query_id
stringlengths 32
32
| query
stringlengths 6
2.48k
| positive_passages
listlengths 1
17
| negative_passages
listlengths 10
100
| subset
stringclasses 7
values |
---|---|---|---|---|
ba87e2ebdc3c8a4aea5b135201401c75 | Bi-directional conversion between graphemes and phonemes using a joint N-gram model | [
{
"docid": "fc79bfdb7fbbfa42d2e1614964113101",
"text": "Probability Theory, 2nd ed. Princeton, N. J.: 960. Van Nostrand, 1 121 T. T. Kadota, “Optimum reception of binary gaussian signals,” Bell Sys. Tech. J., vol. 43, pp. 2767-2810, November 1964. 131 T. T. Kadota. “Ootrmum recention of binarv sure and Gaussian signals,” Bell Sys. ?‘ech: J., vol. 44;~~. 1621-1658, October 1965. 141 U. Grenander, ‘Stochastic processes and statistical inference,” Arkiv fiir Matematik, vol. 17, pp. 195-277, 1950. 151 L. A. Zadeh and J. R. Ragazzini, “Optimum filters for the detection of signals in noise,” Proc. IRE, vol. 40, pp. 1223-1231, O,+nhm 1 a.63 161 J. H. Laning and R. H. Battin, Random Processes in Automatic Control. New York: McGraw-Hill. 1956. nn. 269-358. 171 C.. W. Helstrom, “ Solution of the dete&on integral equation for stationary filtered white noise,” IEEE Trans. on Information Theory, vol. IT-II, pp. 335-339, July 1965. 181 T. Kailath, “The detection of known signals in colored Gaussian noise,” Stanford Electronics Labs., Stanford Univ., Stanford, Calif. Tech. Rept. 7050-4, July 1965. 191 T. T. Kadota, “Optimum reception of nf-ary Gaussian signals in Gaussian noise,” Bell. Sys. Tech. J., vol. 44, pp. 2187-2197, November 1965. [lOI T. T. Kadota, “Term-by-term differentiability of Mercer’s expansion,” Proc. of Am. Math. Sot., vol. 18, pp. 69-72, February 1967.",
"title": ""
}
] | [
{
"docid": "cfbfc01ee75019b563c46d4bebfba0f4",
"text": "We present results from gate-all-around (GAA) silicon nanowire (SiNW) MOSFETs fabricated using a process flow capable of achieving a nanowire pitch of 30 nm and a scaled gate pitch of 60 nm. We demonstrate for the first time that GAA SiNW devices can be integrated to density targets commensurate with CMOS scaling needs of the 10 nm node and beyond. In addition, this work achieves the highest performance for GAA SiNW NFETs at a gate pitch below 100 nm.",
"title": ""
},
{
"docid": "8d8dc05c2de34440eb313503226f7e99",
"text": "Disambiguating entity references by annotating them with unique ids from a catalog is a critical step in the enrichment of unstructured content. In this paper, we show that topic models, such as Latent Dirichlet Allocation (LDA) and its hierarchical variants, form a natural class of models for learning accurate entity disambiguation models from crowd-sourced knowledge bases such as Wikipedia. Our main contribution is a semi-supervised hierarchical model called Wikipedia-based Pachinko Allocation Model} (WPAM) that exploits: (1) All words in the Wikipedia corpus to learn word-entity associations (unlike existing approaches that only use words in a small fixed window around annotated entity references in Wikipedia pages), (2) Wikipedia annotations to appropriately bias the assignment of entity labels to annotated (and co-occurring unannotated) words during model learning, and (3) Wikipedia's category hierarchy to capture co-occurrence patterns among entities. We also propose a scheme for pruning spurious nodes from Wikipedia's crowd-sourced category hierarchy. In our experiments with multiple real-life datasets, we show that WPAM outperforms state-of-the-art baselines by as much as 16% in terms of disambiguation accuracy.",
"title": ""
},
{
"docid": "2693a2815adf4e731d87f9630cd7c427",
"text": "A new fuzzy filter is presented for the noise reduction of images corrupted with additive noise. The filter consists of two stages. The first stage computes a fuzzy derivative for eight different directions. The second stage uses these fuzzy derivatives to perform fuzzy smoothing by weighting the contributions of neighboring pixel values. Both stages are based on fuzzy rules which make use of membership functions. The filter can be applied iteratively to effectively reduce heavy noise. In particular, the shape of the membership functions is adapted according to the remaining noise level after each iteration, making use of the distribution of the homogeneity in the image. A statistical model for the noise distribution can be incorporated to relate the homogeneity to the adaptation scheme of the membership functions. Experimental results are obtained to show the feasibility of the proposed approach. These results are also compared to other filters by numerical measures and visual inspection.",
"title": ""
},
{
"docid": "e96c9bdd3f5e9710f7264cbbe02738a7",
"text": "25 years ago, Lenstra, Lenstra and Lovász presented their c el brated LLL lattice reduction algorithm. Among the various applicatio ns of the LLL algorithm is a method due to Coppersmith for finding small roots of polyn mial equations. We give a survey of the applications of this root finding metho d t the problem of inverting the RSA function and the factorization problem. A s we will see, most of the results are of a dual nature, they can either be interpret ed as cryptanalytic results or as hardness/security results.",
"title": ""
},
{
"docid": "9a9fdd35a3f9df6ebdd7ea8f0cac5a00",
"text": "The recent appearance of augmented reality headsets, such as the Microsoft HoloLens, is a marked move from traditional 2D screen to 3D hologram-like interfaces. Striving to be completely portable, these devices unfortunately suffer multiple limitations, such as the lack of real-time, high quality depth data, which severely restricts their use as research tools. To mitigate this restriction, we provide a simple method to augment a HoloLens headset with much higher resolution depth data. To do so, we calibrate an external depth sensor connected to a computer stick that communicates with the HoloLens headset in real-time. To show how this system could be useful to the research community, we present an implementation of small object detection on HoloLens device.",
"title": ""
},
{
"docid": "2fa5df7c70c05445c9f300c7da0f8f87",
