models. Then the analyst can interactively explore the clusters through an intuitive user interface. He can either obtain summarization of a selected group of data or further refine the clustering result. We evaluated our system using two different datasets from eBay. Analysts who were working on the same data have confirmed the system's effectiveness in extracting user behavior patterns from complex datasets and enhancing their ability to reason.", "title": "" } ]
[ { "docid": "f7f6ee050a759842cbbab74e7487ab15", "text": "Tests, as learning events, can enhance subsequent recall more than do additional study opportunities, even without feedback. Such advantages of testing tend to appear, however, only at long retention intervals and/or when criterion tests stress recall, rather than recognition, processes. We propose that the interaction of the benefits of testing versus restudying with final-test delay and format reflects not only that successful retrievals are more powerful learning events than are re-presentations but also that the distribution of memory strengths across items is shifted differentially by testing and restudying. The benefits of initial testing over restudying, in this view, should increase as the delay or format of the final test makes that test more difficult. Final-test difficulty, not the similarity of initial-test and final-test conditions, should determine the benefits of testing. In Experiments 1 and 2 we indeed found that initial cued-recall testing enhanced subsequent recall more than did restudying when the final test was a difficult (free-recall) test but not when it was an easier (cued-recall) test that matched the initial test. The results of Experiment 3 supported a new prediction of the distribution framework: namely, that the final cued-recall test that did not show a benefit of testing in Experiment 1 should show such a benefit when that test was made more difficult by introducing retroactive interference. Overall, our results suggest that the differential consequences of initial testing versus restudying reflect, in part, differences in how items distributions are shifted by testing and studying.", "title": "" }, { "docid": "600d04e1d78084b36c9fb573fb9d699a", "text": "A mobile robot is designed to pick and place the objects through voice commands. This work would be practically useful to wheelchair bound persons. The pick and place robot is designed in a way that it is able to help the user to pick up an item that is placed at two different levels using an extendable arm. The robot would move around to pick up an item and then pass it back to the user or to a desired location as told by the user. The robot control is achieved through voice commands such as left, right, straight, etc. in order to help the robot to navigate around. Raspberry Pi 2 controls the overall design with 5 DOF servo motor arm. The webcam is used to navigate around which provides live streaming using a mobile application for the user to look into. Results show the ability of the robot to pick and place the objects up to a height of 23.5cm through proper voice commands.", "title": "" }, { "docid": "b5af51c869fa4863dfa581b0fb8cc20a", "text": "This paper describes progress toward a prototype implementation of a tool which aims to improve literacy in deaf high school and college students who are native (or near native) signers of American Sign Language (ASL). We envision a system that will take a piece of text written by a deaf student, analyze that text for grammatical errors, and engage that student in a tutorial dialogue, enabling the student to generate appropriate corrections to the text. A strong focus of this work is to develop a system which adapts this process to the knowledge level and learning strengths of the user and which has the flexibility to engage in multi-modal, multilingual tutorial instruction utilizing both English and the native language of the user.", "title": "" }, { "docid": "3304f4d4c936a416b0ced56ee8e96f20", "text": "Big Data analytics plays a key role through reducing the data size and complexity in Big Data applications. Visualization is an important approach to helping Big Data get a complete view of data and discover data values. Big Data analytics and visualization should be integrated seamlessly so that they work best in Big Data applications. Conventional data visualization methods as well as the extension of some conventional methods to Big Data applications are introduced in this paper. The challenges of Big Data visualization are discussed. New methods, applications, and technology progress of Big Data visualization are presented.", "title": "" }, { "docid": "17c81b17aa32ad6a732fc9f0c6b9ad76", "text": "Highly pathogenic avian influenza A/H5N1 virus can cause morbidity and mortality in humans but thus far has not acquired the ability to be transmitted by aerosol or respiratory droplet (\"airborne transmission\") between humans. To address the concern that the virus could acquire this ability under natural conditions, we genetically modified A/H5N1 virus by site-directed mutagenesis and subsequent serial passage in ferrets. The genetically modified A/H5N1 virus acquired mutations during passage in ferrets, ultimately becoming airborne transmissible in ferrets. None of the recipient ferrets died after airborne infection with the mutant A/H5N1 viruses. Four amino acid substitutions in the host receptor-binding protein hemagglutinin, and one in the polymerase complex protein basic polymerase 2, were consistently present in airborne-transmitted viruses. The transmissible viruses were sensitive to the antiviral drug oseltamivir and reacted well with antisera raised against H5 influenza vaccine strains. Thus, avian A/H5N1 influenza viruses can acquire the capacity for airborne transmission between mammals without recombination in an intermediate host and therefore constitute a risk for human pandemic influenza.", "title": "" }, { "docid": "420719690b6249322927153daedba87b", "text": "• In-domain: 91% F1 on the dev set, 5 we reduced the learning rate from 10−4 to 10−5. We then stopped the training when F1 was not improved after 20 epochs. We did the same for ment-norm except that the learning rate was changed at 91.5% F1. Note that all the hyper-parameters except K and the turning point for early stopping were set to the values used by Ganea and Hofmann (2017). Systematic tuning is expensive though may have further ncreased the result of our models.", "title": "" }, { "docid": "dd412b31bc6f7f18ca18a54dc5267cc3", "text": "We propose a partial information state-based framework for collaborative dialogue and argument between agents. We employ a three-valued based nonmonotonic logic, NML3, for representing and reasoning about Partial Information States (PIS). NML3 formalizes some aspects of revisable reasoning and it is sound and complete. Within the framework of NML3, we present a formalization of some basic dialogue moves and the rules of protocols of some types of dialogue. The rules of a protocol are nonmonotonic in the sense that the set of propositions to which an agent is committed and the validity of moves vary from one move to another. The use of PIS allows an agent to expand consistently its viewpoint with some of the propositions to which another agent, involved in a dialogue, is overtly committed. A proof method for the logic NML3 has been successfully implemented as an automatic theorem prover. We show, via some examples, that the tableau method employed to implement the theorem prover allows an agent, absolute access to every stage of a proof process. This access is useful for constructive argumentation and for finding cooperative and/or informative answers.", "title": "" }, { "docid": "d1cf6f36fe964ac9e48f54a1f35e94c3", "text": "Recognising patterns that correlate multiple events over time becomes increasingly important in applications from urban transportation to surveillance monitoring. In many realworld scenarios, however, timestamps of events may be erroneously recorded and events may be dropped from a stream due to network failures or load shedding policies. In this work, we present SimpMatch, a novel simplex-based algorithm for probabilistic evaluation of event queries using constraints over event orderings in a stream. Our approach avoids learning probability distributions for time-points or occurrence intervals. Instead, we employ the abstraction of segmented intervals and compute the probability of a sequence of such segments using the principle of order statistics. The algorithm runs in linear time to the number of missed timestamps, and shows high accuracy, yielding exact results if event generation is based on a Poisson process and providing a good approximation otherwise. As we demonstrate empirically, SimpMatch enables efficient and effective reasoning over event streams, outperforming state-ofthe-art methods for probabilistic evaluation of event queries by up to two orders of magnitude.", "title": "" }, { "docid": "01895415b6785dda28ac5fa133c97909", "text": "Lossy compression introduces complex compression artifacts, particularly blocking artifacts, ringing effects and blurring. Existing algorithms either focus on removing blocking artifacts and produce blurred output, or restore sharpened images that are accompanied with ringing effects. Inspired by the success of deep convolutional networks (DCN) on superresolution [6], we formulate a compact and efficient network for seamless attenuation of different compression artifacts. To meet the speed requirement of real-world applications, we further accelerate the proposed baseline model by layer decomposition and joint use of large-stride convolutional and deconvolutional layers. This also leads to a more general CNN framework that has a close relationship with the conventional Multi-Layer Perceptron (MLP). Finally, the modified network achieves a speed up of 7.5× with almost no performance loss compared to the baseline model. We also demonstrate that a deeper model can be effectively trained with features learned in a shallow network. Following a similar “easy to hard” idea, we systematically investigate three practical transfer settings and show the effectiveness of transfer learning in low-level vision problems. Our method shows superior performance than the state-of-the-art methods both on benchmark datasets and a real-world use case.", "title": "" }, { "docid": "46e8318e76a1b2e539d7eafd65617993", "text": "A super wideband printed modified bow-tie antenna loaded with rounded-T shaped slots fed through a microstrip balun is proposed for microwave and millimeter-wave band imaging applications. The modified slot-loaded bow-tie pattern increases the electrical length of the bow-tie antenna reducing the lower band to 3.1 GHz. In addition, over the investigated frequency band up to 40 GHz, the proposed modified bow-tie pattern considerably flattens the input impedance response of the bow-tie resulting in a smooth impedance matching performance enhancing the reflection coefficient (S11) characteristics. The introduction of the modified ground plane printed underneath the bow-tie, on the other hand, yields to directional far-field radiation patterns with considerably enhanced gain performance. The S11 and E-plane/H-plane far-field radiation pattern measurements have been carried out and it is demonstrated that the fabricated bow-tie antenna operates across a measured frequency band of 3.1-40 GHz with an average broadband gain of 7.1 dBi.", "title": "" }, { "docid": "7023b8c49c03f37d4a71ed179dddf487", "text": "PURPOSE\nThe Study of Transition, Outcomes and Gender (STRONG) was initiated to assess the health status of transgender people in general and following gender-affirming treatments at Kaiser Permanente health plans in Georgia, Northern California and Southern California. The objectives of this communication are to describe methods of cohort ascertainment and data collection and to characterise the study population.\n\n\nPARTICIPANTS\nA stepwise methodology involving computerised searches of electronic medical records and free-text validation of eligibility and gender identity was used to identify a cohort of 6456 members with first evidence of transgender status (index date) between 2006 and 2014. The cohort included 3475 (54%) transfeminine (TF), 2892 (45%) transmasculine (TM) and 89 (1%) members whose natal sex and gender identity remained undetermined from the records. The cohort was matched to 127 608 enrollees with no transgender evidence (63 825 women and 63 783 men) on year of birth, race/ethnicity, study site and membership year of the index date. Cohort follow-up extends through the end of 2016.\n\n\nFINDINGS TO DATE\nAbout 58% of TF and 52% of TM cohort members received hormonal therapy at Kaiser Permanente. Chest surgery was more common among TM participants (12% vs 0.3%). The proportions of transgender participants who underwent genital reconstruction surgeries were similar (4%-5%) in the two transgender groups. Results indicate that there are sufficient numbers of events in the TF and TM cohorts to further examine mental health status, cardiovascular events, diabetes, HIV and most common cancers.\n\n\nFUTURE PLANS\nSTRONG is well positioned to fill existing knowledge gaps through comparisons of transgender and reference populations and through analyses of health status before and after gender affirmation treatment. Analyses will include incidence of cardiovascular disease, mental health, HIV and diabetes, as well as changes in laboratory-based endpoints (eg, polycythemia and bone density), overall and in relation to gender affirmation therapy.", "title": "" }, { "docid": "d9d0edec2ad5ac8120fb8626f208af6c", "text": "Light-Field enables us to observe scenes from free viewpoints. However, it generally consists of 4-D enormous data, that are not suitable for storing or transmitting without effective compression. 4-D Light-Field is very redundant because essentially it includes just 3-D scene information. Actually, although robust 3-D scene estimation such as depth recovery from Light-Field is not so easy, we successfully derived a method of reconstructing Light-Field directly from 3-D information composed of multi-focus images without any scene estimation. On the other hand, it is easy to synthesize multi-focus images from Light-Field. In this paper, based on the method, we propose novel Light-Field compression via synthesized multi-focus images as effective representation of 3-D scenes. Multi-focus images are easily compressed because they contain mostly low frequency components. We show experimental results by using synthetic and real images. Reconstruction quality of the method is robust even at very low bit-rate.", "title": "" }, { "docid": "b2c299e13eff8776375c14357019d82e", "text": "This paper is focused on the application of complementary split-ring resonators (CSRRs) to the suppression of the common (even) mode in microstrip differential transmission lines. By periodically and symmetrically etching CSRRs in the ground plane of microstrip differential lines, the common mode can be efficiently suppressed over a wide band whereas the differential signals are not affected. Throughout the paper, we present and discuss the principle for the selective common-mode suppression, the circuit model of the structure (including the models under even- and odd-mode excitation), the strategies for bandwidth enhancement of the rejected common mode, and a methodology for common-mode filter design. On the basis of the dispersion relation for the common mode, it is shown that the maximum achievable rejection bandwidth can be estimated. Finally, theory is validated by designing and measuring a differential line and a balanced bandpass filter with common-mode suppression, where double-slit CSRRs (DS-CSRRs) are used in order to enhance the common-mode rejection bandwidth. Due to the presence of DS-CSRRs, the balanced filter exhibits more than 40 dB of common-mode rejection within a 34% bandwidth around the filter pass band.", "title": "" }, { "docid": "76e407bc17d0317eae8ff004dc200095", "text": "Major advances have recently been made in merging language and vision representations. But most tasks considered so far have confined themselves to the processing of objects and lexicalised relations amongst objects (content words). We know, however, that humans (even preschool children) can abstract over raw data to perform certain types of higher-level reasoning, expressed in natural language by function words. A case in point is given by their ability to learn quantifiers, i.e. expressions like few, some and all. From formal semantics and cognitive linguistics, we know that quantifiers are relations over sets which, as a simplification, we can see as proportions. For instance, in most fish are red, most encodes the proportion of fish which are red fish. In this paper, we study how well current language and vision strategies model such relations. We show that state-of-the-art attention mechanisms coupled with a traditional linguistic formalisation of quantifiers gives best performance on the task. Additionally, we provide insights on the role of 'gist' representations in quantification. A 'logical' strategy to tackle the task would be to first obtain a numerosity estimation for the two involved sets and then compare their cardinalities. We however argue that precisely identifying the composition of the sets is not only beyond current state-of-the-art models but perhaps even detrimental to a task that is most efficiently performed by refining the approximate numerosity estimator of the system.", "title": "" }, { "docid": "f1c5f6f2bdff251e91df1dbd1e2302b2", "text": "In this paper, mathematical models for permutation flow shop scheduling and job shop scheduling problems are proposed. The first problem is based on a mixed integer programming model. As the problem is NP-complete, this model can only be used for smaller instances where an optimal solution can be computed. For large instances, another model is proposed which is suitable for solving the problem by stochastic heuristic methods. For the job shop scheduling problem, a mathematical model and its main representation schemes are presented. Keywords—Flow shop, job shop, mixed integer model, representation scheme.", "title": "" }, { "docid": "a6a7007f64e5d615c641048d6c630e03", "text": "Assessment Clinic, Department of Surgery, Flinders University and Medical Centre, Adelaide, South Australia Good understanding of a patient’s lymphoedema or their risk of it is based on accurate and appropriate assessment of their medical, surgical and familial history, as well as taking baseline measures which can provide an indication of structural and functional changes. If we want the holistic picture, we should also examine the impact that lymphoedema has on the patient’s quality of life and activities of daily living.", "title": "" }, { "docid": "aaa2a2971b070bc6e59a4ca9bcd00b49", "text": "In this study, the relationship between psychopathy and the prepetration of sexual homicide was investigated. The official file descriptions of sexual homicides committed by 18 psychopathic and 20 nonpsychopathic Canadian offenders were coded (by coders unaware of Psychopathy Checklist--Revised [PCL--R] scores) for characteristics of the victim, victim/perpetrator relationship, and evidence of gratuitous and sadistic violent behavior. Results indicated that most (84.7%) of the sexual murderers scored in the moderate to high range on the PCL--R. The majority of victims (66.67%) were female strangers, with no apparent influence of psychopathy on victim choice. Homicides committed by psychopathic offenders (using a PCL--R cut-off of 30) contained a significantly higher level of both gratuitous and sadistic violence than nonpsychopathic offenders. Most (82.4%) of the psychopaths exhibited some degree of sadistic behavior in their homicides compared to 52.6% of the nonpsychopaths. Implications for homicide investigations are discussed.", "title": "" }, { "docid": "ceb9cfea66bb08a73c48c2cef82ff7d0", "text": "In this letter, we propose a novel supervised change detection method based on a deep siamese convolutional network for optical aerial images. We train a siamese convolutional network using the weighted contrastive loss. The novelty of the method is that the siamese network is learned to extract features directly from the image pairs. Compared with hand-crafted features used by the conventional change detection method, the extracted features are more abstract and robust. Furthermore, because of the advantage of the weighted contrastive loss function, the features have a unique property: the feature vectors of the changed pixel pair are far away from each other, while the ones of the unchanged pixel pair are close. Therefore, we use the distance of the feature vectors to detect changes between the image pair. Simple threshold segmentation on the distance map can even obtain good performance. For improvement, we use a $k$ -nearest neighbor approach to update the initial result. Experimental results show that the proposed method produces results comparable, even better, with the two state-of-the-art methods in terms of F-measure.", "title": "" } ]
scidocsrr
a3d87a32a073d061dd5a28f606b7006e
An empirical study of PHP feature usage: a static analysis perspective
[ { "docid": "8c7ac806217e1ff497f7f76a5769bf7e", "text": "Transforming text into executable code with a function such as JavaScript’s eval endows programmers with the ability to extend applications, at any time, and in almost any way they choose. But, this expressive power comes at a price: reasoning about the dynamic behavior of programs that use this feature becomes challenging. Any ahead-of-time analysis, to remain sound, is forced to make pessimistic assumptions about the impact of dynamically created code. This pessimism affects the optimizations that can be applied to programs and significantly limits the kinds of errors that can be caught statically and the security guarantees that can be enforced. A better understanding of how eval is used could lead to increased performance and security. This paper presents a large-scale study of the use of eval in JavaScript-based web applications. We have recorded the behavior of 337 MB of strings given as arguments to 550,358 calls to the eval function exercised in over 10,000 web sites. We provide statistics on the nature and content of strings used in eval expressions, as well as their provenance and data obtained by observing their dynamic behavior. eval is evil. Avoid it. eval has aliases. Don’t use them. —Douglas Crockford", "title": "" } ]
[ { "docid": "8ffd290907609be99ca25acee4fb2a87", "text": "This paper introduces zero-shot dialog generation (ZSDG), as a step towards neural dialog systems that can instantly generalize to new situations with minimal data. ZSDG enables an end-to-end generative dialog system to generalize to a new domain for which only a domain description is provided and no training dialogs are available. Then a novel learning framework, Action Matching, is proposed. This algorithm can learn a cross-domain embedding space that models the semantics of dialog responses which, in turn, lets a neural dialog generation model generalize to new domains. We evaluate our methods on a new synthetic dialog dataset, and an existing human-human dialog dataset. Results show that our method has superior performance in learning dialog models that rapidly adapt their behavior to new domains and suggests promising future research.1", "title": "" }, { "docid": "b5e811e4ae761c185c6e545729df5743", "text": "Sleep assessment is of great importance in the diagnosis and treatment of sleep disorders. In clinical practice this is typically performed based on polysomnography recordings and manual sleep staging by experts. This procedure has the disadvantages that the measurements are cumbersome, may have a negative influence on the sleep, and the clinical assessment is labor intensive. Addressing the latter, there has recently been encouraging progress in the field of automatic sleep staging [1]. Furthermore, a minimally obtrusive method for recording EEG from electrodes in the ear (ear-EEG) has recently been proposed [2]. The objective of this study was to investigate the feasibility of automatic sleep stage classification based on ear-EEG. This paper presents a preliminary study based on recordings from a total of 18 subjects. Sleep scoring was performed by a clinical expert based on frontal, central and occipital region EEG, as well as EOG and EMG. 5 subjects were excluded from the study because of alpha wave contamination. In one subject the standard polysomnography was supplemented by ear-EEG. A single EEG channel sleep stage classifier was implemented using the same features and the same classifier as proposed in [1]. The performance of the single channel sleep classifier based on the scalp recordings showed an 85.7 % agreement with the manual expert scoring through 10-fold inter-subject cross validation, while the performance of the ear-EEG recordings was based on a 10-fold intra-subject cross validation and showed an 82 % agreement with the manual scoring. These results suggest that automatic sleep stage classification based on ear-EEG recordings may provide similar performance as compared to single channel scalp EEG sleep stage classification. Thereby ear-EEG may be a feasible technology for future minimal intrusive sleep stage classification.", "title": "" }, { "docid": "b3f4473d11801d862a052a2ec91c71ab", "text": "Plastics from waste electrical and electronic equipment (WEEE) have been an important environmental problem because these plastics commonly contain toxic halogenated flame retardants which may cause serious environmental pollution, especially the formation of carcinogenic substances polybrominated dibenzo dioxins/furans (PBDD/Fs), during treat process of these plastics. Pyrolysis has been proposed as a viable processing route for recycling the organic compounds in WEEE plastics into fuels and chemical feedstock. However, dehalogenation procedures are also necessary during treat process, because the oils collected in single pyrolysis process may contain numerous halogenated organic compounds, which would detrimentally impact the reuse of these pyrolysis oils. Currently, dehalogenation has become a significant topic in recycling of WEEE plastics by pyrolysis. In order to fulfill the better resource utilization of the WEEE plastics, the compositions, characteristics and dehalogenation methods during the pyrolysis recycling process of WEEE plastics were reviewed in this paper. Dehalogenation and the decomposition or pyrolysis of WEEE plastics can be carried out simultaneously or successively. It could be 'dehalogenating prior to pyrolysing plastics', 'performing dehalogenation and pyrolysis at the same time' or 'pyrolysing plastics first then upgrading pyrolysis oils'. The first strategy essentially is the two-stage pyrolysis with the release of halogen hydrides at low pyrolysis temperature region which is separate from the decomposition of polymer matrixes, thus obtaining halogenated free oil products. The second strategy is the most common method. Zeolite or other type of catalyst can be used in the pyrolysis process for removing organohalogens. The third strategy separate pyrolysis and dehalogenation of WEEE plastics, which can, to some degree, avoid the problem of oil value decline due to the use of catalyst, but obviously, this strategy may increase the cost of whole recycling process.", "title": "" }, { "docid": "b3450073ad3d6f2271d6a56fccdc110a", "text": "OBJECTIVE\nMindfulness-based therapies (MBTs) have been shown to be efficacious in treating internally focused psychological disorders (e.g., depression); however, it is still unclear whether MBTs provide improved functioning and symptom relief for individuals with externalizing disorders, including ADHD. To clarify the literature on the effectiveness of MBTs in treating ADHD and to guide future research, an effect-size analysis was conducted.\n\n\nMETHOD\nA systematic review of studies published in PsycINFO, PubMed, and Google Scholar was completed from the earliest available date until December 2014.\n\n\nRESULTS\nA total of 10 studies were included in the analysis of inattention and the overall effect size was d = -.66. A total of nine studies were included in the analysis of hyperactivity/impulsivity and the overall effect was calculated at d = -.53.\n\n\nCONCLUSION\nResults of this study highlight the possible benefits of MBTs in reducing symptoms of ADHD.", "title": "" }, { "docid": "e76fc05d9fd195d39c382652ecb750f6", "text": "A compact ultrawideband (UWB) multiple-input multiple-output (MIMO) antenna, with high isolation, is proposed for portable UWB MIMO systems. Two coplanar stripline-fed staircase-shaped radiating elements are connected back-to-back. The prototype is designed on a substrate of dielectric constant 4.4 with an overall dimension of 25 mm × 30 mm × 1.6 mm. This antenna configuration with an isolating metal strip placed in between the two radiating elements ensures high isolation in the entire UWB band. The proposed antenna exhibits a good 2:1 VSWR impedance bandwidth covering the entire UWB band (3.1-10.6 GHz) with a high isolation better than 20 dB, peak gain of 5.2 dBi, peak efficiency of 90%, and guaranteed value of envelope correlation coefficient (ECC) ≤0.1641.", "title": "" }, { "docid": "9a05c95de1484df50a5540b31df1a010", "text": "Resumen. Este trabajo trata sobre un sistema de monitoreo remoto a través de una pantalla inteligente para sensores de temperatura y corriente utilizando una red híbrida CAN−ZIGBEE. El CAN bus es usado como medio de transmisión de datos a corta distancia mientras que Zigbee es empleado para que cada nodo de la red pueda interactuar de manera inalámbrica con el nodo principal. De esta manera la red híbrida combina las ventajas de cada protocolo de comunicación para intercambiar datos. El sistema cuenta con cuatro nodos, dos son CAN y reciben la información de los sensores y el resto son Zigbee. Estos nodos están a cargo de transmitir la información de un nodo CAN de manera inalámbrica y desplegarla en una pantalla inteligente.", "title": "" }, { "docid": "45974f33d79bf4d3af349877ef119508", "text": "Generation of graspable three-dimensional objects applied for surgical planning, prosthetics and related applications using 3D printing or rapid prototyping is summarized and evaluated. Graspable 3D objects overcome the limitations of 3D visualizations which can only be displayed on flat screens. 3D objects can be produced based on CT or MRI volumetric medical images. Using dedicated post-processing algorithms, a spatial model can be extracted from image data sets and exported to machine-readable data. That spatial model data is utilized by special printers for generating the final rapid prototype model. Patient–clinician interaction, surgical training, medical research and education may require graspable 3D objects. The limitations of rapid prototyping include cost and complexity, as well as the need for specialized equipment and consumables such as photoresist resins. Medical application of rapid prototyping is feasible for specialized surgical planning and prosthetics applications and has significant potential for development of new medical applications.", "title": "" }, { "docid": "7c0586335facd8388814f863e19e3d06", "text": "OBJECTIVE\nWe reviewed randomized controlled trials of complementary and alternative medicine (CAM) treatments for depression, anxiety, and sleep disturbance in nondemented older adults.\n\n\nDATA SOURCES\nWe searched PubMed (1966-September 2006) and PsycINFO (1984-September 2006) databases using combinations of terms including depression, anxiety, and sleep; older adult/elderly; randomized controlled trial; and a list of 56 terms related to CAM.\n\n\nSTUDY SELECTION\nOf the 855 studies identified by database searches, 29 met our inclusion criteria: sample size >or= 30, treatment duration >or= 2 weeks, and publication in English. Four additional articles from manual bibliography searches met inclusion criteria, totaling 33 studies.\n\n\nDATA EXTRACTION\nWe reviewed identified articles for methodological quality using a modified Scale for Assessing Scientific Quality of Investigations (SASQI). We categorized a study as positive if the CAM therapy proved significantly more effective than an inactive control (or as effective as active control) on at least 1 primary psychological outcome. Positive and negative studies were compared on the following characteristics: CAM treatment category, symptom(s) assessed, country where the study was conducted, sample size, treatment duration, and mean sample age.\n\n\nDATA SYNTHESIS\n67% of the 33 studies reviewed were positive. Positive studies had lower SASQI scores for methodology than negative studies. Mind-body and body-based therapies had somewhat higher rates of positive results than energy- or biologically-based therapies.\n\n\nCONCLUSIONS\nMost studies had substantial methodological limitations. A few well-conducted studies suggested therapeutic potential for certain CAM interventions in older adults (e.g., mind-body interventions for sleep disturbances and acupressure for sleep and anxiety). More rigorous research is needed, and suggestions for future research are summarized.", "title": "" }, { "docid": "4d57b0dbc36c2eb058285b4a5b6c102c", "text": "OBJECTIVE\nThis study was planned to investigate the efficacy of neuromuscular rehabilitation and Johnstone Pressure Splints in the patients who had ataxic multiple sclerosis.\n\n\nMETHODS\nTwenty-six outpatients with multiple sclerosis were the subjects of the study. The control group (n = 13) was given neuromuscular rehabilitation, whereas the study group (n = 13) was treated with Johnstone Pressure Splints in addition.\n\n\nRESULTS\nIn pre- and posttreatment data, significant differences were found in sensation, anterior balance, gait parameters, and Expanded Disability Status Scale (p < 0.05). An important difference was observed in walking-on-two-lines data within the groups (p < 0.05). There also was a statistically significant difference in pendular movements and dysdiadakokinesia (p < 0.05). When the posttreatment values were compared, there was no significant difference between sensation, anterior balance, gait parameters, equilibrium and nonequilibrium coordination tests, Expanded Disability Status Scale, cortical onset latency, and central conduction time of somatosensory evoked potentials and motor evoked potentials (p > 0.05). Comparison of values revealed an important difference in cortical onset-P37 peak amplitude of somatosensory evoked potentials (right limbs) in favor of the study group (p < 0.05).\n\n\nCONCLUSIONS\nAccording to our study, it was determined that physiotherapy approaches were effective to decrease the ataxia. We conclude that the combination of suitable physiotherapy techniques is effective multiple sclerosis rehabilitation.", "title": "" }, { "docid": "b4763eece86468bc7718fc98bac856dd", "text": "The inception network has been shown to provide good performance on image classification problems, but there are not much evidences that it is also effective for the image restoration or pixel-wise labeling problems. For image restoration problems, the pooling is generally not used because the decimated features are not helpful for the reconstruction of an image as the output. Moreover, most deep learning architectures for the restoration problems do not use dense prediction that need lots of training parameters. From these observations, for enjoying the performance of inception-like structure on the image based problems we propose a new convolutional network-in-network structure. The proposed network can be considered a modification of inception structure where pool projection and pooling layer are removed for maintaining the entire feature map size, and a larger kernel filter is added instead. Proposed network greatly reduces the number of parameters on account of removed dense prediction and pooling, which is an advantage, but may also reduce the receptive field in each layer. Hence, we add a larger kernel than the original inception structure for not increasing the depth of layers. The proposed structure is applied to typical image-to-image learning problems, i.e., the problems where the size of input and output are same such as skin detection, semantic segmentation, and compression artifacts reduction. Extensive experiments show that the proposed network brings comparable or better results than the state-of-the-art convolutional neural networks for these problems.", "title": "" }, { "docid": "dbd3234f12aff3ee0e01db8a16b13cad", "text": "Information visualization has traditionally limited itself to 2D representations, primarily due to the prevalence of 2D displays and report formats. However, there has been a recent surge in popularity of consumer grade 3D displays and immersive head-mounted displays (HMDs). The ubiquity of such displays enables the possibility of immersive, stereoscopic visualization environments. While techniques that utilize such immersive environments have been explored extensively for spatial and scientific visualizations, contrastingly very little has been explored for information visualization. In this paper, we present our considerations of layout, rendering, and interaction methods for visualizing graphs in an immersive environment. We conducted a user study to evaluate our techniques compared to traditional 2D graph visualization. The results show that participants answered significantly faster with a fewer number of interactions using our techniques, especially for more difficult tasks. While the overall correctness rates are not significantly different, we found that participants gave significantly more correct answers using our techniques for larger graphs.", "title": "" }, { "docid": "b6a0fcd9ee49b3dbfccdfa88fd0f07a0", "text": "Generating images from natural language is one of the primary applications of recent conditional generative models. Besides testing our ability to model conditional, highly dimensional distributions, text to image synthesis has many exciting and practical applications such as photo editing or computer-aided content creation. Recent progress has been made using Generative Adversarial Networks (GANs). This material starts with a gentle introduction to these topics and discusses the existent state of the art models. Moreover, I propose Wasserstein GAN-CLS, a new model for conditional image generation based on the Wasserstein distance which offers guarantees of stability. Then, I show how the novel loss function of Wasserstein GAN-CLS can be used in a Conditional Progressive Growing GAN. In combination with the proposed loss, the model boosts by 7.07% the best Inception Score (on the Caltech birds dataset) of the models which use only the sentence-level visual semantics. The only model which performs better than the Conditional Wasserstein Progressive growing GAN is the recently proposed AttnGAN which uses word-level visual semantics as well.", "title": "" }, { "docid": "31d66211511ae35d71c7055a2abf2801", "text": "BACKGROUND\nPrevious evidence points to a causal link between playing action video games and enhanced cognition and perception. However, benefits of playing other video games are under-investigated. We examined whether playing non-action games also improves cognition. Hence, we compared transfer effects of an action and other non-action types that required different cognitive demands.\n\n\nMETHODOLOGY/PRINCIPAL FINDINGS\nWe instructed 5 groups of non-gamer participants to play one game each on a mobile device (iPhone/iPod Touch) for one hour a day/five days a week over four weeks (20 hours). Games included action, spatial memory, match-3, hidden- object, and an agent-based life simulation. Participants performed four behavioral tasks before and after video game training to assess for transfer effects. Tasks included an attentional blink task, a spatial memory and visual search dual task, a visual filter memory task to assess for multiple object tracking and cognitive control, as well as a complex verbal span task. Action game playing eliminated attentional blink and improved cognitive control and multiple-object tracking. Match-3, spatial memory and hidden object games improved visual search performance while the latter two also improved spatial working memory. Complex verbal span improved after match-3 and action game training.\n\n\nCONCLUSION/SIGNIFICANCE\nCognitive improvements were not limited to action game training alone and different games enhanced different aspects of cognition. We conclude that training specific cognitive abilities frequently in a video game improves performance in tasks that share common underlying demands. Overall, these results suggest that many video game-related cognitive improvements may not be due to training of general broad cognitive systems such as executive attentional control, but instead due to frequent utilization of specific cognitive processes during game play. Thus, many video game training related improvements to cognition may be attributed to near-transfer effects.", "title": "" }, { "docid": "99bd8339f260784fff3d0a94eb04f6f4", "text": "Reinforcement learning algorithms discover policies that maximize reward, but do not necessarily guarantee safety during learning or execution phases. We introduce a new approach to learn optimal policies while enforcing properties expressed in temporal logic. To this end, given the temporal logic specification that is to be obeyed by the learning system, we propose to synthesize a reactive system called a shield. The shield monitors the actions from the learner and corrects them only if the chosen action causes a violation of the specification. We discuss which requirements a shield must meet to preserve the convergence guarantees of the learner. Finally, we demonstrate the versatility of our approach on several challenging reinforcement learning scenarios.", "title": "" }, { "docid": "2e2a21ca1be2da2d30b1b2a92cd49628", "text": "A new form of cloud computing, serverless computing, is drawing attention as a new way to design micro-services architectures. In a serverless computing environment, services are developed as service functional units. The function development environment of all serverless computing framework at present is CPU based. In this paper, we propose a GPU-supported serverless computing framework that can deploy services faster than existing serverless computing framework using CPU. Our core approach is to integrate the open source serverless computing framework with NVIDIA-Docker and deploy services based on the GPU support container. We have developed an API that connects the open source framework to the NVIDIA-Docker and commands that enable GPU programming. In our experiments, we measured the performance of the framework in various environments. As a result, developers who want to develop services through the framework can deploy high-performance micro services and developers who want to run deep learning programs without a GPU environment can run code on remote GPUs with little performance degradation.", "title": "" }, { "docid": "e91dd3f9e832de48a27048a0efa1b67a", "text": "Smart Home technology is the future of residential related technology which is designed to deliver and distribute number of services inside and outside the house via networked devices in which all the different applications & the intelligence behind them are integrated and interconnected. These smart devices have the potential to share information with each other given the permanent availability to access the broadband internet connection. Hence, Smart Home Technology has become part of IoT (Internet of Things). In this work, a home model is analyzed to demonstrate an energy efficient IoT based smart home. Several Multiphysics simulations were carried out focusing on the kitchen of the home model. A motion sensor with a surveillance camera was used as part of the home security system. Coupled with the home light and HVAC control systems, the smart system can remotely control the lighting and heating or cooling when an occupant enters or leaves the kitchen.", "title": "" }, { "docid": "bf6c93ac774f8ae691d0de32e9cd3057", "text": "We address deafness and directional hidden terminal problem that occur when MAC protocols are designed for directional antenna based wireless multi-hop networks. Deafness occurs when the transmitter fails to communicate to its intended receiver, because the receiver's antenna is oriented in a different direction. The directional hidden terminal problem occurs when the transmitter fails to hear a prior RTS/CTS exchange between another pair of nodes and cause collision by initiating a transmission to the receiver of the ongoing communication. Though directional antennas offer better spatial reuse, these problems can have a serious impact on network performance. In this paper, we study various scenarios in which these problems can occur and design a MAC protocol that solves them comprehensively using only a single channel and single radio interface. Current solutions in literature either do not address these issues comprehensively or use more than one radio/channel to solve them. We evaluate our protocol using detailed simulation studies. Simulation results indicate that our protocol can effectively address deafness and directional hidden terminal problem and increase network performance.", "title": "" }, { "docid": "a78149e30a677c320cab3540d55adc4f", "text": "We develop Markov topic models (MTMs), a novel family of generative probabilistic models that can learn topics simultaneously from multiple corpora, such as papers from different conferences. We apply Gaussian (Markov) random fields to model the correlations of different corpora. MTMs capture both the internal topic structure within each corpus and the relationships between topics across the corpora. We derive an efficient estimation procedure with variational expectation-maximization. We study the performance of our models on a corpus of abstracts from six different computer science conferences. Our analysis reveals qualitative discoveries that are not possible with traditional topic models, and improved quantitative performance over the state of the art.", "title": "" }, { "docid": "2fd42b61615dce7e9604b482f16dfa73", "text": "Wildlife species such as tigers and elephants are under the threat of poaching. To combat poaching, conservation agencies (“defenders”) need to (1) anticipate where the poachers are likely to poach and (2) plan effective patrols. We propose an anti-poaching tool CAPTURE (Comprehensive Anti-Poaching tool with Temporal and observation Uncertainty REasoning), which helps the defenders achieve both goals. CAPTURE builds a novel hierarchical model for poacher-patroller interaction. It considers the patroller’s imperfect detection of signs of poaching, the complex temporal dependencies in the poacher's behaviors and the defender’s lack of knowledge of the number of poachers. Further, CAPTURE uses a new game-theoretic algorithm to compute the optimal patrolling strategies and plan effective patrols. This paper investigates the computational challenges that CAPTURE faces. First, we present a detailed analysis of parameter separation and target abstraction, two novel approaches used by CAPTURE to efficiently learn the parameters in the hierarchical model. Second, we propose two heuristics – piece-wise linear approximation and greedy planning – to speed up the computation of the optimal patrolling strategies. We discuss in this paper the lessons learned from using CAPTURE to analyze real-world poaching data collected over 12 years in Queen Elizabeth National Park in Uganda. Introduction Wildlife poaching presents a significant threat to large-bodied animal species. It is one major driver of the population declines of key wildlife species such as tigers, elephants, and rhinos, which are crucial to the functioning of natural ecosystems as well as local and national economies [1, 2]. Poachers illegally catch wildlife by placing snares or hunting. To combat poaching, both government and non-government agencies send well-trained patrollers to wildlife conservation areas. In this work, we focus on snare poaching. The patrollers conduct patrols with the aim of preventing poachers from poaching animals either by catching the poachers or by removing animal traps set by the poachers. Signs of poaching are collected and recorded during the patrols, including snares, traps and other signs such as poacher tracks, which can be used together with other domain features such as animal density or slope of the terrain to analyze and predict the poachers' behavior [3, 4]. It is critical to learn the poachers' behavior, anticipate where the poachers would go for poaching, and further use such information to guide future patrols and make them more effective. Poachers’ behavior is adaptive to patrols as evidenced by multiple studies [5, 6, 7]. Instead of falling into a static pattern, the distribution of poaching activities can be affected by ranger patrols as the poachers will take the patrol locations into account when making decisions. As a result, the rangers should also consider such dynamics when planning the patrols. Such strategic interaction between the conservation agencies and the poachers make game theory an appropriate framework for the problem. Stackelberg Security Games (SSGs) in computational game theory have been successfully applied to various infrastructure security problems in which the defender", "title": "" } ]
scidocsrr
d2a954f38f0950d2ab075ae5416be30c
Boosting up Scene Text Detectors with Guided CNN
[ { "docid": "4d2be7aac363b77c6abd083947bc28c7", "text": "Scene parsing is challenging for unrestricted open vocabulary and diverse scenes. In this paper, we exploit the capability of global context information by different-region-based context aggregation through our pyramid pooling module together with the proposed pyramid scene parsing network (PSPNet). Our global prior representation is effective to produce good quality results on the scene parsing task, while PSPNet provides a superior framework for pixel-level prediction. The proposed approach achieves state-of-the-art performance on various datasets. It came first in ImageNet scene parsing challenge 2016, PASCAL VOC 2012 benchmark and Cityscapes benchmark. A single PSPNet yields the new record of mIoU accuracy 85.4% on PASCAL VOC 2012 and accuracy 80.2% on Cityscapes.", "title": "" }, { "docid": "98d998eae1fa7a00b73dcff0251f0bbd", "text": "Imagery texts are usually organized as a hierarchy of several visual elements, i.e. characters, words, text lines and text blocks. Among these elements, character is the most basic one for various languages such as Western, Chinese, Japanese, mathematical expression and etc. It is natural and convenient to construct a common text detection engine based on character detectors. However, training character detectors requires a vast of location annotated characters, which are expensive to obtain. Actually, the existing real text datasets are mostly annotated in word or line level. To remedy this dilemma, we propose a weakly supervised framework that can utilize word annotations, either in tight quadrangles or the more loose bounding boxes, for character detector training. When applied in scene text detection, we are thus able to train a robust character detector by exploiting word annotations in the rich large-scale real scene text datasets, e.g. ICDAR15 [19] and COCO-text [39]. The character detector acts as a key role in the pipeline of our text detection engine. It achieves the state-of-the-art performance on several challenging scene text detection benchmarks. We also demonstrate the flexibility of our pipeline by various scenarios, including deformed text detection and math expression recognition.", "title": "" }, { "docid": "ead5432cb390756a99e4602a9b6266bf", "text": "In this paper, we present a new approach for text localization in natural images, by discriminating text and non-text regions at three levels: pixel, component and text line levels. Firstly, a powerful low-level filter called the Stroke Feature Transform (SFT) is proposed, which extends the widely-used Stroke Width Transform (SWT) by incorporating color cues of text pixels, leading to significantly enhanced performance on inter-component separation and intra-component connection. Secondly, based on the output of SFT, we apply two classifiers, a text component classifier and a text-line classifier, sequentially to extract text regions, eliminating the heuristic procedures that are commonly used in previous approaches. The two classifiers are built upon two novel Text Covariance Descriptors (TCDs) that encode both the heuristic properties and the statistical characteristics of text stokes. Finally, text regions are located by simply thresholding the text-line confident map. Our method was evaluated on two benchmark datasets: ICDAR 2005 and ICDAR 2011, and the corresponding F-measure values are 0.72 and 0.73, respectively, surpassing previous methods in accuracy by a large margin.", "title": "" } ]
[ { "docid": "ed6b17cb21205e36490ec404922e36bc", "text": "Hepatocellular carcinoma (HCC) is the sixth major malignant tumor in the world and the third tumor leading to deaths. Only 10-54% of patients with HCC are suitable to surgery (Marín-Hargreaves et al., 2003; Takaki et al., 2009; Forner et al., 2012). Transcatheter arterial chemoembolization (TACE) is one of the main measures for treatment of unresectable HCC. However, the low necrosis rate of local tumor after TACE is an important factor leading to tumor recurrence and metastasis and affecting the long-term postoperative efficacy (Georgiades et al., 2008; Takaki et al., 2009; Miyayama et al., 2010; Forner et al., 2012). In addition, tumor size is also one of important factors affecting TACE efficacy and prognosis. The inactivation ability and efficacy of TACE are significantly reduced for large HCC with diameter more than 5 cm (Yamakado et al., 2002; Fan et al., 2011). Compared with simple TACE, combination of TACE and radiofrenquency ablation (RFA) can improve the treatment", "title": "" }, { "docid": "e61b6ae5d763fb135093cdfa035b82bf", "text": "Computer-mediated communication is driving fundamental changes in the nature of written language. We investigate these changes by statistical analysis of a dataset comprising 107 million Twitter messages (authored by 2.7 million unique user accounts). Using a latent vector autoregressive model to aggregate across thousands of words, we identify high-level patterns in diffusion of linguistic change over the United States. Our model is robust to unpredictable changes in Twitter's sampling rate, and provides a probabilistic characterization of the relationship of macro-scale linguistic influence to a set of demographic and geographic predictors. The results of this analysis offer support for prior arguments that focus on geographical proximity and population size. However, demographic similarity - especially with regard to race - plays an even more central role, as cities with similar racial demographics are far more likely to share linguistic influence. Rather than moving towards a single unified \"netspeak\" dialect, language evolution in computer-mediated communication reproduces existing fault lines in spoken American English.", "title": "" }, { "docid": "464e2798a866449532f2d8e72575ac9d", "text": "Fake news has become a hotly debated topic in journalism. In this paper, we present our entry to the 2017 Fake News Challenge which models the detection of fake news as a stance classification task that finished in 11th place on the leader board. Our entry is an ensemble system of classifiers developed by students in the context of their coursework. We show how we used the stacking ensemble method for this purpose and obtained improvements in classification accuracy exceeding each of the individual models’ performance on the development data. Finally, we discuss aspects of the experimental setup of the challenge.", "title": "" }, { "docid": "d7ce50c1545f0b7233db7413486d6b76", "text": "In this paper, we present an analysis of low complexity signal processing algorithms capable of identifying special noises, such as the sounds of forest machinery (used for forestry, logging). Our objective is to find methods that are able to detect internal combustion engines in rural environment, and are also easy to implement on low power devices of WSNs (wireless sensor networks). In this context, we review different methods for detecting illegal logging, with an emphasis on autocorrelation and TESPAR audio techniques. The processing of extracted audio features is to be solved with limited memory and processor resources typical for low cost sensors modes. The representation of noise models is also considered with different archetypes. Implementations of the proposed methods were tested not by simulations but on sensor nodes equipped with an omnidirectional microphone and a low power microcontroller. Our results show that high recognition rate can be achieved using time domain algorithms and highly energy efficient and inexpensive architectures.", "title": "" }, { "docid": "21139973d721956c2f30e07ed1ccf404", "text": "Representing words into vectors in continuous space can form up a potentially powerful basis to generate high-quality textual features for many text mining and natural language processing tasks. Some recent efforts, such as the skip-gram model, have attempted to learn word representations that can capture both syntactic and semantic information among text corpus. However, they still lack the capability of encoding the properties of words and the complex relationships among words very well, since text itself often contains incomplete and ambiguous information. Fortunately, knowledge graphs provide a golden mine for enhancing the quality of learned word representations. In particular, a knowledge graph, usually composed by entities (words, phrases, etc.), relations between entities, and some corresponding meta information, can supply invaluable relational knowledge that encodes the relationship between entities as well as categorical knowledge that encodes the attributes or properties of entities. Hence, in this paper, we introduce a novel framework called RC-NET to leverage both the relational and categorical knowledge to produce word representations of higher quality. Specifically, we build the relational knowledge and the categorical knowledge into two separate regularization functions, and combine both of them with the original objective function of the skip-gram model. By solving this combined optimization problem using back propagation neural networks, we can obtain word representations enhanced by the knowledge graph. Experiments on popular text mining and natural language processing tasks, including analogical reasoning, word similarity, and topic prediction, have all demonstrated that our model can significantly improve the quality of word representations.", "title": "" }, { "docid": "78fc46165449f94e75e70a2654abf518", "text": "This paper presents a non-photorealistic rendering technique that automatically generates a line drawing from a photograph. We aim at extracting a set of coherent, smooth, and stylistic lines that effectively capture and convey important shapes in the image. We first develop a novel method for constructing a smooth direction field that preserves the flow of the salient image features. We then introduce the notion of flow-guided anisotropic filtering for detecting highly coherent lines while suppressing noise. Our method is simple and easy to implement. A variety of experimental results are presented to show the effectiveness of our method in producing self-contained, high-quality line illustrations.", "title": "" }, { "docid": "8573ad563268d5301b38c161c67b2a87", "text": "A fracture theory for a heterogeneous aggregate material which exhibits a gradual strainsoftening due to microcracking and contains aggregate pieces that are not necessarily small compared to struttural dimensions is developed. Only Mode I is considered. The fracture is modeled as a blunt smeared crack band, which is justified by the random nature of the microstructure. Simple triaxial stress-strain relations which model the strain-softening and describe the effect of gradual microcracking in the crack band are derived. It is shown that it is easier to use compliance rather than stiffness matrices and that it suffices to adjust a single diagonal term of the compliance matrix. The limiting case of this matrix for complete (continuous) cracking is shown to be identical to the inverse of the well-known stiffness matrix for a perfectly cracked material. The material fracture properties are characterized by only three paPlameters -fracture energy, uniaxial strength limit and width of the crack band (fracture Process zone), while the strain-softening modulus is a function of these parameters. A m~thod of determining the fracture energy from measured complete stressstrain relations is' also given. Triaxial stress effects on fracture can be taken into account. The theory is verljied by comparisons with numerous experimental data from the literature. Satisfactory fits of maximum load data as well as resistance curves are achieved and values of the three matetial parameters involved, namely the fracture energy, the strength, and the width of crack b~nd front, are determined from test data. The optimum value of the latter width is found to be about 3 aggregate sizes, which is also justified as the minimum acceptable for a homogeneous continuum modeling. The method of implementing the theory in a finite element code is al$o indicated, and rules for achieving objectivity of results with regard to the analyst's choice of element size are given. Finally, a simple formula is derived to predict from the tensile strength and aggregate size the fracture energy, as well as the strain-softening modulus. A statistical analysis of the errors reveals a drastic improvement compared to the linear fracture th~ory as well as the strength theory. The applicability of fracture mechanics to concrete is thz4 solidly established.", "title": "" }, { "docid": "1f9bf4526e7e58494242ddce17f6c756", "text": "Consider the following generalization of the classical job-shop scheduling problem in which a set of machines is associated with each operation of a job. The operation can be processed on any of the machines in this set. For each assignment μ of operations to machines letP(μ) be the corresponding job-shop problem andf(μ) be the minimum makespan ofP(μ). How to find an assignment which minimizesf(μ)? For problems with two jobs a polynomial algorithm is derived. Folgende Verallgemeinerung des klassischen Job-Shop Scheduling Problems wird untersucht. Jeder Operation eines Jobs sei eine Menge von Maschinen zugeordnet. Wählt man für jede Operation genau eine Maschine aus dieser Menge aus, so erhält man ein klassisches Job-Shop Problem, dessen minimale Gesamtbearbeitungszeitf(μ) von dieser Zuordnung μ abhängt. Gesucht ist eine Zuordnung μ, dief(μ) minimiert. Für zwei Jobs wird ein polynomialer Algorithmus entwickelt, der dieses Problem löst.", "title": "" }, { "docid": "789a024e39a832071ffee9e368b7a191", "text": "In this paper, we propose a new deep learning approach, called neural association model (NAM), for probabilistic reasoning in artificial intelligence. We propose to use neural networks to model association between any two events in a domain. Neural networks take one event as input and compute a conditional probability of the other event to model how likely these two events are associated. The actual meaning of the conditional probabilities varies between applications and depends on how the models are trained. In this work, as two case studies, we have investigated two NAM structures, namely deep neural networks (DNN) and relationmodulated neural nets (RMNN), on several probabilistic reasoning tasks in AI, including recognizing textual entailment, triple classification in multirelational knowledge bases and common-sense reasoning. Experimental results on several popular data sets derived from WordNet, FreeBase and ConceptNet have all demonstrated that both DNN and RMNN perform equally well and they can significantly outperform the conventional methods available for these reasoning tasks. Moreover, compared with DNN, RMNN are superior in knowledge transfer, where a pre-trained model can be quickly extended to an unseen relation after observing only a few training samples.", "title": "" }, { "docid": "2de6cd6949177732a1ebdde1b6976600", "text": "Large-scale Structure-from-Motion systems typically spend major computational effort on pairwise image matching and geometric verification in order to discover connected components in large-scale, unordered image collections. In recent years, the research community has spent significant effort on improving the efficiency of this stage. In this paper, we present a comprehensive overview of various state-of-the-art methods, evaluating and analyzing their performance. Based on the insights of this evaluation, we propose a learning-based approach, the PAirwise Image Geometry Encoding (PAIGE), to efficiently identify image pairs with scene overlap without the need to perform exhaustive putative matching and geometric verification. PAIGE achieves state-of-the-art performance and integrates well into existing Structure-from-Motion pipelines.", "title": "" }, { "docid": "a441c8669fa094658e95aeddfe88f86d", "text": "It has been claimed that recent developments in the research on the efficiency of code generation and on graphical input/output interfacing have made it possible to use a functional language to write efficient programs that can compete with industrial applications written in a traditional imperative language. As one of the early steps in verifying this claim, this paper describes a first attempt to implement a spreadsheet in a lazy, purely functional language. An interesting aspect of the design is that the language with which the user specifies the relations between the cells of the spreadsheet is itself a lazy, purely functional and higher order language as well, and not some special dedicated spreadsheet language. Another interesting aspect of the design is that the spreadsheet incorporates symbolic reduction and normalisation of symbolic expressions (including equations). This introduces the possibility of asking the system to prove equality of symbolic cell expressions: a property which can greatly enhance the reliability of a particular user-defined spreadsheet. The resulting application is by no means a fully mature product. It is not intended as a competitor to commercially available spreadsheets. However, with its higher order lazy functional language and its symbolic capabilities it may serve as an interesting candidate to fill the gap between calculators with purely functional expressions and full-featured spreadsheets with dedicated non-functional spreadsheet languages. This paper describes the global design and important implementation issues in the development of the application. The experience gained and lessons learnt during this project are treated. Performance and use of the resulting application are compared with related work.", "title": "" }, { "docid": "de17b1fcae6336947e82adab0881b5ba", "text": "Presence of duplicate documents in the World Wide Web adversely affects crawling, indexing and relevance, which are the core building blocks of web search. In this paper, we present a set of techniques to mine rules from URLs and utilize these learnt rules for de-duplication using just URL strings without fetching the content explicitly. Our technique is composed of mining the crawl logs and utilizing clusters of similar pages to extract specific rules from URLs belonging to each cluster. Preserving each mined rules for de-duplication is not efficient due to the large number of specific rules. We present a machine learning technique to generalize the set of rules, which reduces the resource footprint to be usable at web-scale. The rule extraction techniques are robust against web-site specific URL conventions. We demonstrate the effectiveness of our techniques through experimental evaluation.", "title": "" }, { "docid": "00679e6e34f404e01adc6d3315d7964e", "text": "Immature embryos and embryogenic calli of rice, both japonica and indica subspecies, were bombarded with tungsten particles coated with plasmid DNA that contained a gene encoding hygromycin phosphotransferase (HPH, conferring hygromycin resistance) driven by the CaMV 35S promoter or Agrobactenum tumefaciens NOS promoter. Putatively transformed cell clusters were identified from the bombarded tissues 2 weeks after selection on hygromycin B. By separating these cell clusters from each other, and by stringent selection not only at the callus growth stage but also during regeneration and plantlet growth, the overall transformation and selection efficiencies were substantially improved over those previously reported. From the most responsive cultivar used in these studies, an average of one transgenic plant was produced from 1.3 immature embryos or from 5 pieces of embryogenic calli bombarded. Integration of the introduced gene into the plant genome, and inheritance to the offspring were demonstrated. By using this procedure, we have produced several hundred transgenic plants. The procedure described here provides a simple method for improving transformation and selection efficiencies in rice and may be applicable to other monocots.", "title": "" }, { "docid": "be3466a43f12f66b222ffdc60f71c6a0", "text": "Clothing with conductive textiles for health care applications has in the last decade been of an upcoming research interest. An advantage with the technique is its suitability in distributed and home health care. The present study investigates the electrical properties of conductive yarns and textile electrodes in contact with human skin, thus representing a real ECG-registration situation. The yarn measurements showed a pure resistive characteristic proportional to the length. The electrodes made of pure stainless steel (electrode A) and 20% stainless steel/80% polyester (electrode B) showed acceptable stability of electrode potentials, the stability of A was better than that of B. The electrode made of silver plated copper (electrode C) was less stable. The electrode impedance was lower for electrodes A and B than that for electrode C. From an electrical properties point of view we recommend to use electrodes of type A to be used in intelligent textile medical applications.", "title": "" }, { "docid": "fa77602ff5be73ab040bab5c7a23d2a6", "text": "BACKGROUND\nPeriodontal diseases that lead to the destruction of periodontal tissues--including periodontal ligament (PDL), cementum, and bone--are a major cause of tooth loss in adults and are a substantial public-health burden worldwide. PDL is a specialised connective tissue that connects cementum and alveolar bone to maintain and support teeth in situ and preserve tissue homoeostasis. We investigated the notion that human PDL contains stem cells that could be used to regenerate periodontal tissue.\n\n\nMETHODS\nPDL tissue was obtained from 25 surgically extracted human third molars and used to isolate PDL stem cells (PDLSCs) by single-colony selection and magnetic activated cell sorting. Immunohistochemical staining, RT-PCR, and northern and western blot analyses were used to identify putative stem-cell markers. Human PDLSCs were transplanted into immunocompromised mice (n=12) and rats (n=6) to assess capacity for tissue regeneration and periodontal repair. Findings PDLSCs expressed the mesenchymal stem-cell markers STRO-1 and CD146/MUC18. Under defined culture conditions, PDLSCs differentiated into cementoblast-like cells, adipocytes, and collagen-forming cells. When transplanted into immunocompromised rodents, PDLSCs showed the capacity to generate a cementum/PDL-like structure and contribute to periodontal tissue repair.\n\n\nINTERPRETATION\nOur findings suggest that PDL contains stem cells that have the potential to generate cementum/PDL-like tissue in vivo. Transplantation of these cells, which can be obtained from an easily accessible tissue resource and expanded ex vivo, might hold promise as a therapeutic approach for reconstruction of tissues destroyed by periodontal diseases.", "title": "" }, { "docid": "a04387daa5541ba2a36511d641820392", "text": "Earlier work demonstrates the promise of deeplearning-based approaches for point cloud segmentation; however, these approaches need to be improved to be practically useful. To this end, we introduce a new model SqueezeSegV2 that is more robust to dropout noise in LiDAR point clouds. With improved model structure, training loss, batch normalization and additional input channel, SqueezeSegV2 achieves significant accuracy improvement when trained on real data. Training models for point cloud segmentation requires large amounts of labeled point-cloud data, which is expensive to obtain. To sidestep the cost of collection and annotation, simulators such as GTA-V can be used to create unlimited amounts of labeled, synthetic data. However, due to domain shift, models trained on synthetic data often do not generalize well to the real world. We address this problem with a domainadaptation training pipeline consisting of three major components: 1) learned intensity rendering, 2) geodesic correlation alignment, and 3) progressive domain calibration. When trained on real data, our new model exhibits segmentation accuracy improvements of 6.0-8.6% over the original SqueezeSeg. When training our new model on synthetic data using the proposed domain adaptation pipeline, we nearly double test accuracy on real-world data, from 29.0% to 57.4%. Our source code and synthetic dataset will be open-sourced.", "title": "" }, { "docid": "6cad42e549f449c7156b0a07e2e02726", "text": "Fog computing extends the cloud computing paradigm by placing resources close to the edges of the network to deal with the upcoming growth of connected devices. Smart city applications, such as health monitoring and predictive maintenance, will introduce a new set of stringent requirements, such as low latency, since resources can be requested on-demand simultaneously by multiple devices at different locations. It is then necessary to adapt existing network technologies to future needs and design new architectural concepts to help meet these strict requirements. This article proposes a fog computing framework enabling autonomous management and orchestration functionalities in 5G-enabled smart cities. Our approach follows the guidelines of the European Telecommunications Standards Institute (ETSI) NFV MANO architecture extending it with additional software components. The contribution of our work is its fully-integrated fog node management system alongside the foreseen application layer Peer-to-Peer (P2P) fog protocol based on the Open Shortest Path First (OSPF) routing protocol for the exchange of application service provisioning information between fog nodes. Evaluations of an anomaly detection use case based on an air monitoring application are presented. Our results show that the proposed framework achieves a substantial reduction in network bandwidth usage and in latency when compared to centralized cloud solutions.", "title": "" }, { "docid": "646da3ab593c2a8d5db26cdf7844d9da", "text": "To maximize survival and reproductive success, primates evolved the tendency to tell lies and the ability to accurately detect them. Despite the obvious advantage of detecting lies accurately, conscious judgments of veracity are only slightly more accurate than chance. However, findings in forensic psychology, neuroscience, and primatology suggest that lies can be accurately detected when less-conscious mental processes (as opposed to more-conscious mental processes) are used. We predicted that observing someone tell a lie would automatically activate cognitive concepts associated with deception, and observing someone tell the truth would activate concepts associated with truth. In two experiments, we demonstrated that indirect measures of deception detection are significantly more accurate than direct measures. These findings provide a new lens through which to reconsider old questions and approach new investigations of human lie detection.", "title": "" }, { "docid": "3907bddf6a56b96c4e474d46ddd04359", "text": "The aim of this review is to discuss the accumulating evidence that suggests that grape extracts and purified grape polyphenols possess a diverse array of biological actions and may be beneficial in the prevention of some inflammatory-mediated diseases including cardiovascular disease. The active components from grape extracts, which include the grape seed, grape skin, and grape juice, that have been identified thus far include polyphenols such as resveratrol, phenolic acids, anthocyanins, and flavonoids. All possess potent antioxidant properties and have been shown to decrease low-density lipoprotein-cholesterol oxidation and platelet aggregation. These compounds also possess a range of additional cardioprotective and vasoprotective properties including antiatherosclerotic, antiarrhythmic, and vasorelaxation actions. Although not exclusive, antioxidant properties of grape polyphenols are likely to be central to their mechanism(s) of action, which also include cellular signaling mechanisms and interactions at the genomic level. This review discusses some of the evidence favoring the consumption of grape extracts rich in polyphenols in the prevention of cardiovascular disease. Consumption of grape and grape extracts and/or grape products such as red wine may be beneficial in preventing the development of chronic degenerative diseases such as cardiovascular disease.", "title": "" } ]
scidocsrr
539a0b14380f56c1368896c9ed40c896
A Family of Isolated Buck-Boost Converters Based on Semiactive Rectifiers for High-Output Voltage Applications
[ { "docid": "8d495d909cb2a93929b34d85c371693b", "text": "1 This work is supported by Philips Research, Briarcliff Manor, NY, through Colorado Power Electronics Center Abstract – Single-switch step-up/step-down converters, such as the buck-boost, SEPIC and Cuk, have relatively high voltage and current stresses on components compared to the buck or the boost converter. A buck-boost converter with two independently controlled switches can work as a boost or as a buck converter depending on input-output conditions, and thus achieves lower stresses on components. Using the converter synthesis method from [1], families of two-switch buck-boost converters are generated, including several new converter topologies. The two-switch buck-boost converters are evaluated and compared in terms of component stresses in universal-input power-factor-corrector applications. Among them, one new two-switch converter is identified that has low inductor conduction losses (50% of the boost converter), low inductor volt-seconds (72% of the boost converter), and about the same switch conduction losses and voltage stresses as the boost converter.", "title": "" } ]
[ { "docid": "37fa4ea4d9002483dd2231d215806955", "text": "This paper proposes an Encryption Scheme that possess the following property : An adversary, who knows the encryption algorithm and is given the cyphertext, cannot obtain any information about the clear-text.\n Any implementation of a Public Key Cryptosystem, as proposed by Diffie and Hellman in [8], should possess this property.\n Our Encryption Scheme follows the ideas in the number theoretic implementations of a Public Key Cryptosystem due to Rivest, Shamir and Adleman [13], and Rabin [12].", "title": "" }, { "docid": "8b822d4c223d38d32c374079952f57b5", "text": "Female online shoppers: examining the mediating roles of e-satisfaction and e-trust on e-loyalty development Shihyu Chou Chi-Wen Chen Jiun-You Lin Article information: To cite this document: Shihyu Chou Chi-Wen Chen Jiun-You Lin , (2015),\"Female online shoppers: examining the mediating roles of e-satisfaction and e-trust on e-loyalty development\", Internet Research, Vol. 25 Iss 4 pp. Permanent link to this document: http://dx.doi.org/10.1108/IntR-01-2014-0006", "title": "" }, { "docid": "6aa4b1064833af0c91d16af28136e7e4", "text": "Recently, supervised classification has been shown to work well for the task of speech separation. We perform an in-depth evaluation of such techniques as a front-end for noise-robust automatic speech recognition (ASR). The proposed separation front-end consists of two stages. The first stage removes additive noise via time-frequency masking. The second stage addresses channel mismatch and the distortions introduced by the first stage; a non-linear function is learned that maps the masked spectral features to their clean counterpart. Results show that the proposed front-end substantially improves ASR performance when the acoustic models are trained in clean conditions. We also propose a diagonal feature discriminant linear regression (dFDLR) adaptation that can be performed on a per-utterance basis for ASR systems employing deep neural networks and HMM. Results show that dFDLR consistently improves performance in all test conditions. Surprisingly, the best average results are obtained when dFDLR is applied to models trained using noisy log-Mel spectral features from the multi-condition training set. With no channel mismatch, the best results are obtained when the proposed speech separation front-end is used along with multi-condition training using log-Mel features followed by dFDLR adaptation. Both these results are among the best on the Aurora-4 dataset.", "title": "" }, { "docid": "330329a7ce02b89373b935c99e4f1471", "text": "Feature extraction, deformation handling, occlusion handling, and classification are four important components in pedestrian detection. Existing methods learn or design these components either individually or sequentially. The interaction among these components is not yet well explored. This paper proposes that they should be jointly learned in order to maximize their strengths through cooperation. We formulate these four components into a joint deep learning framework and propose a new deep network architecture. By establishing automatic, mutual interaction among components, the deep model achieves a 9% reduction in the average miss rate compared with the current best-performing pedestrian detection approaches on the largest Caltech benchmark dataset.", "title": "" }, { "docid": "efc48edab4d039b94a87d473e0158033", "text": "The classifier built from a data set with a highly skewed class distribution generally predicts the more frequently occurring classes much more often than the infrequently occurring classes. This is largely due to the fact that most classifiers are designed to maximize accuracy. In many instances, such as for medical diagnosis, this classification behavior is unacceptable because the minority class is the class of primary interest (i.e., it has a much higher misclassification cost than the majority class). In this paper we compare three methods for dealing with data that has a skewed class distribution and nonuniform misclassification costs. The first method incorporates the misclassification costs into the learning algorithm while the other two methods employ oversampling or undersampling to make the training data more balanced. In this paper we empirically compare the effectiveness of these methods in order to determine which produces the best overall classifier—and under what circumstances.", "title": "" }, { "docid": "3e9bd02dc75d8cef53e79736bc7e41c3", "text": "Abstract The increased interaction with multimedia content h as been recognized as a significant factor to improve learners’ learning outcomes. As a result, i nteractive video lectures are increasingly being adopted in digital learning contexts for increasing i teractivity. However, conventional video lecture lacks interactive learning activities (ILAs) that a re an indispensable component of interactivity. Interactive video lectures can provide learners opp ortunities to obtain timely constructive support to produce effective learning outcomes because of ILAs . In order to carefully design and create ILAs for effective learning, instructors need to invest subs tantial efforts for conceiving the content and interactions of ILAs. This study proposed an approa ch to design the content of ILAs by leveraging collective intelligence (CI) gathered from the disc u sion forums specifically related to the content o f video lectures. When learners exercised ILAs, meani ngful interactions by speaking and gesturing worked as learning support to improve comprehension of learning materials. To evaluate the effects of the CI-based ILAs, an experiment was conducted with 90 university students, who were randomly and equally assigned to three different groups (i.e., e mbodied interactive, non-embodied interactive, and conventional video lectures). The results show that learners who learned with the embodied interactive video lecture performed better in comprehension and retention of learning contents than the other two counter groups. The findings also revealed that thi s approach does not impose any additional cognitive load on learners. The design guidelines derived in this study can serve as reference for instructors t o create interactive video lectures with CI-based ILA s in digital learning contexts.The increased interaction with multimedia content h as been recognized as a significant factor to improve learners’ learning outcomes. As a result, i nteractive video lectures are increasingly being adopted in digital learning contexts for increasing i teractivity. However, conventional video lecture lacks interactive learning activities (ILAs) that a re an indispensable component of interactivity. Interactive video lectures can provide learners opp ortunities to obtain timely constructive support to produce effective learning outcomes because of ILAs . In order to carefully design and create ILAs for effective learning, instructors need to invest subs tantial efforts for conceiving the content and interactions of ILAs. This study proposed an approa ch to design the content of ILAs by leveraging collective intelligence (CI) gathered from the disc u sion forums specifically related to the content o f video lectures. When learners exercised ILAs, meani ngful interactions by speaking and gesturing worked as learning support to improve comprehension of learning materials. To evaluate the effects of the CI-based ILAs, an experiment was conducted with 90 university students, who were randomly and equally assigned to three different groups (i.e., e mbodied interactive, non-embodied interactive, and conventional video lectures). The results show that learners who learned with the embodied interactive video lecture performed better in comprehension and retention of learning contents than the other two counter groups. The findings also revealed that thi s approach does not impose any additional cognitive load on learners. The design guidelines derived in this study can serve as reference for instructors t o create interactive video lectures with CI-based ILA s in digital learning contexts.", "title": "" }, { "docid": "77906a8aebb33860423077ac66dc6552", "text": "If a physical object has a smooth or piecewise smooth boundary, its images obtained by cameras in varying positions undergo smooth apparent deformations. These deformations are locally well approximated by affine transforms of the image plane. In consequence the solid object recognition problem has often been led back to the computation of affine invariant image local features. Such invariant features could be obtained by normalization methods, but no fully affine normalization method exists for the time being. Even scale invariance is dealt with rigorously only by the scaleinvariant feature transform (SIFT) method. By simulating zooms out and normalizing translation and rotation, SIFT is invariant to four out of the six parameters of an affine transform. The method proposed in this paper, affine-SIFT (ASIFT), simulates all image views obtainable by varying the two camera axis orientation parameters, namely, the latitude and the longitude angles, left over by the SIFT method. Then it covers the other four parameters by using the SIFT method itself. The resulting method will be mathematically proved to be fully affine invariant. Against any prognosis, simulating all views depending on the two camera orientation parameters is feasible with no dramatic computational load. A two-resolution scheme further reduces the ASIFT complexity to about twice that of SIFT. A new notion, the transition tilt, measuring the amount of distortion from one view to another, is introduced. While an absolute tilt from a frontal to a slanted view exceeding 6 is rare, much higher transition tilts are common when two slanted views of an object are compared (see Figure 1). The attainable transition tilt is measured for each affine image comparison method. The new method permits one to reliably identify features that have undergone transition tilts of large magnitude, up to 36 and higher. This fact is substantiated by many experiments which show that ASIFT significantly outperforms the state-of-the-art methods SIFT, maximally stable extremal region (MSER), Harris-affine, and Hessian-affine.", "title": "" }, { "docid": "2d73a7ab1e5a784d4755ed2fe44078db", "text": "Over the last years, many papers have been published about how to use machine learning for classifying postings on microblogging platforms like Twitter, e.g., in order to assist users to reach tweets that interest them. Typically, the automatic classification results are then evaluated against a gold standard classification which consists of either (i) the hashtags of the tweets' authors, or (ii) manual annotations of independent human annotators. In this paper, we show that there are fundamental differences between these two kinds of gold standard classifications, i.e., human annotators are more likely to classify tweets like other human annotators than like the tweets' authors. Furthermore, we discuss how these differences may influence the evaluation of automatic classifications, like they may be achieved by Latent Dirichlet Allocation (LDA). We argue that researchers who conduct machine learning experiments for tweet classification should pay particular attention to the kind of gold standard they use. One may even argue that hashtags are not appropriate as a gold standard for tweet classification.", "title": "" }, { "docid": "d563b025b084b53c30afba4211870f2d", "text": "Collaborative filtering (CF) techniques recommend items to users based on their historical ratings. In real-world scenarios, user interests may drift over time since they are affected by moods, contexts, and pop culture trends. This leads to the fact that a user’s historical ratings comprise many aspects of user interests spanning a long time period. However, at a certain time slice, one user’s interest may only focus on one or a couple of aspects. Thus, CF techniques based on the entire historical ratings may recommend inappropriate items. In this paper, we consider modeling user-interest drift over time based on the assumption that each user has multiple counterparts over temporal domains and successive counterparts are closely related. We adopt the cross-domain CF framework to share the static group-level rating matrix across temporal domains, and let user-interest distribution over item groups drift slightly between successive temporal domains. The derived method is based on a Bayesian latent factor model which can be inferred using Gibbs sampling. Our experimental results show that our method can achieve state-of-the-art recommendation performance as well as explicitly track and visualize user-interest drift over time.", "title": "" }, { "docid": "1203822bf82dcd890e7a7a60fb282ce5", "text": "Individuals with psychosocial problems such as social phobia or feelings of loneliness might be vulnerable to excessive use of cyber-technological devices, such as smartphones. We aimed to determine the relationship of smartphone addiction with social phobia and loneliness in a sample of university students in Istanbul, Turkey. Three hundred and sixty-seven students who owned smartphones were given the Smartphone Addiction Scale (SAS), UCLA Loneliness Scale (UCLA-LS), and Brief Social Phobia Scale (BSPS). A significant difference was found in the mean SAS scores (p < .001) between users who declared that their main purpose for smartphone use was to access social networking sites. The BSPS scores showed positive correlations with all six subscales and with the total SAS scores. The total UCLA-LS scores were positively correlated with daily life disturbance, positive anticipation, cyber-oriented relationship, and total scores on the SAS. In regression analyses, total BSPS scores were significant predictors for SAS total scores (β = 0.313, t = 5.992, p < .001). In addition, BSPS scores were significant predictors for all six SAS subscales, whereas UCLA-LS scores were significant predictors for only cyber-oriented relationship subscale scores on the SAS (β = 0.130, t = 2.416, p < .05). The results of this study indicate that social phobia was associated with the risk for smartphone addiction in young people. Younger individuals who primarily use their smartphones to access social networking sites also have an excessive pattern of smartphone use. ARTICLE HISTORY Received 12 January 2016 Accepted 19 February 2016", "title": "" }, { "docid": "23ac5c4adf61fad813869882c4d2e7b6", "text": "Most network simulators do not support security features. In this paper, we introduce a new security module for OMNET++ that implements the IEEE 802.15.4 security suite. This module, developed using the C++ language, can simulate all devices and sensors that implement the IEEE 802.15.4 standard. The OMNET++ security module is also evaluated in terms of quality of services in the presence of physical hop attacks. Results show that our module is reliable and can safely be used by researchers.", "title": "" }, { "docid": "47cc9c26f213404cc54b162896cdcc25", "text": "Rupture of the distal biceps tendon is a relatively uncommon clinical entity. Typically, patients are middle-aged males who experience a sudden forced extension against an actively contracting biceps muscle. Patients usually describe a “pop” or tearing sensation in the anterior elbow region. The dominant extremity is involved in a majority of cases. While the etiology is usually traumatic, some believe that distal tendon rupture occurs through an area of prior tendon degeneration. Sudden pain, weakness with supination and elbow flexion, and deformity at the distal biceps tendon insertion are the common presenting symptoms. Diagnosis is made by history and physical findings. While plain x-rays are not usually helpful, magnetic resonance image (MRI) scans have been used to assist in diagnosing difficult cases and partial tendon ruptures. The best results are achieved when early reattachment of the tendon to the radial tuberosity is performed. The authors’ preferred surgical approach is a modified two-incision technique with primary reattachment to the radial tuberosity, but use of a single anterior incision has been described. Complications include radial nerve injury and radioulnar synostosis. Postoperative management involves elbow splinting in a position of flexion with gradual range of motion exercises 2–4 weeks following repair with a return to full activities including lifting by 4–5 months. Excellent results are achieved in most cases with this approach.", "title": "" }, { "docid": "e9d853505b1769992f6d7ffe5a0523e5", "text": "In this article we present Tuio, a simple yet versatile protocol designed specifically to meet the requirements of table-top tangible user interfaces. Inspired by the idea of interconnecting various existing table interfaces such as the reacTable* [1], being developed in Barcelona and the tDesk [2] from Bielefeld, this protocol defines common properties of controller objects on the table surface as well as of finger and hand gestures performed by the user. Currently this protocol has been implemented within a fiducial marker-based computer vision engine developed for the reacTable* project. This fast and robust computer vision engine is based on the original d-touch concept [3], which is also included as an alternative to the newer fiducial tracking engine. The computer vision framework has been implemented on various standard platforms and can be extended with additional sensor components. We are currently working on the tracking of finger-tips for gestural control within the table interface. The Tuio protocol has been implemented using OpenSound Control [4] and is therefore usable on any platform supporting this protocol. At the moment we have working implementations for Java, C++, PureData, Max/MSP, SuperCollider and Flash. 1 General Observations This protocol definition is an attempt to provide a general and versatile communication interface between tangible table-top controller interfaces and underlying application layers. It was designed to meet the needs of table-top interactive surfaces, where the user is able to manipulate a set of objects. These objects are tracked by a sensor system and can be identified and located in position and orientation on the table surface. Additionally we defined a special cursor object, which doesn’t have a unique ID and doesn’t provide rotation information. The protocol’s flexible design offers methods for selecting which information will be sent. This flexibility is provided without affecting existing interfaces, or requiring re-implementation to maintain compatibility. 2 Implementation Details The Tuio protocol defines two main classes of messages: set messages and alive messages. Set messages are used to communicate information about an object’s state such as position, orientation, and other recognized states. Alive messages indicate the current set of objects present on the surface using a list of unique session IDs. To avoid possible errors evolving out of packet loss, no explicit add or remove messages are included in the Tuio-protocol. The receiver deduces object lifetimes by examining the difference between sequential alive messages. In addition to set and alive messages, fseq messages are defined to uniquely tag each update step with a unique frame sequence ID. To summarize: – object parameters are sent after state change using a set message – on object removal an alive message is sent – the client deduces object addition and removal from set and alive messages – fseq messages associate a unique frame id with a set of set and alive messages 2.1 Efficiency & Reliability In order to provide low latency communication our implementation of the Tuio protocol uses UDP transport. When using UDP the possibility exists that some packets will be lost. Therefore, our implementation of the Tuio protocol includes redundant information to correct possible lost packets, while maintaining an efficient usage of the channel. An alternative TCP connection would assure the secure transport but at the cost of higher latency. For efficiency reasons set messages are packed into a bundle to completely use the space provided by a UDP packet. Each bundle also includes a redundant alive message to allow for the possibility of packet loss. For larger object sets a series of packets, each including an alive message are transmitted. When the surface is quiescent, emphalive messages are sent at a fixed rate dependent on the channel quality, for example once every second, to ensure that the receiver eventually acquires a consistent view of the set of alive objects. The state of each alive but unchanged object is periodically resent with additional set messages. This redundant information is resent at a lower rate, and includes only a subset of the unchanged objects at each update. The subset is continuously cycled so that each object is periodically addressed. Finally, each packet is marked with a frame sequence ID (fseq) message: an increasing number which is the same for all packets containing data acquired at the same time. This allows the client to maintain consistency by identifying and dropping out-of-order packets . To summarize: – set messages are bundled to fully utilize UDP packets – each bundle of set messages includes an alive message containing the session IDs of all currently alive tangible objects – when the surface is quiescent the alive message is resent periodically – the state of a cycling subset of alive but unchanged objects is continuously resent via redundant set messages – each bundle contains a frame sequence (fseq) message It should be noted that the retransmission semantics described here are only one possible interpretation of the protocol. Other possible methods include: (1) weighting the frequency of retransmission according to recency of value changes using a logarithmic back-off scheme and, (2) trimming the set of values to be retransmitted using asynchronous acknowledgments from the client.", "title": "" }, { "docid": "6abc9ea6e1d5183e589194db8520172c", "text": "Smart decision making at the tactical level is important for Artificial Intelligence (AI) agents to perform well in the domain of real-time strategy (RTS) games. This paper presents a Bayesian model that can be used to predict the outcomes of isolated battles, as well as predict what units are needed to defeat a given army. Model parameters are learned from simulated battles, in order to minimize the dependency on player skill. We apply our model to the game of StarCraft, with the end-goal of using the predictor as a module for making high-level combat decisions, and show that the model is capable of making accurate predictions.", "title": "" }, { "docid": "dd8c61b00519117ec153b3938f4c6e69", "text": "The characteristics of athletic shoes have been described with terms like cushioning, stability, and guidance.1,2 Despite many years of effort to optimize athletic shoe construction, the prevalence of running-related lower extremity injuries has not significantly declined; however, athletic performance has reached new heights.3-5 Criteria for optimal athletic shoe construction have been proposed, but no clear consensus has emerged.6-8 Given the unique demands of various sports, sportspecific shoe designs may simultaneously increase performance and decrease injury incidence.9-11 The purpose of this report is to provide an overview of current concepts in athletic shoe design, with emphasis on running shoes, so that athletic trainers and therapists (ATs) can assist their patients in selection of an appropriate shoe design.", "title": "" }, { "docid": "4d46796427b515f24ced47acf14f041e", "text": "Aripiprazole is a novel atypical antipsychotic for the treatment of schizophrenia. It is a D2 receptor partial agonist with partial agonist activity at 5-HT1A receptors and antagonist activity at 5-HT2A receptors. The long-term efficacy and safety of aripiprazole (30 mg/d) relative to haloperidol (10 mg/d) were investigated in two 52-wk, randomized, double-blind, multicentre studies (using similar protocols which were prospectively identified to be pooled for analysis) in 1294 patients in acute relapse with a diagnosis of chronic schizophrenia and who had previously responded to antipsychotic medications. Aripiprazole demonstrated long-term efficacy that was comparable or superior to haloperidol across all symptoms measures, including significantly greater improvements for PANSS negative subscale scores and MADRS total score (p<0.05). The time to discontinuation for any reason was significantly greater with aripiprazole than with haloperidol (p=0.0001). Time to discontinuation due to adverse events or lack of efficacy was significantly greater with aripiprazole than with haloperidol (p=0.0001). Aripiprazole was associated with significantly lower scores on all extrapyramidal symptoms assessments than haloperidol (p<0.001). In summary, aripiprazole demonstrated efficacy equivalent or superior to haloperidol with associated benefits for safety and tolerability. Aripiprazole represents a promising new option for the long-term treatment of schizophrenia.", "title": "" }, { "docid": "f749c2ac068000ad489904e56d0fdf70", "text": "–- Line maze solving algorithm is an algorithm used to solve a maze made of lines to be traced by a mobile robot. But it is designed only for lines with right angle intersection or turn. Meanwhile in real world, there are also curved and zig-zag turn. In this work, this algorithm is tested for curved and zig-zag track by using Arduino Uno. It turns out that line maze solving algorithm still has some deficiencies, even for the maze without curved and zig-zag line. Moreover, for the curved and zig-zag track, algorithm improvements are needed. Therefore, some of existing functions has been modified and replaced, and one new function added. When the improvements have been done, new algorithm is obtained. Then the test is done again on the mobile robot in a line maze with curved and zig-zag track. The result has proven that the new algorithm has successfully solved the maze.", "title": "" }, { "docid": "8f3c861c91d0284a891d3531e69014fc", "text": "Automatic deception detection is an important task that has gained momentum in computational linguistics due to its potential applications. In this paper, we propose a simple yet tough to beat multi-modal neural model for deception detection. By combining features from different modalities such as video, audio, and text along with Micro-Expression features, we show that detecting deception in real life videos can be more accurate. Experimental results on a dataset of real-life deception videos show that our model outperforms existing techniques for deception detection with an accuracy of 96.14% and ROC-AUC of 0.9799.", "title": "" }, { "docid": "fda90903b8466d33354ea6ea2c5f1c11", "text": "Hydrogels are three-dimensional cross-linked polymer network that can respond to the fluctuations of the environmental stimuli. These biomaterials can incorporate large quantum of biological fluids and swell. When swelled, they are soft & rubbery and resemble the living tissue, exhibiting excellent biocompatibility. Today, drug delivery experience several challenges where hydrogel could be one potential answer to those. Thanks to the unique properties of hydrogel for which they are widely exposed to different biomedical fields. Hence the preparation techniques of hydrogel biomaterial and the evaluation of the properties are of utmost significance. Literature reveals that this three dimensional architecture could be homo-polymeric, co-polymeric, semiinterpenetrating and interpenetrating polymer networks (IPN) based on preparation methods. Polymeric blends like semi-IPN have also been investigated to satisfy the specific needs of biomedical field. Such blends have shown superior performances over individual polymers. Unique biocompatibility, flexible methods of synthesis and tailor able physical properties have made the hydrogels to be used as a drug delivery device to tissue engineering scaffolds. As scaffolds they should provide structural integrity like tissue constructs and as a drug carrier it should have sufficient mechanical strength to control and protect the drug and proteins until they are delivered to the specific sites of the biological system. Hence, the evaluation of swelling, mechanical and biocompatible properties consider more attention before the hydrogels are applied. In this review article an attempt has been made to describe the available methods of hydrogel synthesis along with their inevitable properties.", "title": "" }, { "docid": "406c07534f083ebb4a71951a29292f2d", "text": "Recurrent neural networks (RNNs) are capable of modeling the temporal dynamics of complex sequential information. However, the structures of existing RNN neurons mainly focus on controlling the contributions of current and historical information but do not explore the different importance levels of different elements in an input vector of a time slot. We propose adding a simple yet effective Element-wiseAttention Gate (EleAttG) to an RNN block (e.g., all RNN neurons in a network layer) that empowers the RNN neurons to have the attentiveness capability. For an RNN block, an EleAttG is added to adaptively modulate the input by assigning different levels of importance, i.e., attention, to each element/dimension of the input. We refer to an RNN block equipped with an EleAttG as an EleAtt-RNN block. Specifically, the modulation of the input is content adaptive and is performed at fine granularity, being element-wise rather than input-wise. The proposed EleAttG, as an additional fundamental unit, is general and can be applied to any RNN structures, e.g., standard RNN, Long Short-Term Memory (LSTM), or Gated Recurrent Unit (GRU). We demonstrate the effectiveness of the proposed EleAtt-RNN by applying it to the action recognition tasks on both 3D human skeleton data and RGB videos. Experiments show that adding attentiveness through EleAttGs to RNN blocks significantly boosts the power of RNNs.", "title": "" } ]