"text": "In this paper, we describe K-Extractor, a powerful NLP framework that provides integrated and seamless access to structured and unstructured information with minimal effort. The K-Extractor converts natural language documents into a rich set of semantic triples that, not only, can be stored within an RDF semantic index, but also, can be queried using natural language questions, thus eliminating the need to manually formulate SPARQL queries. The K-Extractor greatly outperforms a free text search index-based question answering system.",
"title": ""
},
{
"docid": "9673939625a3caafecf3da68a19742b0",
"text": "Automatic detection of road regions in aerial images remains a challenging research topic. Most existing approaches work well on the requirement of users to provide some seedlike points/strokes in the road area as the initial location of road regions, or detecting particular roads such as well-paved roads or straight roads. This paper presents a fully automatic approach that can detect generic roads from a single unmanned aerial vehicles (UAV) image. The proposed method consists of two major components: automatic generation of road/nonroad seeds and seeded segmentation of road areas. To know where roads probably are (i.e., road seeds), a distinct road feature is proposed based on the stroke width transformation (SWT) of road image. To the best of our knowledge, it is the first time to introduce SWT as road features, which show the effectiveness on capturing road areas in images in our experiments. Different road features, including the SWT-based geometry information, colors, and width, are then combined to classify road candidates. Based on the candidates, a Gaussian mixture model is built to produce road seeds and background seeds. Finally, starting from these road and background seeds, a convex active contour model segmentation is proposed to extract whole road regions. Experimental results on varieties of UAV images demonstrate the effectiveness of the proposed method. Comparison with existing techniques shows the robustness and accuracy of our method to different roads.",
"title": ""
},
{
"docid": "9d9428fe9adbe3d1197e12ba4cbafe87",
"text": "BACKGROUND\nLegalization of euthanasia and physician-assisted suicide has been heavily debated in many countries. To help inform this debate, we describe the practices of euthanasia and assisted suicide, and the use of life-ending drugs without an explicit request from the patient, in Flanders, Belgium, where euthanasia is legal.\n\n\nMETHODS\nWe mailed a questionnaire regarding the use of life-ending drugs with or without explicit patient request to physicians who certified a representative sample (n = 6927) of death certificates of patients who died in Flanders between June and November 2007.\n\n\nRESULTS\nThe response rate was 58.4%. Overall, 208 deaths involving the use of life-ending drugs were reported: 142 (weighted prevalence 2.0%) were with an explicit patient request (euthanasia or assisted suicide) and 66 (weighted prevalence 1.8%) were without an explicit request. Euthanasia and assisted suicide mostly involved patients less than 80 years of age, those with cancer and those dying at home. Use of life-ending drugs without an explicit request mostly involved patients 80 years of older, those with a disease other than cancer and those in hospital. Of the deaths without an explicit request, the decision was not discussed with the patient in 77.9% of cases. Compared with assisted deaths with the patient's explicit request, those without an explicit request were more likely to have a shorter length of treatment of the terminal illness, to have cure as a goal of treatment in the last week, to have a shorter estimated time by which life was shortened and to involve the administration of opioids.\n\n\nINTERPRETATION\nPhysician-assisted deaths with an explicit patient request (euthanasia and assisted suicide) and without an explicit request occurred in different patient groups and under different circumstances. Cases without an explicit request often involved patients whose diseases had unpredictable end-of-life trajectories. Although opioids were used in most of these cases, misconceptions seem to persist about their actual life-shortening effects.",
"title": ""
},
{
"docid": "11c117d839be466c369274f021caba13",
"text": "Android smartphones are becoming increasingly popular. The open nature of Android allows users to install miscellaneous applications, including the malicious ones, from third-party marketplaces without rigorous sanity checks. A large portion of existing malwares perform stealthy operations such as sending short messages, making phone calls and HTTP connections, and installing additional malicious components. In this paper, we propose a novel technique to detect such stealthy behavior. We model stealthy behavior as the program behavior that mismatches with user interface, which denotes the user's expectation of program behavior. We use static program analysis to attribute a top level function that is usually a user interaction function with the behavior it performs. Then we analyze the text extracted from the user interface component associated with the top level function. Semantic mismatch of the two indicates stealthy behavior. To evaluate AsDroid, we download a pool of 182 apps that are potentially problematic by looking at their permissions. Among the 182 apps, AsDroid reports stealthy behaviors in 113 apps, with 28 false positives and 11 false negatives.",
"title": ""
},
{
"docid": "118c147b4bca8036f2ce360609a3c3e5",
"text": "Robot manipulators are increasingly used in minimally invasive surgery (MIS). They are required to have small size, wide workspace, adequate dexterity and payload ability when operating in confined surgical cavity. Snake-like flexible manipulators are well suited to these applications. However, conventional fully actuated snake-like flexible manipulators are difficult to miniaturize and even after miniaturization the payload is very limited. The alternative is to use underactuated snake-like flexible manipulators. Three prevailing designs are tendon-driven continuum manipulators (TCM), tendon-driven serpentine manipulators (TSM) and concentric tube manipulators (CTM). In this paper, the three designs are compared at the mechanism level from the kinematics point of view. The workspace and distal end dexterity are compared for TCM, TSM and CTM with one, two and three sections, respectively. Other aspects of these designs are also discussed, including sweeping motion, scaling, force sensing, stiffness control, etc. From the results, the tendon-driven designs and concentric tube design complement each other in terms of their workspace, which is influenced by the number of sections as well as the length distribution among sections. The tendon-driven designs entail better distal end dexterity while generate larger sweeping motion in positions close to the shaft.",
"title": ""
},
{
"docid": "a408e25435dded29744cf2af0f7da1e5",
"text": "Using cloud storage to automatically back up content changes when editing documents is an everyday scenario. We demonstrate that current cloud storage services can cause unnecessary bandwidth consumption, especially for office suite documents, in this common scenario. Specifically, even with incremental synchronization approach in place, existing cloud storage services still incur whole-file transmission every time when the document file is synchronized. We analyze the problem causes in depth, and propose EdgeCourier, a system to address the problem. We also propose the concept of edge-hosed personal service (EPS), which has many benefits, such as helping deploy EdgeCourier easily in practice. We have prototyped the EdgeCourier system, deployed it in the form of EPS in a lab environment, and performed extensive experiments for evaluation. Evaluation results suggest that our prototype system can effectively reduce document synchronization bandwidth with negligible overheads.",
"title": ""
},
{
"docid": "ff705a36e71e2aa898e99fbcfc9ec9d2",
"text": "This paper presents a design concept for smart home automation system based on the idea of the internet of things (IoT) technology. The proposed system has two scenarios where first one is denoted as a wireless based and the second is a wire-line based scenario. Each scenario has two operational modes for manual and automatic use. In Case of the wireless scenario, Arduino-Uno single board microcontroller as a central controller for home appliances is applied. Cellular phone with Matlab-GUI platform for monitoring and controlling processes through Wi-Fi communication technology is addressed. For the wire-line scenario, field-programmable gate array (FPGA) kit as a main controller is used. Simulation and hardware realization for the proposed system show its reliability and effectiveness.",
"title": ""
},
{
"docid": "34cc6503494981fda7f69c794525776a",
"text": "In this article we investigate the problem of human action recognition in static images. By action recognition we intend a class of problems which includes both action classification and action detection (i.e. simultaneous localization and classification). Bag-of-words image representations yield promising results for action classification, and deformable part models perform very well object detection. The representations for action recognition typically use only shape cues and ignore color information. Inspired by the recent success of color in image classification and object detection, we investigate the potential of color for action classification and detection in static images. We perform a comprehensive evaluation of color descriptors and fusion approaches for action recognition. Experiments were conducted on the three datasets most used for benchmarking action recognition in still images: Willow, PASCAL VOC 2010 and Stanford-40. Our experiments demonstrate that incorporating color information considerably improves recognition performance, and that a descriptor based on color names outperforms pure color descriptors. Our experiments demonstrate that late fusion of color and shape information outperforms other approaches on action recognition. Finally, we show that the different color–shape fusion approaches result in complementary information and combining them yields state-of-the-art performance for action classification.",
"title": ""
},
{
"docid": "185ae8a2c89584385a810071c6003c15",
"text": "In this paper, we propose a free viewpoint image rendering method combined with filter based alpha matting for improving the image quality of image boundaries. When we synthesize a free viewpoint image, blur around object boundaries in an input image spills foreground/background color in the synthesized image. To generate smooth boundaries, alpha matting is a solution. In our method based on filtering, we make a boundary map from input images and depth maps, and then feather the map by using guided filter. In addition, we extend view synthesis method to deal the alpha channel. Experiment results show that the proposed method synthesizes 0.4 dB higher quality images than the conventional method without the matting. Also the proposed method synthesizes 0.2 dB higher quality images than the conventional method of robust matting. In addition, the computational cost of the proposed method is 100x faster than the conventional matting.",
"title": ""
},
{
"docid": "04e478610728f0aae76e5299c28da25a",
"text": "Single image super resolution is one of the most important topic in computer vision and image processing research, many convolutional neural networks (CNN) based super resolution algorithms were proposed and achieved advanced performance, especially in recovering image details, in which PixelCNN is the most representative one. However, due to the intensive computation requirement of PixelCNN model, running time remains a major challenge, which limited its wider application. In this paper, several modifications are proposed to improve PixelCNN based recursive super resolution model. First, a discrete logistic mixture likelihood is adopted, then a cache structure for generating process is proposed, with these modifications, numerous redundant computations are removed without loss of accuracy. Finally, a partial generating network is proposed for higher resolution generation. Experiments on CelebA dataset demonstrate the effectiveness the superiority of the proposed method.",
"title": ""
},
{
"docid": "4e9ca5976fc68c319e8303076ca80dc7",