scidocsrr
093f2e084435e6cca140c173ff96cad9
A Model Driven Approach Accelerating Ontology-based IoT Applications Development
[ { "docid": "49e824c73b62d4c05b28fbd46fde1a28", "text": "The Advent of Internet-of-Things (IoT) paradigm has brought exciting opportunities to solve many real-world problems. IoT in industries is poised to play an important role not only to increase productivity and efficiency but also to improve customer experiences. Two main challenges that are of particular interest to industry include: handling device heterogeneity and getting contextual information to make informed decisions. These challenges can be addressed by IoT along with proven technologies like the Semantic Web. In this paper, we present our work, SQenIoT: a Semantic Query Engine for Industrial IoT. SQenIoT resides on a commercial product and offers query capabilities to retrieve information regarding the connected things in a given facility. We also propose a things query language, targeted for resource-constrained gateways and non-technical personnel such as facility managers. Two other contributions include multi-level ontologies and mechanisms for semantic tagging in our commercial products. The implementation details of SQenIoT and its performance results are also presented.", "title": "" }, { "docid": "a53caf0e12e25aadb812e9819fa41e27", "text": "Abstact This paper does not pretend either to transform completely the ontological art in engineering or to enumerate xhaustively the complete set of works that has been reported in this area. Its goal is to clarify to readers interested in building ontologies from scratch, the activities they should perform and in which order, as well as the set of techniques to be used in each phase of the methodology. This paper only presents a set of activities that conform the ontology development process, a life cycle to build ontologies based in evolving prototypes, and METHONTOLOGY, a well-structured methodology used to build ontologies from scratch. This paper gathers the experience of the authors on building an ontology in the domain of chemicals.", "title": "" } ]
[ { "docid": "34e21b8051f3733c077d7087c035be2f", "text": "This paper deals with the synthesis of a speed control strategy for a DC motor drive based on an output feedback backstepping controller. The backstepping method takes into account the non linearities of the system in the design control law and leads to a system asymptotically stable in the context of Lyapunov theory. Simulated results are displayed to validate the feasibility and the effectiveness of the proposed strategy.", "title": "" }, { "docid": "b382f93bb45e7324afaff9950d814cf3", "text": "OBJECTIVE\nA vocational rehabilitation program (occupational therapy and supported employment) for promoting the return to the community of long-stay persons with schizophrenia was established at a psychiatric hospital in Japan. The purpose of the study was to evaluate the program in terms of hospitalization rates, community tenure, and social functioning with each individual serving as his or her control.\n\n\nMETHODS\nFifty-two participants, averaging 8.9 years of hospitalization, participated in the vocational rehabilitation program consisting of 2 to 6 hours of in-hospital occupational therapy for 6 days per week and a post-discharge supported employment component. Seventeen years after the program was established, a retrospective study was conducted to evaluate the impact of the program on hospitalizations, community tenure, and social functioning after participants' discharge from hospital, using an interrupted time-series analysis. The postdischarge period was compared with the period from onset of illness to the index discharge on the three outcome variables.\n\n\nRESULTS\nAfter discharge from the hospital, the length of time spent by participants out of the hospital increased, social functioning improved, and risk of hospitalization diminished by 50%. Female participants and those with supportive families spent more time out of the hospital than participants who were male or came from nonsupportive families.\n\n\nCONCLUSION\nA combined program of occupational therapy and supported employment was successful in a Japanese psychiatric hospital when implemented with the continuing involvement of a clinical team. Interventions that improve the emotional and housing supports provided to persons with schizophrenia by their families are likely to enhance the outcome of vocational services.", "title": "" }, { "docid": "9363421f524b4990c5314298a7e56e80", "text": "hree years ago, researchers at the secretive Google X lab in Mountain View, California, extracted some 10 million still images from YouTube videos and fed them into Google Brain — a network of 1,000 computers programmed to soak up the world much as a human toddler does. After three days looking for recurring patterns, Google Brain decided, all on its own, that there were certain repeating categories it could identify: human faces, human bodies and … cats 1. Google Brain's discovery that the Inter-net is full of cat videos provoked a flurry of jokes from journalists. But it was also a landmark in the resurgence of deep learning: a three-decade-old technique in which massive amounts of data and processing power help computers to crack messy problems that humans solve almost intuitively, from recognizing faces to understanding language. Deep learning itself is a revival of an even older idea for computing: neural networks. These systems, loosely inspired by the densely interconnected neurons of the brain, mimic human learning by changing the strength of simulated neural connections on the basis of experience. Google Brain, with about 1 million simulated neurons and 1 billion simulated connections, was ten times larger than any deep neural network before it. Project founder Andrew Ng, now director of the Artificial Intelligence Laboratory at Stanford University in California, has gone on to make deep-learning systems ten times larger again. Such advances make for exciting times in THE LEARNING MACHINES Using massive amounts of data to recognize photos and speech, deep-learning computers are taking a big step towards true artificial intelligence.", "title": "" }, { "docid": "50964057831f482d806bf1c9d46621c0", "text": "We propose a unified framework for deep density models by formally defining density destructors. A density destructor is an invertible function that transforms a given density to the uniform density—essentially destroying any structure in the original density. This destructive transformation generalizes Gaussianization via ICA and more recent autoregressive models such as MAF and Real NVP. Informally, this transformation can be seen as a generalized whitening procedure or a multivariate generalization of the univariate CDF function. Unlike Gaussianization, our destructive transformation has the elegant property that the density function is equal to the absolute value of the Jacobian determinant. Thus, each layer of a deep density can be seen as a shallow density—uncovering a fundamental connection between shallow and deep densities. In addition, our framework provides a common interface for all previous methods enabling them to be systematically combined, evaluated and improved. Leveraging the connection to shallow densities, we also propose a novel tree destructor based on tree densities and an image-specific destructor based on pixel locality. We illustrate our framework on a 2D dataset, MNIST, and CIFAR-10. Code is available on first author’s website.", "title": "" }, { "docid": "d838819f465fb2bde432666d09f25526", "text": "Phenyl boronic acid-functionalized CdSe/ZnS quantum dots (QDs) were synthesized. The modified particles bind nicotinamide adenine dinucleotide (NAD(+)) or 1,4-dihydronicotinamide adenine dinucleotide (NADH). The NAD(+)-functionalized QDs are effectively quenched by an electron transfer process, while the NADH-modified QDs are inefficiently quenched by the reduced cofactor. These properties enable the implementation of the QDs for the fluorescence analysis of ethanol in the presence of alcohol dehydrogenase. The NADH-functionalized QDs were used for the optical analysis of the 1,3,5-trinitrotriazine, RDX explosive, with a detection limit that corresponded to 1 x 10(-10) M. We demonstrate cooperative optical and catalytic functions of the core-shell components of the QDs in the analysis of RDX.", "title": "" }, { "docid": "a172cd697bfcb1f3d2a824bb6a5bb6d1", "text": "Bitcoin provides two incentives for miners: block rewards and transaction fees. The former accounts for the vast majority of miner revenues at the beginning of the system, but it is expected to transition to the latter as the block rewards dwindle. There has been an implicit belief that whether miners are paid by block rewards or transaction fees does not affect the security of the block chain.\n We show that this is not the case. Our key insight is that with only transaction fees, the variance of the block reward is very high due to the exponentially distributed block arrival time, and it becomes attractive to fork a \"wealthy\" block to \"steal\" the rewards therein. We show that this results in an equilibrium with undesirable properties for Bitcoin's security and performance, and even non-equilibria in some circumstances. We also revisit selfish mining and show that it can be made profitable for a miner with an arbitrarily low hash power share, and who is arbitrarily poorly connected within the network. Our results are derived from theoretical analysis and confirmed by a new Bitcoin mining simulator that may be of independent interest.\n We discuss the troubling implications of our results for Bitcoin's future security and draw lessons for the design of new cryptocurrencies.", "title": "" }, { "docid": "6f125b0a1f7de3402c1a6e2af72af506", "text": "The location-based service (LBS) of mobile communication and the personalization of information recommendation are two important trends in the development of electric commerce. However, many previous researches have only emphasized on one of the two trends. In this paper, we integrate the application of LBS with recommendation technologies to present a location-based service recommendation model (LBSRM) and design a prototype system to simulate and measure the validity of LBSRM. Due to the accumulation and variation of preference, in the recommendation model we conduct an adaptive method including long-term and short-term preference adjustment to enhance the result of recommendation. Research results show, with the assessments of relative index, the rate of recommendation precision could be 85.48%. 2008 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "f65d5366115da23c8acd5bce1f4a9887", "text": "Effective crisis management has long relied on both the formal and informal response communities. Social media platforms such as Twitter increase the participation of the informal response community in crisis response. Yet, challenges remain in realizing the formal and informal response communities as a cooperative work system. We demonstrate a supportive technology that recognizes the existing capabilities of the informal response community to identify needs (seeker behavior) and provide resources (supplier behavior), using their own terminology. To facilitate awareness and the articulation of work in the formal response community, we present a technology that can bridge the differences in terminology and understanding of the task between the formal and informal response communities. This technology includes our previous work using domain-independent features of conversation to identify indications of coordination within the informal response community. In addition, it includes a domain-dependent analysis of message content (drawing from the ontology of the formal response community and patterns of language usage concerning the transfer of property) to annotate social media messages. The resulting repository of annotated messages is accessible through our social media analysis tool, Twitris. It allows recipients in the formal response community to sort on resource needs and availability along various dimensions including geography and time. Thus, computation indexes the original social media content and enables complex querying to identify contents, players, and locations. Evaluation of the computed annotations for seeker-supplier behavior with human judgment shows fair to moderate agreement. In addition to the potential benefits to the formal emergency response community regarding awareness of the observations and activities of the informal response community, the analysis serves as a point of reference for evaluating more computationally intensive efforts and characterizing the patterns of language behavior during a crisis.", "title": "" }, { "docid": "6358c534b358d47b6611bd2a5ef95134", "text": "In recent years, query recommendation algorithms have been designed to provide related queries for search engine users. Most of these solutions, which perform extensive analysis of users' search history (or query logs), are largely insufficient for long-tail queries that rarely appear in query logs. To handle such queries, we study a new solution, which makes use of a knowledge base (or KB), such as YAGO and Freebase. A KB is a rich information source that describes how real-world entities are connected. We extract entities from a query, and use these entities to explore new ones in the KB. Those discovered entities are then used to suggest new queries to the user. As shown in our experiments, our approach provides better recommendation results for long-tail queries than existing solutions.", "title": "" }, { "docid": "c891330d08fb8e41d179e803524a1737", "text": "This article deals with active frequency filter design using signalflow graphs. The procedure of multifunctional circuit design that can realize more types of frequency filters is shown. To design a new circuit the Mason – Coates graphs with undirected self-loops have been used. The voltage conveyors whose properties are dual to the properties of the well-known current conveyors have been used as the active element.", "title": "" }, { "docid": "8c95392ab3cc23a7aa4f621f474d27ba", "text": "Designing agile locomotion for quadruped robots often requires extensive expertise and tedious manual tuning. In this paper, we present a system to automate this process by leveraging deep reinforcement learning techniques. Our system can learn quadruped locomotion from scratch using simple reward signals. In addition, users can provide an open loop reference to guide the learning process when more control over the learned gait is needed. The control policies are learned in a physics simulator and then deployed on real robots. In robotics, policies trained in simulation often do not transfer to the real world. We narrow this reality gap by improving the physics simulator and learning robust policies. We improve the simulation using system identification, developing an accurate actuator model and simulating latency. We learn robust controllers by randomizing the physical environments, adding perturbations and designing a compact observation space. We evaluate our system on two agile locomotion gaits: trotting and galloping. After learning in simulation, a quadruped robot can successfully perform both gaits in the real world.", "title": "" }, { "docid": "45be193fe04064886615367dd9225c92", "text": "Automatic electrocardiogram (ECG) beat classification is essential to timely diagnosis of dangerous heart conditions. Specifically, accurate detection of premature ventricular contractions (PVCs) is imperative to prepare for the possible onset of life-threatening arrhythmias. Although many groups have developed highly accurate algorithms for detecting PVC beats, results have generally been limited to relatively small data sets. Additionally, many of the highest classification accuracies (>90%) have been achieved in experiments where training and testing sets overlapped significantly. Expanding the overall data set greatly reduces overall accuracy due to significant variation in ECG morphology among different patients. As a result, we believe that morphological information must be coupled with timing information, which is more constant among patients, in order to achieve high classification accuracy for larger data sets. With this approach, we combined wavelet-transformed ECG waves with timing information as our feature set for classification. We used select waveforms of 18 files of the MIT/BIH arrhythmia database, which provides an annotated collection of normal and arrhythmic beats, for training our neural-network classifier. We then tested the classifier on these 18 training files as well as 22 other files from the database. The accuracy was 95.16% over 93,281 beats from all 40 files, and 96.82% over the 22 files outside the training set in differentiating normal, PVC, and other beats", "title": "" }, { "docid": "f55cd152f6c9e32ed33e4cca1a91cf2e", "text": "This study investigated whether being charged with a child pornography offense is a valid diagnostic indicator of pedophilia, as represented by an index of phallometrically assessed sexual arousal to children. The sample of 685 male patients was referred between 1995 and 2004 for a sexological assessment of their sexual interests and behavior. As a group, child pornography offenders showed greater sexual arousal to children than to adults and differed from groups of sex offenders against children, sex offenders against adults, and general sexology patients. The results suggest child pornography offending is a stronger diagnostic indicator of pedophilia than is sexually offending against child victims. Theoretical and clinical implications are discussed.", "title": "" }, { "docid": "16a18f742d67e4dfb660b4ce3b660811", "text": "Container-based virtualization has become the de-facto standard for deploying applications in data centers. However, deployed containers frequently include a wide-range of tools (e.g., debuggers) that are not required for applications in the common use-case, but they are included for rare occasions such as in-production debugging. As a consequence, containers are significantly larger than necessary for the common case, thus increasing the build and deployment time. CNTR1 provides the performance benefits of lightweight containers and the functionality of large containers by splitting the traditional container image into two parts: the “fat” image — containing the tools, and the “slim” image — containing the main application. At run-time, CNTR allows the user to efficiently deploy the “slim” image and then expand it with additional tools, when and if necessary, by dynamically attaching the “fat” image. To achieve this, CNTR transparently combines the two container images using a new nested namespace, without any modification to the application, the container manager, or the operating system. We have implemented CNTR in Rust, using FUSE, and incorporated a range of optimizations. CNTR supports the full Linux filesystem API, and it is compatible with all container implementations (i.e., Docker, rkt, LXC, systemd-nspawn). Through extensive evaluation, we show that CNTR incurs reasonable performance overhead while reducing, on average, by 66.6% the image size of the Top-50 images available on Docker Hub.", "title": "" }, { "docid": "36e5cd6aac9b0388f67a9584d9bf0bf6", "text": "To learn to program, a novice programmer must understand the dynamic, runtime aspect of program code, a so-called notional machine. Understanding the machine can be easier when it is represented graphically, and tools have been developed to this end. However, these tools typically support only one programming language and do not work in a web browser. In this article, we present the functionality and technical implementation of the two visualization tools. First, the language-agnostic and extensible Jsvee library helps educators visualize notional machines and create expression-level program animations for online course materials. Second, the Kelmu toolkit can be used by ebook authors to augment automatically generated animations, for instance by adding annotations such as textual explanations and arrows. Both of these libraries have been used in introductory programming courses, and there is preliminary evidence that students find the animations useful.", "title": "" }, { "docid": "26029eb824fc5ad409f53b15bfa0dc15", "text": "Detecting contradicting statements is a fundamental and challenging natural language processing and machine learning task, with numerous applications in information extraction and retrieval. For instance, contradictions need to be recognized by question answering systems or multi-document summarization systems. In terms of machine learning, it requires the ability, through supervised learning, to accurately estimate and capture the subtle differences between contradictions and for instance, paraphrases. In terms of natural language processing, it demands a pipeline approach with distinct phases in order to extract as much knowledge as possible from sentences. Previous state-of-the-art systems rely often on semantics and alignment relations. In this work, I move away from the commonly setup used in this domain, and address the problem of detecting contradictions as a classification task. I argue that for such classification, one can heavily rely on features based on those used for detecting paraphrases and recognizing textual entailment, alongside with numeric and string based features. This M.Sc. dissertation provides a system capable of detecting contradictions from a pair of affirmations published across newspapers with both a F1-score and Accuracy of 71%. Furthermore, this M.Sc. dissertation provides an assessment of what are the most informative features for detecting contradictions and paraphrases and infer if exists a correlation between contradiction detection and paraphrase identification.", "title": "" }, { "docid": "bab7a21f903157fcd0d3e70da4e7261a", "text": "The clinical, electrophysiological and morphological findings (light and electron microscopy of the sural nerve and gastrocnemius muscle) are reported in an unusual case of Guillain-Barré polyneuropathy with an association of muscle hypertrophy and a syndrome of continuous motor unit activity. Fasciculation, muscle stiffness, cramps, myokymia, impaired muscle relaxation and percussion myotonia, with their electromyographic accompaniments, were abolished by peripheral nerve blocking, carbamazepine, valproic acid or prednisone therapy. Muscle hypertrophy, which was confirmed by morphometric data, diminished 2 months after the beginning of prednisone therapy. Electrophysiological and nerve biopsy findings revealed a mixed process of axonal degeneration and segmental demyelination. Muscle biopsy specimen showed a marked predominance and hypertrophy of type-I fibres and atrophy, especially of type-II fibres.", "title": "" }, { "docid": "cfddb85a8c81cb5e370fe016ea8d4c5b", "text": "Negative (adverse or threatening) events evoke strong and rapid physiological, cognitive, emotional, and social responses. This mobilization of the organism is followed by physiological, cognitive, and behavioral responses that damp down, minimize, and even erase the impact of that event. This pattern of mobilization-minimization appears to be greater for negative events than for neutral or positive events. Theoretical accounts of this response pattern are reviewed. It is concluded that no single theoretical mechanism can explain the mobilization-minimization pattern, but that a family of integrated process models, encompassing different classes of responses, may account for this pattern of parallel but disparately caused effects.", "title": "" }, { "docid": "ba974ef3b1724a0b31331f558ed13e8e", "text": "The paper presents a simple and effective sketch-based algorithm for large scale image retrieval. One of the main challenges in image retrieval is to localize a region in an image which would be matched with the query image in contour. To tackle this problem, we use the human perception mechanism to identify two types of regions in one image: the first type of region (the main region) is defined by a weighted center of image features, suggesting that we could retrieve objects in images regardless of their sizes and positions. The second type of region, called region of interests (ROI), is to find the most salient part of an image, and is helpful to retrieve images with objects similar to the query in a complicated scene. So using the two types of regions as candidate regions for feature extraction, our algorithm could increase the retrieval rate dramatically. Besides, to accelerate the retrieval speed, we first extract orientation features and then organize them in a hierarchal way to generate global-to-local features. Based on this characteristic, a hierarchical database index structure could be built which makes it possible to retrieve images on a very large scale image database online. Finally a real-time image retrieval system on 4.5 million database is developed to verify the proposed algorithm. The experiment results show excellent retrieval performance of the proposed algorithm and comparisons with other algorithms are also given.", "title": "" }, { "docid": "e7865d56e092376493090efc48a7e238", "text": "Machine learning techniques are applied to the task of context awareness, or inferring aspects of the user's state given a stream of inputs from sensors worn by the person. We focus on the task of indoor navigation and show that, by integrating information from accelerometers, magnetometers and temperature and light sensors, we can collect enough information to infer the user's location. However, our navigation algorithm performs very poorly, with almost a 50% error rate, if we use only the raw sensor signals. Instead, we introduce a \"data cooking\" module that computes appropriate high-level features from the raw sensor data. By introducing these high-level features, we are able to reduce the error rate to 2% in our example environment.", "title": "" } ]
scidocsrr
78b2ef4bd48daf5f99403fbdff835aac
Affective News : The Automated Coding of Sentiment in Political Texts LORI YOUNG and STUART SOROKA
[ { "docid": "fc70a1820f838664b8b51b5adbb6b0db", "text": "This paper presents a method for identifying an opinion with its holder and topic, given a sentence from online news media texts. We introduce an approach of exploiting the semantic structure of a sentence, anchored to an opinion bearing verb or adjective. This method uses semantic role labeling as an intermediate step to label an opinion holder and topic using data from FrameNet. We decompose our task into three phases: identifying an opinion-bearing word, labeling semantic roles related to the word in the sentence, and then finding the holder and the topic of the opinion word among the labeled semantic roles. For a broader coverage, we also employ a clustering technique to predict the most probable frame for a word which is not defined in FrameNet. Our experimental results show that our system performs significantly better than the baseline.", "title": "" }, { "docid": "8a2586b1059534c5a23bac9c1cc59906", "text": "The web contains a wealth of product reviews, but sifting through them is a daunting task. Ideally, an opinion mining tool would process a set of search results for a given item, generating a list of product attributes (quality, features, etc.) and aggregating opinions about each of them (poor, mixed, good). We begin by identifying the unique properties of this problem and develop a method for automatically distinguishing between positive and negative reviews. Our classifier draws on information retrieval techniques for feature extraction and scoring, and the results for various metrics and heuristics vary depending on the testing situation. The best methods work as well as or better than traditional machine learning. When operating on individual sentences collected from web searches, performance is limited due to noise and ambiguity. But in the context of a complete web-based tool and aided by a simple method for grouping sentences into attributes, the results are qualitatively quite useful.", "title": "" } ]
[ { "docid": "72b8d077bb96fcb4d14b09f9bb85132f", "text": "Locomotion at low Reynolds number is not possible with cycles of reciprocal motion, an example being the oscillation of a single pair of rigid paddles or legs. Here, I demonstrate the possibility of swimming with two or more pairs of legs. They are assumed to oscillate collectively in a metachronal wave pattern in a minimal model based on slender-body theory for Stokes flow. The model predicts locomotion in the direction of the traveling wave, as commonly observed along the body of free-swimming crustaceans. The displacement of the body and the swimming efficiency depend on the number of legs, the amplitude, and the phase of oscillations. This study shows that paddling legs with distinct orientations and phases offers a simple mechanism for driving flow.", "title": "" }, { "docid": "b89f999bd27a6cbe1865f8853e384eba", "text": "A rescue crawler robot with flipper arms has high ability to get over rough terrain, but it is hard to control its flipper arms in remote control. The authors aim at development of a semi-autonomous control system for the solution. In this paper, the authors propose a sensor reflexive method that controls these flippers autonomously for getting over unknown steps. Our proposed method is effective in unknown and changeable environment. The authors applied the proposed method to Aladdin, and examined validity of these control rules in unknown environment.", "title": "" }, { "docid": "d4b9d294d60ef001bee3a872b17a75b1", "text": "Real-time formative assessment of student learning has become the subject of increasing attention. Students' textual responses to short answer questions offer a rich source of data for formative assessment. However, automatically analyzing textual constructed responses poses significant computational challenges, and the difficulty of generating accurate assessments is exacerbated by the disfluencies that occur prominently in elementary students' writing. With robust text analytics, there is the potential to accurately analyze students' text responses and predict students' future success. In this paper, we present WriteEval, a hybrid text analytics method for analyzing student-composed text written in response to constructed response questions. Based on a model integrating a text similarity technique with a semantic analysis technique, WriteEval performs well on responses written by fourth graders in response to short-text science questions. Further, it was found that WriteEval's assessments correlate with summative analyses of student performance.", "title": "" }, { "docid": "751524df9e2f7cbec6f3c3f40cd73552", "text": "Syntactic knowledge is widely held to be partially innate, rather than learned. In a classic example, it is sometimes argued that children know the proper use of anaphoric one, although that knowledge could not have been learned from experience. Lidz et al. [Lidz, J., Waxman, S., & Freedman, J. (2003). What infants know about syntax but couldn't have learned: Experimental evidence for syntactic structure at 18 months. Cognition, 89, B65-B73.] pursue this argument, and present corpus and experimental evidence that appears to support it; they conclude that specific aspects of this knowledge must be innate. We demonstrate, contra Lidz et al., that this knowledge may in fact be acquired from the input, through a simple Bayesian learning procedure. The learning procedure succeeds because it is sensitive to the absence of particular input patterns--an aspect of learning that is apparently overlooked by Lidz et al. More generally, we suggest that a prominent form of the \"argument from poverty of the stimulus\" suffers from the same oversight, and is as a result logically unsound.", "title": "" }, { "docid": "a36e20361e39b46d2e161b48596c0fd5", "text": "This paper investigates the issue of interference avoidance in body area networks (BANs). IEEE 802.15 Task Group 6 presented several schemes to reduce such interference, but these schemes are still not proper solutions for BANs. We present a novel distributed TDMA-based beacon interval shifting scheme that reduces interference in the BANs. A design goal of the scheme is to avoid the wakeup period of each BAN coinciding with other networks by employing carrier sensing before a beacon transmission. We analyze the beacon interval shifting scheme and investigate the proper back-off length when the channel is busy. We compare the performance of the proposed scheme with the schemes presented in IEEE 802.15 Task Group 6 using an OMNeT++ simulation. The simulation results show that the proposed scheme has a lower packet loss, energy consumption, and delivery-latency than the schemes of IEEE 802.15 Task Group 6.", "title": "" }, { "docid": "7f7d51fc848cf9e47f492a4e33959fca", "text": "Future wars will be cyber wars and the attacks will be a sturdy amalgamation of cryptography along with malware to distort information systems and its security. The explosive Internet growth facilitates cyber-attacks. Web threats include risks, that of loss of confidential data and erosion of consumer confidence in e-commerce. The emergence of cyber hack jacking threat in the new form in cyberspace is known as ransomware or crypto virus. The locker bot waits for specific triggering events, to become active. It blocks the task manager, command prompt and other cardinal executable files, a thread checks for their existence every few milliseconds, killing them if present. Imposing serious threats to the digital generation, ransomware pawns the Internet users by hijacking their system and encrypting entire system utility files and folders, and then demanding ransom in exchange for the decryption key it provides for release of the encrypted resources to its original form. We present in this research, the anatomical study of a ransomware family that recently picked up quite a rage and is called CTB locker, and go on to the hard money it makes per user, and its source C&C server, which lies with the Internet's greatest incognito mode-The Dark Net. Cryptolocker Ransomware or the CTB Locker makes a Bitcoin wallet per victim and payment mode is in the form of digital bitcoins which utilizes the anonymity network or Tor gateway. CTB Locker is the deadliest malware the world ever encountered.", "title": "" }, { "docid": "f2026d9d827c088711875acc56b12b70", "text": "The goal of the study is to formalize the concept of viral marketing (VM) as a close derivative of contagion models from epidemiology. The study examines in detail the two common mathematical models of epidemic spread and their marketing implications. The SIR and SEIAR models of infectious disease spread are examined in detail. From this analysis of the epidemiological foundations along with a review of relevant marketing literature, a marketing model of VM is developed. This study demonstrates the key elements that define viral marketing as a formal marketing concept and the distinctive mechanical features that differ from conventional marketing.", "title": "" }, { "docid": "8d2aeee4064a2d6e65afeaf5330b2c49", "text": "In this paper we discuss verification and validation of simulation models. Four different approaches to deciding model validity are described; two different paradigms that relate verification and validation to the model development process are presented; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; a way to document results is given; a recommended procedure for model validation is presented; and accreditation is briefly discussed.", "title": "" }, { "docid": "32aab68579ffc866a187824bc502efc3", "text": "This paper presents an automatic people counting system based on face detection, where the number of people passing through a gate or door is counted by setting a video camera. The basic idea is to first use the frame difference to detect the rough edges of moving people and then use the chromatic feature to locate the people face. Based on NCC (Normalized Color Coordinates) color space, the initial face candidate is obtained by detecting the skin color region and then the face feature of the candidate is analyzed to determine whether the candidate is real face or not. After face detection, a person will be tracked by following the detected face and then this person will counted if its face touches the counting line. Experimental results show that the proposed people counting algorithm can provide a high count accuracy of 80% on average for the crowded pedestrians.", "title": "" }, { "docid": "349b6f11d60d851a23d2d6f9ebe88e81", "text": "In the hybrid approach, neural network output directly serves as hidden Markov model (HMM) state posterior probability estimates. In contrast to this, in the tandem approach neural network output is used as input features to improve classic Gaussian mixture model (GMM) based emission probability estimates. This paper shows that GMM can be easily integrated into the deep neural network framework. By exploiting its equivalence with the log-linear mixture model (LMM), GMM can be transformed to a large softmax layer followed by a summation pooling layer. Theoretical and experimental results indicate that the jointly trained and optimally chosen GMM and bottleneck tandem features cannot perform worse than a hybrid model. Thus, the question “hybrid vs. tandem” simplifies to optimizing the output layer of a neural network. Speech recognition experiments are carried out on a broadcast news and conversations task using up to 12 feed-forward hidden layers with sigmoid and rectified linear unit activation functions. The evaluation of the LMM layer shows recognition gains over the classic softmax output.", "title": "" }, { "docid": "0e19123e438f39c4404d4bd486348247", "text": "Boundary and edge cues are highly beneficial in improving a wide variety of vision tasks such as semantic segmentation, object recognition, stereo, and object proposal generation. Recently, the problem of edge detection has been revisited and significant progress has been made with deep learning. While classical edge detection is a challenging binary problem in itself, the category-aware semantic edge detection by nature is an even more challenging multi-label problem. We model the problem such that each edge pixel can be associated with more than one class as they appear in contours or junctions belonging to two or more semantic classes. To this end, we propose a novel end-to-end deep semantic edge learning architecture based on ResNet and a new skip-layer architecture where category-wise edge activations at the top convolution layer share and are fused with the same set of bottom layer features. We then propose a multi-label loss function to supervise the fused activations. We show that our proposed architecture benefits this problem with better performance, and we outperform the current state-of-the-art semantic edge detection methods by a large margin on standard data sets such as SBD and Cityscapes.", "title": "" }, { "docid": "527c1e2a78e7f171025231a475a828b9", "text": "Cryptography is the science to transform the information in secure way. Encryption is best alternative to convert the data to be transferred to cipher data which is an unintelligible image or data which cannot be understood by any third person. Images are form of the multimedia data. There are many image encryption schemes already have been proposed, each one of them has its own potency and limitation. This paper presents a new algorithm for the image encryption/decryption scheme which has been proposed using chaotic neural network. Chaotic system produces the same results if the given inputs are same, it is unpredictable in the sense that it cannot be predicted in what way the system's behavior will change for any little change in the input to the system. The objective is to investigate the use of ANNs in the field of chaotic Cryptography. The weights of neural network are achieved based on chaotic sequence. The chaotic sequence generated and forwarded to ANN and weighs of ANN are updated which influence the generation of the key in the encryption algorithm. The algorithm has been implemented in the software tool MATLAB and results have been studied. To compare the relative performance peak signal to noise ratio (PSNR) and mean square error (MSE) are used.", "title": "" }, { "docid": "99d99ce673dfc4a6f5bf3e7d808a5570", "text": "We introduce an online popularity prediction and tracking task as a benchmark task for reinforcement learning with a combinatorial, natural language action space. A specified number of discussion threads predicted to be popular are recommended, chosen from a fixed window of recent comments to track. Novel deep reinforcement learning architectures are studied for effective modeling of the value function associated with actions comprised of interdependent sub-actions. The proposed model, which represents dependence between sub-actions through a bi-directional LSTM, gives the best performance across different experimental configurations and domains, and it also generalizes well with varying numbers of recommendation requests.", "title": "" }, { "docid": "0cae4ea322daaaf33a42427b69e8ba9f", "text": "Background--By leveraging cloud services, organizations can deploy their software systems over a pool of resources. However, organizations heavily depend on their business-critical systems, which have been developed over long periods. These legacy applications are usually deployed on-premise. In recent years, research in cloud migration has been carried out. However, there is no secondary study to consolidate this research. Objective--This paper aims to identify, taxonomically classify, and systematically compare existing research on cloud migration. Method--We conducted a systematic literature review (SLR) of 23 selected studies, published from 2010 to 2013. We classified and compared the selected studies based on a characterization framework that we also introduce in this paper. Results--The research synthesis results in a knowledge base of current solutions for legacy-to-cloud migration. This review also identifies research gaps and directions for future research. Conclusion--This review reveals that cloud migration research is still in early stages of maturity, but is advancing. It identifies the needs for a migration framework to help improving the maturity level and consequently trust into cloud migration. This review shows a lack of tool support to automate migration tasks. This study also identifies needs for architectural adaptation and self-adaptive cloud-enabled systems.", "title": "" }, { "docid": "ed769b97bea6d4bbe7e282ad6dbb1c67", "text": "Three basic switching structures are defined: one is formed by two capacitors and three diodes; the other two are formed by two inductors and two diodes. They are inserted in either a Cuk converter, or a Sepic, or a Zeta converter. The SC/SL structures are built in such a way as when the active switch of the converter is on, the two inductors are charged in series or the two capacitors are discharged in parallel. When the active switch is off, the two inductors are discharged in parallel or the two capacitors are charged in series. As a result, the line voltage is reduced more times than in classical Cuk/Sepic/Zeta converters. The steady-state analysis of the new converters, a comparison of the DC voltage gain and of the voltage and current stresses of the new hybrid converters with those of the available quadratic converters, and experimental results are given", "title": "" }, { "docid": "9dde89f24f55602e21823620b49633dd", "text": "Darier's disease is a rare late-onset genetic disorder of keratinisation. Mosaic forms of the disease characterised by localised and unilateral keratotic papules carrying post-zygotic ATP2A2 mutation in affected areas have been documented. Segmental forms of Darier's disease are classified into two clinical subtypes: type 1 manifesting with distinct lesions on a background of normal appearing skin and type 2 with well-defined areas of Darier's disease occurring on a background of less severe non-mosaic phenotype. Herein we describe two cases of type 1 segmental Darier's disease with favourable response to topical retinoids.", "title": "" }, { "docid": "748de94434343888e10d1895eef4c805", "text": "It may seem precursory to begin my essay with an image that has been haunting me since September 11, but in a concise way it prefigures many issues I will write about. It is an image of a work by the Chilean artist and poet, Cecilia Vicuna, who has been living in New York for many years. The work dates from 1981 and shows a word drawn in three colors of pigment (white, blue, and red—also the colors of the American flag) on the pavement of the West Side Highway with the World Trade Center on the horizon. It reads in Spanish: Parti si passion (Participation), which Vicuna unravels as “to say yes in passion, or to partake of suffering.” Revealing aspects of connectivity and compassion, the word spelled out on the road was as ephemeral as its meaning remained for the art world. Unnoticed and unacknowledged, it disappeared in dust, but becomes intelligible in the present. This precarious work tells us how certain art practices, in their continuous effort to press forward a different perception of the world, have a visionary content that is marginalized because of fixed conventional readings of art, but nevertheless is bound to be recognized. My essay will seek to uncover the latency of this kind of work in the second half of the twentieth century, which is slowly coming into being today and can be understood because of feminist practice, but also perhaps because of an abruptly changed reality. Focusing on the work of two SouthAmerican artists—Lygia Clark (1920-1988) and Anna Maria Maiolino (born in 1942), both from Brazil—I will address the topic of “the relational as the radical.”", "title": "" }, { "docid": "24c2877aff9c4e8441dbbbd4481370b6", "text": "Ramp merging is a critical maneuver for road safety and traffic efficiency. Most of the current automated driving systems developed by multiple automobile manufacturers and suppliers are typically limited to restricted access freeways only. Extending the automated mode to ramp merging zones presents substantial challenges. One is that the automated vehicle needs to incorporate a future objective (e.g. a successful and smooth merge) and optimize a long-term reward that is impacted by subsequent actions when executing the current action. Furthermore, the merging process involves interaction between the merging vehicle and its surrounding vehicles whose behavior may be cooperative or adversarial, leading to distinct merging countermeasures that are crucial to successfully complete the merge. In place of the conventional rule-based approaches, we propose to apply reinforcement learning algorithm on the automated vehicle agent to find an optimal driving policy by maximizing the long-term reward in an interactive driving environment. Most importantly, in contrast to most reinforcement learning applications in which the action space is resolved as discrete, our approach treats the action space as well as the state space as continuous without incurring additional computational costs. Our unique contribution is the design of the Q-function approximation whose format is structured as a quadratic function, by which simple but effective neural networks are used to estimate its coefficients. The results obtained through the implementation of our training platform demonstrate that the vehicle agent is able to learn a safe, smooth and timely merging policy, indicating the effectiveness and practicality of our approach.", "title": "" }, { "docid": "8a1adea9a1f4beeb704691d76b2e4f53", "text": "As we observe a trend towards the recentralisation of the Internet, this paper raises the question of guaranteeing an everlasting decentralisation. We introduce the properties of strong and soft uncentralisability in order to describe systems in which all authorities can be untrusted at any time without affecting the system. We link the soft uncentralisability to another property called perfect forkability. Using that knowledge, we introduce a new cryptographic primitive called uncentralisable ledger and study its properties. We use those properties to analyse what an uncentralisable ledger may offer to classic electronic voting systems and how it opens up the realm of possibilities for completely new voting mechanisms. We review a list of selected projects that implement voting systems using blockchain technology. We then conclude that the true revolutionary feature enabled by uncentralisable ledgers is a self-sovereign and distributed identity provider.", "title": "" }, { "docid": "8e805d92cb57ddd36cf37eb608fddd71", "text": "Cogging torque in permanent-magnet machines causes torque and speed ripples, as well as acoustic noise and vibration, especially in low speed and direct drive applications. In this paper, a general analytical expression for cogging torque is derived by the energy method and the Fourier series analysis, based on the air gap permeance and the flux density distribution in an equivalent slotless machine. The optimal design parameters, such as slot number and pole number combination, skewing, pole-arc to pole-pitch ratio, and slot opening, are derived analytically to minimize the cogging torque. Finally, the finite-element analysis is adopted to verify the correctness of analytical methods.", "title": "" } ]
scidocsrr
60854e3789fc024abe9a998091dc11d4
Geotagging one hundred million Twitter accounts with total variation minimization
[ { "docid": "848bbc65a726680348b275c6818f4b94", "text": "We present a new algorithm for inferring the home locations of Twitter users at different granularities, such as city, state, or time zone, using the content of their tweets and their tweeting behavior. Unlike existing approaches, our algo rithm uses an ensemble of statistical and heuristic classifiers to predict locations. We find that a hierarchical classifica tion approach can improve prediction accuracy. Experi mental evidence suggests that our algorithm works well in practice and outperforms the best existing algorithms for predicting the location of Twitter users.", "title": "" }, { "docid": "d438d948601b22f7de6ec9ecaaf04c63", "text": "Location plays an essential role in our lives, bridging our online and offline worlds. This paper explores the interplay between people's location, interactions, and their social ties within a large real-world dataset. We present and evaluate Flap, a system that solves two intimately related tasks: link and location prediction in online social networks. For link prediction, Flap infers social ties by considering patterns in friendship formation, the content of people's messages, and user location. We show that while each component is a weak predictor of friendship alone, combining them results in a strong model, accurately identifying the majority of friendships. For location prediction, Flap implements a scalable probabilistic model of human mobility, where we treat users with known GPS positions as noisy sensors of the location of their friends. We explore supervised and unsupervised learning scenarios, and focus on the efficiency of both learning and inference. We evaluate Flap on a large sample of highly active users from two distinct geographical areas and show that it (1) reconstructs the entire friendship graph with high accuracy even when no edges are given; and (2) infers people's fine-grained location, even when they keep their data private and we can only access the location of their friends. Our models significantly outperform current comparable approaches to either task.", "title": "" } ]