"text": "A self-driving car, to be deployed in real-world driving environments, must be capable of reliably detecting and effectively tracking of nearby moving objects. This paper presents our new, moving object detection and tracking system that extends and improves our earlier system used for the 2007 DARPA Urban Challenge. We revised our earlier motion and observation models for active sensors (i.e., radars and LIDARs) and introduced a vision sensor. In the new system, the vision module detects pedestrians, bicyclists, and vehicles to generate corresponding vision targets. Our system utilizes this visual recognition information to improve a tracking model selection, data association, and movement classification of our earlier system. Through the test using the data log of actual driving, we demonstrate the improvement and performance gain of our new tracking system.",
"title": ""
},
{
"docid": "fb1c9fcea2f650197b79711606d4678b",
"text": "Self-similarity based super-resolution (SR) algorithms are able to produce visually pleasing results without extensive training on external databases. Such algorithms exploit the statistical prior that patches in a natural image tend to recur within and across scales of the same image. However, the internal dictionary obtained from the given image may not always be sufficiently expressive to cover the textural appearance variations in the scene. In this paper, we extend self-similarity based SR to overcome this drawback. We expand the internal patch search space by allowing geometric variations. We do so by explicitly localizing planes in the scene and using the detected perspective geometry to guide the patch search process. We also incorporate additional affine transformations to accommodate local shape variations. We propose a compositional model to simultaneously handle both types of transformations. We extensively evaluate the performance in both urban and natural scenes. Even without using any external training databases, we achieve significantly superior results on urban scenes, while maintaining comparable performance on natural scenes as other state-of-the-art SR algorithms.",
"title": ""
},
{
"docid": "40c87c73dad1bf79e1dd047b320a5b49",
"text": "Very recently, an increasing number of software companies adopted DevOps to adapt themselves to the ever-changing business environment. While it is important to mature adoption of the DevOps for these companies, no dedicated maturity models for DevOps exist. Meanwhile, maturity models such as CMMI models have demonstrated their effects in the traditional paradigm of software industry, however, it is not clear whether the CMMI models could guide the improvements with the context of DevOps. This paper reports a case study aiming at evaluating the feasibility to apply the CMMI models to guide process improvement for DevOps projects and identifying possible gaps. Using a structured method(i.e., SCAMPI C), we conducted a case study by interviewing four employees from one DevOps project. Based on evidence we collected in the case study, we managed to characterize the maturity/capability of the DevOps project, which implies the possibility to use the CMMI models to appraise the current processes in this DevOps project and guide future improvements. Meanwhile, several gaps also are identified between the CMMI models and the DevOps mode. In this sense, the CMMI models could be taken as a good foundation to design suitable maturity models so as to guide process improvement for projects adopting the DevOps.",
"title": ""
},
{
"docid": "c699ede2caeb5953decc55d8e42c2741",
"text": "Traditionally, two distinct approaches have been employed for exploratory factor analysis: maximum likelihood factor analysis and principal component analysis. A third alternative, called regularized exploratory factor analysis, was introduced recently in the psychometric literature. Small sample size is an important issue that has received considerable discussion in the factor analysis literature. However, little is known about the differential performance of these three approaches to exploratory factor analysis in a small sample size scenario. A simulation study and an empirical example demonstrate that regularized exploratory factor analysis may be recommended over the two traditional approaches, particularly when sample sizes are small (below 50) and the sample covariance matrix is near singular.",
"title": ""
},
{
"docid": "715877425204ebb5764bd6ca57ac54ea",
"text": "User Generated Content (UGC) is re-shaping the way people watch video and TV, with millions of video producers and consumers. In particular, UGC sites are creating new viewing patterns and social interactions, empowering users to be more creative, and developing new business opportunities. To better understand the impact of UGC systems, we have analyzed YouTube, the world's largest UGC VoD system. Based on a large amount of data collected, we provide an in-depth study of YouTube and other similar UGC systems. In particular, we study the popularity life-cycle of videos, the intrinsic statistical properties of requests and their relationship with video age, and the level of content aliasing or of illegal content in the system. We also provide insights on the potential for more efficient UGC VoD systems (e.g. utilizing P2P techniques or making better use of caching). Finally, we discuss the opportunities to leverage the latent demand for niche videos that are not reached today due to information filtering effects or other system scarcity distortions. Overall, we believe that the results presented in this paper are crucial in understanding UGC systems and can provide valuable information to ISPs, site administrators, and content owners with major commercial and technical implications.",
"title": ""
}
] | scidocsrr |
cb43f7936174c76fd998816371905987 | Duplicate-skins for compatible mesh modelling | [
{
"docid": "30604dca66bbf3f0abe63c101f02e434",
"text": "This paper presents a novel feature based parameterization approach of human bodies from the unorganized cloud points and the parametric design method for generating new models based on the parameterization. The parameterization consists of two phases. Firstly, the semantic feature extraction technique is applied to construct the feature wireframe of a human body from laser scanned 3D unorganized points. Secondly, the symmetric detail mesh surface of the human body is modeled. Gregory patches are utilized to generate G 1 continuous mesh surface interpolating the curves on feature wireframe. After that, a voxel-based algorithm adds details on the smooth G 1 continuous surface by the cloud points. Finally, the mesh surface is adjusted to become symmetric. Compared to other template fitting based approaches, the parameterization approach introduced in this paper is more efficient. The parametric design approach synthesizes parameterized sample models to a new human body according to user input sizing dimensions. It is based on a numerical optimization process. The strategy of choosing samples for synthesis is also introduced. Human bodies according to a wide range of dimensions can be generated by our approach. Different from the mathematical interpolation function based human body synthesis methods, the models generated in our method have the approximation errors minimized. All mannequins constructed by our approach have consistent feature patches, which benefits the design automation of customized clothes around human bodies a lot.",
"title": ""
}
] | [
{
"docid": "6f72b40f0971bde8d21ff8008ca8edbf",
"text": "In this paper, we propose multi-stage and deformable deep convolutional neural networks for object detection. This new deep learning object detection diagram has innovations in multiple aspects. In the proposed new deep architecture, a new deformation constrained pooling (defpooling) layer models the deformation of object parts with geometric constraint and penalty. With the proposed multistage training strategy, multiple classifiers are jointly o ptimized to process samples at different difficulty levels. A ne w pre-training strategy is proposed to learn feature represe ntations more suitable for the object detection task and with good generalization capability. By changing the net structures, training strategies, adding and removing some key components in the detection pipeline, a set of models with large diversity are obtained, which significantly improves the effectiveness of modeling averaging. The proposed approach ranked #2 in ILSVRC 2014. It improves the mean averaged precision obtained by RCNN, which is the stateof-the-art of object detection, from31% to 45%. Detailed component-wise analysis is also provided through extensiv experimental evaluation.",
"title": ""
},
{
"docid": "4ea5dd9377b2ed6dba15ee05060f1c53",
"text": "The mechanism of death in patients struggling against restraints remains a topic of debate. This article presents a series of five patients with restraint-associated cardiac arrest and profound metabolic acidosis. The lowest recorded pH was 6.25; this patient and three others died despite aggressive resuscitation. The survivor's pH was 6.46; this patient subsequently made a good recovery. Struggling against restraints may produce a lactic acidosis. Stimulant drugs such as cocaine may promote further metabolic acidosis and impair normal behavioral regulatory responses. Restrictive positioning of combative patients may impede appropriate respiratory compensation for this acidemia. Public safety personnel and emergency providers must be aware of the life threat to combative patients and be careful with restraint techniques. Further investigation of sedative agents and buffering therapy for this select patient group is suggested.",
"title": ""
},
{
"docid": "23ef781d3230124360f24cc6e38fb15f",
"text": "Exploration of ANNs for the economic purposes is described and empirically examined with the foreign exchange market data. For the experiments, panel data of the exchange rates (USD/EUR, JPN/USD, USD/ GBP) are examined and optimized to be used for time-series predictions with neural networks. In this stage the input selection, in which the processing steps to prepare the raw data to a suitable input for the models are investigated. The best neural network is found with the best forecasting abilities, based on a certain performance measure. A visual graphs on the experiments data set is presented after processing steps, to illustrate that particular results. The out-of-sample results are compared with training ones. & 2015 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "4aed0c391351671ccb5297b2fe9d4891",
"text": "Applying evolution to generate simple agent behaviours has become a successful and heavily used practice. However the notion of scaling up behaviour into something more noteworthy and complex is far from elementary. In this paper we propose a method of combining neuroevolution practices with the subsumption paradigm; in which we generate Artificial Neural Network (ANN) layers ordered in a hierarchy such that high-level controllers can override lower behaviours. To explore this proposal we apply our controllers to the dasiaEvoTankspsila domain; a small, dynamic, adversarial environment. Our results show that once layers are evolved we can generate competent and capable results that can deal with hierarchies of multiple layers. Further analysis of results provides interesting insights into design decisions for such controllers, particularly when compared to the original suggestions for the subsumption paradigm.",
"title": ""
},
{
"docid": "1348ee3316643f4269311b602b71d499",
"text": "This paper describes our proposed solution for SemEval 2017 Task 1: Semantic Textual Similarity (Daniel Cer and Specia, 2017). The task aims at measuring the degree of equivalence between sentences given in English. Performance is evaluated by computing Pearson Correlation scores between the predicted scores and human judgements. Our proposed system consists of two subsystems and one regression model for predicting STS scores. The two subsystems are designed to learn Paraphrase and Event Embeddings that can take the consideration of paraphrasing characteristics and sentence structures into our system. The regression model associates these embeddings to make the final predictions. The experimental result shows that our system acquires 0.8 of Pearson Correlation Scores in this task.",
"title": ""
},
{
"docid": "9bf877100b35d266240e5bd221c889ee",