[ { "docid": "46360fec3d7fa0adbe08bb4b5bb05847", "text": "Previous approaches to action recognition with deep features tend to process video frames only within a small temporal region, and do not model long-range dynamic information explicitly. However, such information is important for the accurate recognition of actions, especially for the discrimination of complex activities that share sub-actions, and when dealing with untrimmed videos. Here, we propose a representation, VLAD for Deep Dynamics (VLAD3), that accounts for different levels of video dynamics. It captures short-term dynamics with deep convolutional neural network features, relying on linear dynamic systems (LDS) to model medium-range dynamics. To account for long-range inhomogeneous dynamics, a VLAD descriptor is derived for the LDS and pooled over the whole video, to arrive at the final VLAD3 representation. An extensive evaluation was performed on Olympic Sports, UCF101 and THUMOS15, where the use of the VLAD3 representation leads to state-of-the-art results.", "title": "" }, { "docid": "0f2d6a8ce07258658f24fb4eec006a02", "text": "Dynamic bandwidth allocation in passive optical networks presents a key issue for providing efficient and fair utilization of the PON upstream bandwidth while supporting the QoS requirements of different traffic classes. In this article we compare the typical characteristics of DBA, such as bandwidth utilization, delay, and jitter at different traffic loads, within the two major standards for PONs, Ethernet PON and gigabit PON. A particular PON standard sets the framework for the operation of DBA and the limitations it faces. We illustrate these differences between EPON and GPON by means of simulations for the two standards. Moreover, we consider the evolution of both standards to their next-generation counterparts with the bit rate of 10 Gb/s and the implications to the DBA. A new simple GPON DBA algorithm is used to illustrate GPON performance. It is shown that the length of the polling cycle plays a crucial but different role for the operation of the DBA within the two standards. Moreover, only minor differences regarding DBA for current and next-generation PONs were found.", "title": "" }, { "docid": "d4ea09e7c942174c0301441a5c53b4ef", "text": "As the cloud computing is a new style of computing over internet. It has many advantages along with some crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related with the load management, fault tolerance and different security issues in cloud environment. In this paper the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity, delay or network load. Load balancing is the process of distributing the load among various nodes of a distributed system to improve both resource utilization and job response time while also avoiding a situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work. Load balancing ensures that all the processor in the system or every node in the network does approximately the equal amount of work at any instant of time. Many methods to resolve this problem has been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony optimization to resolve the problem of load balancing in cloud environment.", "title": "" }, { "docid": "56d7541e8769e4f4918fe704031c1ebc", "text": "Internet of Things (IoT) refers to systems that can be attached to the Internet and thus can be accessed and controlled remotely. Such devices are essential for creating ”smart things” like smart homes, smart grids, etc. IoT has achieved unprecedented success. It offers an interconnected network where devices (in the consumer space) can all communicate with each other. However, many IoT devices only add security features as an afterthought. This has been a contributing factor in many of the recently reported attacks and warnings of potential attacks such as those aimed at gaining control of autonomous cars. Many IoT devices are compact and feature limited computing resources, which often limits their ability to perform complex operations such as encryption or other security and privacy checks. With capabilities of devices in IoT varying greatly, a one-size-fits-all approach to security can prove to be inadequate. We firmly believe that safety and privacy should both be easy to use, present little inconvenience for users of non-critical systems, yet be as strong as possible to minimize breaches in critical systems. In this paper, we propose a novel architecture that caters to devicespecific security policies in IoT environments with varying levels of functionalities and criticality of services they offer. This would ensure that the best possible security profiles for IoT are enforced. We use a smart home environment to illustrate the architecture. Keywords–Internet of Things (IoT); Software Defined Networking (SDN); IoT Security.", "title": "" }, { "docid": "154528ab93e89abe965b6abd93af6a13", "text": "We investigate the geometry of that function in the plane or 3-space, which associates to each point the square of the shortest distance to a given curve or surface. Particular emphasis is put on second order Taylor approximants and other local quadratic approximants. Their key role in a variety of geometric optimization algorithms is illustrated at hand of registration in Computer Vision and surface approximation.", "title": "" }, { "docid": "c7b92058dd9aee5217725a55ca1b56ff", "text": "For the autonomous navigation of mobile robots, robust and fast visual localization is a challenging task. Although some end-to-end deep neural networks for 6-DoF Visual Odometry (VO) have been reported with promising results, they are still unable to solve the drift problem in long-range navigation. In this paper, we propose the deep global-relative networks (DGRNets), which is a novel global and relative fusion framework based on Recurrent Convolutional Neural Networks (RCNNs). It is designed to jointly estimate global pose and relative localization from consecutive monocular images. DGRNets include feature extraction sub-networks for discriminative feature selection, RCNNs-type relative pose estimation subnetworks for smoothing the VO trajectory and RCNNs-type global pose regression sub-networks for avoiding the accumulation of pose errors. We also propose two loss functions: the first one consists of Cross Transformation Constraints (CTC) that utilize geometric consistency of the adjacent frames to train a more accurate relative sub-networks, and the second one is composed of CTC and Mean Square Error (MSE) between the predicted pose and ground truth used to train the end-to-end DGRNets. The competitive experiments on indoor Microsoft 7-Scenes and outdoor KITTI dataset show that our DGRNets outperform other learning-based monocular VO methods in terms of pose accuracy.", "title": "" }, { "docid": "8f1d27581e7a83e378129e4287c64bd9", "text": "Online social media plays an increasingly significant role in shaping the political discourse during elections worldwide. In the 2016 U.S. presidential election, political campaigns strategically designed candidacy announcements on Twitter to produce a significant increase in online social media attention. We use large-scale online social media communications to study the factors of party, personality, and policy in the Twitter discourse following six major presidential campaign announcements for the 2016 U.S. presidential election. We observe that all campaign announcements result in an instant bump in attention, with up to several orders of magnitude increase in tweets. However, we find that Twitter discourse as a result of this bump in attention has overwhelmingly negative sentiment. The bruising criticism, driven by crosstalk from Twitter users of opposite party affiliations, is organized by hashtags such as #NoMoreBushes and #WhyImNotVotingForHillary. We analyze how people take to Twitter to criticize specific personality traits and policy positions of presidential candidates.", "title": "" }, { "docid": "f585793eedbba47d4a735bd91d5c539a", "text": "In this paper, we present a novel method to couple Smoothed Particle Hydrodynamics (SPH) and nonlinear FEM to animate the interaction of fluids and deformable solids in real time. To accurately model the coupling, we generate proxy particles over the boundary of deformable solids to facilitate the interaction with fluid particles, and develop an efficient method to distribute the coupling forces of proxy particles to FEM nodal points. Specifically, we employ the Total Lagrangian Explicit Dynamics (TLED) finite element algorithm for nonlinear FEM because of many of its attractive properties such as supporting massive parallelism, avoiding dynamic update of stiffness matrix computation, and efficient solver. Based on a predictor-corrector scheme for both velocity and position, different normal and tangential conditions can be realized even for shell-like thin solids. Our coupling method is entirely implemented on modern GPUs using CUDA. We demonstrate the advantage of our two-way coupling method in computer animation via various virtual scenarios.", "title": "" }, { "docid": "92e97a422b52a066c338dae0a16d2dff", "text": "To facilitate necessary task-based interactions and to avoid annoying or upsetting people a domestic robot will have to exhibit appropriate non-verbal social behaviour. Most current robots have the ability to sense and control for the distance of people and objects in their vicinity. An understanding of human robot proxemic and associated non-verbal social behaviour is crucial for humans to accept robots as domestic or servants. Therefore, this thesis addressed the following hypothesis: Attributes of robot appearance, behaviour, task context and situation will affect the distances that people will find comfortable between themselves and a robot.. Initial exploratory Human-Robot Interaction (HRI) experiments replicated human-human studies into comfortable approach distances with a mechanoid robot in place of one of the human interactors. It was found that most human participants respected the robot's interpersonal space and there were systematic differences for participants' comfortable approach distances to robots with different voice styles. It was proposed that greater initial comfortable approach distances to the robot were due to perceived inconsistencies between the robots overall appearance and voice style. To investigate these issues further it was necessary to develop HRI experimental set-ups, a novel Video-based HRI (VHRI) trial methodology, trial data collection methods and analytical methodologies. An exploratory VHRI trial then investigated human perceptions and preferences for robot appearance and non-verbal social behaviour. The methodological approach highlighted the holistic and embodied nature of robot appearance and behaviour. Findings indicated that people tend to rate a particular behaviour less favourably when the behaviour is not consistent with the robot’s appearance. A live HRI experiment finally confirmed and extended from these previous findings that there were multiple factors which significantly affected participants preferences for robot to human approach distances. There was a significant general tendency for participants to prefer either a tall humanoid robot or a", "title": "" }, { "docid": "c5113ff741d9e656689786db10484a07", "text": "Pulmonary administration of drugs presents several advantages in the treatment of many diseases. Considering local and systemic delivery, drug inhalation enables a rapid and predictable onset of action and induces fewer side effects than other routes of administration. Three main inhalation systems have been developed for the aerosolization of drugs; namely, nebulizers, pressurized metered-dose inhalers (MDIs) and dry powder inhalers (DPIs). The latter are currently the most convenient alternative as they are breath-actuated and do not require the use of any propellants. The deposition site in the respiratory tract and the efficiency of inhaled aerosols are critically influenced by the aerodynamic diameter, size distribution, shape and density of particles. In the case of DPIs, since micronized particles are generally very cohesive and exhibit poor flow properties, drug particles are usually blended with coarse and fine carrier particles. This increases particle aerodynamic behavior and flow properties of the drugs and ensures accurate dosage of active ingredients. At present, particles with controlled properties are obtained by milling, spray drying or supercritical fluid techniques. Several excipients such as sugars, lipids, amino acids, surfactants, polymers and absorption enhancers have been tested for their efficacy in improving drug pulmonary administration. The purpose of this article is to describe various observations that have been made in the field of inhalation product development, especially for the dry powder inhalation formulation, and to review the use of various additives, their effectiveness and their potential toxicity for pulmonary administration.", "title": "" }, { "docid": "77f78bc7e4300c1f1ddd6657e7628c57", "text": "The use of TLS by malware poses new challenges to network threat detection because traditional pattern-matching techniques can no longer be applied to its messages. However, TLS also introduces a complex set of observable data features that allow many inferences to be made about both the client and the server. We show that these features can be used to detect and understand malware communication, while at the same time preserving the privacy of the benign uses of encryption. These data features also allow for accurate malware family attribution of network communication, even when restricted to a single, encrypted flow. To demonstrate this, we performed a detailed study of how TLS is used by malware and enterprise applications. We provide a general analysis on millions of TLS encrypted flows, and a targeted study on 18 malware families composed of thousands of unique malware samples and tens-of-thousands of malicious TLS flows. Importantly, we identify and accommodate for the bias introduced by the use of a malware sandbox. We show that the performance of a malware classifier is correlated with a malware family’s use of TLS, i.e., malware families that actively evolve their use of cryptography are more difficult to classify. We conclude that malware’s usage of TLS is distinct in an enterprise setting, and that these differences can be effectively used in rules and machine learning classifiers.", "title": "" }, { "docid": "672b5aab97b676581864b5a4e75d3731", "text": "The ability to consolidate information of different types is at the core of intelligence, and has tremendous practical value in allowing learning for one task to benefit from generalizations learned for others. In this paper we tackle the challenging task of improving semantic parsing performance, taking UCCA parsing as a test case, and AMR, SDP and Universal Dependencies (UD) parsing as auxiliary tasks. We experiment on three languages, using a uniform transition-based system and learning architecture for all parsing tasks. Despite notable conceptual, formal and domain differences, we show that multitask learning significantly improves UCCA parsing in both in-domain and out-of-domain settings. Our code is publicly available.", "title": "" }, { "docid": "67a6d90c319374d7edd6e0893f06ce6f", "text": "The study aimed to assess the effects of compression trigger point therapy on the stiffness of the trapezius muscle in professional basketball players (Part A), and the reliability of the MyotonPRO device in clinical evaluation of athletes (Part B). Twelve professional basketball players participated in Part A of the study (mean age: 19.8 ± 2.4 years, body height 197 ± 8.2 cm, body mass: 91.8 ± 11.8 kg), with unilateral neck or shoulder pain at the dominant side. Part B tested twelve right-handed male athletes (mean ± SD; age: 20.4 ± 1.2 years; body height: 178.6 ± 7.7 cm; body mass: 73.2 ± 12.6 kg). Stiffness measurements were obtained directly before and after a single session trigger point compression therapy. Measurements were performed bilaterally over 5 points covering the trapezius muscle. The effects were evaluated using a full-factorial repeated measure ANOVA and the Bonferroni post-hoc test for equal variance. A p-value < .05 was considered significant. The RM ANOVA revealed a significant decrease in muscle stiffness for the upper trapezius muscle. Specifically, muscle stiffness decreased from 243.7 ± 30.5 to 215.0 ± 48.5 N/m (11.8%), (p = .008) (Part A). The test-retest relative reliability of trapezius muscle stiffness was found to be high (ICC from 0.821 to 0.913 for measurement points). The average SEM was 23.59 N/m and the MDC 65.34 N/m, respectively (Part B). The present study showed that a single session of compression trigger point therapy can be used to significantly decrease the stiffness of the upper trapezius among professional basketball players.", "title": "" }, { "docid": "70294e6680ad7d662596262c4068a352", "text": "As cancer development involves pathological vessel formation, 16 angiogenesis markers were evaluated as potential ovarian cancer (OC) biomarkers. Blood samples collected from 172 patients were divided based on histopathological result: OC (n = 38), borderline ovarian tumours (n = 6), non-malignant ovarian tumours (n = 62), healthy controls (n = 50) and 16 patients were excluded. Sixteen angiogenesis markers were measured using BioPlex Pro Human Cancer Biomarker Panel 1 immunoassay. Additionally, concentrations of cancer antigen 125 (CA125) and human epididymis protein 4 (HE4) were measured in patients with adnexal masses using electrochemiluminescence immunoassay. In the comparison between OC vs. non-OC, osteopontin achieved the highest area under the curve (AUC) of 0.79 (sensitivity 69%, specificity 78%). Multimarker models based on four to six markers (basic fibroblast growth factor-FGF-basic, follistatin, hepatocyte growth factor-HGF, osteopontin, platelet-derived growth factor AB/BB-PDGF-AB/BB, leptin) demonstrated higher discriminatory ability (AUC 0.80-0.81) than a single marker (AUC 0.79). When comparing OC with benign ovarian tumours, six markers had statistically different expression (osteopontin, leptin, follistatin, PDGF-AB/BB, HGF, FGF-basic). Osteopontin was the best single angiogenesis marker (AUC 0.825, sensitivity 72%, specificity 82%). A three-marker panel consisting of osteopontin, CA125 and HE4 better discriminated the groups (AUC 0.958) than HE4 or CA125 alone (AUC 0.941 and 0.932, respectively). Osteopontin should be further investigated as a potential biomarker in OC screening and differential diagnosis of ovarian tumours. Adding osteopontin to a panel of already used biomarkers (CA125 and HE4) significantly improves differential diagnosis between malignant and benign ovarian tumours.", "title": "" }, { "docid": "854b473b0ee6d3cf4d1a34cd79a658e3", "text": "Blockchain provides a new approach for participants to maintain reliable databases in untrusted networks without centralized authorities. However, there are still many serious problems in real blockchain systems in IP network such as the lack of support for multicast and the hierarchies of status. In this paper, we design a bitcoin-like blockchain system named BlockNDN over Named Data Networking and we implement and deploy it on our cluster as well. The resulting design solves those problems in IP network. It provides completely decentralized systems and simplifies system architecture. It also improves the weak-connectivity phenomenon and decreases the broadcast overhead.", "title": "" }, { "docid": "b7e42b4dbcd34d57c25c184f72ed413e", "text": "How smart can a micron-sized bag of chemicals be? How can an artificial or real cell make inferences about its environment? From which kinds of probability distributions can chemical reaction networks sample? We begin tackling these questions by showing four ways in which a stochastic chemical reaction network can implement a Boltzmann machine, a stochastic neural network model that can generate a wide range of probability distributions and compute conditional probabilities. The resulting models, and the associated theorems, provide a road map for constructing chemical reaction networks that exploit their native stochasticity as a computational resource. Finally, to show the potential of our models, we simulate a chemical Boltzmann machine to classify and generate MNIST digits in-silico.", "title": "" }, { "docid": "6b46bdafd8d29d31e2aeacc386654f0e", "text": "An extended subdivision surface (ESub) is a generalization of Catmull Clark and NURBS surfaces. Depending on the knot intervals and valences of the vertices and faces, Catmull Clark as well as NURBS patches can be generated using the extended subdivision rules. Moreover, an arbitrary choice of the knot intervals and the topology is possible. Special features like sharp edges and corners are consistently supported by setting selected knot intervals to zero or by applying special rules. Compared to the prior nonuniform rational subdivision surfaces (NURSS), the ESubs offer limit-point rules which are indispensable in many applications, for example, for computer-aided design or in adaptive visualization. The refinement and limit-point rules for our nonuniform, nonstationary scheme are obtained via a new method using local Bézier control points. With our new surface, it is possible to start with existing Catmull Clark as well as NURBS models and to continue the modeling process using the extended subdivision options.", "title": "" }, { "docid": "223c9e9bd6ad868eea2c936437abe2a7", "text": "ÐDetermining the rigid transformation relating 2D images to known 3D geometry is a classical problem in photogrammetry and computer vision. Heretofore, the best methods for solving the problem have relied on iterative optimization methods which cannot be proven to converge and/or which do not effectively account for the orthonormal structure of rotation matrices. We show that the pose estimation problem can be formulated as that of minimizing an error metric based on collinearity in object (as opposed to image) space. Using object space collinearity error, we derive an iterative algorithm which directly computes orthogonal rotation matrices and which is globally convergent. Experimentally, we show that the method is computationally efficient, that it is no less accurate than the best currently employed optimization methods, and that it outperforms all tested methods in robustness to outliers. Index TermsÐPose estimation, absolute orientation, optimization,weak-perspective camera models, numerical optimization.", "title": "" }, { "docid": "5c129341d3b250dcbd5732a61ae28d53", "text": "Circadian rhythms govern a remarkable variety of metabolic and physiological functions. Accumulating epidemiological and genetic evidence indicates that the disruption of circadian rhythms might be directly linked to cancer. Intriguingly, several molecular gears constituting the clock machinery have been found to establish functional interplays with regulators of the cell cycle, and alterations in clock function could lead to aberrant cellular proliferation. In addition, connections between the circadian clock and cellular metabolism have been identified that are regulated by chromatin remodelling. This suggests that abnormal metabolism in cancer could also be a consequence of a disrupted circadian clock. Therefore, a comprehensive understanding of the molecular links that connect the circadian clock to the cell cycle and metabolism could provide therapeutic benefit against certain human neoplasias.", "title": "" } ]
scidocsrr
0000c2dd246fed8d8266077f61df568b
A Looped-Bowtie RFID Tag Antenna Design for Metallic Objects
[ { "docid": "085345c30e517a441dd0ada4a2200a8d", "text": "A slim radio frequency identification (RFID) tag antenna design for metallic objects application is proposed in this letter. It is designed based on a high-impedance surface (HIS) unit cell structure directly rather than adopting a large HIS ground plane. The antenna structure consists of metallic rectangular patches electrically connected through vias to the ground plane to form an RFID tag antenna that is suitable for mounting on metallic objects. The experimental tests show that the maximum read range of RFID tag placed on a metallic object is about 3.1 m and the overall size is 65 times 20 times 1.5 mm3. It is thinner than inverted-F antenna (IFA), planar inverted-F antenna (PIFA), or patch-type antennas for metallic objects. Simulation and measurement results of the proposed RFID tag antenna are also presented in this letter.", "title": "" } ]
[ { "docid": "48c851b54fb489cea937cdfac3ca8132", "text": "This paper describes a new system, dubbed Continuous Appearance-based Trajectory SLAM (CAT-SLAM), which augments sequential appearance-based place recognition with local metric pose filtering to improve the frequency and reliability of appearance based loop closure. As in other approaches to appearance-based mapping, loop closure is performed without calculating global feature geometry or performing 3D map construction. Loop closure filtering uses a probabilistic distribution of possible loop closures along the robot’s previous trajectory, which is represented by a linked list of previously visited locations linked by odometric information. Sequential appearance-based place recognition and local metric pose filtering are evaluated simultaneously using a Rao-Blackwellised particle filter, which weights particles based on appearance matching over sequential frames and the similarity of robot motion along the trajectory. The particle filter explicitly models both the likelihood of revisiting previous locations and exploring new locations. A modified resampling scheme counters particle deprivation and allows loop closure updates to be performed in constant time for a given environment. We compare the performance of CAT-SLAM to FAB-MAP (a state-of-the-art appearance-only SLAM algorithm) using multiple real-world datasets, demonstrating an increase in the number of correct loop closures detected by CAT-SLAM.", "title": "" }, { "docid": "e9eb40af4556c3203aedbd4198e2f43c", "text": "Cloud computing is one of the rapidly improving technologies. It provides scalable resources needed for the applications hosted on it. As cloud-based services become more dynamic, resource provisioning becomes more challenging. The QoS constrained resource allocation problem is considered in this paper, in which customers are willing to host their applications on the provider’s cloud with a given SLA requirements for performance such as throughput and response time. Since, the data centers hosting the applications consume huge amounts of energy and cause huge operational costs, solutions that reduce energy consumption as well as operational costs are gaining importance. In this work, we propose an energy efficient mechanism that allocates the cloud resources to the applications without violating the given service level agreements(SLA) using Ant colony framework.", "title": "" }, { "docid": "0521f79f13cdbe05867b5db733feac16", "text": "This conceptual paper discusses how we can consider a particular city as a smart one, drawing on recent practices to make cities smart. A set of the common multidimensional components underlying the smart city concept and the core factors for a successful smart city initiative is identified by exploring current working definitions of smart city and a diversity of various conceptual relatives similar to smart city. The paper offers strategic principles aligning to the three main dimensions (technology, people, and institutions) of smart city: integration of infrastructures and technology-mediated services, social learning for strengthening human infrastructure, and governance for institutional improvement and citizen engagement.", "title": "" }, { "docid": "3402901e3f28447d618f5db0371e5ffa", "text": "A number of studies have found that today's Visual Question Answering (VQA) models are heavily driven by superficial correlations in the training data and lack sufficient image grounding. To encourage development of models geared towards the latter, we propose a new setting for VQA where for every question type, train and test sets have different prior distributions of answers. Specifically, we present new splits of the VQA v1 and VQA v2 datasets, which we call Visual Question Answering under Changing Priors (VQA-CP v1 and VQA-CP v2 respectively). First, we evaluate several existing VQA models under this new setting and show that their performance degrades significantly compared to the original VQA setting. Second, we propose a novel Grounded Visual Question Answering model (GVQA) that contains inductive biases and restrictions in the architecture specifically designed to prevent the model from 'cheating' by primarily relying on priors in the training data. Specifically, GVQA explicitly disentangles the recognition of visual concepts present in the image from the identification of plausible answer space for a given question, enabling the model to more robustly generalize across different distributions of answers. GVQA is built off an existing VQA model - Stacked Attention Networks (SAN). Our experiments demonstrate that GVQA significantly outperforms SAN on both VQA-CP v1 and VQA-CP v2 datasets. Interestingly, it also outperforms more powerful VQA models such as Multimodal Compact Bilinear Pooling (MCB) in several cases. GVQA offers strengths complementary to SAN when trained and evaluated on the original VQA v1 and VQA v2 datasets. Finally, GVQA is more transparent and interpretable than existing VQA models.", "title": "" }, { "docid": "8c372bbf18c71b35ed44e94eacc5f5d1", "text": "Neural circuits display complex activity patterns both spontaneously and when responding to a stimulus or generating a motor output. How are these two forms of activity related? We develop a procedure called FORCE learning for modifying synaptic strengths either external to or within a model neural network to change chaotic spontaneous activity into a wide variety of desired activity patterns. FORCE learning works even though the networks we train are spontaneously chaotic and we leave feedback loops intact and unclamped during learning. Using this approach, we construct networks that produce a wide variety of complex output patterns, input-output transformations that require memory, multiple outputs that can be switched by control inputs, and motor patterns matching human motion capture data. Our results reproduce data on premovement activity in motor and premotor cortex, and suggest that synaptic plasticity may be a more rapid and powerful modulator of network activity than generally appreciated.", "title": "" }, { "docid": "7ad0a3e21de90ae5578626c12b42e666", "text": "Social media are a primary means for travelers to connect with each other and plan trips. They can also help tourism suppliers (e.g., by providing relevant information), thus overcoming the shortcomings of traditional information sources. User-generated content from social media has already been used in many studies as a primary information source. However, the quality of information derived thus far remains largely unclear. This study assesses the quality of macro-level information on the spatio-temporal distribution of tourism derived from online travel reviews in social media in terms of completeness, timeliness, and accuracy. We found that information quality increased from 2000 to 2009 as online travel reviews increasingly covered more countries, became available earlier than statistics reported by the United Nations World Tourism Organization (UNWTO), were highly correlated with the UNWTO statistics. We conclude that social media are a good information source for macro-level spatio-temporal tourism information and could be used, for example, to estimate tourism figures.", "title": "" }, { "docid": "dbf9de0a2b0c0b9fcde395aeecec346b", "text": "Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.", "title": "" }, { "docid": "3159879f34a093d38e82dba61b92d74e", "text": "The performance of many hard combinatorial problem solvers depends strongly on their parameter settings, and since manual parameter tuning is both tedious and suboptimal the AI community has recently developed several algorithm configuration (AC) methods to automatically address this problem. While all existing AC methods start the configuration process of an algorithm A from scratch for each new type of benchmark instances, here we propose to exploit information about A’s performance on previous benchmarks in order to warmstart its configuration on new types of benchmarks. We introduce two complementary ways in which we can exploit this information to warmstart AC methods based on a predictive model. Experiments for optimizing a flexible modern SAT solver on twelve different instance sets show that our methods often yield substantial speedups over existing AC methods (up to 165-fold) and can also find substantially better configurations given the same compute budget.", "title": "" }, { "docid": "ec361784976ab4d00b50c89d308a13ad", "text": "In this paper, we apply text mining and topic modelling to understand public mental health. We focus on identifying common mental health topics across two anonymous social media platforms: Reddit and a mobile journalling/mood-tracking app. Furthermore, we analyze journals from the app to uncover relationships between topics, journal visibility (private vs. visible to other users of the app), and user-labelled sentiment. Our main findings are that 1) anxiety and depression are shared on both platforms; 2) users of the journalling app keep routine topics such as eating private, and these topics rarely appear on Reddit; and 3) sleep was a critical theme on the journalling app and had an unexpectedly negative sentiment.", "title": "" }, { "docid": "5ea45a4376e228b3eacebb8dd8e290d2", "text": "The sharing economy has quickly become a very prominent subject of research in the broader computing literature and the in human--computer interaction (HCI) literature more specifically. When other computing research areas have experienced similarly rapid growth (e.g. human computation, eco-feedback technology), early stage literature reviews have proved useful and influential by identifying trends and gaps in the literature of interest and by providing key directions for short- and long-term future work. In this paper, we seek to provide the same benefits with respect to computing research on the sharing economy. Specifically, following the suggested approach of prior computing literature reviews, we conducted a systematic review of sharing economy articles published in the Association for Computing Machinery Digital Library to investigate the state of sharing economy research in computing. We performed this review with two simultaneous foci: a broad focus toward the computing literature more generally and a narrow focus specifically on HCI literature. We collected a total of 112 sharing economy articles published between 2008 and 2017 and through our analysis of these papers, we make two core contributions: (1) an understanding of the computing community's contributions to our knowledge about the sharing economy, and specifically the role of the HCI community in these contributions (i.e.what has been done) and (2) a discussion of under-explored and unexplored aspects of the sharing economy that can serve as a partial research agenda moving forward (i.e.what is next to do).", "title": "" }, { "docid": "d83aa51df8fa3cc03e3ee8d5ed01851e", "text": "Because the World Wide Web consists primarily of text, information extraction is central to any e ort that would use the Web as a resource for knowledge discovery. We show how information extraction can be cast as a standard machine learning problem, and argue for the suitability of relational learning in solving it. The implementation of a general-purpose relational learner for information extraction, SRV, is described. In contrast with earlier learning systems for information extraction, SRV makes no assumptions about document structure and the kinds of information available for use in learning extraction patterns. Instead, structural and other information is supplied as input in the form of an extensible token-oriented feature set. We demonstrate the e ectiveness of this approach by adapting SRV for use in learning extraction rules for a domain consisting of university course and research project pages sampled from the Web. Making SRV Web-ready only involves adding several simple HTML-speci c features to its basic feature set. The World Wide Web, with its explosive growth and ever-broadening reach, is swiftly becoming the default knowledge resource for many areas of endeavor. Unfortunately, although any one of over 200,000,000 Web pages is readily accessible to an Internet-connected workstation, the information content of these pages is, without human interpretation, largely inaccessible. Systems have been developed which can make sense of highly regularWeb pages, such as those generated automatically from internal databases in response to user queries (Doorenbos, Etzioni, & Weld 1997) (Kushmerick 1997). A surprising number of Web sites have pages amenable to the techniques used by these systems. Still, most Web pages do not exhibit the regularity required by they require. There is a larger class of pages, however, which are regular in a more abstract sense. ManyWeb pages come from collections in which each page describes a single entity or event (e.g., home pages in a CS department; each describes its owner). The purpose of such a page is often to convey essential facts about the entity it Copyright c 1998, American Association for Arti cial Intelligence (www.aaai.org). All rights reserved. describes. It is often reasonable to approach such a page with a set of standard questions, and to expect that the answers to these questions will be available as succinct text fragments in the page. A home page, for example, frequently lists the owner's name, a liations, email address, etc. The problem of identifying the text fragments that answer standard questions de ned for a document collection is called information extraction (IE) (Def 1995). Our interest in IE concerns the development of machine learning methods to solve it. We regard IE as a kind of text classi cation, which has strong a nities with the well-investigated problem of document classi cation, but also presents unique challenges. We share this focus with a number of other recent systems (Soderland 1996) (Cali & Mooney 1997), including a system designed to learn how to extract from HTML (Soderland 1997). In this paper we describe SRV, a top-down relational algorithm for information extraction. Central to the design of SRV is its reliance on a set of token-oriented features, which are easy to implement and add to the system. Since domain-speci c information is contained within this features, which are separate from the core algorithm, SRV is better poised than similar systems for targeting to new domains. We have used it to perform extraction from electronic seminar announcements, medical abstracts, and newswire articles on corporate acquisitions. The experiments reported here show that targeting the system to HTML involves nothing more than the addition of HTML-speci c features to its basic feature set. Learning for Information Extraction Consider a collection of Web pages describing university computer science courses. Given a page, a likely task for an information extraction system is to nd the title of the course the page describes. We call the title a eld and any literal title taken from an actual page, such as \\Introduction to Arti cial Intelligence,\" an instantiation or instance of the title eld. Note that the typical information extraction problem involves multiple elds, some of which may have multiple instantiations in a given le. For example, a course page might From: AAAI-98 Proceedings. Copyright © 1998, AAAI (www.aaai.org). All rights reserved.", "title": "" }, { "docid": "eb4e88e8d34a9bafce8cc98c03b9055c", "text": "Understanding how different cultures use the Net---as well as perceive the same Web sites---can translate to truly global e-commerce.", "title": "" }, { "docid": "8d7af01e003961cbf2a473abe32d8b7e", "text": "This paper presents a series of control strategies for soft compliant manipulators. We provide a novel approach to control multi-fingered tendon-driven foam hands using a CyberGlove and a simple ridge regression model. The results achieved include complex posing, dexterous grasping and in-hand manipulations. To enable efficient data sampling and a more intuitive design process of foam robots, we implement and evaluate a finite element based simulation. The accuracy of this model is evaluated using a Vicon motion capture system. We then use this simulation to solve inverse kinematics and compare the performance of supervised learning, reinforcement learning, nearest neighbor and linear ridge regression methods in terms of their accuracy and sample efficiency.", "title": "" }, { "docid": "6cc7205ad19d3de8fab076a752d82284", "text": "Visual odometry and mapping methods can provide accurate navigation and comprehensive environment (obstacle) information for autonomous flights of Unmanned Aerial Vehicle (UAV) in GPS-denied cluttered environments. This work presents a new light small-scale low-cost ARM-based stereo vision pre-processing system, which not only is used as onboard sensor to continuously estimate 6-DOF UAV pose, but also as onboard assistant computer to pre-process visual information, thereby saving more computational capability for the onboard host computer of the UAV to conduct other tasks. The visual odometry is done by one plugin specifically developed for this new system with a fixed baseline (12cm). In addition, the pre-processed infromation from this new system are sent via a Gigabit Ethernet cable to the onboard host computer of UAV for real-time environment reconstruction and obstacle detection with a octree-based 3D occupancy grid mapping approach, i.e. OctoMap. The visual algorithm is evaluated with the stereo video datasets from EuRoC Challenge III in terms of efficiency, accuracy and robustness. Finally, the new system is mounted and tested on a real quadrotor UAV to carry out the visual odometry and mapping task.", "title": "" }, { "docid": "21fb04bbdf23094a5967661787d1f2de", "text": "We present a practical, stratified autocalibration algorithm with theoretical guarantees of global optimality. Given a projective reconstruction, the first stage of the algorithm upgrades it to affine by estimating the position of the plane at infinity. The plane at infinity is computed by globally minimizing a least squares formulation of the modulus constraints. In the second stage, the algorithm upgrades this affine reconstruction to a metric one by globally minimizing the infinite homography relation to compute the dual image of the absolute conic (DIAC). The positive semidefiniteness of the DIAC is explicitly enforced as part of the optimization process, rather than as a post-processing step. For each stage, we construct and minimize tight convex relaxations of the highly non-convex objective functions in a branch and bound optimization framework. We exploit the problem structure to restrict the search space for the DIAC and the plane at infinity to a small, fixed number of branching dimensions, independent of the number of views. Experimental evidence of the accuracy, speed and scalability of our algorithm is presented on synthetic and real data. MATLAB code for the implementation is made available to the community.", "title": "" }, { "docid": "49a645d8d1c160a445a15a2dfd142a7f", "text": "Currently, 4G network becomes commercial in large scale around the world and the industry has started the fifth-generation mobile communication technology (5G) research. Compared to 4G network, 5G network will support larger mobility as well as higher transmission rate, higher user experience rate, energy efficiency, spectrum efficiency and so forth. All of these will boost a variety of multimedia services, especially for Over-The-Top (OTT) services. So for, OTT services have already gained great popularity and contributed to large traffic consumption, which propose a challenge for operators. As OTT services are designed to deliver over the best effort Internet, the QoE management solutions for traditional multimedia services are obsolete, which propose new challenges in QOE management aspects for network and service providers, especially for the 4G and future 5G network. This paper attempts to present the technical challenges faced by 5G network from QoE management perspective of OTT services. Our objective is to enhance the user experience of OTT services and improve network efficiency. We analysis the characteristics and QoE factors of OTT services over 5G wireless network. With the QoE factors and current QoE management situation, we summarize OTT services QoE quantification and evaluation methods, present QoE-driven radio resource management and optimization solutions. Then, we propose a framework and whole evaluation procedure which aim at obtaining the accurate user experience value as well as improving network efficiency and optimizing the user experience.", "title": "" }, { "docid": "69902c9571cafdbf126e14f608c081ce", "text": "Most recent storage devices, such as NAND flash-based solid state drives (SSDs), provide low access latency and high degree of parallelism. However, conventional file systems, which are designed for slow hard disk drives, often encounter severe scalability bottlenecks in exploiting the advances of these fast storage devices on manycore architectures. To scale file systems to many cores, we propose SpanFS, a novel file system which consists of a collection of micro file system services called domains. SpanFS distributes files and directories among the domains, provides a global file system view on top of the domains and maintains consistency in case of system crashes. SpanFS is implemented based on the Ext4 file system. Experimental results evaluating SpanFS against Ext4 on a modern PCI-E SSD show that SpanFS scales much better than Ext4 on a 32-core machine. In microbenchmarks SpanFS outperforms Ext4 by up to 1226%. In application-level benchmarks SpanFS improves the performance by up to 73% relative to Ext4.", "title": "" }, { "docid": "54194d7233235abae5c98720794d1737", "text": "Generating and manipulating human facial images using high-level attributal controls are important and interesting problems. The models proposed in previous work can solve one of these two problems (generation or manipulation), but not both coherently. This paper proposes a novel model that learns how to both generate and modify the facial image from high-level semantic attributes. Our key idea is to formulate a Semi-Latent Facial Attribute Space (SL-FAS) to systematically learn relationship between user-defined and latent attributes, as well as between those attributes and RGB imagery. As part of this newly formulated space, we propose a new model – SL-GAN which is a specific form of Generative Adversarial Network. Finally, we present an iterative training algorithm for SL-GAN. The experiments on recent CelebA and CASIA-WebFace datasets validate the effectiveness of our proposed framework. We will also make data, pre-trained models and code available.", "title": "" } ]
scidocsrr
b1632b21c1d9d47d82e89b1667a6e303
A comparison of social, learning, and financial strategies on crowd engagement and output quality
[ { "docid": "741619d65757e07394a161f4b96ec408", "text": "Self-disclosure plays a central role in the development and maintenance of relationships. One way that researchers have explored these processes is by studying the links between self-disclosure and liking. Using meta-analytic procedures, the present work sought to clarify and review this literature by evaluating the evidence for 3 distinct disclosure-liking effects. Significant disclosure-liking relations were found for each effect: (a) People who engage in intimate disclosures tend to be liked more than people who disclose at lower levels, (b) people disclose more to those whom they initially like, and (c) people like others as a result of having disclosed to them. In addition, the relation between disclosure and liking was moderated by a number of variables, including study paradigm, type of disclosure, and gender of the discloser. Taken together, these results suggest that various disclosure-liking effects can be integrated and viewed as operating together within a dynamic interpersonal system. Implications for theory development are discussed, and avenues for future research are suggested.", "title": "" }, { "docid": "ff8dec3914e16ae7da8801fe67421760", "text": "A hypothesized need to form and maintain strong, stable interpersonal relationships is evaluated in light of the empirical literature. The need is for frequent, nonaversive interactions within an ongoing relational bond. Consistent with the belongingness hypothesis, people form social attachments readily under most conditions and resist the dissolution of existing bonds. Belongingness appears to have multiple and strong effects on emotional patterns and on cognitive processes. Lack of attachments is linked to a variety of ill effects on health, adjustment, and well-being. Other evidence, such as that concerning satiation, substitution, and behavioral consequences, is likewise consistent with the hypothesized motivation. Several seeming counterexamples turned out not to disconfirm the hypothesis. Existing evidence supports the hypothesis that the need to belong is a powerful, fundamental, and extremely pervasive motivation.", "title": "" } ]
[ { "docid": "738a69ad1006c94a257a25c1210f6542", "text": "Encrypted data search allows cloud to offer fundamental information retrieval service to its users in a privacy-preserving way. In most existing schemes, search result is returned by a semi-trusted server and usually considered authentic. However, in practice, the server may malfunction or even be malicious itself. Therefore, users need a result verification mechanism to detect the potential misbehavior in this computation outsourcing model and rebuild their confidence in the whole search process. On the other hand, cloud typically hosts large outsourced data of users in its storage. The verification cost should be efficient enough for practical use, i.e., it only depends on the corresponding search operation, regardless of the file collection size. In this paper, we are among the first to investigate the efficient search result verification problem and propose an encrypted data search scheme that enables users to conduct secure conjunctive keyword search, update the outsourced file collection and verify the authenticity of the search result efficiently. The proposed verification mechanism is efficient and flexible, which can be either delegated to a public trusted authority (TA) or be executed privately by data users. We formally prove the universally composable (UC) security of our scheme. Experimental result shows its practical efficiency even with a large dataset.", "title": "" }, { "docid": "dd5bfaaf18138d1b714de8d91fbacc7a", "text": "Ball-balancing robots (BBRs) are endowed with rich dynamics. When properly designed and stabilized via feedback to eliminate jitter, and intuitively coordinated with a well-designed smartphone interface, BBRs exhibit a uniquely fluid and organic motion. Unlike mobile inverted pendulums (MIPs, akin to unmanned Segways), BBRs stabilize both fore/aft and left/right motions with feedback, and bank when turning. Previous research on BBRs focused on vehicles from 50cm to 2m in height; the present work is the first to build significantly smaller BBRs, with heights under 25cm. We consider the unique issues arising when miniaturizing a BBR to such a scale, which are characterized by faster time scales and reduced weight (and, thus, reduced normal force and stiction between the omniwheels and the ball). Two key patent-pending aspects of our design are (a) moving the omniwheels to contact the ball down to around 20 to 30 deg N latitude, which increases the normal force between the omniwheels and the ball, and (b) orienting the omniwheels into mutually-orthogonal planes, which improves efficiency. Design iterations were facilitated by rapid prototyping and leveraged low-cost manufacturing principles and inexpensive components. Classical successive loop closure control strategies are implemented, which prove to be remarkably effective when the BBR isn't spinning quickly, and thus the left/right and fore/aft stabilization problems decompose into two decoupled MIP problems.", "title": "" }, { "docid": "196ddcefb2c3fcb6edd5e8d108f7e219", "text": "This paper may be considered as a practical reference for those who wish to add (now sufficiently matured) Agent Based modeling to their analysis toolkit and may or may not have some System Dynamics or Discrete Event modeling background. We focus on systems that contain large numbers of active objects (people, business units, animals, vehicles, or even things like projects, stocks, products, etc. that have timing, event ordering or other kind of individual behavior associated with them). We compare the three major paradigms in simulation modeling: System Dynamics, Discrete Event and Agent Based Modeling with respect to how they approach such systems. We show in detail how an Agent Based model can be built from an existing System Dynamics or a Discrete Event model and then show how easily it can be further enhanced to capture much more complicated behavior, dependencies and interactions thus providing for deeper insight in the system being modeled. Commonly understood examples are used throughout the paper; all models are specified in the visual language supported by AnyLogic tool. We view and present Agent Based modeling not as a substitution to older modeling paradigms but as a useful add-on that can be efficiently combined with System Dynamics and Discrete Event modeling. Several multi-paradigm model architectures are suggested.", "title": "" }, { "docid": "486e15d89ea8d0f6da3b5133c9811ee1", "text": "Frequency-modulated continuous wave radar systems suffer from permanent leakage of the transmit signal into the receive path. Besides leakage within the radar device itself, an unwanted object placed in front of the antennas causes so-called short-range (SR) leakage. In an automotive application, for instance, it originates from signal reflections of the car’s own bumper. Particularly the residual phase noise of the downconverted SR leakage signal causes a severe degradation of the achievable sensitivity. In an earlier work, we proposed an SR leakage cancellation concept that is feasible for integration in a monolithic microwave integrated circuit. In this brief, we present a hardware prototype that holistically proves our concept with discrete components. The fundamental theory and properties of the concept are proven with measurements. Further, we propose a digital design for real-time operation of the cancellation algorithm on a field programmable gate array. Ultimately, by employing measurements with a bumper mounted in front of the antennas, we show that the leakage canceller significantly improves the sensitivity of the radar.", "title": "" }, { "docid": "053afa7201df9174e7f44dded8fa3c36", "text": "Fault Detection and Diagnosis systems offers enhanced availability and reduced risk of safety haz ards w hen comp onent failure and other unex p ected events occur in a controlled p lant. For O nline FDD an ap p rop riate method an O nline data are req uired. I t is q uite difficult to get O nline data for FDD in industrial ap p lications and solution, using O P C is suggested. T op dow n and bottomup ap p roaches to diagnostic reasoning of w hole system w ere rep resented and tw o new ap p roaches w ere suggested. S olution 1 using q ualitative data from “ similar” subsystems w as p rop osed and S olution 2 using reference subsystem w ere p rop osed.", "title": "" }, { "docid": "b2817d85893a624574381eee4f8648db", "text": "A coupled-fed antenna design capable of covering eight-band WWAN/LTE operation in a smartphone and suitable to integrate with a USB connector is presented. The antenna comprises an asymmetric T-shaped monopole as a coupling feed and a radiator as well, and a coupled-fed loop strip shorted to the ground plane. The antenna generates a wide lower band to cover (824-960 MHz) for GSM850/900 operation and a very wide upper band of larger than 1 GHz to cover the GPS/GSM1800/1900/UMTS/LTE2300/2500 operation (1565-2690 MHz). The proposed antenna provides wideband operation and exhibits great flexible behavior. The antenna is capable of providing eight-band operation for nine different sizes of PCBs, and enhance impedance matching only by varying a single element length, L. Details of proposed antenna, parameters and performance are presented and discussed in this paper.", "title": "" }, { "docid": "8da6cc5c6a8a5d45fadbab8b7ca8b71f", "text": "Feature detection and description is a pivotal step in many computer vision pipelines. Traditionally, human engineered features have been the main workhorse in this domain. In this paper, we present a novel approach for learning to detect and describe keypoints from images leveraging deep architectures. To allow for a learning based approach, we collect a large-scale dataset of patches with matching multiscale keypoints. The proposed model learns from this vast dataset to identify and describe meaningful keypoints. We evaluate our model for the effectiveness of its learned representations for detecting multiscale keypoints and describing their respective support regions.", "title": "" }, { "docid": "f103277dbbcab26d8e5c176520666db9", "text": "Air pollution in urban environments has risen steadily in the last several decades. Such cities as Beijing and Delhi have experienced rises to dangerous levels for citizens. As a growing and urgent public health concern, cities and environmental agencies have been exploring methods to forecast future air pollution, hoping to enact policies and provide incentives and services to benefit their citizenry. Much research is being conducted in environmental science to generate deterministic models of air pollutant behavior; however, this is both complex, as the underlying molecular interactions in the atmosphere need to be simulated, and often inaccurate. As a result, with greater computing power in the twenty-first century, using machine learning methods for forecasting air pollution has become more popular. This paper investigates the use of the LSTM recurrent neural network (RNN) as a framework for forecasting in the future, based on time series data of pollution and meteorological information in Beijing. Due to the sequence dependencies associated with large-scale and longer time series datasets, RNNs, and in particular LSTM models, are well-suited. Our results show that the LSTM framework produces equivalent accuracy when predicting future timesteps compared to the baseline support vector regression for a single timestep. Using our LSTM framework, we can now extend the prediction from a single timestep out to 5 to 10 hours into the future. This is promising in the quest for forecasting urban air quality and leveraging that insight to enact beneficial policy.", "title": "" }, { "docid": "723f2a824bba1167b462b528a34b4b72", "text": "The Korea Advanced Institute of Science and Technology (KAIST) humanoid robot 1 (KHR-1) was developed for the purpose of researching the walking action of bipeds. KHR-1, which has no hands or head, has 21 degrees of freedom (DOF): 12 DOF in the legs, 1 DOF in the torso, and 8 DOF in the arms. The second version of this humanoid robot, KHR-2, (which has 41 DOF) can walk on a living-room floor; it also moves and looks like a human. The third version, KHR-3 (HUBO), has more human-like features, a greater variety of movements, and a more human-friendly character. We present the mechanical design of HUBO, including the design concept, the lower body design, the upper body design, and the actuator selection of joints. Previously we developed and published details of KHR-1 and KHR-2. The HUBO platform, which is based on KHR-2, has 41 DOF, stands 125 cm tall, and weighs 55 kg. From a mechanical point of view, HUBO has greater mechanical stiffness and a more detailed frame design than KHR-2. The stiffness of the frame was increased and the detailed design around the joints and link frame were either modified or fully redesigned. We initially introduced an exterior art design concept for KHR-2, and that concept was implemented in HUBO at the mechanical design stage.", "title": "" }, { "docid": "2c969a6f8292eb42e1775dad1ad2a741", "text": "Solar energy forms the major alternative for the generation of power keeping in mind the sustainable development with reduced greenhouse emission. For improved efficiency of the MPPT which uses solar energy in photovoltaic systems(PV), this paper presents a technique utilizing improved incremental conductance(Inc Cond) MPPT with direct control method using SEPIC converter. Several improvements in the existing technique is proposed which includes converter design aspects, system simulation & DSP programming. For the control part dsPIC30F2010 is programmed accordingly to get the maximum power point for different illuminations. DSP controller also forms the interfacing of PV array with the load. Now the improved Inc Cond helps to get point to point values accurately to track MPP's under different atmospheric conditions. MATLAB and Simulink were employed for simulation studies validation of the proposed technique. Experiment result proves the improvement from existing method.", "title": "" }, { "docid": "6ea0e96496d0c3054ae81e93a3012eb7", "text": "Supervised hierarchical topic modeling and unsupervised hierarchical topic modeling are usually used to obtain hierarchical topics, such as hLLDA and hLDA. Supervised hierarchical topic modeling makes heavy use of the information from observed hierarchical labels, but cannot explore new topics; while unsupervised hierarchical topic modeling is able to detect automatically new topics in the data space, but does not make use of any information from hierarchical labels. In this paper, we propose a semi-supervised hierarchical topic model which aims to explore new topics automatically in the data space while incorporating the information from observed hierarchical labels into the modeling process, called SemiSupervised Hierarchical Latent Dirichlet Allocation (SSHLDA). We also prove that hLDA and hLLDA are special cases of SSHLDA. We conduct experiments on Yahoo! Answers and ODP datasets, and assess the performance in terms of perplexity and clustering. The experimental results show that predictive ability of SSHLDA is better than that of baselines, and SSHLDA can also achieve significant improvement over baselines for clustering on the FScore measure.", "title": "" }, { "docid": "ebd65c03599cc514e560f378f676cc01", "text": "The purpose of this paper is to examine an integrated model of TAM and D&M to explore the effects of quality features, perceived ease of use, perceived usefulness on users’ intentions and satisfaction, alongside the mediating effect of usability towards use of e-learning in Iran. Based on the e-learning user data collected through a survey, structural equations modeling (SEM) and path analysis were employed to test the research model. The results revealed that ‘‘intention’’ and ‘‘user satisfaction’’ both had positive effects on actual use of e-learning. ‘‘System quality’’ and ‘‘information quality’’ were found to be the primary factors driving users’ intentions and satisfaction towards use of e-learning. At last, ‘‘perceived usefulness’’ mediated the relationship between ease of use and users’ intentions. The sample consisted of e-learning users of four public universities in Iran. Past studies have seldom examined an integrated model in the context of e-learning in developing countries. Moreover, this paper tries to provide a literature review of recent published studies in the field of e-learning. 2014 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "efba71635ca38b4588d3e4200d655fee", "text": "BACKGROUND\nCircumcisions and cesarian sections are common procedures. Although complications to the newborn child fortunately are rare, it is important to emphasize the potential significance of this problem and its frequent iatrogenic etiology. The authors present 7 cases of genitourinary trauma in newborns, including surgical management and follow-up.\n\n\nMETHODS\nThe authors relate 7 recent cases of genitourinary trauma in newborns from a children's hospital in a major metropolitan area.\n\n\nRESULTS\nCase 1 and 2: Two infants suffered degloving injuries to both the prepuce and penile shaft from a Gomco clamp. Successful full-thickness skin grafting using the previously excised foreskin was used in 1 child. Case 3, 4, and 5: A Mogen clamp caused glans injuries in 3 infants. In 2, hemorrhage from the severed glans was controlled with topical epinephrine; the glans healed with a flattened appearance. Another infant sustained a laceration ventrally, requiring a delayed modified meatal advancement glanoplasty to correct the injury. Case 6: A male infant suffered a ventral slit and division of the ventral urethra before placement of a Gomco clamp. Formal hypospadias repair was required. Case 7: An emergent cesarean section resulted in a grade 4-perineal laceration in a female infant. The vaginal tear caused by the surgeon's finger, extended up to the posterior insertion of the cervix and into the rectum. The infant successfully underwent an emergent multilayered repair.\n\n\nCONCLUSIONS\nGenitourinary trauma in the newborn is rare but often necessitates significant surgical intervention. Circumcision often is the causative event. There has been only 1 prior report of a perineal injury similar to case 7, with a fatal outcome.", "title": "" }, { "docid": "f89236f0cf15d8fa64aca8682d87447f", "text": "This research targeted the learning preferences, goals and motivations, achievements, challenges, and possibilities for life change of self-directed online learners who subscribed to the monthly OpenCourseWare (OCW) e-newsletter from MIT. Data collection included a 25-item survey of 1,429 newsletter subscribers; 613 of whom also completed an additional 15 open-ended survey items. The 25 close-ended survey findings indicated that respondents used a wide range of devices and places to learn for their self-directed learning needs. Key motivational factors included curiosity, interest, and internal need for self-improvement. Factors leading to success or personal change included freedom to learn, resource abundance, choice, control, and fun. In terms of achievements, respondents were learning both specific skills as well as more general skills that help them advance in their careers. Science, math, and foreign language skills were the most desired by the survey respondents. The key obstacles or challenges faced were time, lack of high quality open resources, and membership or technology fees. Several brief stories of life change across different age ranges are documented. Among the chief implications is that learning something new to enhance one’s life or to help others is often more important than course transcript credit or a certificate of completion.", "title": "" }, { "docid": "7adb0a3079fb3b64f7a503bd8eae623e", "text": "Attack trees have found their way to practice because they have proved to be an intuitive aid in threat analysis. Despite, or perhaps thanks to, their apparent simplicity, they have not yet been provided with an unambiguous semantics. We argue that such a formal interpretation is indispensable to precisely understand how attack trees can be manipulated during construction and analysis. We provide a denotational semantics, based on a mapping to attack suites, which abstracts from the internal structure of an attack tree, we study transformations between attack trees, and we study the attribution and projection of an attack tree.", "title": "" }, { "docid": "59a91a18b3706f3e170063818e964ce8", "text": "We present an approach to capture the 3D structure and motion of a group of people engaged in a social interaction. The core challenges in capturing social interactions are: (1) occlusion is functional and frequent, (2) subtle motion needs to be measured over a space large enough to host a social group, and (3) human appearance and configuration variation is immense. The Panoptic Studio is a system organized around the thesis that social interactions should be measured through the perceptual integration of a large variety of view points. We present a modularized system designed around this principle, consisting of integrated structural, hardware, and software innovations. The system takes, as input, 480 synchronized video streams of multiple people engaged in social activities, and produces, as output, the labeled time-varying 3D structure of anatomical landmarks on individuals in the space. The algorithmic contributions include a hierarchical approach for generating skeletal trajectory proposals, and an optimization framework for skeletal reconstruction with trajectory re-association.", "title": "" }, { "docid": "051aa7421187bab5d9e11184da16cc9e", "text": "This paper compares the approaches to reuse in software engineering and knowledge engineering. In detail, definitions are given, the history is enlightened, the main approaches are described, and their feasibility is discussed. The aim of the paper is to show the close relation between software and knowledge engineering and to help the knowledge engineering community to learn from experiences in software engineering with respect to reuse. 1 Reuse in Software Engineering", "title": "" }, { "docid": "1e347f69d739577d4bb0cc050d87eb5b", "text": "The rapidly growing paradigm of the Internet of Things (IoT) requires new search engines, which can crawl heterogeneous data sources and search in highly dynamic contexts. Existing search engines cannot meet these requirements as they are designed for traditional Web and human users only. This is contrary to the fact that things are emerging as major producers and consumers of information. Currently, there is very little work on searching IoT and a number of works claim the unavailability of public IoT data. However, it is dismissed that a majority of real-time web-based maps are sharing data that is generated by things, directly. To shed light on this line of research, in this paper, we firstly create a set of tools to capture IoT data from a set of given data sources. We then create two types of interfaces to provide real-time searching services on dynamic IoT data for both human and machine users.", "title": "" }, { "docid": "a00acd7a9a136914bf98478ccd85e812", "text": "Deep-learning has proved in recent years to be a powerful tool for image analysis and is now widely used to segment both 2D and 3D medical images. Deep-learning segmentation frameworks rely not only on the choice of network architecture but also on the choice of loss function. When the segmentation process targets rare observations, a severe class imbalance is likely to occur between candidate labels, thus resulting in sub-optimal performance. In order to mitigate this issue, strategies such as the weighted cross-entropy function, the sensitivity function or the Dice loss function, have been proposed. In this work, we investigate the behavior of these loss functions and their sensitivity to learning rate tuning in the presence of different rates of label imbalance across 2D and 3D segmentation tasks. We also propose to use the class re-balancing properties of the Generalized Dice overlap, a known metric for segmentation assessment, as a robust and accurate deep-learning loss function for unbalanced tasks.", "title": "" }, { "docid": "412e10ae26c0abcb37379c6b37ea022a", "text": "This paper presents the Gavagai Living Lexicon, which is an online distributional semantic model currently available in 20 different languages. We describe the underlying distributional semantic model, and how we have solved some of the challenges in applying such a model to large amounts of streaming data. We also describe the architecture of our implementation, and discuss how we deal with continuous quality assurance of the lexicon.", "title": "" } ]
scidocsrr
981afbb61e0060c0e3f5ea4f84abbd63
Holographic localization of passive UHF RFID transponders
[ { "docid": "22c3eb9aa0127e687f6ebb6994fc8d1d", "text": "In this paper, the novel inverse synthetic aperture secondary radar wireless positioning technique is introduced. The proposed concept allows for a precise spatial localization of a backscatter transponder even in dense multipath environments. A novel secondary radar signal evaluation concept compensates for the unknown modulation phase of the returned signal and thus leads to radar signals comparable to common primary radar. With use of this concept, inverse synthetic aperture radar algorithms can be applied to the signals of backscatter transponder systems. In simulations and first experiments, we used a broadband holographic reconstruction principle to realize the inverse synthetic aperture approach. The movement of the transponder along a short arbitrary aperture path is determined with assisting relative sensors (dead reckoning or inertia sensors). A set of signals measured along the aperture is adaptively focused to the transponder position. By this focusing technique, multipath reflections can be suppressed impressively and a precise indoor positioning becomes feasible. With our technique, completely new and powerful options for integrated navigation and sensor fusion in RF identification systems and wireless local positioning systems are now possible.", "title": "" } ]
[ { "docid": "54d223a2a00cbda71ddf3f1b29f1ebed", "text": "Much of the data of scientific interest, particularly when independence of data is not assumed, can be represented in the form of information networks where data nodes are joined together to form edges corresponding to some kind of associations or relationships. Such information networks abound, like protein interactions in biology, web page hyperlink connections in information retrieval on the Web, cellphone call graphs in telecommunication, co-authorships in bibliometrics, crime event connections in criminology, etc. All these networks, also known as social networks, share a common property, the formation of connected groups of information nodes, called community structures. These groups are densely connected nodes with sparse connections outside the group. Finding these communities is an important task for the discovery of underlying structures in social networks, and has recently attracted much attention in data mining research. In this paper, we present Top Leaders, a new community mining approach that, simply put, regards a community as a set of followers congregating around a potential leader. Our algorithm starts by identifying promising leaders in a given network then iteratively assembles followers to their closest leaders to form communities, and subsequently finds new leaders in each group around which to gather followers again until convergence. Our intuitions are based on proven observations in social networks and the results are very promising. Experimental results on benchmark networks verify the feasibility and effectiveness of our new community mining approach.", "title": "" }, { "docid": "a2e8ece304e6300d399a4ef38d282623", "text": "So, they had to be simple, apply to a broad range of systems, and yet exhibit good resolution. Obviously a simple task, but first let’s look at what it means to be autonomous. he recently released DoD Unmanned Aerial Vehicles map [9] discusses advancements in UAV autonomy in of autonomous control levels (ACL). The ACL concept pioneered by researchers in the Air Force Research ratory’s Air Vehicles Directorate who are charged with loping autonomous air vehicles. In the process of loping intelligent autonomous agents for UAV control ms we were constantly challenged to “tell us how omous a UAV is, and how do you think it can be ured...” Usually we hand-waved away the argument and d the questioner will go away since this is a very subjective, complicated, subject, but within the last year we’ve been ted to develop national intelligent autonomous UAV control cs an IQ test for the flyborgs, if you will. The ACL chart result. We’ve done this via intense discussions with other rnment labs and industry, and this paper covers the agreed cs (an extension of the OODA observe, orient, decide, and loop) as well as the precursors, “dead-ends”, and out-andlops investigated to get there. 2. Quick Difference Between Autonomous and Automatic (our definition) Many people don’t realize that there is a significant difference between the words autonomous and automatic. Many news and trade articles use these words interchangeably. Automatic means that a system will do exactly as programmed, it has no choice. Autonomous means that a system has a choice to make free of outside influence, i.e., an autonomous system has free will. For instance, let’s compare functions of an automatic system (autopilot) and an autonomous guidance system: • Autopilot: Stay on course chosen. • Autonomous Guidance: Decide which course to take, then stay on it. eywords: autonomy metrics, machine intelligence ics, UAV, autonomous control Example: a cruise missile is not autonomous, but automatic since all choices have been made prior to launch. Background p levels of the US Department of Defense an effort been initiated to coordinate researchers across the ices and industry in meeting national goals in fixedvehicle development. The Fixed-Wing Vehicle ative (FWV) has broad goals across numerous vehicle nologies. One of those areas is mission management AVs. Our broad goal is to develop the technology ing UAVs to replace human piloted aircraft for any eivable mission. This implies that we have to give s some level of autonomy to accomplish the ions. One of the cornerstones of the FWV process is stablishment of metrics so one know that a goal is hed, but what metrics were available for measuring autonomy? Our research, in conjunction with stry, determined that there was not any sort of metric e desired. Thus we set out to define our own [Note 3. We Need To Measure Autonomy, Not Intelligence For some reason people tend to equate autonomy to intelligence. Looking through the proceedings of the last NIST Intelligent Systems Workshop there are several papers which do this, and in fact, the entire conference sets the tone that “intelligence is autonomy” [3]. They are not the same. Many stupid things are quite autonomous (bacteria) and many very smart things are not (my 3 year old daughter seemingly most of the time). Intelligence (one of a myriad of definitions) is the capability of discovering knowledge and using it to do something. Autonomy is: • the ability to generate one’s own purposes without any instruction from outside (L. Fogel) what characteristics should these metrics have? We ded that they needed to be: • having free will (B. Clough) What we want to know is how well a UAV will do a task, or better yet, develop tasks to reach goals, when we’re not around to do it for the UAV. We really don’t care how intelligent it is, just that it does the job assigned. Therefore, intelligence measures tell us little. So, although we could talk about the Turing Test [1] and other intelligence metrics, that is not what we wanted. Easily visualized such that upper management could grasp the concepts in a couple of briefing slides. Broad enough to measure past, present and future autonomous system development. Have enough resolution to easily track impact of technological program investments. Report Documentation Page Form Approved", "title": "" }, { "docid": "444472f7c11a35a747b50bc9ffc7fea7", "text": "Deep Neural Networks (DNNs) are very popular these days, and are the subject of a very intense investigation. A DNN is made by layers of internal units (or neurons), each of which computes an affine combination of the output of the units in the previous layer, applies a nonlinear operator, and outputs the corresponding value (also known as activation). A commonly-used nonlinear operator is the so-called rectified linear unit (ReLU), whose output is just the maximum between its input value and zero. In this (and other similar cases like max pooling, where the max operation involves more than one input value), one can model the DNN as a 0-1 Mixed Integer Linear Program (0-1 MILP) where the continuous variables correspond to the output values of each unit, and a binary variable is associated with each ReLU to model its yes/no nature. In this paper we discuss the peculiarity of this kind of 0-1 MILP models, and describe an effective bound-tightening technique intended to ease its solution. We also present possible applications of the 0-1 MILP model arising in feature visualization and in the construction of adversarial examples. Preliminary computational results are reported, aimed at investigating (on small DNNs) the computational performance of a state-of-the-art MILP solver when applied to a known test case, namely, hand-written digit recognition.", "title": "" }, { "docid": "29e5afc2780455b398e7b7451c08e39f", "text": "The recent special report, “Indiana’s Vision of Response to Intervention” issued by the Center for Evaluation & Education Policy (CEEP) was the first of a three-part series aimed to build a fundamental understanding of a Response-to-Intervention (RTI) framework in Indiana’s schools to aid in the prevention and intervention of both academic and behavioral problems for all students. The report also discussed the impetus for implementation of RTI, as well as what the state of Indiana is currently doing to respond to and guide schools through this new initiative. Specifically, Indiana’s Department of Education (IDOE) has developed a framework of RTI that addresses six core components on which to focus: (1) evidence-based curriculum, instruction, intervention and extension; (2) assessment and progress monitoring; (3) data-based decision making; (4) leadership; (5) family, school, and community partnerships; and (6) cultural responsivity.", "title": "" }, { "docid": "881325bbeb485fc405c2cb77f9a12dfb", "text": "Drawing on social capital theory, this study examined whether college students’ self-disclosure on a social networking site was directly associated with social capital, or related indirectly through the degree of positive feedback students got from Internet friends. Structural equation models applied to anonymous, self-report survey data from 264 first-year students at 3 universities in Beijing, China, indicated direct effects on bridging social capital and indirect effects on bonding social capital. Effects remained significant, though modest in magnitude, after controlling for social skills level. Findings suggest ways in which social networking sites can foster social adjustment as an adolescent transition to residential col-", "title": "" }, { "docid": "eeff8964179ebd51745fece9b2fd50f3", "text": "In this paper, we present a novel structure-preserving image completion approach equipped with dynamic patches. We formulate the image completion problem into an energy minimization framework that accounts for coherence within the hole and global coherence simultaneously. The completion of the hole is achieved through iterative optimizations combined with a multi-scale solution. In order to avoid abnormal structure and disordered texture, we utilize a dynamic patch system to achieve efficient structure restoration. Our dynamic patch system functions in both horizontal and vertical directions of the image pyramid. In the horizontal direction, we conduct a parallel search for multi-size patches in each pyramid level and design a competitive mechanism to select the most suitable patch. In the vertical direction, we use large patches in higher pyramid level to maximize the structure restoration and use small patches in lower pyramid level to reduce computational workload. We test our approach on massive images with complex structure and texture. The results are visually pleasing and preserve nice structure. Apart from effective structure preservation, our approach outperforms previous state-of-the-art methods in time consumption.", "title": "" }, { "docid": "853f361ca9e99c120a0462d957da12df", "text": "This study examined Japanese speakers’ learning of American English during their first years of immersion in the United States (U.S.). Native Japanesespeaking (NJ) children (n=16) and adults (n=16) were tested on two occasions, averaging 0.5 (T1) and 1.6 years (T2) after arrival in the U.S. Age-matched groups of native English-speaking children (n=16) and adults (n=16) also participated. The NJ adults’ scores for segmental perception and production were higher than the NJ children’s at T1. The NJ children’s foreign accent scores and pronunciation of English fricatives improved significantly between T1 and T2, whereas the NJ adults’ scores did not. These findings suggest that adults may have an advantage over children initially but that children may improve in production more quickly than adults when immersed in an L2-speaking environment.", "title": "" }, { "docid": "051f9518ffd3d5b3073a70cb2d4fe683", "text": "This paper describes a novel Byzantine fault tolerant protocol that allows replicas to join and exit dynamically. With the astonishing success of cryptocurrencies, people attach great importance in “blockchain” and robust Byzantine fault tolerant (BFT) protocols for consensus. Among the conventional wisdom, the Practical Byzantine Fault Tolerance (PBFT), proposed by Miguel and Liskov in 1999, occupies an important position. Although PBFT has many advantages, it has fatal disadvantages. Firstly, it works in a completely enclosed environment, where users who want to add or take out any node must stop the whole system. Secondly, although PBFT guarantees liveness and safety if at most $\\left\\lfloor {\\frac{{{\\rm{n}} - 1}}{3}} \\right\\rfloor$ out of a total n replicas are faulty, it takes no measure to deal with these ineffective or malicious replicas, which is harmful to the system and will cause system crash finally. These drawbacks are unbearable in practice. In order to solve them, we present an alternative, Dynamic PBFT.", "title": "" }, { "docid": "d2f7f7a355f133a8e5f40c67ca42a076", "text": "In present times, giving a computer to carry out any task requires a set of specific instructions or the implementation of an algorithm that defines the rules that need to be followed. The present day computer system has no ability to learn from past experiences and hence cannot readily improve on the basis of past mistakes. So, giving a computer or instructing a computer controlled programme to perform a task requires one to define a complete and correct algorithm for task and then programme the algorithm into the computer. Such activities involve tedious and time consuming effort by specially trained teacher or person. Jaime et al (Jaime G. Carbonell, 1983) also explained that the present day computer systems cannot truly learn to perform a task through examples or through previous solved task and they cannot improve on the basis of past mistakes or acquire new abilities by observing and imitating experts. Machine Learning research endeavours to open the possibility of instruction the computer in such a new way and thereby promise to ease the burden of hand writing programmes and growing problems of complex information that get complicated in the computer. When approaching a task-oriented acquisition task, one must be aware that the resultant computer system must interact with human and therefore should closely match human abilities. So, learning machine or programme on the other hand will have to interact with computer users who make use of them and consequently the concept and skills they acquireif not necessarily their internal mechanism must be understandable to humans. Also Alpaydin (Alpaydin, 2004) stated that with advances in computer technology, we currently have the ability to store and process large amount of data, as well as access it from physically distant locations over computer network. Most data acquisition devices are digital now and record reliable data. For example, a supermarket chain that has hundreds of stores all over the country selling thousands of goods to millions of customers. The point of sale terminals record the details of each transaction: date, customer identification code, goods bought and their amount, total money spent and so forth, This typically amounts to gigabytes of data every day. This store data becomes useful only when it is analysed and tuned into information that can be used or be predicted. We do not know exactly which people are likely to buy a particular product or which author to suggest to people who enjoy reading Hemingway. If we knew, we would not need any analysis of the data; we would just go ahead and write down code. But because we do not, we can only collect data and hope to extract the answers to these and similar question from 1", "title": "" }, { "docid": "f3e83402c548ea1b5bcdaab4eb123ace", "text": "This paper advocates a novel multiscale, structure-sensitive saliency detection method, which can distinguish multilevel, reliable saliency from various natural pictures in a robust and versatile way. One key challenge for saliency detection is to guarantee the entire salient object being characterized differently from nonsalient background. To tackle this, our strategy is to design a structure-aware descriptor based on the intrinsic biharmonic distance metric. One benefit of introducing this descriptor is its ability to simultaneously integrate local and global structure information, which is extremely valuable for separating the salient object from nonsalient background in a multiscale sense. Upon devising such powerful shape descriptor, the remaining challenge is to capture the saliency to make sure that salient subparts actually stand out among all possible candidates. Toward this goal, we conduct multilevel low-rank and sparse analysis in the intrinsic feature space spanned by the shape descriptors defined on over-segmented super-pixels. Since the low-rank property emphasizes much more on stronger similarities among super-pixels, we naturally obtain a scale space along the rank dimension in this way. Multiscale saliency can be obtained by simply computing differences among the low-rank components across the rank scale. We conduct extensive experiments on some public benchmarks, and make comprehensive, quantitative evaluation between our method and existing state-of-the-art techniques. All the results demonstrate the superiority of our method in accuracy, reliability, robustness, and versatility.", "title": "" }, { "docid": "8942b664429435fbd66c765215bec284", "text": "In this paper, we present a technique for generating animation from a variety of user-defined constraints. We pose constraint-based motion synthesis as a maximum a posterior (MAP) problem and develop an optimization framework that generates natural motion satisfying user constraints. The system automatically learns a statistical dynamic model from motion capture data and then enforces it as a motion prior. This motion prior, together with user-defined constraints, comprises a trajectory optimization problem. Solving this problem in the low-dimensional space yields optimal natural motion that achieves the goals specified by the user. We demonstrate the effectiveness of this approach by generating whole-body and facial motion from a variety of spatial-temporal constraints.", "title": "" }, { "docid": "b0d2e7d1c9f347adc58cb88aead3fd07", "text": "The promise of learning to learn for robotics rests on the hope that by extracting some information about the learning process itself we can speed up subsequent similar learning tasks. Here, we introduce a computationally efficient online meta-learning algorithm that builds and optimizes a memory model of the optimal learning rate landscape from previously observed gradient behaviors. While performing task specific optimization, this memory of learning rates predicts how to scale currently observed gradients. After applying the gradient scaling our meta-learner updates its internal memory based on the observed effect its prediction had. Our meta-learner can be combined with any gradient-based optimizer, learns on the fly and can be transferred to new optimization tasks. In our evaluations we show that our meta-learning algorithm speeds up learning of MNIST classification and a variety of learning control tasks, either in batch or online learning settings.", "title": "" }, { "docid": "3c24165f70675be40ad42f8d8ce09c33", "text": "This paper describes the design of a smart, motorized, voice controlled wheelchair using embedded system. Proposed design supports voice activation system for physically differently abled persons incorporating manual operation. This paper represents the “Voice-controlled Wheel chair” for the physically differently abled person where the voice command controls the movements of the wheelchair. The voice command is given through a cellular device having Bluetooth and the command is transferred and converted to string by the BT Voice Control for Arduino and is transferred to the Bluetooth Module SR-04connected to the Arduino board for the control of the Wheelchair. For example, when the user says „Go‟ then chair will move in forward direction and when he says „Back‟ then the chair will move in backward direction and similarly „Left‟, „Right‟ for rotating it in left and right directions respectively and „Stop‟ for making it stop. This system was designed and developed to save cost, time and energy of the patient. Ultrasonic sensor is also made a part of the design and it helps to detect obstacles lying ahead in the way of the wheelchair that can hinder the passage of the wheelchair.", "title": "" }, { "docid": "2a41af8ad6000163951b9e7399ce7444", "text": "Accurate location of the endpoints of an isolated word is important for reliable and robust word recognition. The endpoint detection problem is nontrivial for nonstationary backgrounds where artifacts (i.e., nonspeech events) may be introduced by the speaker, the recording environment, and the transmission system. Several techniques for the detection of the endpoints of isolated words recorded over a dialed-up telephone line were studied. The techniques were broadly classified as either explicit, implicit, or hybrid in concept. The explicit techniques for endpoint detection locate the endpoints prior to and independent of the recognition and decision stages of the system. For the implicit methods, the endpoints are determined solely by the recognition and decision stages Of the system, i.e., there is no separate stage for endpoint detection. The hybrid techniques incorporate aspects from both the explicit and implicit methods. Investigations showed that the hybrid techniques consistently provided the best estimates for both of the word endpoints and, correspondingly, the highest recognition accuracy of the three classes studied. A hybrid endpoint detector is proposed which gives a rejection rate of less than 0.5 percent, while providing recognition accuracy close to that obtained from hand-edited endpoints.", "title": "" }, { "docid": "6d55978aa80f177f6a859a55380ffed8", "text": "This paper investigates the effect of lowering the supply and threshold voltages on the energy efficiency of CMOS circuits. Using a first-order model of the energy and delay of a CMOS circuit, we show that lowering the supply and threshold voltage is generally advantageous, especially when the transistors are velocity saturated and the nodes have a high activity factor. In fact, for modern submicron technologies, this simple analysis suggests optimal energy efficiency at supply voltages under 0.5 V. Other process and circuit parameters have almost no effect on this optimal operating point. If there is some uncertainty in the value of the threshold or supply voltage, however, the power advantage of this very low voltage operation diminishes. Therefore, unless active feedback is used to control the uncertainty, in the future the supply and threshold voltage will not decrease drastically, but rather will continue to scale down to maintain constant electric fields.", "title": "" }, { "docid": "0e32cef3d4f4e6bd23a3004a44b138a6", "text": "There have been some works that learn a lexicon together with the corpus to improve the word embeddings. However, they either model the lexicon separately but update the neural networks for both the corpus and the lexicon by the same likelihood, or minimize the distance between all of the synonym pairs in the lexicon. Such methods do not consider the relatedness and difference of the corpus and the lexicon, and may not be the best optimized. In this paper, we propose a novel method that considers the relatedness and difference of the corpus and the lexicon. It trains word embeddings by learning the corpus to predicate a word and its corresponding synonym under the context at the same time. For polysemous words, we use a word sense disambiguation filter to eliminate the synonyms that have different meanings for the context. To evaluate the proposed method, we compare the performance of the word embeddings trained by our proposed model, the control groups without the filter or the lexicon, and the prior works in the word similarity tasks and text classification task. The experimental results show that the proposed model provides better embeddings for polysemous words and improves the performance for text classification.", "title": "" }, { "docid": "27c0c6c43012139fc3e4ee64ae043c0b", "text": "This paper presents a method for measuring signal backscattering from RFID tags, and for calculating a tag's radar cross section (RCS). We derive a theoretical formula for the RCS of an RFID tag with a minimum-scattering antenna. We describe an experimental measurement technique, which involves using a network analyzer connected to an anechoic chamber with and without the tag. The return loss measured in this way allows us to calculate the backscattered power and to find the tag's RCS. Measurements were performed using an RFID tag operating in the UHF band. To determine whether the tag was turned on, we used an RFID tag tester. The tag's RCS was also calculated theoretically, using electromagnetic simulation software. The theoretical results were found to be in good agreement with experimental data", "title": "" }, { "docid": "c49ae120bca82ef0d9e94115ad7107f2", "text": "An evaluation and comparison of seven of the world’s major building codes and standards is conducted in this study, with specific discussion of their estimations of the alongwind, acrosswind, and torsional response, where applicable, for a given building. The codes and standards highlighted by this study are those of the United States, Japan, Australia, the United Kingdom, Canada, China, and Europe. In addition, the response predicted by using the measured power spectra of the alongwind, acrosswind, and torsional responses for several building shapes tested in a wind tunnel are presented, and a comparison between the response predicted by wind tunnel data and that estimated by some of the standards is conducted. This study serves not only as a comparison of the response estimates by international codes and standards, but also introduces a new set of wind tunnel data for validation of wind tunnel-based empirical expressions. 1.0 Introduction Under the influence of dynamic wind loads, typical high-rise buildings oscillate in the alongwind, acrosswind, and torsional directions. The alongwind motion primarily results from pressure fluctuations on the windward and leeward faces, which generally follows the fluctuations in the approach flow, at least in the low frequency range. Therefore, alongwind aerodynamic loads may be quantified analytically utilizing quasi-steady and strip theories, with dynamic effects customarily represented by a random-vibrationbased “Gust Factor Approach” (Davenport 1967, Vellozzi & Cohen 1968, Vickery 1970, Simiu 1976, Solari 1982, ESDU 1989, Gurley & Kareem 1993). However, the acrosswind motion is introduced by pressure fluctuations on the side faces which are influenced by fluctuations in the separated shear layers and wake dynamics (Kareem 1982). This renders the applicability of strip and quasi-steady theories rather doubtful. Similarly, the wind-induced torsional effects result from an imbalance in the instantaneous pressure distribution on the building surface. These load effects are further amplified in asymmetric buildings as a result of inertial coupling (Kareem 1985). Due to the complexity of the acrosswind and torsional responses, physical modeling of fluid-structure interactions remains the only viable means of obtaining information on wind loads, though recently, research in the area of computational fluid dynam1. Graduate Student & Corresponding Author, NatHaz Modeling Laboratory, Department of Civil Engineering and Geological Sciences, University of Notre Dame, Notre Dame, IN, 46556. e-mail: Tracy.L.Kijewski.1@nd.edu 2. Professor, NatHaz Modeling Laboratory, Department of Civil Engineering and Geological Sciences, University of Notre Dame, Notre Dame, IN, 46556", "title": "" }, { "docid": "d9df79b3724820a12d5517f2dcdc33ff", "text": "The tremendous growth of machine-tomachine (M2M) applications has been a great attractor to cellular network operators to provide machine-type communication services. One of the important challenges for cellular systems supporting M2M terminals is coverage, because terminals can be located in spaces in buildings and structures suffering from significant penetration losses. Since these terminals are also often stationary, they are permanently without cellular coverage. To address this critical issue, the third generation partnership project (3GPP), and in particular its radio access network technical specification group, commenced work on coverage enhancement (CE) for long-term evolution (LTE) systems in June 2013. This article reviews the CE objectives defined for LTE machine-type communication and presents CE methods for LTE downlink and uplink channels discussed in this group. The presented methods achieve CE in a spectrally efficient manner and without notably affecting performance for legacy (non- M2M) devices.", "title": "" }, { "docid": "e103d3a7be2ce1933eac191d2324e85b", "text": "With recent progress in the medical signals processing, the EEG allows to study the Brain functioning with a high temporal and spatial resolution. This approach is possible by combining the standard processing algorithms of cortical brain waves with characterization and interpolation methods. First, a new vector of characteristics for each EEG channel was introduced using the Extended Kalman filter (EKF). Next, the spherical spline interpolation technique was applied in order to rebuild other vectors corresponding to virtual electrodes. The temporal variation of these vectors was restored by applying the EKF. Finally, the accuracy of the method has been estimated by calculating the error between the actual and interpolated signal after passing by the characterization method with the Root Mean Square Error algorithm (RMSE).", "title": "" } ]
scidocsrr
e0a8bda10c5595a4a07a428ce6dd2a29
A new image filtering method: Nonlocal image guided averaging
[ { "docid": "b5453d9e4385d5a5ff77997ad7e3f4f0", "text": "We propose a new measure, the method noise, to evaluate and compare the performance of digital image denoising methods. We first compute and analyze this method noise for a wide class of denoising algorithms, namely the local smoothing filters. Second, we propose a new algorithm, the nonlocal means (NL-means), based on a nonlocal averaging of all pixels in the image. Finally, we present some experiments comparing the NL-means algorithm and the local smoothing filters.", "title": "" } ]