"text": "The current standard for intra-domain network routing, Open Shortest Path First (OSPF), suffers from a number of problems-the tunable parameters (the weights) are hard to optimize, the chosen paths are not robust under changes in traffic or network state, and some network links are over-used at the expense of others. We present prototypical scenarios that illustrate these problems. Then we propose several variants of a protocol to eliminate or alleviate them and demonstrate the improvements in performance under those scenarios. We also prove that these protocols never perform significantly worse than OSPF and show that for at least a limited class of network topologies, it is possible to find efficiently the optimal weight settings. Some of the problems with OSPF are well known; indeed, there are several routing protocols that perform better than OSPF in routing quality (i.e., in terms of congestion, delay, etc.). OSPF’s popularity persists in part because of its efficiency with respect to several resource bounds. In contrast, many competing protocols that provide routing superior to OSPF are computationally prohibitive. Motivated by this consideration, we designed our protocols not only to achieve better routing quality than OSPF, but also to use resources in amount comparable with OSPF with respect to offline broadcast communication, size of and time to compute routing tables, packet delivery latency, and packet header structure and size.",
"title": ""
},
{
"docid": "bd1ab7a30b4478a6320e5cad4698c2b4",
"text": "Corresponding Author: Jing Wang Boston University, Boston, MA, USA Email: jwa222@bu.edu Abstract: Non-inferiority of a diagnostic test to the standard is a common issue in medical research. For instance, we may be interested in determining if a new diagnostic test is noninferior to the standard reference test because the new test might be inexpensive to the extent that some small inferior margin in sensitivity or specificity may be acceptable. Noninferiority trials are also found to be useful in clinical trials, such as image studies, where the data are collected in pairs. Conventional noninferiority trials for paired binary data are designed with a fixed sample size and no interim analysis is allowed. Adaptive design which allows for interim modifications of the trial becomes very popular in recent years and are widely used in clinical trials because of its efficiency. However, to our knowledge there is no adaptive design method available for noninferiority trial with paired binary data. In this study, we developed an adaptive design method for non-inferiority trials with paired binary data, which can also be used for superiority trials when the noninferiority margin is set to zero. We included a trial example and provided the SAS program for the design simulations.",
"title": ""
},
{
"docid": "cc9686bac7de957afe52906763799554",
"text": "A key issue in software evolution analysis is the identification of particular changes that occur across several versions of a program. We present change distilling, a tree differencing algorithm for fine-grained source code change extraction. For that, we have improved the existing algorithm by Chawathe et al. for extracting changes in hierarchically structured data. Our algorithm extracts changes by finding both a match between the nodes of the compared two abstract syntax trees and a minimum edit script that can transform one tree into the other given the computed matching. As a result, we can identify fine-grained change types between program versions according to our taxonomy of source code changes. We evaluated our change distilling algorithm with a benchmark that we developed, which consists of 1,064 manually classified changes in 219 revisions of eight methods from three different open source projects. We achieved significant improvements in extracting types of source code changes: Our algorithm approximates the minimum edit script 45 percent better than the original change extraction approach by Chawathe et al. We are able to find all occurring changes and almost reach the minimum conforming edit script, that is, we reach a mean absolute percentage error of 34 percent, compared to the 79 percent reached by the original algorithm. The paper describes both our change distilling algorithm and the results of our evolution.",
"title": ""
},
{
"docid": "20832ede6851f36d6a249e044c28892a",
"text": "Mobile learning highly prioritizes the successful acquisition of context-aware contents from a learning server. A variant of 2D barcodes, the quick response (QR) code, which can be rapidly read using a PDA equipped with a camera and QR code reading software, is considered promising for context-aware applications. This work presents a novel QR code and handheld augmented reality (AR) supported mobile learning (m-learning) system: the handheld English language learning organization (HELLO). In the proposed English learning system, the linked information between context-aware materials and learning zones is defined in the QR codes. Each student follows the guide map displayed on the phone screen to visit learning zones and decrypt QR codes. The detected information is then sent to the learning server to request and receive context-aware learning material wirelessly. Additionally, a 3D animated virtual learning partner is embedded in the learning device based on AR technology, enabling students to complete their context-aware immersive learning. A case study and a survey conducted in a university demonstrate the effectiveness of the proposed m-learning system.",
"title": ""
},
{
"docid": "21e241200a7cc99588facb5349a5e865",
"text": "Comparison between formulae for the counting functions of the heights tn of the Riemann zeros and of semiclassical quantum eigenvalues En suggests that the tn are eigenvalues of an (unknown) hermitean operator H, obtained by quantizing a classical dynamical system with hamiltonian Hcl. Many features of Hcl are provided by the analogy; for example, the “Riemann dynamics” should be chaotic and have periodic orbits whose periods are multiples of logarithms of prime numbers. Statistics of the tn have a similar structure to those of the semiclassical En; in particular, they display random-matrix universality at short range, and nonuniversal behaviour over longer ranges. Very refined features of the statistics of the tn can be computed accurately from formulae with quantum analogues. The Riemann-Siegel formula for the zeta function is described in detail. Its interpretation as a relation between long and short periodic orbits gives further insights into the quantum spectral fluctuations. We speculate that the Riemann dynamics is related to the trajectories generated by the classical hamiltonian Hcl = XP .",
"title": ""
},
{
"docid": "151d1bcb869f689eaed1b9ab579990c3",