[ { "docid": "a9612aacde205be2d753c5119b9d95d3", "text": "We propose a multi-object multi-camera framework for tracking large numbers of tightly-spaced objects that rapidly move in three dimensions. We formulate the problem of finding correspondences across multiple views as a multidimensional assignment problem and use a greedy randomized adaptive search procedure to solve this NP-hard problem efficiently. To account for occlusions, we relax the one-to-one constraint that one measurement corresponds to one object and iteratively solve the relaxed assignment problem. After correspondences are established, object trajectories are estimated by stereoscopic reconstruction using an epipolar-neighborhood search. We embedded our method into a tracker-to-tracker multi-view fusion system that not only obtains the three-dimensional trajectories of closely-moving objects but also accurately settles track uncertainties that could not be resolved from single views due to occlusion. We conducted experiments to validate our greedy assignment procedure and our technique to recover from occlusions. We successfully track hundreds of flying bats and provide an analysis of their group behavior based on 150 reconstructed 3D trajectories.", "title": "" }, { "docid": "e70c6ccc129f602bd18a49d816ee02a9", "text": "This purpose of this paper is to show how prevalent features of successful human tutoring interactions can be integrated into a pedagogical agent, AutoTutor. AutoTutor is a fully automated computer tutor that responds to learner input by simulating the dialog moves of effective, normal human tutors. AutoTutor’s delivery of dialog moves is organized within a 5step framework that is unique to normal human tutoring interactions. We assessed AutoTutor’s performance as an effective tutor and conversational partner during tutoring sessions with virtual students of varying ability levels. Results from three evaluation cycles indicate the following: (1) AutoTutor is capable of delivering pedagogically effective dialog moves that mimic the dialog move choices of human tutors, and (2) AutoTutor is a reasonably effective conversational partner. INTRODUCTION AND BACKGROUND Over the last decade a number of researchers have attempted to uncover the mechanisms of human tutoring that are responsible for student learning gains. Many of the informative findings have been reported in studies that have systematically analyzed the collaborative discourse that occurs between tutors and students (Fox, 1993; Graesser & Person, 1994; Graesser, Person, & Magliano, 1995; Hume, Michael, Rovick, & Evens, 1996; McArthur, Stasz, & Zmuidzinas, 1990; Merrill, Reiser, Ranney, & Trafton, 1992; Moore, 1995; Person & Graesser, 1999; Person, Graesser, Magliano, & Kreuz, 1994; Person, Kreuz, Zwaan, & Graesser, 1995; Putnam, 1987). For example, we have learned that the tutorial session is predominately controlled by the tutor. That is, tutors, not students, typically determine when and what topics will be covered in the session. Further, we know that human tutors rarely employ sophisticated or “ideal” tutoring models that are often incorporated into intelligent tutoring systems. Instead, human tutors are more likely to rely on localized strategies that are embedded within conversational turns. Although many findings such as these have illuminated the tutoring process, they present formidable challenges for designers of intelligent tutoring systems. After all, building a knowledgeable conversational partner is no small feat. However, if designers of future tutoring systems wish to capitalize on the knowledge gained from human tutoring studies, the next generation of tutoring systems will incorporate pedagogical agents that engage in learning dialogs with students. The purpose of this paper is twofold. First, we will describe how prevalent features of successful human tutoring interactions can be incorporated into a pedagogical agent, AutoTutor. Second, we will provide data from several preliminary performance evaluations in which AutoTutor interacts with virtual students of varying ability levels. Person, Graesser, Kreuz, Pomeroy, and the Tutoring Research Group AutoTutor is a fully automated computer tutor that is currently being developed by the Tutoring Research Group (TRG). AutoTutor is a working system that attempts to comprehend students’ natural language contributions and then respond to the student input by simulating the dialogue moves of human tutors. AutoTutor differs from other natural language tutors in several ways. First, AutoTutor does not restrict the natural language input of the student like other systems (e.g., Adele (Shaw, Johnson, & Ganeshan, 1999); the Ymir agents (Cassell & Thórisson, 1999); Cirscim-Tutor (Hume, Michael, Rovick, & Evens, 1996; Zhou et al., 1999); Atlas (Freedman, 1999); and Basic Electricity and Electronics (Moore, 1995; Rose, Di Eugenio, & Moore, 1999)). These systems tend to limit student input to a small subset of judiciously worded speech acts. Second, AutoTutor does not allow the user to substitute natural language contributions with GUI menu options like those in the Atlas and Adele systems. The third difference involves the open-world nature of AutoTutor’s content domain (i.e., computer literacy). The previously mentioned tutoring systems are relatively more closed-world in nature, and therefore, constrain the scope of student contributions. The current version of AutoTutor simulates the tutorial dialog moves of normal, untrained tutors; however, plans for subsequent versions include the integration of more sophisticated ideal tutoring strategies. AutoTutor is currently designed to assist college students learn about topics covered in an introductory computer literacy course. In a typical tutoring session with AutoTutor, students will learn the fundamentals of computer hardware, the operating system, and the Internet. A Brief Sketch of AutoTutor AutoTutor is an animated pedagogical agent that serves as a conversational partner with the student. AutoTutor’s interface is comprised of four features: a two-dimensional, talking head, a text box for typed student input, a text box that displays the problem/question being discussed, and a graphics box that displays pictures and animations that are related to the topic at hand. AutoTutor begins the session by introducing himself and then presents the student with a question or problem that is selected from a curriculum script. The question/problem remains in a text box at the top of the screen until AutoTutor moves on to the next topic. For some questions and problems, there are graphical displays and animations that appear in a specially designated box on the screen. Once AutoTutor has presented the student with a problem or question, a multi-turn tutorial dialog occurs between AutoTutor and the learner. All student contributions are typed into the keyboard and appear in a text box at the bottom of the screen. AutoTutor responds to each student contribution with one or a combination of pedagogically appropriate dialog moves. These dialog moves are conveyed via synthesized speech, appropriate intonation, facial expressions, and gestures and do not appear in text form on the screen. In the future, we hope to have AutoTutor handle speech recognition, so students can speak their contributions. However, current speech recognition packages require time-consuming training that is not optimal for systems that interact with multiple users. The various modules that enable AutoTutor to interact with the learner will be described in subsequent sections of the paper. For now, however, it is important to note that our initial goals for building AutoTutor have been achieved. That is, we have designed a computer tutor that participates in a conversation with the learner while simulating the dialog moves of normal human tutors. WHY SIMULATE NORMAL HUMAN TUTORS? It has been well documented that normal, untrained human tutors are effective. Effect sizes ranging between .5 and 2.3 have been reported in studies where student learning gains were measured (Bloom, 1984; Cohen, Kulik, & Kulik, 1982). For quite a while, these rather large effect sizes were somewhat puzzling. That is, normal tutors typically do not have expert domain knowledge nor do they have knowledge about sophisticated tutoring strategies. In order to gain a better understanding of the primary mechanisms that are responsible for student learning Simulating Human Tutor Dialog Moves in AutoTutor gains, a handful of researchers have systematically analyzed the dialogue that occurs between normal, untrained tutors and students (Graesser & Person, 1994; Graesser et al., 1995; Person & Graesser, 1999; Person et al., 1994; Person et al., 1995). Graesser, Person, and colleagues analyzed over 100 hours of tutoring interactions and identified two prominent features of human tutoring dialogs: (1) a five-step dialog frame that is unique to tutoring interactions, and (2) a set of tutor-initiated dialog moves that serve specific pedagogical functions. We believe these two features are responsible for the positive learning outcomes that occur in typical tutoring settings, and further, these features can be implemented in a tutoring system more easily than the sophisticated methods and strategies that have been advocated by other educational researchers and ITS developers. Five-step Dialog Frame The structure of human tutorial dialogs differs from learning dialogs that often occur in classrooms. Mehan (1979) and others have reported a 3-step pattern that is prevalent in classroom interactions. This pattern is often referred to as IRE, which stands for Initiation (a question or claim articulated by the teacher), Response (an answer or comment provided by the student), and Evaluation (teacher evaluates the student contribution). In tutoring, however, the dialog is managed by a 5-step dialog frame (Graesser & Person, 1994; Graesser et al., 1995). The five steps in this frame are presented below. Step 1: Tutor asks question (or presents problem). Step 2: Learner answers question (or begins to solve problem). Step 3: Tutor gives short immediate feedback on the quality of the answer (or solution). Step 4: Tutor and learner collaboratively improve the quality of the answer. Step 5: Tutor assesses learner’s understanding of the answer. This 5-step dialog frame in tutoring is a significant augmentation over the 3-step dialog frame in classrooms. We believe that the advantage of tutoring over classroom settings lies primarily in Step 4. Typically, Step 4 is a lengthy multi-turn dialog in which the tutor and student collaboratively contribute to the explanation that answers the question or solves the problem. At a macro-level, the dialog that occurs between AutoTutor and the learner conforms to Steps 1 through 4 of the 5-step frame. For example, at the beginning of each new topic, AutoTutor presents the learner with a problem or asks the learner a question (Step 1). The learner then attempts to solve the problem or answer the question (Step 2). Next, AutoTutor provides some type of short, evaluative feedback (Step 3). During Step 4, AutoTutor employs a variety of dialog moves (see next section) that encourage learner participation. Thus, ins", "title": "" }, { "docid": "40495cc96353f56481ed30f7f5709756", "text": "This paper reported the construction of partial discharge measurement system under influence of cylindrical metal particle in transformer oil. The partial discharge of free cylindrical metal particle in the uniform electric field under AC applied voltage was studied in this paper. The partial discharge inception voltage (PDIV) for the single particle was measure to be 11kV. The typical waveform of positive PD and negative PD was also obtained. The result shows that the magnitude of negative PD is higher compared to positive PD. The observation on cylindrical metal particle movement revealed that there were a few stages of motion process involved.", "title": "" }, { "docid": "2753e0a54d1a58993fcdd79ee40f0aac", "text": "This study investigated the effectiveness of the WAIS-R Block Design subtest to predict everyday spatial ability for 65 university undergraduates (15 men, 50 women) who were administered Block Design, the Standardized Road Map Test of Direction Sense, and the Everyday Spatial Activities Test. In addition, the verbally loaded National Adult Reading Test was administered to assess whether the more visuospatial Block Design subtest was a better predictor of spatial ability. Moderate support was found. When age and sex were accounted for, Block Design accounted for 36% of the variance in performance (r = -.62) on the Road Map Test and 19% of the variance on the performance of the Everyday Spatial Activities Test (r = .42). In contrast, the scores on the National Adult Reading Test did not predict performance on the Road Map Test or Everyday Spatial Abilities Test. This suggests that, with appropriate caution, Block Design could be used as a measure of everyday spatial abilities.", "title": "" }, { "docid": "c70d8ae9aeb8a36d1f68ba0067c74696", "text": "Representing entities and relations in an embedding space is a well-studied approach for machine learning on relational data. Existing approaches, however, primarily focus on simple link structure between a finite set of entities, ignoring the variety of data types that are often used in knowledge bases, such as text, images, and numerical values. In this paper, we propose multimodal knowledge base embeddings (MKBE) that use different neural encoders for this variety of observed data, and combine them with existing relational models to learn embeddings of the entities and multimodal data. Further, using these learned embedings and different neural decoders, we introduce a novel multimodal imputation model to generate missing multimodal values, like text and images, from information in the knowledge base. We enrich existing relational datasets to create two novel benchmarks that contain additional information such as textual descriptions and images of the original entities. We demonstrate that our models utilize this additional information effectively to provide more accurate link prediction, achieving state-of-the-art results with a considerable gap of 5-7% over existing methods. Further, we evaluate the quality of our generated multimodal values via a user study. We have release the datasets and the opensource implementation of our models at https: //github.com/pouyapez/mkbe.", "title": "" }, { "docid": "d3b2283ce3815576a084f98c34f37358", "text": "We present a system for the detection of the stance of headlines with regard to their corresponding article bodies. The approach can be applied in fake news, especially clickbait detection scenarios. The component is part of a larger platform for the curation of digital content; we consider veracity and relevancy an increasingly important part of curating online information. We want to contribute to the debate on how to deal with fake news and related online phenomena with technological means, by providing means to separate related from unrelated headlines and further classifying the related headlines. On a publicly available data set annotated for the stance of headlines with regard to their corresponding article bodies, we achieve a (weighted) accuracy score of 89.59.", "title": "" }, { "docid": "3b9491f337ab93d65831a0dfe687a639", "text": "—The increase in the number of large data sets and the complexity of current probabilistic sequence evolution models necessitates fast and reliable phylogeny reconstruction methods. We describe a new approach, based on the maximumlikelihood principle, which clearly satisfies these requirements. The core of this method is a simple hill-climbing algorithm that adjusts tree topology and branch lengths simultaneously. This algorithm starts from an initial tree built by a fast distance-based method and modifies this tree to improve its likelihood at each iteration. Due to this simultaneous adjustment of the topology and branch lengths, only a few iterations are sufficient to reach an optimum. We used extensive and realistic computer simulations to show that the topological accuracy of this new method is at least as high as that of the existing maximum-likelihood programs and much higher than the performance of distance-based and parsimony approaches. The reduction of computing time is dramatic in comparison with other maximum-likelihood packages, while the likelihood maximization ability tends to be higher. For example, only 12 min were required on a standard personal computer to analyze a data set consisting of 500 rbcL sequences with 1,428 base pairs from plant plastids, thus reaching a speed of the same order as some popular distance-based and parsimony algorithms. This new method is implemented in the PHYML program, which is freely available on our web page: http://www.lirmm.fr/w3ifa/MAAS/. [Algorithm; computer simulations; maximum likelihood; phylogeny; rbcL; RDPII project.] The size of homologous sequence data sets has increased dramatically in recent years, and many of these data sets now involve several hundreds of taxa. Moreover, current probabilistic sequence evolution models (Swofford et al., 1996; Page and Holmes, 1998), notably those including rate variation among sites (Uzzell and Corbin, 1971; Jin and Nei, 1990; Yang, 1996), require an increasing number of calculations. Therefore, the speed of phylogeny reconstruction methods is becoming a significant requirement and good compromises between speed and accuracy must be found. The maximum likelihood (ML) approach is especially accurate for building molecular phylogenies. Felsenstein (1981) brought this framework to nucleotide-based phylogenetic inference, and it was later also applied to amino acid sequences (Kishino et al., 1990). Several variants were proposed, most notably the Bayesian methods (Rannala and Yang 1996; and see below), and the discrete Fourier analysis of Hendy et al. (1994), for example. Numerous computer studies (Huelsenbeck and Hillis, 1993; Kuhner and Felsenstein, 1994; Huelsenbeck, 1995; Rosenberg and Kumar, 2001; Ranwez and Gascuel, 2002) have shown that ML programs can recover the correct tree from simulated data sets more frequently than other methods can. Another important advantage of the ML approach is the ability to compare different trees and evolutionary models within a statistical framework (see Whelan et al., 2001, for a review). However, like all optimality criterion–based phylogenetic reconstruction approaches, ML is hampered by computational difficulties, making it impossible to obtain the optimal tree with certainty from even moderate data sets (Swofford et al., 1996). Therefore, all practical methods rely on heuristics that obtain near-optimal trees in reasonable computing time. Moreover, the computation problem is especially difficult with ML, because the tree likelihood not only depends on the tree topology but also on numerical parameters, including branch lengths. Even computing the optimal values of these parameters on a single tree is not an easy task, particularly because of possible local optima (Chor et al., 2000). The usual heuristic method, implemented in the popular PHYLIP (Felsenstein, 1993 ) and PAUP∗ (Swofford, 1999 ) packages, is based on hill climbing. It combines stepwise insertion of taxa in a growing tree and topological rearrangement. For each possible insertion position and rearrangement, the branch lengths of the resulting tree are optimized and the tree likelihood is computed. When the rearrangement improves the current tree or when the position insertion is the best among all possible positions, the corresponding tree becomes the new current tree. Simple rearrangements are used during tree growing, namely “nearest neighbor interchanges” (see below), while more intense rearrangements can be used once all taxa have been inserted. The procedure stops when no rearrangement improves the current best tree. Despite significant decreases in computing times, notably in fastDNAml (Olsen et al., 1994 ), this heuristic becomes impracticable with several hundreds of taxa. This is mainly due to the two-level strategy, which separates branch lengths and tree topology optimization. Indeed, most calculations are done to optimize the branch lengths and evaluate the likelihood of trees that are finally rejected. New methods have thus been proposed. Strimmer and von Haeseler (1996) and others have assembled fourtaxon (quartet) trees inferred by ML, in order to reconstruct a complete tree. However, the results of this approach have not been very satisfactory to date (Ranwez and Gascuel, 2001 ). Ota and Li (2000, 2001) described", "title": "" }, { "docid": "32ec9f1c0dbc7caaf6ece7ba105eace1", "text": "A major problem worldwide is the potential loss of fisheries, forests, and water resources. Understanding of the processes that lead to improvements in or deterioration of natural resources is limited, because scientific disciplines use different concepts and languages to describe and explain complex social-ecological systems (SESs). Without a common framework to organize findings, isolated knowledge does not cumulate. Until recently, accepted theory has assumed that resource users will never self-organize to maintain their resources and that governments must impose solutions. Research in multiple disciplines, however, has found that some government policies accelerate resource destruction, whereas some resource users have invested their time and energy to achieve sustainability. A general framework is used to identify 10 subsystem variables that affect the likelihood of self-organization in efforts to achieve a sustainable SES.", "title": "" }, { "docid": "b9a2a41e12e259fbb646ff92956e148e", "text": "The paper presents a concept where pairs of ordinary RFID tags are exploited for use as remotely read moisture sensors. The pair of tags is incorporated into one label where one of the tags is embedded in a moisture absorbent material and the other is left open. In a humid environment the moisture concentration is higher in the absorbent material than the surrounding environment which causes degradation to the embedded tag's antenna in terms of dielectric losses and change of input impedance. The level of relative humidity or the amount of water in the absorbent material is determined for a passive RFID system by comparing the difference in RFID reader output power required to power up respectively the open and embedded tag. It is similarly shown how the backscattered signal strength of a semi-active RFID system is proportional to the relative humidity and amount of water in the absorbent material. Typical applications include moisture detection in buildings, especially from leaking water pipe connections hidden beyond walls. Presented solution has a cost comparable to ordinary RFID tags, and the passive system also has infinite life time since no internal power supply is needed. The concept is characterized for two commercial RFID systems, one passive operating at 868 MHz and one semi-active operating at 2.45 GHz.", "title": "" }, { "docid": "8c3e545f12c621e0ffe1460b9db959e7", "text": "A unique behavior of humans is modifying one’s unobservable behavior based on the reaction of others for cooperation. We used a card game called Hanabi as an evaluation task of imitating human reflective intelligence with artificial intelligence. Hanabi is a cooperative card game with incomplete information. A player cooperates with an opponent in building several card sets constructed with the same color and ordered numbers. However, like a blind man's bluff, each player sees the cards of all other players except his/her own. Also, communication between players is restricted to information about the same numbers and colors, and the player is required to read his/his opponent's intention with the opponent's hand, estimate his/her cards with incomplete information, and play one of them for building a set. We compared human play with several simulated strategies. The results indicate that the strategy with feedbacks from simulated opponent's viewpoints achieves more score than other strategies. Introduction of Cooperative Game Social Intelligence estimating an opponent's thoughts from his/her behavior – is a unique function of humans. The solving process of this social intelligence is one of the interesting challenges for both artificial intelligence (AI) and cognitive science. Bryne et al. hypothesized that the human brain increases mainly due to this type of social requirement as a evolutionary pressure (Byrne & Whiten 1989). One of the most difficult tasks for using social intelligence is estimating one’s own unobservable information from the behavior of others and to modify one's own information. This type of reflective behavior – using other behavior as a looking glass – is both a biological and psychological task. For example, the human voice is informed by others via sound waves through the air, but informed by him/herself through bone conduction (Chen et al. 2007). In this scenario, a person cannot observe his/her own voice directly. For improving social Copyright © 2015, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. influence from one's voice, one needs to observe others' reactions and modify his/her voice. Joseph et al. also defined such unobservable information from oneself as a \"blind spot\" from a psychological viewpoint (Luft & Ingham 1961). In this study, we solved such reflective estimation tasks using a cooperative game involving incomplete information. We used a card game called Hanabi as a challenge task. Hanabi is a cooperative card game. It has three unique features for contributing to AI and multi-agent system (MAS) studies compared with other card games that have been used in AI studies. First, it is a cooperative card game and not a battle card game. Every player is required to cooperate and build a set of five different colored fireworks (Hanabi in Japanese) before the cards run out. This requires the AI program to handle cooperation of multiple agents. Second, every player can observe all other players' cards except his/her own. This does not require a coordinative leader and requires pure coordination between multiple agents. Finally, communication between players is prohibited except for restricted informing actions for a color or a number of opponent's cards. This allows the AI program to avoid handling natural language processing matters directly. Hanabi won the top German game award due to these unique features (Jahres 2013). We created an AI program to play Hanabi with multiple strategies including simulation of opponents' viewpoints with opponents' behavior, and evaluated how this type of reflective simulation contributes to earning a high score in this game. The paper is organized as follows. Section 2 gives background on incomplete information games involving AI and what challenges there are with Hanabi. Section 3 explains the rules of Hanabi and models. We focused on a two-player game in this paper. Section 4 explains several strategies for playing Hanabi. Section 5 evaluates these strategies and the results are discussed in Section 6. Section 7 explains the contribution of our research, limitations, and future work, and Section 8 concludes our paper. 37 Computer Poker and Imperfect Information: Papers from the 2015 AAAI Workshop", "title": "" }, { "docid": "62cf2ae97e48e6b57139f305d616ec1b", "text": "Many analytics applications generate mixed workloads, i.e., workloads comprised of analytical tasks with different processing characteristics including data pre-processing, SQL, and iterative machine learning algorithms. Examples of such mixed workloads can be found in web data analysis, social media analysis, and graph analytics, where they are executed repetitively on large input datasets (e.g., Find the average user time spent on the top 10 most popular web pages on the UK domain web graph.). Scale-out processing engines satisfy the needs of these applications by distributing the data and the processing task efficiently among multiple workers that are first reserved and then used to execute the task in parallel on a cluster of machines. Finding the resource allocation that can complete the workload execution within a given time constraint, and optimizing cluster resource allocations among multiple analytical workloads motivates the need for estimating the runtime of the workload before its actual execution. Predicting runtime of analytical workloads is a challenging problem as runtime depends on a large number of factors that are hard to model a priori execution. These factors can be summarized as workload characteristics (data statistics and processing costs) , the execution configuration (deployment, resource allocation, and software settings), and the cost model that captures the interplay among all of the above parameters. While conventional cost models proposed in the context of query optimization can assess the relative order among alternative SQL query plans, they are not aimed to estimate absolute runtime. Additionally, conventional models are ill-equipped to estimate the runtime of iterative analytics that are executed repetitively until convergence and that of user defined data pre-processing operators which are not “owned” by the underlying data management system. This thesis demonstrates that runtime for data analytics can be predicted accurately by breaking the analytical tasks into multiple processing phases, collecting key input features during a reference execution on a sample of the dataset, and then using the features to build per-phase cost models. We develop prediction models for three categories of data analytics produced by social media applications: iterative machine learning, data pre-processing, and reporting SQL. The prediction framework for iterative analytics, PREDIcT, addresses the challenging problem of estimating the number of iterations, and per-iteration runtime for a class of iterative machine learning algorithms that are run repetitively until convergence. The hybrid prediction models we develop for data pre-processing tasks and for reporting SQL combine the benefits of analytical modeling with that of machine learning-based models. Through a", "title": "" }, { "docid": "cf54533bc317b960fc80f22baa26d7b1", "text": "The state-of-the-art named entity recognition (NER) systems are statistical machine learning models that have strong generalization capability (i.e., can recognize unseen entities that do not appear in training data) based on lexical and contextual information. However, such a model could still make mistakes if its features favor a wrong entity type. In this paper, we utilize Wikipedia as an open knowledge base to improve multilingual NER systems. Central to our approach is the construction of high-accuracy, highcoverage multilingual Wikipedia entity type mappings. These mappings are built from weakly annotated data and can be extended to new languages with no human annotation or language-dependent knowledge involved. Based on these mappings, we develop several approaches to improve an NER system. We evaluate the performance of the approaches via experiments on NER systems trained for 6 languages. Experimental results show that the proposed approaches are effective in improving the accuracy of such systems on unseen entities, especially when a system is applied to a new domain or it is trained with little training data (up to 18.3 F1 score improvement).", "title": "" }, { "docid": "79b0f13bec3201bf2ca770b268085306", "text": "In this paper, we introduce a new 3D hand gesture recognition approach based on a deep learning model. We propose a new Convolutional Neural Network (CNN) where sequences of hand-skeletal joints' positions are processed by parallel convolutions; we then investigate the performance of this model on hand gesture sequence classification tasks. Our model only uses hand-skeletal data and no depth image. Experimental results show that our approach achieves a state-of-the-art performance on a challenging dataset (DHG dataset from the SHREC 2017 3D Shape Retrieval Contest), when compared to other published approaches. Our model achieves a 91.28% classification accuracy for the 14 gesture classes case and an 84.35% classification accuracy for the 28 gesture classes case.", "title": "" }, { "docid": "7ca62c2da424c826744bca7196f07def", "text": "Accurately answering a question about a given image requires combining observations with general knowledge. While this is effortless for humans, reasoning with general knowledge remains an algorithmic challenge. To advance research in this direction a novel ‘fact-based’ visual question answering (FVQA) task has been introduced recently along with a large set of curated facts which link two entities, i.e., two possible answers, via a relation. Given a question-image pair, deep network techniques have been employed to successively reduce the large set of facts until one of the two entities of the final remaining fact is predicted as the answer. We observe that a successive process which considers one fact at a time to form a local decision is sub-optimal. Instead, we develop an entity graph and use a graph convolutional network to ‘reason’ about the correct answer by jointly considering all entities. We show on the challenging FVQA dataset that this leads to an improvement in accuracy of around 7% compared to the state of the art.", "title": "" }, { "docid": "9bcf4fcb795ab4cfe4e9d2a447179feb", "text": "In a previous experiment, we determined how various changes in three structural elements of the software inspection process (team size and the number and sequencing of sessions) altered effectiveness and interval. Our results showed that such changes did not significantly influence the defect detection rate, but that certain combinations of changes dramatically increased the inspection interval. We also observed a large amount of unexplained variance in the data, indicating that other factors must be affecting inspection performance. The nature and extent of these other factors now have to be determined to ensure that they had not biased our earlier results. Also, identifying these other factors might suggest additional ways to improve the efficiency of inspections. Acting on the hypothesis that the “inputs” into the inspection process (reviewers, authors, and code units) were significant sources of variation, we modeled their effects on inspection performance. We found that they were responsible for much more variation in detect detection than was process structure. This leads us to conclude that better defect detection techniques, not better process structures, are the key to improving inspection effectiveness. The combined effects of process inputs and process structure on the inspection interval accounted for only a small percentage of the variance in inspection interval. Therefore, there must be other factors which need to be identified.", "title": "" }, { "docid": "3c5bb0b08b365029a3fc1a7ef73e3aa7", "text": "This paper proposes an estimation method to identify the electrical model parameters of photovoltaic (PV) modules and makes a comparison with other methods already popular in the technical literature. Based on the full single-diode model, the mathematical description of the I-V characteristic of modules is generally represented by a coupled nonlinear equation with five unknown parameters, which is difficult to solve by an analytical approach. The aim of the proposed method is to find the five unknown parameters that guarantee the minimum absolute error between the P-V curves generated by the electrical model and the P-V curves provided by the manufacturers' datasheets for different external conditions such as temperature and irradiance. The first advantage of the proposed method is that the parameters are estimated using the P-V curves instead of I-V curves, since most of the applications that use the electrical model want to accurately estimate the extracted power. The second advantage is that the value ranges of each unknown parameter respect their physical meaning. In order to prove the effectiveness of the proposition, a comparison among methods is carried out using both types of P-V and I-V curves: those obtained by manufacturers' datasheets and those extracted experimentally in the laboratory.", "title": "" }, { "docid": "f5405c8fb7ad62d4277837bd7036b0d3", "text": "Context awareness is one of the important fields in ubiquitous computing. Smart Home, a specific instance of ubiquitous computing, provides every family with opportunities to enjoy the power of hi-tech home living. Discovering that relationship among user, activity and context data in home environment is semantic, therefore, we apply ontology to model these relationships and then reason them as the semantic information. In this paper, we present the realization of smart home’s context-aware system based on ontology. We discuss the current challenges in realizing the ontology context base. These challenges can be listed as collecting context information from heterogeneous sources, such as devices, agents, sensors into ontology, ontology management, ontology querying, and the issue related to environment database explosion.", "title": "" }, { "docid": "36e8ecc13c1f92ca3b056359e2d803f0", "text": "We propose a novel module, the reviewer module, to improve the encoder-decoder learning framework. The reviewer module is generic, and can be plugged into an existing encoder-decoder model. The reviewer module performs a number of review steps with attention mechanism on the encoder hidden states, and outputs a fact vector after each review step; the fact vectors are used as the input of the attention mechanism in the decoder. We show that the conventional encoderdecoders are a special case of our framework. Empirically, we show that our framework can improve over state-of-the-art encoder-decoder systems on the tasks of image captioning and source code captioning.", "title": "" }, { "docid": "59f29d3795e747bb9cee8fcbf87cb86f", "text": "This paper introduces the development of a semi-active friction based variable physical damping actuator (VPDA) unit. The realization of this unit aims to facilitate the control of compliant robotic joints by providing physical variable damping on demand assisting on the regulation of the oscillations induced by the introduction of compliance. The mechatronics details and the dynamic model of the damper are introduced. The proposed variable damper mechanism is evaluated on a simple 1-DOF compliant joint linked to the ground through a torsion spring. This flexible connection emulates a compliant joint, generating oscillations when the link is perturbed. Preliminary results are presented to show that the unit and the proposed control scheme are capable of replicating simulated relative damping values with good fidelity.", "title": "" }, { "docid": "3b31d07c6a5f7522e2060d5032ca5177", "text": "In the past few years detection of repeatable and distinctive keypoints on 3D surfaces has been the focus of intense research activity, due on the one hand to the increasing diffusion of low-cost 3D sensors, on the other to the growing importance of applications such as 3D shape retrieval and 3D object recognition. This work aims at contributing to the maturity of this field by a thorough evaluation of several recent 3D keypoint detectors. A categorization of existing methods in two classes, that allows for highlighting their common traits, is proposed, so as to abstract all algorithms to two general structures. Moreover, a comprehensive experimental evaluation is carried out in terms of repeatability, distinctiveness and computational efficiency, based on a vast data corpus characterized by nuisances such as noise, clutter, occlusions and viewpoint changes.", "title": "" } ]
scidocsrr
cfecd5986b39b4a57b6543db7319bf74
Classification and Characteristics of Electronic Payment Systems
[ { "docid": "3fc66dd37228df26f0cae8fa66283ce7", "text": "Consumers' lack of trust has often been cited as a major barrier to the adoption of electronic commerce (e-commerce). To address this problem, a model of trust was developed that describes what design factors affect consumers' assessment of online vendors' trustworthiness. Six components were identified and regrouped into three categories: Prepurchase Knowledge, Interface Properties and Informational Content. This model also informs the Human-Computer Interaction (HCI) design of e-commerce systems in that its components can be taken as trust-specific high-level user requirements.", "title": "" } ]
[ { "docid": "6661cc34d65bae4b09d7c236d0f5400a", "text": "In this letter, we present a novel coplanar waveguide fed quasi-Yagi antenna with broad bandwidth. The uniqueness of this design is due to its simple feed selection and despite this, its achievable bandwidth. The 10 dB return loss bandwidth of the antenna is 44% covering X-band. The antenna is realized on a high dielectric constant substrate and is compatible with microstrip circuitry and active devices. The gain of the antenna is 7.4 dBi, the front-to-back ratio is 15 dB and the nominal efficiency of the radiator is 95%.", "title": "" }, { "docid": "e04ff1f4c08bc0541da0db5cd7928ef7", "text": "Artificial neural networks are computer software or hardware models inspired by the structure and behavior of neurons in the human nervous system. As a powerful learning tool, increasingly neural networks have been adopted by many large-scale information processing applications but there is no a set of well defined criteria for choosing a neural network. The user mostly treats a neural network as a black box and cannot explain how learning from input data was done nor how performance can be consistently ensured. We have experimented with several information visualization designs aiming to open the black box to possibly uncover underlying dependencies between the input data and the output data of a neural network. In this paper, we present our designs and show that the visualizations not only help us design more efficient neural networks, but also assist us in the process of using neural networks for problem solving such as performing a classification task.", "title": "" }, { "docid": "4ec7af75127df22c9cb7bd279cb2bcf3", "text": "This paper describes a real-time walking control system developed for the biped robots JOHNNIE and LOLA. Walking trajectories are planned on-line using a simplified robot model and modified by a stabilizing controller. The controller uses hybrid position/force control in task space based on a resolved motion rate scheme. Inertial stabilization is achieved by modifying the contact force trajectories. The paper includes an analysis of the dynamics of controlled bipeds, which is the basis for the proposed control system. The system was tested both in forward dynamics simulations and in experiments with JOHNNIE.", "title": "" }, { "docid": "d49ea26480f4170ec3684ddbf3272306", "text": "Basic surgical skills of suturing and knot tying are an essential part of medical training. Having an automated system for surgical skills assessment could help save experts time and improve training efficiency. There have been some recent attempts at automated surgical skills assessment using either video analysis or acceleration data. In this paper, we present a novel approach for automated assessment of OSATS-like surgical skills and provide an analysis of different features on multi-modal data (video and accelerometer data). We conduct a large study for basic surgical skill assessment on a dataset that contained video and accelerometer data for suturing and knot-tying tasks. We introduce “entropy-based” features—approximate entropy and cross-approximate entropy, which quantify the amount of predictability and regularity of fluctuations in time series data. The proposed features are compared to existing methods of Sequential Motion Texture, Discrete Cosine Transform and Discrete Fourier Transform, for surgical skills assessment. We report average performance of different features across all applicable OSATS-like criteria for suturing and knot-tying tasks. Our analysis shows that the proposed entropy-based features outperform previous state-of-the-art methods using video data, achieving average classification accuracies of 95.1 and 92.2% for suturing and knot tying, respectively. For accelerometer data, our method performs better for suturing achieving 86.8% average accuracy. We also show that fusion of video and acceleration features can improve overall performance for skill assessment. Automated surgical skills assessment can be achieved with high accuracy using the proposed entropy features. Such a system can significantly improve the efficiency of surgical training in medical schools and teaching hospitals.", "title": "" }, { "docid": "dadd9fec98c7dbc05d4e898d282e78fa", "text": "Managing unanticipated changes in turbulent and dynamic market environments requires organizations to reach an extended level of flexibility, which is known as agility. Agility can be defined as ability to sense environmental changes and to readily respond to those. While information systems are alleged to have a major influence on organizational agility, service-oriented architecture (SOA) poses an opportunity to shape agile information systems and ultimately organizational agility. However, related research studies predominantly comprise theoretical claims only. Seeking a detailed picture and in-depth insights, we conduct a qualitative exploratory case study. The objective of our research-in-progress is therefore to provide first-hand empirical data to contribute insights into SOA’s influence on organizational agility. We contribute to the two related research fields of SOA and organizational agility by addressing lack of empirical research on SOA’s organizational implications.", "title": "" }, { "docid": "8f0da69d48c3d5098018b2e5046b6e8e", "text": "Halogenated aliphatic compounds have many technical uses, but substances within this group are also ubiquitous environmental pollutants that can affect the ozone layer and contribute to global warming. The establishment of quantitative structure-property relationships is of interest not only to fill in gaps in the available database but also to validate experimental data already acquired. The three-dimensional structures of 240 compounds were modeled with molecular mechanics prior to the generation of empirical descriptors. Two bilinear projection methods, principal component analysis (PCA) and partial-least-squares regression (PLSR), were used to identify outliers. PLSR was subsequently used to build a multivariate calibration model by extracting the latent variables that describe most of the covariation between the molecular structure and the boiling point. Boiling points were also estimated with an extension of the group contribution method of Stein and Brown.", "title": "" }, { "docid": "0e1dc67e473e6345be5725f2b06e916f", "text": "A number of experiments explored the hypothesis that immediate memory span is not constant, but varies with the length of the words to be recalled. Results showed: (1) Memory span is inversely related to word length across a wide range of materials; (2) When number of syllables and number of phonemes are held constant, words of short temporal duration are better recalled than words of long duration; (3) Span could be predicted on the basis of the number of words which the subject can read in approximately 2 sec; (4) When articulation is suppressed by requiring the subject to articulate an irrelevant sound, the word length effect disappears with visual presentation, but remains when presentation is auditory. The results are interpreted in terms of a phonemically-based store of limited temporal capacity, which may function as an output buffer for speech production, and as a supplement to a more central working memory system.", "title": "" }, { "docid": "736a413352df6b0225b4d567a26a5d78", "text": "This letter presents a compact, single-feed, dual-band antenna covering both the 433-MHz and 2.45-GHz Industrial Scientific and Medical (ISM) bands. The antenna has small dimensions of 51 ×28 mm2. A square-spiral resonant element is printed on the top layer for the 433-MHz band. The remaining space within the spiral is used to introduce an additional parasitic monopole element on the bottom layer that is resonant at 2.45 GHz. Measured results show that the antenna has a 10-dB return-loss bandwidth of 2 MHz at 433 MHz and 132 MHz at 2.45 GHz, respectively. The antenna has omnidirectional radiation characteristics with a peak realized gain (measured) of -11.5 dBi at 433 MHz and +0.5 dBi at 2.45 GHz, respectively.", "title": "" }, { "docid": "122e3e4c10e4e5f2779773bde106d068", "text": "In recent years, research on image generation methods has been developing fast. The auto-encoding variational Bayes method (VAEs) was proposed in 2013, which uses variational inference to learn a latent space from the image database and then generates images using the decoder. The generative adversarial networks (GANs) came out as a promising framework, which uses adversarial training to improve the generative ability of the generator. However, the generated pictures by GANs are generally blurry. The deep convolutional generative adversarial networks (DCGANs) were then proposed to leverage the quality of generated images. Since the input noise vectors are randomly sampled from a Gaussian distribution, the generator has to map from a whole normal distribution to the images. This makes DCGANs unable to reflect the inherent structure of the training data. In this paper, we propose a novel deep model, called generative adversarial networks with decoder-encoder output noise (DE-GANs), which takes advantage of both the adversarial training and the variational Bayesain inference to improve the performance of image generation. DE-GANs use a pre-trained decoder-encoder architecture to map the random Gaussian noise vectors to informative ones and pass them to the generator of the adversarial networks. Since the decoder-encoder architecture is trained by the same images as the generators, the output vectors could carry the intrinsic distribution information of the original images. Moreover, the loss function of DE-GANs is different from GANs and DCGANs. A hidden-space loss function is added to the adversarial loss function to enhance the robustness of the model. Extensive empirical results show that DE-GANs can accelerate the convergence of the adversarial training process and improve the quality of the generated images.", "title": "" }, { "docid": "0b44782174d1dae460b86810db8301ec", "text": "We present an overview of Markov chain Monte Carlo, a sampling method for model inference and uncertainty quantification. We focus on the Bayesian approach to MCMC, which allows us to estimate the posterior distribution of model parameters, without needing to know the normalising constant in Bayes’ theorem. Given an estimate of the posterior, we can then determine representative models (such as the expected model, and the maximum posterior probability model), the probability distributions for individual parameters, and the uncertainty about the predictions from these models. We also consider variable dimensional problems in which the number of model parameters is unknown and needs to be inferred. Such problems can be addressed with reversible jump (RJ) MCMC. This leads us to model choice, where we may want to discriminate between models or theories of differing complexity. For problems where the models are hierarchical (e.g. similar structure but with a different number of parameters), the Bayesian approach naturally selects the simpler models. More complex problems require an estimate of the normalising constant in Bayes’ theorem (also known as the evidence) and this is difficult to do reliably for high dimensional problems. We illustrate the applications of RJMCMC with 3 examples from our earlier working involving modelling distributions of geochronological age data, inference of sea-level and sediment supply histories from 2D stratigraphic cross-sections, and identification of spatially discontinuous thermal histories from a suite of apatite fission track samples distributed in 3D. 2009 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "f282c9ff4afa773af39eb963f4987d09", "text": "The fast development of computing and communication has reformed the financial markets' dynamics. Nowadays many people are investing and trading stocks through online channels and having access to real-time market information efficiently. There are more opportunities to lose or make money with all the stocks information available throughout the World; however, one should spend a lot of effort and time to follow those stocks and the available instant information. This paper presents a preliminary regarding a multi-agent recommender system for computational investing. This system utilizes a hybrid filtering technique to adaptively recommend the most profitable stocks at the right time according to investor's personal favour. The hybrid technique includes collaborative and content-based filtering. The content-based model uses investor preferences, influencing macro-economic factors, stocks profiles and the predicted trend to tailor to its advices. The collaborative filter assesses the investor pairs' investing behaviours and actions that are proficient in economic market to recommend the similar ones to the target investor.", "title": "" }, { "docid": "7c9b3de1491b8f58b1326b9d91ab688e", "text": "We characterize the cache behavior of an in-memory tag table and demonstrate that an optimized implementation can typically achieve a near-zero memory traffic overhead. Both industry and academia have repeatedly demonstrated tagged memory as a key mechanism to enable enforcement of powerful security invariants, including capabilities, pointer integrity, watchpoints, and information-flow tracking. A single-bit tag shadowspace is the most commonly proposed requirement, as one bit is the minimum metadata needed to distinguish between an untyped data word and any number of new hardware-enforced types. We survey various tag shadowspace approaches and identify their common requirements and positive features of their implementations. To avoid non-standard memory widths, we identify the most practical implementation for tag storage to be an in-memory table managed next to the DRAM controller. We characterize the caching performance of such a tag table and demonstrate a DRAM traffic overhead below 5% for the vast majority of applications. We identify spatial locality on a page scale as the primary factor that enables surprisingly high table cache-ability. We then demonstrate tag-table compression for a set of common applications. A hierarchical structure with elegantly simple optimizations reduces DRAM traffic overhead to below 1% for most applications. These insights and optimizations pave the way for commercial applications making use of single-bit tags stored in commodity memory.", "title": "" }, { "docid": "450401c2092f881e26210e27d01d6195", "text": "This article describes what should typically be included in the introduction, method, results, and discussion sections of a meta-analytic review. Method sections include information on literature searches, criteria for inclusion of studies, and a listing of the characteristics recorded for each study. Results sections include information describing the distribution of obtained effect sizes, central tendencies, variability, tests of significance, confidence intervals, tests for heterogeneity, and contrasts (univariate or multivariate). The interpretation of meta-analytic results is often facilitated by the inclusion of the binomial effect size display procedure, the coefficient of robustness, file drawer analysis, and, where overall results are not significant, the counternull value of the obtained effect size and power analysis.", "title": "" }, { "docid": "bb2504b2275a20010c0d5f9050173d40", "text": "Clustering nodes in a graph is a useful general technique in data mining of large network data sets. In this context, Newman and Girvan [9] recently proposed an objective function for graph clustering called the Q function which allows automatic selection of the number of clusters. Empirically, higher values of the Q function have been shown to correlate well with good graph clusterings. In this paper we show how optimizing the Q function can be reformulated as a spectral relaxation problem and propose two new spectral clustering algorithms that seek to maximize Q. Experimental results indicate that the new algorithms are efficient and effective at finding both good clusterings and the appropriate number of clusters across a variety of real-world graph data sets. In addition, the spectral algorithms are much faster for large sparse graphs, scaling roughly linearly with the number of nodes n in the graph, compared to O(n) for previous clustering algorithms using the Q function.", "title": "" }, { "docid": "a56efa3471bb9e3091fffc6b1585f689", "text": "Rogowski current transducers combine a high bandwidth, an easy to use thin flexible coil, and low insertion impedance making them an ideal device for measuring pulsed currents in power electronic applications. Practical verification of a Rogowski transducer's ability to measure current transients due to the fastest MOSFET and IGBT switching requires a calibrated test facility capable of generating a pulse with a rise time of the order of a few 10's ns. A flexible 8-module system has been built which gives a 2000A peak current with a rise time of 40ns. The modular approach enables verification for a range of transducer coil sizes and ratings.", "title": "" }, { "docid": "01c8b3612769216c21d8c16567faa430", "text": "Optimal decision making during the business process execution is crucial for achieving the business goals of an enterprise. Process execution often involves the usage of the decision logic specified in terms of business rules represented as atomic elements of conditions leading to conclusions. However, the question of using and integrating the processand decision-centric approaches, i.e. harmonization of the widely accepted Business Process Model and Notation (BPMN) and the recent Decision Model and Notation (DMN) proposed by the OMG group, is important. In this paper, we propose a four-step approach to derive decision models from process models on the examples of DMN and BPMN: (1) Identification of decision points in a process model; (2) Extraction of decision logic encapsulating the data dependencies affecting the decisions in the process model; (3) Construction of a decision model; (4) Adaptation of the process model with respect to the derived decision logic. Our contribution also consists in proposing an enrichment of the extracted decision logic by taking into account the predictions of process performance measures corresponding to different decision outcomes. We demonstrate the applicability of the approach on an exemplary business process from the banking domain.", "title": "" }, { "docid": "a81e4b95dfaa7887f66066343506d35f", "text": "The purpose of making a “biobetter” biologic is to improve on the salient characteristics of a known biologic for which there is, minimally, clinical proof of concept or, maximally, marketed product data. There already are several examples in which second-generation or biobetter biologics have been generated by improving the pharmacokinetic properties of an innovative drug, including Neulasta® [a PEGylated, longer-half-life version of Neupogen® (filgrastim)] and Aranesp® [a longer-half-life version of Epogen® (epoetin-α)]. This review describes the use of protein fusion technologies such as Fc fusion proteins, fusion to human serum albumin, fusion to carboxy-terminal peptide, and other polypeptide fusion approaches to make biobetter drugs with more desirable pharmacokinetic profiles.", "title": "" }, { "docid": "e6a913ca404c59cd4e0ecffaf18144e5", "text": "SPARQL is the standard language for querying RDF data. In this article, we address systematically the formal study of the database aspects of SPARQL, concentrating in its graph pattern matching facility. We provide a compositional semantics for the core part of SPARQL, and study the complexity of the evaluation of several fragments of the language. Among other complexity results, we show that the evaluation of general SPARQL patterns is PSPACE-complete. We identify a large class of SPARQL patterns, defined by imposing a simple and natural syntactic restriction, where the query evaluation problem can be solved more efficiently. This restriction gives rise to the class of well-designed patterns. We show that the evaluation problem is coNP-complete for well-designed patterns. Moreover, we provide several rewriting rules for well-designed patterns whose application may have a considerable impact in the cost of evaluating SPARQL queries.", "title": "" }, { "docid": "868501b6dc57751b7a6416d91217f0bd", "text": "OBJECTIVE\nThe major aim of this research is to determine whether infants who were anxiously/resistantly attached in infancy develop more anxiety disorders during childhood and adolescence than infants who were securely attached. To test different theories of anxiety disorders, newborn temperament and maternal anxiety were included in multiple regression analyses.\n\n\nMETHOD\nInfants participated in Ainsworth's Strange Situation Procedure at 12 months of age. The Schedule for Affective Disorders and Schizophrenia for School-Age Children was administered to the 172 children when they reached 17.5 years of age. Maternal anxiety and infant temperament were assessed near the time of birth.\n\n\nRESULTS\nThe hypothesized relation between anxious/resistant attachment and later anxiety disorders was confirmed. No relations with maternal anxiety and the variables indexing temperament were discovered, except for a composite score of nurses' ratings designed to access \"high reactivity,\" and the Neonatal Behavioral Assessment Scale clusters of newborn range of state and inability to habituate to stimuli. Anxious/resistant attachment continued to significantly predict child/adolescent anxiety disorders, even when entered last, after maternal anxiety and temperament, in multiple regression analyses.\n\n\nCONCLUSION\nThe attachment relationship appears to play an important role in the development of anxiety disorders. Newborn temperament may also contribute.", "title": "" }, { "docid": "bb75aa9bbe07e635493b123eaaadf74d", "text": "Right ventricular (RV) pacing increases the incidence of atrial fibrillation (AF) and hospitalization rate for heart failure. Many patients with sinus node dysfunction (SND) are implanted with a DDDR pacemaker to ensure the treatment of slowly conducted atrial fibrillation and atrioventricular (AV) block. Many pacemakers are never reprogrammed after implantation. This study aims to evaluate the effectiveness of programming DDIR with a long AV delay in patients with SND and preserved AV conduction as a possible strategy to reduce RV pacing in comparison with a nominal DDDR setting including an AV search hysteresis. In 61 patients (70 ± 10 years, 34 male, PR < 200 ms, AV-Wenckebach rate at ≥130 bpm) with symptomatic SND a DDDR pacemaker was implanted. The cumulative prevalence of right ventricular pacing was assessed according to the pacemaker counter in the nominal DDDR-Mode (AV delay 150/120 ms after atrial pacing/sensing, AV search hysteresis active) during the first postoperative days and in DDIR with an individually programmed long fixed AV delay after 100 days (median). With the nominal DDDR mode the median incidence of right ventricular pacing amounted to 25.2%, whereas with DDIR and long AV delay the median prevalence of RV pacing was significantly reduced to 1.1% (P < 0.001). In 30 patients (49%) right ventricular pacing was almost completely (<1%) eliminated, n = 22 (36%) had >1% <20% and n = 4 (7%) had >40% right ventricular pacing. The median PR interval was 161 ms. The median AV interval with DDIR was 280 ms. The incidence of right ventricular pacing in patients with SND and preserved AV conduction, who are treated with a dual chamber pacemaker, can significantly be reduced by programming DDIR with a long, individually adapted AV delay when compared with a nominal DDDR setting, but nonetheless in some patients this strategy produces a high proportion of disadvantageous RV pacing. The DDIR mode with long AV delay provides an effective strategy to reduce unnecessary right ventricular pacing but the effect has to be verified in every single patient.", "title": "" } ]
scidocsrr
44ba2f8d3461d9fdad4ab07005cdc5a0
Deep Reinforcement Learning for Visual Object Tracking in Videos
[ { "docid": "e14d1f7f7e4f7eaf0795711fb6260264", "text": "In this paper, we treat tracking as a learning problem of estimating the location and the scale of an object given its previous location, scale, as well as current and previous image frames. Given a set of examples, we train convolutional neural networks (CNNs) to perform the above estimation task. Different from other learning methods, the CNNs learn both spatial and temporal features jointly from image pairs of two adjacent frames. We introduce multiple path ways in CNN to better fuse local and global information. A creative shift-variant CNN architecture is designed so as to alleviate the drift problem when the distracting objects are similar to the target in cluttered environment. Furthermore, we employ CNNs to estimate the scale through the accurate localization of some key points. These techniques are object-independent so that the proposed method can be applied to track other types of object. The capability of the tracker of handling complex situations is demonstrated in many testing sequences.", "title": "" } ]
[ { "docid": "727c36aac7bd0327f3edb85613dcf508", "text": "The interpretation of adjective-noun pairs plays a crucial role in tasks such as recognizing textual entailment. Formal semantics often places adjectives into a taxonomy which should dictate adjectives’ entailment behavior when placed in adjective-noun compounds. However, we show experimentally that the behavior of subsective adjectives (e.g. red) versus non-subsective adjectives (e.g. fake) is not as cut and dry as often assumed. For example, inferences are not always symmetric: while ID is generally considered to be mutually exclusive with fake ID, fake ID is considered to entail ID. We discuss the implications of these findings for automated natural language understanding.", "title": "" }, { "docid": "889dd22fcead3ce546e760bda8ef4980", "text": "We explore unsupervised approaches to relation extraction between two named entities; for instance, the semantic bornIn relation between a person and location entity. Concretely, we propose a series of generative probabilistic models, broadly similar to topic models, each which generates a corpus of observed triples of entity mention pairs and the surface syntactic dependency path between them. The output of each model is a clustering of observed relation tuples and their associated textual expressions to underlying semantic relation types. Our proposed models exploit entity type constraints within a relation as well as features on the dependency path between entity mentions. We examine effectiveness of our approach via multiple evaluations and demonstrate 12% error reduction in precision over a state-of-the-art weakly supervised baseline.", "title": "" }, { "docid": "ae153e953060e9e8a742c8a9149521a8", "text": "This paper briefly describes three Windkessel models and demonstrates application of Matlab for mathematical modelling and simulation experiments with the models. Windkessel models are usually used to describe basic properties vascular bed and to study relationships among hemodynamic variables in great vessels. Analysis of a systemic or pulmonary arterial load described by parameters such as arterial compliance and peripheral resistance, is important, for example, in quantifying the effects of vasodilator or vasoconstrictor drugs. Also, a mathematical model of the relationship between blood pressure and blood flow in the aorta and pulmonary artery can be useful, for example, in the design, development and functional analysis of a mechanical heart and/or heart-lung machines. We found that ascending aortic pressure could be predicted better from aortic flow by using the four-element windkessel than by using the three-element windkessel or two-elment windkessel. The root-mean-square errors were smaller for the four-element windkessel.", "title": "" }, { "docid": "c3ad915ac57bf56c4adc47acee816b54", "text": "How does the brain “produce” conscious subjective experience, an awareness of something? This question has been regarded as perhaps the most challenging one facing science. Penfield et al. [9] had produced maps of whereresponses to electrical stimulation of cerebral cortex could be obtained in human neurosurgical patients. Mapping of cerebral activations in various subjective paradigms has been greatly extended more recently by utilizing PET scan and fMRI techniques. But there were virtually no studies of what the appropriate neurons do in order to elicit a conscious experience. The opportunity for me to attempt such studies arose when my friend and neurosurgeon colleague, Bertram Feinstein, invited me to utilize the opportunity presented by access to stimulating and recording electrodes placed for therapeutic purposes intracranially in awake and responsive patients. With the availability of an excellent facility and team of co-workers, I decided to study neuronal activity requirements for eliciting a simple conscious somatosensory experience, and compare that to activity requirements forunconsciousdetection of sensory signals. We discovered that a surprising duration of appropriate neuronal activations, up to about 500 msec, was required in order to elicit a conscious sensory experience [5]. This was true not only when the initiating stimulus was in any of the cerebral somatosensory pathways; several lines of evidence indicated that even a single stimulus pulse to the skin required similar durations of activities at the cortical level. That discovery led to further studies of such a delay factor for awareness generally, and to profound inferences for the nature of conscious subjective experience. It formed the basis of that highlight in my work [1,3]. For example, a neuronal requirement of about 500 msec to produce awareness meant that we do not experience our sensory world immediately, in real time. But that would contradict our intuitive feeling of the experience in real time. We solved this paradox with a hypothesis for “backward referral” of subjective experience to the time of the first cortical response, the primary evoked potential. This was tested and confirmed experimentally [8], a thrilling result. We could now add subjective referral in time to the already known subjective referral in space. Subjective referrals have no known neural basis and appear to be purely mental phenomena! Another experimental study supported my “time-on” theory for eliciting conscious sensations as opposed to unconscious detection [7]. The time-factor appeared also in an endogenous experience, the conscious intention or will to produce a purely voluntary act [4,6]. In this, we found that cerebral activity initiates this volitional process at least 350 msec before the conscious wish (W) to act appears. However, W appears about 200 msec before the muscles are activated. That retained the possibility that the conscious will could control the outcome of the volitional process; it could veto it and block the performance of the act. These discoveries have profound implications for the nature of free will, for individual responsibility and guilt. Discovery of these time factors led to unexpected ways of viewing conscious experience and unconscious mental functions. Experience of the sensory world is delayed. It raised the possibility that all conscious mental functions are initiated unconsciouslyand become conscious only if neuronal activities persist for a sufficiently long time. Conscious experiences must be discontinuousif there is a delay for each; the “stream of consciousness” must be modified. Quick actions or responses, whether in reaction times, sports activities, etc., would all be initially unconscious. Unconscious mental operations, as in creative thinking, artistic impulses, production of speech, performing in music, etc., can all proceed rapidly, since only brief neural actions are sufficient. Rapid unconscious events would allow faster processing in thinking, etc. The delay for awareness provides a physiological opportunity for modulatory influences to affect the content of an experience that finally appears, as in Freudian repression of certain sensory images or thoughts [2,3]. The discovery of the neural time factor (except in conscious will) could not have been made without intracranial access to the neural pathways. They provided an experimentally based entry into how new hypotheses, of how the brain deals with conscious experience, could be directly tested. That was in contrast to the many philosophical approaches which were speculative and mostly untestable. Evidence based views could now be accepted with some confidence.", "title": "" }, { "docid": "ea236e7ab1b3431523c01c51a3186009", "text": "Analysis-by-synthesis has been a successful approach for many tasks in computer vision, such as 6D pose estimation of an object in an RGB-D image which is the topic of this work. The idea is to compare the observation with the output of a forward process, such as a rendered image of the object of interest in a particular pose. Due to occlusion or complicated sensor noise, it can be difficult to perform this comparison in a meaningful way. We propose an approach that \"learns to compare\", while taking these difficulties into account. This is done by describing the posterior density of a particular object pose with a convolutional neural network (CNN) that compares observed and rendered images. The network is trained with the maximum likelihood paradigm. We observe empirically that the CNN does not specialize to the geometry or appearance of specific objects. It can be used with objects of vastly different shapes and appearances, and in different backgrounds. Compared to state-of-the-art, we demonstrate a significant improvement on two different datasets which include a total of eleven objects, cluttered background, and heavy occlusion.", "title": "" }, { "docid": "2b8efba9363b5f177089534edeb877a9", "text": "This article presents a methodology that allows the development of new converter topologies for single-input, multiple-output (SIMO) from different basic configurations of single-input, single-output dc-dc converters. These typologies have in common the use of only one power-switching device, and they are all nonisolated converters. Sixteen different topologies are highlighted, and their main features are explained. The 16 typologies include nine twooutput-type, five three-output-type, one four-output-type, and one six-output-type dc-dc converter configurations. In addition, an experimental prototype of a three-output-type configuration with six different output voltages based on a single-ended primary inductance (SEPIC)-Cuk-boost combination converter was developed, and the proposed design methodology for a basic converter combination was experimentally verified.", "title": "" }, { "docid": "2ad34a7b1ed6591d683fe1450d1bd25f", "text": "An extension of the Gauss-Newton method for nonlinear equations to convex composite optimization is described and analyzed. Local quadratic convergence is established for the minimization of h o F under two conditions, namely h has a set of weak sharp minima, C, and there is a regular point of the inclusion F ( x ) E C. This result extends a similar convergence result due to Womersley (this journal, 1985) which employs the assumption of a strongly unique solution of the composite function h o F. A backtracking line-search is proposed as a globalization strategy. For this algorithm, a global convergence result is established, with a quadratic rate under the regularity assumption.", "title": "" }, { "docid": "553de71fcc3e4e6660015632eee751b1", "text": "Data governance is an emerging research area getting attention from information systems (IS) scholars and practitioners. In this paper I take a look at existing literature and current state-of-the-art in data governance. I found out that there is only a limited amount of existing scientific literature, but many practitioners are already treating data as a valuable corporate asset. The paper describes an action design research project that will be conducted in 2012-2016 and is expected to result in a generic data governance framework.", "title": "" }, { "docid": "2496fa63868717ce2ed56c1777c4b0ed", "text": "Person re-identification (reID) is an important task that requires to retrieve a person’s images from an image dataset, given one image of the person of interest. For learning robust person features, the pose variation of person images is one of the key challenges. Existing works targeting the problem either perform human alignment, or learn human-region-based representations. Extra pose information and computational cost is generally required for inference. To solve this issue, a Feature Distilling Generative Adversarial Network (FD-GAN) is proposed for learning identity-related and pose-unrelated representations. It is a novel framework based on a Siamese structure with multiple novel discriminators on human poses and identities. In addition to the discriminators, a novel same-pose loss is also integrated, which requires appearance of a same person’s generated images to be similar. After learning pose-unrelated person features with pose guidance, no auxiliary pose information and additional computational cost is required during testing. Our proposed FD-GAN achieves state-of-the-art performance on three person reID datasets, which demonstrates that the effectiveness and robust feature distilling capability of the proposed FD-GAN. ‡‡", "title": "" }, { "docid": "cbaead0172b87c670929d38a5e2199bb", "text": "Internet addiction is characterized by excessive or poorly controlled preoccupations, urges or behaviours regarding computer use and internet access that lead to impairment or distress. The condition has attracted increasing attention in the popular media and among researchers, and this attention has paralleled the growth in computer (and Internet) access. Prevalence estimates vary widely, although a recent random telephone survey of the general US population reported an estimate of 0.3-0.7%. The disorder occurs worldwide, but mainly in countries where computer access and technology are widespread. Clinical samples and a majority of relevant surveys report a male preponderance. Onset is reported to occur in the late 20s or early 30s age group, and there is often a lag of a decade or more from initial to problematic computer usage. Internet addiction has been associated with dimensionally measured depression and indicators of social isolation. Psychiatric co-morbidity is common, particularly mood, anxiety, impulse control and substance use disorders. Aetiology is unknown, but probably involves psychological, neurobiological and cultural factors. There are no evidence-based treatments for internet addiction. Cognitive behavioural approaches may be helpful. There is no proven role for psychotropic medication. Marital and family therapy may help in selected cases, and online self-help books and tapes are available. Lastly, a self-imposed ban on computer use and Internet access may be necessary in some cases.", "title": "" }, { "docid": "758eb7a0429ee116f7de7d53e19b3e02", "text": "With the rapid development of the Internet, many types of websites have been developed. This variety of websites makes it necessary to adopt systemized evaluation criteria with a strong theoretical basis. This study proposes a set of evaluation criteria derived from an architectural perspective which has been used for over a 1000 years in the evaluation of buildings. The six evaluation criteria are internal reliability and external security for structural robustness, useful content and usable navigation for functional utility, and system interface and communication interface for aesthetic appeal. The impacts of the six criteria on user satisfaction and loyalty have been investigated through a large-scale survey. The study results indicate that the six criteria have different impacts on user satisfaction for different types of websites, which can be classified along two dimensions: users’ goals and users’ activity levels.", "title": "" }, { "docid": "279870c84659e0eb6668e1ec494e77c9", "text": "There is a need to move from opinion-based education to evidence-based education. Best evidence medical education (BEME) is the implementation, by teachers in their practice, of methods and approaches to education based on the best evidence available. It involves a professional judgement by the teacher about his/her teaching taking into account a number of factors-the QUESTS dimensions. The Quality of the research evidence available-how reliable is the evidence? the Utility of the evidence-can the methods be transferred and adopted without modification, the Extent of the evidence, the Strength of the evidence, the Target or outcomes measured-how valid is the evidence? and the Setting or context-how relevant is the evidence? The evidence available can be graded on each of the six dimensions. In the ideal situation the evidence is high on all six dimensions, but this is rarely found. Usually the evidence may be good in some respects, but poor in others.The teacher has to balance the different dimensions and come to a decision on a course of action based on his or her professional judgement.The QUESTS dimensions highlight a number of tensions with regard to the evidence in medical education: quality vs. relevance; quality vs. validity; and utility vs. the setting or context. The different dimensions reflect the nature of research and innovation. Best Evidence Medical Education encourages a culture or ethos in which decision making takes place in this context.", "title": "" }, { "docid": "201d9105d956bc8cb8d692490d185487", "text": "BACKGROUND\nDespite its evident clinical benefits, single-incision laparoscopic surgery (SILS) imposes inherent limitations of collision between external arms and inadequate triangulation because multiple instruments are inserted through a single port at the same time.\n\n\nMETHODS\nA robot platform appropriate for SILS was developed wherein an elbowed instrument can be equipped to easily create surgical triangulation without the interference of robot arms. A novel joint mechanism for a surgical instrument actuated by a rigid link was designed for high torque transmission capability.\n\n\nRESULTS\nThe feasibility and effectiveness of the robot was checked through three kinds of preliminary tests: payload, block transfer, and ex vivo test. Measurements showed that the proposed robot has a payload capability >15 N with 7 mm diameter.\n\n\nCONCLUSIONS\nThe proposed robot is effective and appropriate for SILS, overcoming inadequate triangulation and improving workspace and traction force capability.", "title": "" }, { "docid": "e871e2b5bd1ed95fd5302e71f42208bf", "text": "Chapters 2–7 make up Part II of the book: artificial neural networks. After introducing the basic concepts of neurons and artificial neuron learning rules in Chapter 2, Chapter 3 describes a particular formalism, based on signal-plus-noise, for the learning problem in general. After presenting the basic neural network types this chapter reviews the principal algorithms for error function minimization/optimization and shows how these learning issues are addressed in various supervised models. Chapter 4 deals with issues in unsupervised learning networks, such as the Hebbian learning rule, principal component learning, and learning vector quantization. Various techniques and learning paradigms are covered in Chapters 3–6, and especially the properties and relative merits of the multilayer perceptron networks, radial basis function networks, self-organizing feature maps and reinforcement learning are discussed in the respective four chapters. Chapter 7 presents an in-depth examination of performance issues in supervised learning, such as accuracy, complexity, convergence, weight initialization, architecture selection, and active learning. Par III (Chapters 8–15) offers an extensive presentation of techniques and issues in evolutionary computing. Besides the introduction to the basic concepts in evolutionary computing, it elaborates on the more important and most frequently used techniques on evolutionary computing paradigm, such as genetic algorithms, genetic programming, evolutionary programming, evolutionary strategies, differential evolution, cultural evolution, and co-evolution, including design aspects, representation, operators and performance issues of each paradigm. The differences between evolutionary computing and classical optimization are also explained. Part IV (Chapters 16 and 17) introduces swarm intelligence. It provides a representative selection of recent literature on swarm intelligence in a coherent and readable form. It illustrates the similarities and differences between swarm optimization and evolutionary computing. Both particle swarm optimization and ant colonies optimization are discussed in the two chapters, which serve as a guide to bringing together existing work to enlighten the readers, and to lay a foundation for any further studies. Part V (Chapters 18–21) presents fuzzy systems, with topics ranging from fuzzy sets, fuzzy inference systems, fuzzy controllers, to rough sets. The basic terminology, underlying motivation and key mathematical models used in the field are covered to illustrate how these mathematical tools can be used to handle vagueness and uncertainty. This book is clearly written and it brings together the latest concepts in computational intelligence in a friendly and complete format for undergraduate/postgraduate students as well as professionals new to the field. With about 250 pages covering such a wide variety of topics, it would be impossible to handle everything at a great length. Nonetheless, this book is an excellent choice for readers who wish to familiarize themselves with computational intelligence techniques or for an overview/introductory course in the field of computational intelligence. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond—Bernhard Schölkopf and Alexander Smola, (MIT Press, Cambridge, MA, 2002, ISBN 0-262-19475-9). Reviewed by Amir F. Atiya.", "title": "" }, { "docid": "d8b3eb944d373741747eb840a18a490b", "text": "Natural scenes contain large amounts of geometry, such as hundreds of thousands or even millions of tree leaves and grass blades. Subtle lighting effects present in such environments usually include a significant amount of occlusion effects and lighting variation. These effects are important for realistic renderings of such natural environments; however, plausible lighting and full global illumination computation come at prohibitive costs especially for interactive viewing. As a solution to this problem, we present a simple approximation to integrated visibility over a hemisphere (ambient occlusion) that allows interactive rendering of complex and dynamic scenes. Based on a set of simple assumptions, we show that our method allows the rendering of plausible variation in lighting at modest additional computation and little or no precomputation, for complex and dynamic scenes.", "title": "" }, { "docid": "132bb5b7024de19f4160664edca4b4f5", "text": "Generic Competitive Strategy: Basically, strategy is about two things: deciding where you want your business to go, and deciding how to get there. A more complete definition is based on competitive advantage, the object of most corporate strategy: “Competitive advantage grows out of value a firm is able to create for its buyers that exceeds the firm's cost of creating it. Value is what buyers are willing to pay, and superior value stems from offering lower prices than competitors for equivalent benefits or providing unique benefits that more than offset a higher price. There are two basic types of competitive advantage: cost leadership and differentiation.” Michael Porter Competitive strategies involve taking offensive or defensive actions to create a defendable position in the industry. Generic strategies can help the organization to cope with the five competitive forces in the industry and do better than other organization in the industry. Generic strategies include ‘overall cost leadership’, ‘differentiation’, and ‘focus’. Generally firms pursue only one of the above generic strategies. However some firms make an effort to pursue only one of the above generic strategies. However some firms make an effort to pursue more than one strategy at a time by bringing out a differentiated product at low cost. Though approaches like these are successful in short term, they are hardly sustainable in the long term. If firms try to maintain cost leadership as well as differentiation at the same time, they may fail to achieve either.", "title": "" }, { "docid": "c44f060f18e55ccb1b31846e618f3282", "text": "In multi-label classification, each sample can be associated with a set of class labels. When the number of labels grows to the hundreds or even thousands, existing multi-label classification methods often become computationally inefficient. In recent years, a number of remedies have been proposed. However, they are based either on simple dimension reduction techniques or involve expensive optimization problems. In this paper, we address this problem by selecting a small subset of class labels that can approximately span the original label space. This is performed by an efficient randomized sampling procedure where the sampling probability of each class label reflects its importance among all the labels. Experiments on a number of realworld multi-label data sets with many labels demonstrate the appealing performance and efficiency of the proposed algorithm.", "title": "" }, { "docid": "708915f99102f80b026b447f858e3778", "text": "One of the main obstacles to broad application of reinforcement learning methods is the parameter sensitivity of our core learning algorithms. In many large-scale applications, online computation and function approximation represent key strategies in scaling up reinforcement learning algorithms. In this setting, we have effective and reasonably well understood algorithms for adapting the learning-rate parameter, online during learning. Such meta-learning approaches can improve robustness of learning and enable specialization to current task, improving learning speed. For temporaldifference learning algorithms which we study here, there is yet another parameter, λ, that similarly impacts learning speed and stability in practice. Unfortunately, unlike the learning-rate parameter, λ parametrizes the objective function that temporal-difference methods optimize. Different choices of λ produce different fixed-point solutions, and thus adapting λ online and characterizing the optimization is substantially more complex than adapting the learningrate parameter. There are no meta-learning method for λ that can achieve (1) incremental updating, (2) compatibility with function approximation, and (3) maintain stability of learning under both on and off-policy sampling. In this paper we contribute a novel objective function for optimizing λ as a function of state rather than time. We derive a new incremental, linear complexity λ-adaption algorithm that does not require offline batch updating or access to a model of the world, and present a suite of experiments illustrating the practicality of our new algorithm in three different settings. Taken together, our contributions represent a concrete step towards black-box application of temporaldifference learning methods in real world problems.", "title": "" } ]
scidocsrr
fb4c4d7b26c5848a32b3f09cbbacf9bd
Self-Calibration of a 3-D-Digital Beamforming Radar System for Automotive Applications With Installation Behind Automotive Covers
[ { "docid": "3b2a3fc20a03d829e4c019fbdbc0f2ae", "text": "First cars equipped with 24 GHz short range radar (SRR) systems in combination with 77 GHz long range radar (LRR) system enter the market in autumn 2005 enabling new safety and comfort functions. In Europe the 24 GHz ultra wideband (UWB) frequency band is temporally allowed only till end of June 2013 with a limitation of the car pare penetration of 7%. From middle of 2013 new cars have to be equipped with SRR sensors which operate in the frequency band of 79 GHz (77 GHz to 81 GHz). The development of the 79 GHz SRR technology within the German government (BMBF) funded project KOKON is described", "title": "" } ]
[ { "docid": "83fbffec2e727e6ed6be1e02f54e1e47", "text": "Large dc and ac electric currents are often measured by open-loop sensors without a magnetic yoke. A widely used configuration uses a differential magnetic sensor inserted into a hole in a flat busbar. The use of a differential sensor offers the advantage of partial suppression of fields coming from external currents. Hall sensors and AMR sensors are currently used in this application. In this paper, we present a current sensor of this type that uses novel integrated fluxgate sensors, which offer a greater range than magnetoresistors and better stability than Hall sensors. The frequency response of this type of current sensor is limited due to the eddy currents in the solid busbar. We present a novel amphitheater geometry of the hole in the busbar of the sensor, which reduces the frequency dependence from 15% error at 1 kHz to 9%.", "title": "" }, { "docid": "8f0073815a64e4f5d3e4e8cb9290fa65", "text": "In this paper, we investigate the benefits of applying a form of network coding known as random linear coding (RLC) to unicast applications in disruption-tolerant networks (DTNs). Under RLC, nodes store and forward random linear combinations of packets as they encounter each other. For the case of a single group of packets originating from the same source and destined for the same destination, we prove a lower bound on the probability that the RLC scheme achieves the minimum time to deliver the group of packets. Although RLC significantly reduces group delivery delays, it fares worse in terms of average packet delivery delay and network transmissions. When replication control is employed, RLC schemes reduce group delivery delays without increasing the number of transmissions. In general, the benefits achieved by RLC are more significant under stringent resource (bandwidth and buffer) constraints, limited signaling, highly dynamic networks, and when applied to packets in the same flow. For more practical settings with multiple continuous flows in the network, we show the importance of deploying RLC schemes with a carefully tuned replication control in order to achieve reduction in average delay, which is observed to be as large as 20% when buffer space is constrained.", "title": "" }, { "docid": "d71e4ef0514252aaabe41509b5762ef2", "text": "The dynamic power dissipation is the dominant source of power dissipation in CMOS circuits. It is directly related to the number of signal transitions and glitches. The glitches occupy a considerable amount of power of the total power dissipation in CMOS circuits. This paper presents a survey of the different techniques used for decreasing the dynamic power by reduction of glitches. The advantages and limitations of these techniques are also discussed. Glitches, CMOS circuits, low power, path balancing, gate sizing.", "title": "" }, { "docid": "5b2b0a3a857d06246cebb69e6e575b5f", "text": "This paper develops a novel framework for feature extraction based on a combination of Linear Discriminant Analysis and cross-correlation. Multiple Electrocardiogram (ECG) signals, acquired from the human heart in different states such as in fear, during exercise, etc. are used for simulations. The ECG signals are composed of P, Q, R, S and T waves. They are characterized by several parameters and the important information relies on its HRV (Heart Rate Variability). Human interpretation of such signals requires experience and incorrect readings could result in potentially life threatening and even fatal consequences. Thus a proper interpretation of ECG signals is of paramount importance. This work focuses on designing a machine based classification algorithm for ECG signals. The proposed algorithm filters the ECG signals to reduce the effects of noise. It then uses the Fourier transform to transform the signals into the frequency domain for analysis. The frequency domain signal is then cross correlated with predefined classes of ECG signals, in a manner similar to pattern recognition. The correlated co-efficients generated are then thresholded. Moreover Linear Discriminant Analysis is also applied. Linear Discriminant Analysis makes classes of different multiple ECG signals. LDA makes classes on the basis of mean, global mean, mean subtraction, transpose, covariance, probability and frequencies. And also setting thresholds for the classes. The distributed space area is divided into regions corresponding to each of the classes. Each region associated with a class is defined by its thresholds. So it is useful in distinguishing ECG signals from each other. And pedantic details from LDA (Linear Discriminant Analysis) output graph can be easily taken in account rapidly. The output generated after applying cross-correlation and LDA displays either normal, fear, smoking or exercise ECG signal. As a result, the system can help clinically on large scale by providing reliable and accurate classification in a fast and computationally efficient manner. The doctors can use this system by gaining more efficiency. As very few errors are involved in it, showing accuracy between 90% 95%.", "title": "" }, { "docid": "f6d57563226c779e7e44a638da35276f", "text": "Given the substantial investment in information technology (IT), and the significant impact it has on organizational success, organisations consume considerable resources to manage acquisition and use of IT in organizations. While, various arguments proposed suggest which IT governance arrangements may work best, our understanding of the effectiveness of such initiatives is limited. We examine the relationship between the effectiveness of IT steering committee-driven IT governance initiatives and firm’s IT management and IT infrastructure related capabilities. We further propose that firm’s IT-related capabilities, generated through IT governance initiatives should improve its business processes and firm-level performance. We test these relationships empirically by a field survey of 216 firms. Results of this study suggest that a firms’ effectiveness of IT steering committee-driven IT governance initiatives positively relate to the level of their IT-related capabilities. We also found positive relationships between IT-related capabilities and internal process-level performance. Our results also support the conjecture that improvement in internal process-level performance will be positively related to improvement in customer service and firm-level performance. For researchers, we demonstrate that the resource-based theory provides a more robust explanation of the determinants of firms IT governance initiatives. This would be ideal in evaluating other IT governance initiatives effectiveness in relation to how they contribute to building performance-differentiating IT-related capabilities. For decision makers, we hope our study has reiterated the notion that IT governance is truly a coordinated effort, embracing all levels of human resources.", "title": "" }, { "docid": "406fab96a8fd49f4d898a9735ee1512f", "text": "An otolaryngology phenol applicator kit can be successfully and safely used in the performance of chemical matricectomy. The applicator kit provides a convenient way to apply phenol to the nail matrix precisely and efficiently, whereas minimizing both the risk of application to nonmatrix surrounding soft tissue and postoperative recovery time.Given the smaller size of the foam-tipped applicator, we feel that this is a more precise tool than traditional cotton-tipped applicators for chemical matricectomy. Particularly with regard to lower extremity nail ablation and matricectomy, minimizing soft tissue inflammation could in turn reduce the risk of postoperative infections, decrease recovery time, as well and make for a more positive overall patient experience.", "title": "" }, { "docid": "eba4faac7a6a0e0da2e860f9ddb01801", "text": "Current research in Information Extraction tends to be focused on application-specific systems tailored to a particular domain. The Muse system is a multi-purpose Named Entity recognition system which aims to reduce the need for costly and time-consuming adaptation of systems to new applications, with its capability for processing texts from widely differing domains and genres. Although the system is still under development, preliminary results are encouraging, showing little degradation when processing texts of lower quality or of unusual types. The system currently averages 93% precision and 95% recall across a variety of text types.", "title": "" }, { "docid": "b6f32f675e1a9209aba6f361ecdd9a37", "text": "Neural Machine Translation (NMT) systems are known to degrade when confronted with noisy data, especially when the system is trained only on clean data. In this paper, we show that augmenting training data with sentences containing artificially-introduced grammatical errors can make the system more robust to such errors. In combination with an automatic grammar error correction system, we can recover 1.9 BLEU out of 3.1 BLEU lost due to grammatical errors. We also present a set of Spanish translations of the JFLEG grammar error correction corpus, which allows for testing NMT robustness to real grammatical errors.", "title": "" }, { "docid": "eb5208a4793fa5c5723b20da0421af26", "text": "High-level synthesis promises a significant shortening of the FPGA design cycle when compared with design entry using register transfer level (RTL) languages. Recent evaluations report that C-to-RTL flows can produce results with a quality close to hand-crafted designs [1]. Algorithms which use dynamic, pointer-based data structures, which are common in software, remain difficult to implement well. In this paper, we describe a comparative case study using Xilinx Vivado HLS as an exemplary state-of-the-art high-level synthesis tool. Our test cases are two alternative algorithms for the same compute-intensive machine learning technique (clustering) with significantly different computational properties. We compare a data-flow centric implementation to a recursive tree traversal implementation which incorporates complex data-dependent control flow and makes use of pointer-linked data structures and dynamic memory allocation. The outcome of this case study is twofold: We confirm similar performance between the hand-written and automatically generated RTL designs for the first test case. The second case reveals a degradation in latency by a factor greater than 30× if the source code is not altered prior to high-level synthesis. We identify the reasons for this shortcoming and present code transformations that narrow the performance gap to a factor of four. We generalise our source-to-source transformations whose automation motivates research directions to improve high-level synthesis of dynamic data structures in the future.", "title": "" }, { "docid": "15800830f8774211d48110980d08478a", "text": "This paper surveys the problem of navigation for autonomous underwater vehicles (AUVs). Marine robotics technology has undergone a phase of dramatic increase in capability in recent years. Navigation is one of the key challenges that limits our capability to use AUVs to address problems of critical importance to society. Good navigation information is essential for safe operation and recovery of an AUV. For the data gathered by an AUV to be of value, the location from which the data has been acquired must be accurately known. The three primary methods for navigation of AUVs are (1) dead-reckoning and inertial navigation systems, (2) acoustic navigation, and (3) geophysical navigation techniques. The current state-of-the-art in each of these areas is summarized, and topics for future research are suggested.", "title": "" }, { "docid": "b7524787cce58c3bf34a9d7fd3c8af90", "text": "Convolutional Neural Networks and Graphics Processing Units have been at the core of a paradigm shift in computer vision research that some researchers have called “the algorithmic perception revolution.” This thesis presents the implementation and analysis of several techniques for performing artistic style transfer using a Convolutional Neural Network architecture trained for large-scale image recognition tasks. We present an implementation of an existing algorithm for artistic style transfer in images and video. The neural algorithm separates and recombines the style and content of arbitrary images. Additionally, we present an extension of the algorithm to perform weighted artistic style transfer.", "title": "" }, { "docid": "12229c2940f66bd7d8db63d542436062", "text": "We develop some versions of quantum devices simulators such as NEMO-VN, NEMO-VN1 and NEMO-VN2. The quantum device simulator – NEMO-VN2 focuses on carbon nanotube FET (CNTFET). CNTFETs have been studied in recent years as potential alternatives to CMOS devices because of their compelling properties. Studies of phonon scattering in CNTs and its influence in CNTFET have focused on metallic tubes or on long semiconducting tubes. Phonon scattering in short channel CNTFETs, which is important for nanoelectronic applications, remains unexplored. In this work the non-equilibrium Green function (NEGF) is used to perform a comprehensive study of CNT transistors. The program has been written by using graphic user interface (GUI) of Matlab. We find that the effect of scattering on current-voltage characteristics of CNTFET is significant. The degradation of drain current due to scattering has been observed. Some typical simulation results have been presented for illustration.", "title": "" }, { "docid": "be41d072e3897506fad111549e7bf862", "text": "Handing unbalanced data and noise are two important issues in the field of machine learning. This paper proposed a complete framework of fuzzy relevance vector machine by weighting the punishment terms of error in Bayesian inference process of relevance vector machine (RVM). Above problems can be learned within this framework with different kinds of fuzzy membership functions. Experiments on both synthetic data and real world data demonstrate that fuzzy relevance vector machine (FRVM) is effective in dealing with unbalanced data and reducing the effects of noises or outliers. 2008 Published by Elsevier B.V.", "title": "" }, { "docid": "8a81d5a3a91fdd0d4e55a8ce477f279a", "text": "Sex differences are prominent in mood and anxiety disorders and may provide a window into mechanisms of onset and maintenance of affective disturbances in both men and women. With the plethora of sex differences in brain structure, function, and stress responsivity, as well as differences in exposure to reproductive hormones, social expectations and experiences, the challenge is to understand which sex differences are relevant to affective illness. This review will focus on clinical aspects of sex differences in affective disorders including the emergence of sex differences across developmental stages and the impact of reproductive events. Biological, cultural, and experiential factors that may underlie sex differences in the phenomenology of mood and anxiety disorders are discussed.", "title": "" }, { "docid": "d4d52c325a33710cfa59a2067dbc553c", "text": "This paper presents an SDR (Software-Defined Radio) implementation of an FMCW (Frequency-Modulated Continuous-Wave) radar using a USRP (Universal Software Radio Peripheral) device. The tools used in the project and the architecture of implementation with FPGA real-time processing and PC off-line processing are covered. This article shows the detailed implementation of an FMCW radar using a USRP device with no external analog devices except for one amplifier and two antennas. The FMCW radar demonstrator presented in the paper has been tested in the laboratory as well as in the real environment, where the ability to detect targets such as cars moving on the roads has been successfully shown.", "title": "" }, { "docid": "3765aae3bd550c2ab5b4b32e1a969c71", "text": "This paper develops a novel algorithm, termed <italic>SPARse Truncated Amplitude flow</italic> (SPARTA), to reconstruct a sparse signal from a small number of magnitude-only measurements. It deals with what is also known as sparse phase retrieval (PR), which is <italic>NP-hard</italic> in general and emerges in many science and engineering applications. Upon formulating sparse PR as an amplitude-based nonconvex optimization task, SPARTA works iteratively in two stages: In stage one, the support of the underlying sparse signal is recovered using an analytically well-justified rule, and subsequently a sparse orthogonality-promoting initialization is obtained via power iterations restricted on the support; and in the second stage, the initialization is successively refined by means of hard thresholding based gradient-type iterations. SPARTA is a simple yet effective, scalable, and fast sparse PR solver. On the theoretical side, for any <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula>-dimensional <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>-sparse (<inline-formula> <tex-math notation=\"LaTeX\">$k\\ll n$</tex-math></inline-formula>) signal <inline-formula><tex-math notation=\"LaTeX\"> $\\boldsymbol {x}$</tex-math></inline-formula> with minimum (in modulus) nonzero entries on the order of <inline-formula> <tex-math notation=\"LaTeX\">$(1/\\sqrt{k})\\Vert \\boldsymbol {x}\\Vert _2$</tex-math></inline-formula>, SPARTA recovers the signal exactly (up to a global unimodular constant) from about <inline-formula><tex-math notation=\"LaTeX\">$k^2\\log n$ </tex-math></inline-formula> random Gaussian measurements with high probability. Furthermore, SPARTA incurs computational complexity on the order of <inline-formula><tex-math notation=\"LaTeX\">$k^2n\\log n$</tex-math> </inline-formula> with total runtime proportional to the time required to read the data, which improves upon the state of the art by at least a factor of <inline-formula><tex-math notation=\"LaTeX\">$k$</tex-math></inline-formula>. Finally, SPARTA is robust against additive noise of bounded support. Extensive numerical tests corroborate markedly improved recovery performance and speedups of SPARTA relative to existing alternatives.", "title": "" }, { "docid": "d78acb79ccd229af7529dae1408dea6a", "text": "Making recommendations by learning to rank is becoming an increasingly studied area. Approaches that use stochastic gradient descent scale well to large collaborative filtering datasets, and it has been shown how to approximately optimize the mean rank, or more recently the top of the ranked list. In this work we present a family of loss functions, the k-order statistic loss, that includes these previous approaches as special cases, and also derives new ones that we show to be useful. In particular, we present (i) a new variant that more accurately optimizes precision at k, and (ii) a novel procedure of optimizing the mean maximum rank, which we hypothesize is useful to more accurately cover all of the user's tastes. The general approach works by sampling N positive items, ordering them by the score assigned by the model, and then weighting the example as a function of this ordered set. Our approach is studied in two real-world systems, Google Music and YouTube video recommendations, where we obtain improvements for computable metrics, and in the YouTube case, increased user click through and watch duration when deployed live on www.youtube.com.", "title": "" }, { "docid": "b1ad4467e0abecb9a5de0f7191cc13b8", "text": "A study that assesses the significance of student background characteristics on outcomes in a depth-first CS I course is presented. The study was conducted over a two-year period and involved more than 400 students in fourteen different course sections taught by eight different instructors in a CSAC-accredited program. In this paper, focus is on the impact of prior programming courses on CS I outcomes. In particular, the impact of the prior course's programming language and provider is reported.", "title": "" }, { "docid": "8f6add3adeb6b1b5a6aa4fb01e5de2a0", "text": "Growing evidence demonstrates that psychological risk variables can contribute to physical disease. In an effort to thoroughly investigate potential etiological origins and optimal interventions, this broad review is divided into five sections: the stress response, chronic diseases, mind-body theoretical models, psychophysiological interventions, and integrated health care solutions. The stress response and its correlation to chronic disorders such as cardiovascular, gastrointestinal, autoimmune, metabolic syndrome, and chronic pain are comprehensively explored. Current mind-body theoretical models, including peripheral nerve pathway, neurophysiological, and integrative theories, are reviewed to elucidate the biological mechanisms behind psychophysiological interventions. Specific interventions included are psychotherapy, mindfulness meditation, yoga, and psychopharmacology. Finally, the author advocates for an integrated care approach as a means by which to blur the sharp distinction between physical and psychological health. Integrated care approaches can utilize psychiatric nurse practitioners for behavioral assessment, intervention, research, advocacy, consultation, and education to optimize health outcomes.", "title": "" } ]
scidocsrr
43fe7463474910c2e0dc717c934bfd26
Sentiment, emotion, purpose, and style in electoral tweets
[ { "docid": "f252e69bf7edc59bf51d77481e5009e2", "text": "This study investigates whether microblogging messages on Twitter validly mirror the political landscape off-line and can be used to predict election results. In the context of the 2009 German federal election, we conducted a sentiment analysis of over 100,000 messages containing a reference to either a political party or a politician. Our results show that Twitter is used extensively for political deliberation and that the mere number of party mentions accurately reflects the election result. The tweets’ sentiment (e.g., positive and negative emotions associated with a politician) corresponds closely to voters’ political preferences. In addition, party sentiment profiles reflect the similarity of political positions between parties. We derive suggestions for further research and discuss the use of microblogging services to aggregate dispersed information.", "title": "" }, { "docid": "e59d1a3936f880233001eb086032d927", "text": "In microblogging services such as Twitter, the users may become overwhelmed by the raw data. One solution to this problem is the classification of short text messages. As short texts do not provide sufficient word occurrences, traditional classification methods such as \"Bag-Of-Words\" have limitations. To address this problem, we propose to use a small set of domain-specific features extracted from the author's profile and text. The proposed approach effectively classifies the text to a predefined set of generic classes such as News, Events, Opinions, Deals, and Private Messages.", "title": "" }, { "docid": "f13d3c01729d9f3dcb2b220a0fcce902", "text": "User generated content on Twitter (produced at an enormous rate of 340 million tweets per day) provides a rich source for gleaning people's emotions, which is necessary for deeper understanding of people's behaviors and actions. Extant studies on emotion identification lack comprehensive coverage of \"emotional situations\" because they use relatively small training datasets. To overcome this bottleneck, we have automatically created a large emotion-labeled dataset (of about 2.5 million tweets) by harnessing emotion-related hash tags available in the tweets. We have applied two different machine learning algorithms for emotion identification, to study the effectiveness of various feature combinations as well as the effect of the size of the training data on the emotion identification task. Our experiments demonstrate that a combination of unigrams, big rams, sentiment/emotion-bearing words, and parts-of-speech information is most effective for gleaning emotions. The highest accuracy (65.57%) is achieved with a training data containing about 2 million tweets.", "title": "" }, { "docid": "c61f9e85a3a804ceb06b835cd94b37cf", "text": "The recognition of personal emotional state or sentiment conveyed through text is the main task we address in our research. The communication of emotions through text messaging and posts of personal blogs poses the ‘informal style of writing’ challenge for researchers expecting grammatically correct input. Our Affect Analysis Model was designed to handle the informal messages written in an abbreviated or expressive manner. While constructing our rule-based approach to affect recognition from text, we followed the compositionality principle. Our method is capable of processing sentences of different complexity, including simple, compound, complex (with complement and relative clauses), and complex-compound sentences. The evaluation of the Affect Analysis Model algorithm showed promising results regarding its capability to accurately recognize affective information in text from an existing corpus of personal blog posts.", "title": "" } ]