"text": "T paper shows that corporate social responsibility (CSR) and firm value are positively related for firms with high customer awareness, as proxied by advertising expenditures. For firms with low customer awareness, the relation is either negative or insignificant. In addition, we find that the effect of awareness on the CSR–value relation is reversed for firms with a poor prior reputation as corporate citizens. This evidence is consistent with the view that CSR activities can add value to the firm but only under certain conditions.",
"title": ""
},
{
"docid": "ff815f534ab19e79d46adaf8f579f01c",
"text": "Leveraging zero-shot learning to learn mapping functions between vector spaces of different languages is a promising approach to bilingual dictionary induction. However, methods using this approach have not yet achieved high accuracy on the task. In this paper, we propose a bridging approach, where our main contribution is a knowledge distillation training objective. As teachers, rich resource translation paths are exploited in this role. And as learners, translation paths involving low resource languages learn from the teachers. Our training objective allows seamless addition of teacher translation paths for any given low resource pair. Since our approach relies on the quality of monolingual word embeddings, we also propose to enhance vector representations of both the source and target language with linguistic information. Our experiments on various languages show large performance gains from our distillation training objective, obtaining as high as 17% accuracy improvements.",
"title": ""
},
{
"docid": "9a0e36d12585bcdf54cdaadb0311a46c",
"text": "¤Andrea Buraschi is from London Business School, Sussex Place, Regent's Park, London NW1 4SA, United Kingdom. Tel: +44-20-7262-5050, fax: +44-20-7724-3317, aburaschi@lbs.ac.uk. Jens Jackwerth is from the University of Wisconsin at Madison, Finance Department, School of Business, 975 University Avenue, Madison, WI 53706, Tel: 608-262-6032, Fax: 608-265-4195, jjackwerth@bus.wisc.edu. For helpful comments on this paper we wish to thank Sudipto Bhattacharya, Mark Britten-Jones, Ian Cooper, the editor Bernard Dumas, Julian Franks, Erzo Luttmer, Davide Menini, Anthony Neuberger, Stephen Schaefer, an anonymous referee, and seminar participants at EFMA Lisbon, WFA Conference, 1998 Computational Finance Conference New York, The University of Chicago, HEC Business School, London Business School, London School of Economics, City University of London, Oxford Business School, Konstanz University, University of Wisconsin at Madison, Georgetown University.",
"title": ""
},
{
"docid": "83ed8190d8f0715d79580043b83d3620",
"text": "We describe a probabilistic method for identifying characters in TV series or movies. We aim at labeling every character appearance, and not only those where a face can be detected. Consequently, our basic unit of appearance is a person track (as opposed to a face track). We model each TV series episode as a Markov Random Field, integrating face recognition, clothing appearance, speaker recognition and contextual constraints in a probabilistic manner. The identification task is then formulated as an energy minimization problem. In order to identify tracks without faces, we learn clothing models by adapting available face recognition results. Within a scene, as indicated by prior analysis of the temporal structure of the TV series, clothing features are combined by agglomerative clustering. We evaluate our approach on the first 6 episodes of The Big Bang Theory and achieve an absolute improvement of 20% for person identification and 12% for face recognition.",
"title": ""
},
{
"docid": "046207a87b7b01f6bc12f08a195670b9",
"text": "Text normalization is the task of transforming lexical variants to their canonical forms. We model the problem of text normalization as a character-level sequence to sequence learning problem and present a neural encoder-decoder model for solving it. To train the encoder-decoder model, many sentences pairs are generally required. However, Japanese non-standard canonical pairs are scarce in the form of parallel corpora. To address this issue, we propose a method of data augmentation to increase data size by converting existing resources into synthesized non-standard forms using handcrafted rules. We conducted an experiment to demonstrate that the synthesized corpus contributes to stably train an encoder-decoder model and improve the performance of Japanese text normalization.",
"title": ""
},
{
"docid": "25b77292def9ba880fecb58a38897400",
"text": "In this paper, we present a successful operation of Gallium Nitride(GaN)-based three-phase inverter with high efficiency of 99.3% for driving motor at 900W under the carrier frequency of 6kHz. This efficiency well exceeds the value by IGBT (Insulated Gate Bipolar Transistor). This demonstrates that GaN has a great potential for power switching application competing with SiC. Fully reduced on-state resistance in a new normally-off GaN transistor called Gate Injection Transistor (GIT) greatly helps to increase the efficiency. In addition, use of the bidirectional operation of the lateral and compact GITs with synchronous gate driving, the inverter is operated free from fly-wheel diodes which have been connected in parallel with IGBTs in a conventional inverter system.",
"title": ""
},
{
"docid": "3e7e947ae2dfec39f57432f2946a12b2",