[ { "docid": "4bce4bc5fde90ed5448ee6361a9534ff", "text": "Much of human dialogue occurs in semicooperative settings, where agents with different goals attempt to agree on common decisions. Negotiations require complex communication and reasoning skills, but success is easy to measure, making this an interesting task for AI. We gather a large dataset of human-human negotiations on a multi-issue bargaining task, where agents who cannot observe each other’s reward functions must reach an agreement (or a deal) via natural language dialogue. For the first time, we show it is possible to train end-to-end models for negotiation, which must learn both linguistic and reasoning skills with no annotated dialogue states. We also introduce dialogue rollouts, in which the model plans ahead by simulating possible complete continuations of the conversation, and find that this technique dramatically improves performance. Our code and dataset are publicly available.1", "title": "" }, { "docid": "2ceb67df0c4b404540b625f93a1c62e5", "text": "AIM\nIn this paper, I call into question the widely-held assumption of a single, more or less unified paradigm of 'qualitative research' whose methodologies share certain epistemological and ontological characteristics, and explore the implications of this position for judgements about the quality of research studies.\n\n\nBACKGROUND\nAfter a quarter of a century of debate in nursing about how best to judge the quality of qualitative research, we appear to be no closer to a consensus, or even to deciding whether it is appropriate to try to achieve a consensus. The literature on this issue can be broadly divided into three positions: those writers who wish qualitative research to be judged according to the same criteria as quantitative research; those who believe that a different set of criteria is required; and those who question the appropriateness of any predetermined criteria for judging qualitative research. Of the three positions, the second appears to have generated most debate, and a number of different frameworks and guidelines for judging the quality of qualitative research have been devised over recent years.\n\n\nDISCUSSION\nThe second of the above positions is rejected in favour of the third. It argues that, if there is no unified qualitative research paradigm, then it makes little sense to attempt to establish a set of generic criteria for making quality judgements about qualitative research studies. We need either to acknowledge that the commonly perceived quantitative-qualitative dichotomy is in fact a continuum which requires a continuum of quality criteria, or to recognize that each study is individual and unique, and that the task of producing frameworks and predetermined criteria for assessing the quality of research studies is futile.\n\n\nCONCLUSION\nSome of the implications of this latter position are explored, including the requirement that all published research reports should include a reflexive research diary.", "title": "" }, { "docid": "1ddc15202bfb318771525a6882e01ad0", "text": "In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes, security and privacy. To show how game theory is utilized in cyberspace security and privacy, we select research regarding three main applications: cyber-physical security, communication security, and privacy. We present game models, features, and solutions of the selected works and describe their advantages and limitations from design to implementation of the defense mechanisms. We also identify some emerging trends and topics for future research. This survey not only demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employ game theory to establish a comprehensive understanding of emerging security and privacy problems in cyberspace and potential solutions.", "title": "" }, { "docid": "15b38be44110ded3407b152af2f65457", "text": "What will 5G be? What it will not be is an incremental advance on 4G. The previous four generations of cellular technology have each been a major paradigm shift that has broken backward compatibility. Indeed, 5G will need to be a paradigm shift that includes very high carrier frequencies with massive bandwidths, extreme base station and device densities, and unprecedented numbers of antennas. However, unlike the previous four generations, it will also be highly integrative: tying any new 5G air interface and spectrum together with LTE and WiFi to provide universal high-rate coverage and a seamless user experience. To support this, the core network will also have to reach unprecedented levels of flexibility and intelligence, spectrum regulation will need to be rethought and improved, and energy and cost efficiencies will become even more critical considerations. This paper discusses all of these topics, identifying key challenges for future research and preliminary 5G standardization activities, while providing a comprehensive overview of the current literature, and in particular of the papers appearing in this special issue.", "title": "" }, { "docid": "5cd3809ab7ed083de14bb622f12373fe", "text": "The proliferation of online information sources has led to an increased use of wrappers for extracting data from Web sources. While most of the previous research has focused on quick and efficient generation of wrappers, the development of tools for wrapper maintenance has received less attention. This is an important research problem because Web sources often change in ways that prevent the wrappers from extracting data correctly. We present an efficient algorithm that learns structural information about data from positive examples alone. We describe how this information can be used for two wrapper maintenance applications: wrapper verification and reinduction. The wrapper verification system detects when a wrapper is not extracting correct data, usually because the Web source has changed its format. The reinduction algorithm automatically recovers from changes in the Web source by identifying data on Web pages so that a new wrapper may be generated for this source. To validate our approach, we monitored 27 wrappers over a period of a year. The verification algorithm correctly discovered 35 of the 37 wrapper changes, and made 16 mistakes, resulting in precision of 0.73 and recall of 0.95. We validated the reinduction algorithm on ten Web sources. We were able to successfully reinduce the wrappers, obtaining precision and recall values of 0.90 and 0.80 on the data extraction task.", "title": "" }, { "docid": "2519ef6995b6345d2131053619d5fc81", "text": "A power and area efficient continuous-time inputfeedforward delta-sigma modulator (DSM) structure is proposed. The coefficients are optimized to increase the input range and reduce the power. The feedforward paths and the summer are embedded into the quantizer, hence the circuit is simplified, and the power consumption and area are reduced. The prototype chip, fabricated in a 0.13-µm CMOS technology, achieves a 68-dB DR (Dynamic Range) and 66.1-dB SNDR (signal-to-noise-and-distortion ratio) over a 1.25-MHz signal bandwidth with a 160-MHz clock. The power consumption of the modulator is 2.7 mW under a 1.2-V supply, and the chip core area is 0.082mm2.", "title": "" }, { "docid": "6be2f551ce116fa822ae71a8b2a0c3a1", "text": "Making complex decisions in real world problems often involves assigning values to sets of interdependent variables where an expressive dependency structure among these can influence, or even dictate, what assignments are possible. Commonly used models typically ignore expressive dependencies since the traditional way of incorporating non-local dependencies is inefficient and hence leads to expensive training and inference. The contribution of this paper is two-fold. First, this paper presents Constrained Conditional Models (CCMs), a framework that augments linear models with declarative constraints as a way to support decisions in an expressive output space while maintaining modularity and tractability of training. The paper develops, analyzes and compares novel algorithms for CCMs based on Hidden Markov Models and Structured Perceptron. The proposed CCM framework is also compared to task-tailored models, such as semi-CRFs. Second, we propose CoDL, a constraint-driven learning algorithm, which makes use of constraints to guide semi-supervised learning. We provide theoretical justification for CoDL along with empirical results which show the advantage of using declarative constraints in the context of semi-supervised training of probabilistic models.", "title": "" }, { "docid": "54f555d7c5ea388541e9159490e12cb2", "text": "Internet of Things is a generic term that refers to interconnection of real-world services which are provided by smart objects and sensors that enable interaction with the physical world. Cities are also evolving into large interconnected ecosystems in an effort to improve sustainability and operational efficiency of the city services and infrastructure. However, it is often difficult to perform real-time analysis of large amount of heterogeneous data and sensory information that are provided by various sources. This paper describes a framework for real-time semantic annotation of streaming IoT data to support dynamic integration into the Web using the Advanced Message Queuing Protocol (AMPQ). This will enable delivery of large volume of data that can influence the performance of the smart city systems that use IoT data. We present an information model to represent summarisation and reliability of stream data. The framework is evaluated with the data size and average exchanged message time using summarised and raw sensor data. Based on a statistical analysis, a detailed comparison between various sensor points is made to investigate the memory and computational cost for the stream annotation framework.", "title": "" }, { "docid": "eb17078285e6f528d0cd08178e1e57c2", "text": "This paper proposes a smart queue management system for delivering real-time service request updates to clients' smartphones in the form of audio and visual feedback. The proposed system aims at reducing the dissatisfaction with services with medium to long waiting times. To this end, the system allows carriers of digital ticket to leave the waiting areas and return in time for their turn to receive service. The proposed system also improves the waiting experience of clients choosing to stay in the waiting area by connecting them to the audio signal of the often muted television sets running entertainment programs, advertisement of services, or news. The system is a web of things including connected units for registering and verifying tickets, units for capturing and streaming audio and queue management, and participating client units in the form of smartphone applications. We implemented the proposed system and verified its functionality and report on our findings and areas of improvements.", "title": "" }, { "docid": "1bf93bf9bd826c4701df5d2036b83226", "text": "In this paper, we propose a novel end-to-end neural architecture for ranking candidate answers, that adapts a hierarchical recurrent neural network and a latent topic clustering module. With our proposed model, a text is encoded to a vector representation from an wordlevel to a chunk-level to effectively capture the entire meaning. In particular, by adapting the hierarchical structure, our model shows very small performance degradations in longer text comprehension while other state-of-the-art recurrent neural network models suffer from it. Additionally, the latent topic clustering module extracts semantic information from target samples. This clustering module is useful for any text related tasks by allowing each data sample to find its nearest topic cluster, thus helping the neural network model analyze the entire data. We evaluate our models on the Ubuntu Dialogue Corpus and consumer electronic domain question answering dataset, which is related to Samsung products. The proposed model shows state-of-the-art results for ranking question-answer pairs.", "title": "" }, { "docid": "c714d199e3900eb52e095fee7997f7e2", "text": "Hardware tokens for user authentication need a secure and usable mechanism to lock them when not in use. The Pico academic project proposes an authentication token unlocked by the proximity of simpler wearable devices that provide shares of the token’s master key. This method, however, is vulnerable to a cold boot attack: an adversary who captures a running Pico could extract the master key from its RAM and steal all of the user’s credentials. We present a cryptographic countermeasure—bivariate secret sharing—that protects all the credentials except the one in use at that time, even if the token is captured while it is on. Remarkably, our key storage costs for the wearables that supply the cryptographic shares are very modest (256 bits) and remain constant even if the token holds thousands of credentials. Although bivariate secret sharing has been used before in slightly different ways, our scheme is leaner and more efficient and achieves a new property—cold boot protection. We validated the efficacy of our design by implementing it on a commercial Bluetooth Low Energy development board and measuring its latency and energy consumption. For reasonable choices of latency and security parameters, a standard CR2032 button-cell battery can power our prototype for 5–7 months, and we demonstrate a simple enhancement that could make the same battery last for over 9 months.", "title": "" }, { "docid": "7e6b6f8bab3172457473d158960688a7", "text": "BACKGROUND\nCancer is a leading cause of death worldwide. Given the complexity of caring work, recent studies have focused on the professional quality of life of oncology nurses. China, the world's largest developing country, faces heavy burdens of care for cancer patients. Chinese oncology nurses may be encountering the negative side of their professional life. However, studies in this field are scarce, and little is known about the prevalence and predictors of oncology nurses' professional quality of life.\n\n\nOBJECTIVES\nTo describe and explore the prevalence of predictors of professional quality of life (compassion fatigue, burnout and compassion satisfaction) among Chinese oncology nurses under the guidance of two theoretical models.\n\n\nDESIGN\nA cross-sectional design with a survey.\n\n\nSETTINGS\nTen tertiary hospitals and five secondary hospitals in Shanghai, China.\n\n\nPARTICIPANTS\nA convenience and cluster sample of 669 oncology nurses was used. All of the nurses worked in oncology departments and had over 1 year of oncology nursing experience. Of the selected nurses, 650 returned valid questionnaires that were used for statistical analyses.\n\n\nMETHODS\nThe participants completed the demographic and work-related questionnaire, the Chinese version of the Professional Quality of Life Scale for Nurses, the Chinese version of the Jefferson Scales of Empathy, the Simplified Coping Style Questionnaire, the Perceived Social Support Scale, and the Chinese Big Five Personality Inventory brief version. Descriptive statistics, t-tests, one-way analysis of variance, simple and multiple linear regressions were used to determine the predictors of the main research variables.\n\n\nRESULTS\nHigher compassion fatigue and burnout were found among oncology nurses who had more years of nursing experience, worked in secondary hospitals and adopted passive coping styles. Cognitive empathy, training and support from organizations were identified as significant protectors, and 'perspective taking' was the strongest predictor of compassion satisfaction, explaining 23.0% of the variance. Personality traits of openness and conscientiousness were positively associated with compassion satisfaction, while neuroticism was a negative predictor, accounting for 24.2% and 19.8% of the variance in compassion fatigue and burnout, respectively.\n\n\nCONCLUSIONS\nOncology care has unique features, and oncology nurses may suffer from more work-related stressors compared with other types of nurses. Various predictors can influence the professional quality of life, and some of these should be considered in the Chinese nursing context. The results may provide clues to help nurse administrators identify oncology nurses' vulnerability to compassion fatigue and burnout and develop comprehensive strategies to improve their professional quality of life.", "title": "" }, { "docid": "8bc17e181e2ca063c44c3ab5dc627993", "text": "Unlike traditional over-the-phone spoken dialog systems (SDSs), modern dialog systems tend to have visual rendering on the device screen as an additional modality to communicate the system’s response to the user. Visual display of the system’s response not only changes human behavior when interacting with devices, but also creates new research areas in SDSs. Onscreen item identification and resolution in utterances is one critical problem to achieve a natural and accurate humanmachine communication. We pose the problem as a classification task to correctly identify intended on-screen item(s) from user utterances. Using syntactic, semantic as well as context features from the display screen, our model can resolve different types of referring expressions with up to 90% accuracy. In the experiments we also show that the proposed model is robust to domain and screen layout changes.", "title": "" }, { "docid": "c3aa37246eeb4745616790dde605ec9d", "text": "The paper describes the use of Conditional Random Fields(CRF) utilizing contextual information in automatically labeling extracted segments of scanned documents as Machine-print, Handwriting and Noise. The result of such a labeling can serve as an indexing step for a context-based image retrieval system or a bio-metric signature verification system. A simple region growing algorithm is first used to segment the document into a number of patches. A label for each such segmented patch is inferred using a CRF model. The model is flexible enough to include signatures as a type of handwriting and isolate it from machine-print and noise. The robustness of the model is due to the inherent nature of modeling neighboring spatial dependencies in the labels as well as the observed data using CRF. Maximum pseudo-likelihood estimates for the parameters of the CRF model are learnt using conjugate gradient descent. Inference of labels is done by computing the probability of the labels under the model with Gibbs sampling. Experimental results show that this approach provides for 95.75% of the data being assigned correct labels. The CRF based model is shown to be superior to Neural Networks and Naive Bayes.", "title": "" }, { "docid": "b04539950e17001e850efdc246db9acf", "text": "Today&apos;s interconnected computer network is complex and is constantly growing in size . As per OWASP Top10 list 2013[1] the top vulnerability in web application is listed as injection attack. SQL injection[2] is the most dangerous attack among injection attacks. Most of the available techniques provide an incomplete solution. While attacking using SQL injection attacker probably use space, single quotes or double dashes in his input so as to change the indented meaning of the runtime query generated based on these inputs. Stored procedure based and second order SQL injection are two types of SQL injection that are difficult to detect and hence difficult to prevent. This work concentrates on Stored procedure based and second", "title": "" }, { "docid": "bd5597d34e862ca915d0e46947ee69b3", "text": "We study non-parametric estimation of consumer choice models. Non-parametric approaches were introduced to alleviate unreasonable assumptions and issues of suboptimal model fit/selection present in traditional parametric approaches, and are prevalent in several application areas. We present two convex optimization-based frameworks, a primal approach and a dual approach, to efficiently learn a non-parametric choice model from data that is close to the best-fitting one. As opposed to the existing literature, both approaches enjoy provable convergence guarantees and extend naturally to the dynamic observation setting. Our computational study on the dynamic setting reveals the true impact of how much data are needed and at what rate to achieve the best trade-off in terms of estimation accuracy and model simplicity. In the static setup, we also compare our non-parametric approach with existing parametric approaches.", "title": "" }, { "docid": "b6a0fcd9ee49b3dbfccdfa88fd0f07a0", "text": "Generating images from natural language is one of the primary applications of recent conditional generative models. Besides testing our ability to model conditional, highly dimensional distributions, text to image synthesis has many exciting and practical applications such as photo editing or computer-aided content creation. Recent progress has been made using Generative Adversarial Networks (GANs). This material starts with a gentle introduction to these topics and discusses the existent state of the art models. Moreover, I propose Wasserstein GAN-CLS, a new model for conditional image generation based on the Wasserstein distance which offers guarantees of stability. Then, I show how the novel loss function of Wasserstein GAN-CLS can be used in a Conditional Progressive Growing GAN. In combination with the proposed loss, the model boosts by 7.07% the best Inception Score (on the Caltech birds dataset) of the models which use only the sentence-level visual semantics. The only model which performs better than the Conditional Wasserstein Progressive growing GAN is the recently proposed AttnGAN which uses word-level visual semantics as well.", "title": "" }, { "docid": "b3939c4753ddf44ec603869a038e85f6", "text": "There are extensive connections between the latissimus dorsi (LD) and gluteus maximus (GMax) muscles and the thoracolumbar fascia (TLF), which suggests a possible pathway for myofascial force transmission. The present study was designed to provide empirical evidence of myofascial force transmission from LD to contralateral GMax through TFL in vivo. To accomplish this goal, we evaluated whether active or passive tensioning of the LD results in increased passive tension of the contralateral GMax, indexed by changes in the hip resting position (RP) or passive stiffness. The hip RP was defined as the angular position in which the passive joint torque equals zero, and passive hip stiffness was calculated as the change in passive torque per change in joint angle. Thirty-seven subjects underwent an assessment of their passive hip torque against medial rotation by means of an isokinetic dynamometer. These measures were carried out under three test conditions: (1) control, (2) passive LD tensioning and (3) active LD tensioning. Electromyography was used to monitor the activity of the hip muscles and the LD under all conditions. Repeated measures analyses of variance demonstrated that passive LD tensioning shifted the hip RP towards lateral rotation (p=0.009) but did not change the passive hip stiffness (p>0.05). Active LD tensioning shifted the hip RP towards lateral rotation (p<0.001) and increased the passive hip stiffness (p≤0.004). The results demonstrated that manipulation of the LD tension modified the passive hip variables, providing evidence of myofascial force transmission in vivo.", "title": "" }, { "docid": "71b0c7a0f28508e01cf3e938aa1ceb86", "text": "Most attempts to identify biological underpinnings of gender identity and sexual orientation in humans have investigated effects of sex steroids, so pivotal in the differentiation of the genitalia, showing strong parallels between animals and the human. The information on humans is derived from the so-called 'experiments of nature', clinical entities with a lesser-than-normal androgen exposure in XY subjects and a higher than normal androgen exposure in XX subjects. Prenatal androgenization appears to predispose to a male gender identity development, but apparently not decisively since 40-50% of 46,XY intersexed children with a history of prenatal androgen exposure do not develop a male gender identity. Obviously, male-to-female transsexuals, with a normal androgen exposure prenatally (there is no serious evidence to the contrary) develop a female gender identity, through unknown biological mechanisms apparently overriding the effects of prenatal androgens. The latest studies in 46, XX subjects exposed to prenatal androgens show that prenatal androgenization of 46,XX fetuses leads to marked masculinization of later gender-related behavior but does not lead to gender confusion/dysphoria. The example of female-to-male transsexuals, without evidence of prenatal androgen exposure, indicates that a male gender identity can develop without a significant androgen stimulus. So we are far away from any comprehensive understanding of hormonal imprinting on gender identity formation. Brain studies in homosexuals have not held up in replication studies or are in need of replication in transsexuals. Genetic studies and the fraternal birth order hypothesis provide indications of familial clustering of homosexuality but in many homosexuals these genetic patterns cannot be identified. The biological explanations advanced for the birth order hypothesis lack any experimental support.", "title": "" }, { "docid": "bb6314a8e6ec728d09aa37bfffe5c835", "text": "In recent years, Convolutional Neural Network (CNN) has been extensively applied in the field of computer vision, which has also made remarkable achievements. However, the CNN models are computation-intensive and memory-consuming, which hinders the deployment of CNN-based methods on resource-limited embedded platforms. Therefore, this paper gives insight into low numerical precision Convolutional Neural Networks. At first, an image classification CNN model is quantized into 8-bit dynamic fixed-point with no more than 1% accuracy drop and then the method of conducting inference on low-cost ARM processor has been proposed. Experimental results verified the effectiveness of this method. Besides, our proof-of-concept prototype implementation can obtain a frame rate of 4.54fps when running on single Cortex-A72 core under 1.8GHz working frequency and 6.48 watts of gross power consumption.", "title": "" } ]
scidocsrr
e5293b67d91dad5e4ed00f3bb89f6425
Detecting patterns of anomalies
[ { "docid": "3df95e4b2b1bb3dc80785b25c289da92", "text": "The problem of efficiently locating previously known patterns in a time series database (i.e., query by content) has received much attention and may now largely be regarded as a solved problem. However, from a knowledge discovery viewpoint, a more interesting problem is the enumeration of previously unknown, frequently occurring patterns. We call such patterns “motifs”, because of their close analogy to their discrete counterparts in computation biology. An efficient motif discovery algorithm for time series would be useful as a tool for summarizing and visualizing massive time series databases. In addition it could be used as a subroutine in various other data mining tasks, including the discovery of association rules, clustering and classification. In this work we carefully motivate, then introduce, a nontrivial definition of time series motifs. We propose an efficient algorithm to discover them, and we demonstrate the utility and efficiency of our approach on several real world datasets.", "title": "" } ]
[ { "docid": "be4fbfdde6ec503bebd5b2a8ddaa2820", "text": "Attack-defence Capture The Flag (CTF) competitions are effective pedagogic platforms to teach secure coding practices due to the interactive and real-world experiences they provide to the contest participants. Two of the key challenges that prevent widespread adoption of such contests are: 1) The game infrastructure is highly resource intensive requiring dedication of significant hardware resources and monitoring by organizers during the contest and 2) the participants find the gameplay to be complicated, requiring performance of multiple tasks that overwhelms inexperienced players. In order to address these, we propose a novel attack-defence CTF game infrastructure which uses application containers. The results of our work showcase effectiveness of these containers and supporting tools in not only reducing the resources organizers need but also simplifying the game infrastructure. The work also demonstrates how the supporting tools can be leveraged to help participants focus more on playing the game i.e. attacking and defending services and less on administrative tasks. The results from this work indicate that our architecture can accommodate over 150 teams with 15 times fewer resources when compared to existing infrastructures of most contests today.", "title": "" }, { "docid": "4540c8ed61e6c8ab3727eefc9a048377", "text": "Network Functions Virtualization (NFV) is incrementally deployed by Internet Service Providers (ISPs) in their carrier networks, by means of Virtual Network Function (VNF) chains, to address customers' demands. The motivation is the increasing manageability, reliability and performance of NFV systems, the gains in energy and space granted by virtualization, at a cost that becomes competitive with respect to legacy physical network function nodes. From a network optimization perspective, the routing of VNF chains across a carrier network implies key novelties making the VNF chain routing problem unique with respect to the state of the art: the bitrate of each demand flow can change along a VNF chain, the VNF processing latency and computing load can be a function of the demands traffic, VNFs can be shared among demands, etc. In this paper, we provide an NFV network model suitable for ISP operations. We define the generic VNF chain routing optimization problem and devise a mixed integer linear programming formulation. By extensive simulation on realistic ISP topologies, we draw conclusions on the trade-offs achievable between legacy Traffic Engineering (TE) ISP goals and novel combined TE-NFV goals.", "title": "" }, { "docid": "ff572d9c74252a70a48d4ba377f941ae", "text": "This paper considers how design fictions in the form of 'imaginary abstracts' can be extended into complete 'fictional papers'. Imaginary abstracts are a type of design fiction that are usually included within the content of 'real' research papers, they comprise brief accounts of fictional problem frames, prototypes, user studies and findings. Design fiction abstracts have been proposed as a means to move beyond solutionism to explore the potential societal value and consequences of new HCI concepts. In this paper we contrast the properties of imaginary abstracts, with the properties of a published paper that presents fictional research, Game of Drones. Extending the notion of imaginary abstracts so that rather than including fictional abstracts within a 'non-fiction' research paper, Game of Drones is fiction from start to finish (except for the concluding paragraph where the fictional nature of the paper is revealed). In this paper we review the scope of design fiction in HCI research before contrasting the properties of imaginary abstracts with the properties of our example fictional research paper. We argue that there are clear merits and weaknesses to both approaches, but when used tactfully and carefully fictional research papers may further empower HCI's burgeoning design discourse with compelling new methods.", "title": "" }, { "docid": "73e2738994b78d54d8fbad5df4622451", "text": "Although online consumer reviews (OCR) have helped consumers to know about the strengths and weaknesses of different products and find the ones that best suit their needs, they introduce a challenge for businesses to analyze them because of their volume, variety, velocity and veracity. This research investigates the predictors of readership and helpfulness of OCR using a sentiment mining approach for big data analytics. Our findings show that reviews with higher levels of positive sentiment in the title receive more readerships. Sentimental reviews with neutral polarity in the text are also perceived to be more helpful. The length and longevity of a review positively influence both its readership and helpfulness. Because the current methods used for sorting OCR may bias both their readership and helpfulness, the approach used in this study can be adopted by online vendors to develop scalable automated systems for sorting and classification of big OCR data which will benefit both vendors and consumers.", "title": "" }, { "docid": "fc6f02a4eb006efe54b34b1705559a55", "text": "Company movements and market changes often are headlines of the news, providing managers with important business intelligence (BI). While existing corporate analyses are often based on numerical financial figures, relatively little work has been done to reveal from textual news articles factors that represent BI. In this research, we developed BizPro, an intelligent system for extracting and categorizing BI factors from news articles. BizPro consists of novel text mining procedures and BI factor modeling and categorization. Expert guidance and human knowledge (with high inter-rater reliability) were used to inform system development and profiling of BI factors. We conducted a case study of using the system to profile BI factors of four major IT companies based on 6859 sentences extracted from 231 news articles published in major news sources. The results show that the chosen techniques used in BizPro – Naïve Bayes (NB) and Logistic Regression (LR) – significantly outperformed a benchmark technique. NB was found to outperform LR in terms of precision, recall, F-measure, and area under ROC curve. This research contributes to developing a new system for profiling company BI factors from news articles, to providing new empirical findings to enhance understanding in BI factor extraction and categorization, and to addressing an important yet under-explored concern of BI analysis. © 2014 Elsevier Ltd. All rights reserved.", "title": "" }, { "docid": "dc4d11c0478872f3882946580bb10572", "text": "An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved-and in some cases entirely new-forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define \"neurosecurity\"-a version of computer science security principles and methods applied to neural engineering-and discuss why neurosecurity should be a critical consideration in the design of future neural devices.", "title": "" }, { "docid": "2653554c6dec7e9cfa0f5a4080d251e2", "text": "Clustering is a key technique within the KDD process, with k-means, and the more general k-medoids, being well-known incremental partition-based clustering algorithms. A fundamental issue within this class of algorithms is to find an initial set of medians (or medoids) that improves the efficiency of the algorithms (e.g., accelerating its convergence to a solution), at the same time that it improves its effectiveness (e.g., finding more meaningful clusters). Thus, in this article we aim at providing a technique that, given a set of elements, quickly finds a very small number of elements as medoid candidates for this set, allowing to improve both the efficiency and effectiveness of existing clustering algorithms. We target the class of k-medoids algorithms in general, and propose a technique that selects a well-positioned subset of central elements to serve as the initial set of medoids for the clustering process. Our technique leads to a substantially smaller amount of distance calculations, thus improving the algorithm’s efficiency when compared to existing methods, without sacrificing effectiveness. A salient feature of our proposed technique is that it is not a new k-medoid clustering algorithm per se, rather, it can be used in conjunction with any existing clustering algorithm that is based on the k-medoid paradigm. Experimental results, using both synthetic and real datasets, confirm the efficiency, effectiveness and scalability of the proposed technique.", "title": "" }, { "docid": "abf6f1218543ce69b0095bba24f40ced", "text": "Evolution of cooperation and competition can appear when multiple adaptive agents share a biological, social, or technological niche. In the present work we study how cooperation and competition emerge between autonomous agents that learn by reinforcement while using only their raw visual input as the state representation. In particular, we extend the Deep Q-Learning framework to multiagent environments to investigate the interaction between two learning agents in the well-known video game Pong. By manipulating the classical rewarding scheme of Pong we show how competitive and collaborative behaviors emerge. We also describe the progression from competitive to collaborative behavior when the incentive to cooperate is increased. Finally we show how learning by playing against another adaptive agent, instead of against a hard-wired algorithm, results in more robust strategies. The present work shows that Deep Q-Networks can become a useful tool for studying decentralized learning of multiagent systems coping with high-dimensional environments.", "title": "" }, { "docid": "6f9afe3cbf5cc675c6b4e96ee2ccfa76", "text": "As more firms begin to collect (and seek value from) richer customer-level datasets, a focus on the emerging concept of customer-base analysis is becoming increasingly common and critical. Such analyses include forward-looking projections ranging from aggregate-level sales trajectories to individual-level conditional expectations (which, in turn, can be used to derive estimates of customer lifetime value). We provide an overview of a class of parsimonious models (called probability models) that are well-suited to meet these rising challenges. We first present a taxonomy that captures some of the key distinctions across different kinds of business settings and customer relationships, and identify some of the unique modeling and measurement issues that arise across them. We then provide deeper coverage of these modeling issues, first for noncontractual settings (i.e., situations in which customer “death” is unobservable), then contractual ones (i.e., situations in which customer “death” can be observed). We review recent literature in these areas, highlighting substantive insights that arise from the research as well as the methods used to capture them. We focus on practical applications that use appropriately chosen data summaries (such as recency and frequency) and rely on commonly available software packages (such as Microsoft Excel). n 2009 Direct Marketing Educational Foundation, Inc. Published by Elsevier B.V. All rights reserved.", "title": "" }, { "docid": "e77cf8938714824d46cfdbdb1b809f93", "text": "Generative models provide a way to model structure in complex distributions and have been shown to be useful for many tasks of practical interest. However, current techniques for training generative models require access to fully-observed samples. In many settings, it is expensive or even impossible to obtain fullyobserved samples, but economical to obtain partial, noisy observations. We consider the task of learning an implicit generative model given only lossy measurements of samples from the distribution of interest. We show that the true underlying distribution can be provably recovered even in the presence of per-sample information loss for a class of measurement models. Based on this, we propose a new method of training Generative Adversarial Networks (GANs) which we call AmbientGAN. On three benchmark datasets, and for various measurement models, we demonstrate substantial qualitative and quantitative improvements. Generative models trained with our method can obtain 2-4x higher inception scores than the baselines.", "title": "" }, { "docid": "b85df2aec85417d45b251299dfce4f39", "text": "A growing body of studies is developing approaches to evaluating human interaction with Web search engines, including the usability and effectiveness of Web search tools. This study explores a user-centered approach to the evaluation of the Web search engine Inquirus – a Web metasearch tool developed by researchers from the NEC Research Institute. The goal of the study reported in this paper was to develop a user-centered approach to the evaluation including: (1) effectiveness: based on the impact of users' interactions on their information problem and information seeking stage, and (2) usability: including screen layout and system capabilities for users. Twenty-two (22) volunteers searched Inquirus on their own personal information topics. Data analyzed included: (1) user preand post-search questionnaires and (2) Inquirus search transaction logs. Key findings include: (1) Inquirus was rated highly by users on various usability measures, (2) all users experienced some level of shift/change in their information problem, information seeking, and personal knowledge due to their Inquirus interaction, (3) different users experienced different levels of change/shift, and (4) the search measure precision did not correlate with other user-based measures. Some users experienced major changes/shifts in various userbased variables, such as information problem or information seeking stage with a search of low precision and vice versa. Implications for the development of user-centered approaches to the evaluation of Web and IR systems and further research are discussed.", "title": "" }, { "docid": "e4b54824b2528b66e28e82ad7d496b36", "text": "Objective: In this paper, we develop a personalized real-time risk scoring algorithm that provides timely and granular assessments for the clinical acuity of ward patients based on their (temporal) lab tests and vital signs; the proposed risk scoring system ensures timely intensive care unit admissions for clinically deteriorating patients. Methods: The risk scoring system is based on the idea of sequential hypothesis testing under an uncertain time horizon. The system learns a set of latent patient subtypes from the offline electronic health record data, and trains a mixture of Gaussian Process experts, where each expert models the physiological data streams associated with a specific patient subtype. Transfer learning techniques are used to learn the relationship between a patient's latent subtype and her static admission information (e.g., age, gender, transfer status, ICD-9 codes, etc). Results: Experiments conducted on data from a heterogeneous cohort of 6321 patients admitted to Ronald Reagan UCLA medical center show that our score significantly outperforms the currently deployed risk scores, such as the Rothman index, MEWS, APACHE, and SOFA scores, in terms of timeliness, true positive rate, and positive predictive value. Conclusion: Our results reflect the importance of adopting the concepts of personalized medicine in critical care settings; significant accuracy and timeliness gains can be achieved by accounting for the patients’ heterogeneity. Significance: The proposed risk scoring methodology can confer huge clinical and social benefits on a massive number of critically ill inpatients who exhibit adverse outcomes including, but not limited to, cardiac arrests, respiratory arrests, and septic shocks.", "title": "" }, { "docid": "024265b0b1872dd89d875dd5d3df5b78", "text": "In this paper, we present a novel system to analyze human body motions for action recognition task from two sets of features using RGBD videos. The Bag-of-Features approach is used for recognizing human action by extracting local spatialtemporal features and shape invariant features from all video frames. These feature vectors are computed in four steps: Firstly, detecting all interest keypoints from RGB video frames using Speed-Up Robust Features and filters motion points using Motion History Image and Optical Flow, then aligned these motion points to the depth frame sequences. Secondly, using a Histogram of orientation gradient descriptor for computing the features vector around these points from both RGB and depth channels, then combined these feature values in one RGBD feature vector. Thirdly, computing Hu-Moment shape features from RGBD frames, fourthly, combining the HOG features with Hu-moments features in one feature vector for each video action. Finally, the k-means clustering and the multi-class K-Nearest Neighbor is used for the classification task. This system is invariant to scale, rotation, translation, and illumination. All tested are utilized on a dataset that is available to the public and used often in the community. By using this new feature combination method improves performance on actions with low movement and reach recognition rates superior to other publications of the dataset. Keywords—RGBD Videos; Feature Extraction; k-means Clustering; KNN (K-Nearest Neighbor)", "title": "" }, { "docid": "cf817c1802b65f93e5426641a5ea62e2", "text": "To protect sensitive data processed by current applications, developers, whether security experts or not, have to rely on cryptography. While cryptography algorithms have become increasingly advanced, many data breaches occur because developers do not correctly use the corresponding APIs. To guide future research into practical solutions to this problem, we perform an empirical investigation into the obstacles developers face while using the Java cryptography APIs, the tasks they use the APIs for, and the kind of (tool) support they desire. We triangulate data from four separate studies that include the analysis of 100 StackOverflow posts, 100 GitHub repositories, and survey input from 48 developers. We find that while developers find it difficult to use certain cryptographic algorithms correctly, they feel surprisingly confident in selecting the right cryptography concepts (e.g., encryption vs. signatures). We also find that the APIs are generally perceived to be too low-level and that developers prefer more task-based solutions.", "title": "" }, { "docid": "77f7644a5e2ec50b541fe862a437806f", "text": "This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for application level framing and light-weight sessions. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The framework has been prototyped in wb, a distributed whiteboard application, and has been extensively tested on a global scale with sessions ranging from a few to more than 1000 participants. The paper describes the principles that have guided our design, including the IP multicast group delivery model, an end-to-end, receiver-based model of reliability, and the application level framing protocol model. As with unicast communications, the performance of a reliable multicast delivery algorithm depends on the underlying topology and operational environment. We investigate that dependence via analysis and simulation, and demonstrate an adaptive algorithm that uses the results of previous loss recovery events to adapt the control parameters used for future loss recovery. With the adaptive algorithm, our reliable multicast delivery algorithm provides good performance over a wide range of underlying topologies.", "title": "" }, { "docid": "56667d286f69f8429be951ccf5d61c24", "text": "As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural abstractions support U2IoT model. In particular, 1) an information security model is established to describe the mapping relations among U2IoT, security layer, and security requirement, in which social layer and additional intelligence and compatibility properties are infused into IPM; 2) physical security referring to the external context and inherent infrastructure are inspired by artificial immune algorithms; 3) recommended security strategies are suggested for social management control. The proposed IPM combining the cyber world, physical world and human social provides constructive proposal towards the future IoT security and privacy protection.", "title": "" }, { "docid": "104c845c9c34e8e94b6e89d651635ae8", "text": "Three families of Bacillus cyclic lipopeptides--surfactins, iturins, and fengycins--have well-recognized potential uses in biotechnology and biopharmaceutical applications. This study outlines the isolation and characterization of locillomycins, a novel family of cyclic lipopeptides produced by Bacillus subtilis 916. Elucidation of the locillomycin structure revealed several molecular features not observed in other Bacillus lipopeptides, including a unique nonapeptide sequence and macrocyclization. Locillomycins are active against bacteria and viruses. Biochemical analysis and gene deletion studies have supported the assignment of a 38-kb gene cluster as the locillomycin biosynthetic gene cluster. Interestingly, this gene cluster encodes 4 proteins (LocA, LocB, LocC, and LocD) that form a hexamodular nonribosomal peptide synthetase to biosynthesize cyclic nonapeptides. Genome analysis and the chemical structures of the end products indicated that the biosynthetic pathway exhibits two distinct features: (i) a nonlinear hexamodular assembly line, with three modules in the middle utilized twice and the first and last two modules used only once and (ii) several domains that are skipped or optionally selected.", "title": "" }, { "docid": "4b432638ecceac3d1948fb2b2e9be49b", "text": "Software process refers to the set of tools, methods, and practices used to produce a software artifact. The objective of a software process management model is to produce software artifacts according to plans while simultaneously improving the organization's capability to produce better artifacts. The SEI's Capability Maturity Model (CMM) is a software process management model; it assists organizations to provide the infrastructure for achieving a disciplined and mature software process. There is a growing concern that the CMM is not applicable to small firms because it requires a huge investment. In fact, detailed studies of the CMM show that its applications may cost well over $100,000. This article attempts to address the above concern by studying the feasibility of a scaled-down version of the CMM for use in small software firms. The logic for a scaled-down CMM is that the same quantitative quality control principles that work for larger projects can be scaled-down and adopted for smaller ones. Both the CMM and the Personal Software Process (PSP) are briefly described and are used as basis.", "title": "" }, { "docid": "20a2390dede15514cd6a70e9b56f5432", "text": "The ability to record and replay program executions with low overhead enables many applications, such as reverse-execution debugging, debugging of hard-toreproduce test failures, and “black box” forensic analysis of failures in deployed systems. Existing record-andreplay approaches limit deployability by recording an entire virtual machine (heavyweight), modifying the OS kernel (adding deployment and maintenance costs), requiring pervasive code instrumentation (imposing significant performance and complexity overhead), or modifying compilers and runtime systems (limiting generality). We investigated whether it is possible to build a practical record-and-replay system avoiding all these issues. The answer turns out to be yes — if the CPU and operating system meet certain non-obvious constraints. Fortunately modern Intel CPUs, Linux kernels and user-space frameworks do meet these constraints, although this has only become true recently. With some novel optimizations, our system RR records and replays real-world lowparallelism workloads with low overhead, with an entirely user-space implementation, using stock hardware, compilers, runtimes and operating systems. RR forms the basis of an open-source reverse-execution debugger seeing significant use in practice. We present the design and implementation of RR, describe its performance on a variety of workloads, and identify constraints on hardware and operating system design required to support our approach.", "title": "" }, { "docid": "a9b366b2b127b093b547f8a10ac05ca5", "text": "Each user session in an e-commerce system can be modeled as a sequence of web pages, indicating how the user interacts with the system and makes his/her purchase. A typical recommendation approach, e.g., Collaborative Filtering, generates its results at the beginning of each session, listing the most likely purchased items. However, such approach fails to exploit current viewing history of the user and hence, is unable to provide a real-time customized recommendation service. In this paper, we build a deep recurrent neural network to address the problem. The network tracks how users browse the website using multiple hidden layers. Each hidden layer models how the combinations of webpages are accessed and in what order. To reduce the processing cost, the network only records a finite number of states, while the old states collapse into a single history state. Our model refreshes the recommendation result each time when user opens a new web page. As user's session continues, the recommendation result is gradually refined. Furthermore, we integrate the recurrent neural network with a Feedfoward network which represents the user-item correlations to increase the prediction accuracy. Our approach has been applied to Kaola (http://www.kaola.com), an e-commerce website powered by the NetEase technologies. It shows a significant improvement over previous recommendation service.", "title": "" } ]
scidocsrr