"text": "We present a data-driven approach for mesh denoising. Our key idea is to formulate the denoising process with cascaded non-linear regression functions and learn them from a set of noisy meshes and their ground-truth counterparts. Each regression function infers the normal of a denoised output mesh facet from geometry features extracted from its neighborhood facets on the input mesh and sends the result as the input of the next regression function. Specifically, we develop a filtered facet normal descriptor (FND) for modeling the geometry features around each facet on the noisy mesh and model a regression function with neural networks for mapping the FNDs to the facet normals of the denoised mesh. To handle meshes with different geometry features and reduce the training difficulty, we cluster the input mesh facets according to their FNDs and train neural networks for each cluster separately in an offline learning stage. At runtime, our method applies the learned cascaded regression functions to a noisy input mesh and reconstructs the denoised mesh from the output facet normals.\n Our method learns the non-linear denoising process from the training data and makes no specific assumptions about the noise distribution and geometry features in the input. The runtime denoising process is fully automatic for different input meshes. Our method can be easily adapted to meshes with arbitrary noise patterns by training a dedicated regression scheme with mesh data and the particular noise pattern. We evaluate our method on meshes with both synthetic and real scanned noise, and compare it to other mesh denoising algorithms. Results demonstrate that our method outperforms the state-of-the-art mesh denoising methods and successfully removes different kinds of noise for meshes with various geometry features.",
"title": ""
},
{
"docid": "473c0fb93641a1d6ab5e593558b7fc12",
"text": "BACKGROUND\nSerious games are motivating and provide a safe environment for students to learn from their mistakes without experiencing any negative consequences from their actions. However, little is known about students' gaming preferences and the types of serious games they like to play for education.\n\n\nOBJECTIVE\nThis study aims to determine the types of gaming aspects that students would like to play in a pharmacy-related serious game.\n\n\nMETHODS\nA cross-sectional study was conducted using a self-administered survey, which obtained students' responses on their preferences regarding various gaming aspects (reward systems, game settings, storylines, viewing perspectives, and gaming styles) and for a hypothetical gaming scenario (authentic simulation or post-apocalyptic fantasy). Descriptive statistics, chi-square, and Fisher's exact tests were used for statistical analyses.\n\n\nRESULTS\nResponse rate was 72.7% (497/684 undergraduates). The most popular game reward systems were unlocking mechanisms (112/497, 22.5%) and experience points (90/497, 18.1%). Most students preferred fantasy/medieval/mythic (253/497, 50.9%) and modern (117/497, 23.5%) settings, but lower year undergraduates preferred modern settings less than upper year seniors (47/236, 19.9% vs 70/242, 28.9%, P=.022). Almost one-third (147/497, 29.6%) preferred an adventurer storyline or an authentic pharmacy-related plot (119/497, 23.9%), and a collaborative game style was most preferred by the students (182/497, 36.6%). Three-dimensional game perspectives (270/497, 54.3%) were more popular than two-dimensional perspectives (221/497, 44.5%), especially among males than females (126/185, 68.1% vs 142/303, 46.9%, P<.001). In terms of choice for a pharmacy-related serious game, a post-apocalyptic fantasy game (scenario B, 287/497, 57.7%) was more popular than an authentic simulation game (scenario A, 209/497, 42.1%). More males preferred the post-apocalyptic fantasy scenario than females (129/187, 69.0% vs 155/306, 50.7%, P<.001).\n\n\nCONCLUSIONS\nIn general, students want a three-dimensional, fantasy/medieval/mythic post-apocalyptic game, based on an adventurer storyline with an unlocking mechanism reward system. A balance between real-life and fantasy elements needs to be struck in order for the game to cater students towards health care practices.",
"title": ""
},
{
"docid": "e06646b7d2bd6ee83c4d557f4215e143",
"text": "Deep generative models have been praised for their ability to learn smooth latent representation of images, text, and audio, which can then be used to generate new, plausible data. However, current generative models are unable to work with graphs due to their unique characteristics—their underlying structure is not Euclidean or grid-like, they remain isomorphic under permutation of the nodes labels, and they come with a different number of nodes and edges. In this paper, we propose NeVAE, a novel variational autoencoder for graphs, whose encoder and decoder are specially designed to account for the above properties by means of several technical innovations. In addition, by using masking, the decoder is able to guarantee a set of local structural and functional properties in the generated graphs. Experiments reveal that our model is able to learn and mimic the generative process of several well-known random graph models and can be used to discover new molecules more effectively than several state of the art methods. Moreover, by utilizing Bayesian optimization over the continuous latent representation of molecules our model finds, we can also identify molecules that maximize certain desirable properties more effectively than alternatives.",
"title": ""
},
{
"docid": "109838175d109002e022115d84cae0fa",
"text": "We present a probabilistic variant of the recently introduced maxout unit. The success of deep neural networks utilizing maxout can partly be attributed to favorable performance under dropout, when compared to rectified linear units. It however also depends on the fact that each maxout unit performs a pooling operation over a group of linear transformations and is thus partially invariant to changes in its input. Starting from this observation we ask the question: Can the desirable properties of maxout units be preserved while improving their invariance properties ? We argue that our probabilistic maxout (probout) units successfully achieve this balance. We quantitatively verify this claim and report classification performance matching or exceeding the current state of the art on three challenging image classification benchmarks (CIFAR-10, CIFAR-100 and SVHN).",
"title": ""
}
] | scidocsrr |
01a61572cc5ab882346b3d1656a9f13d | Scalable Hierarchical Network-on-Chip Architecture for Spiking Neural Network Hardware Implementations | [
{
"docid": "4bce473bb65dfc545d5895c7edb6cea6",
"text": "mathematical framework of the population equations. It will turn out that the results are – of course – consistent with those derived from the population equation. We study a homogeneous network of N identical neurons which are mutually coupled with strength wij = J0/N where J0 > 0 is a positive constant. In other words, the (excitatory) interaction is scaled with one over N so that the total input to a neuron i is of order one even if the number of neurons is large (N →∞). Since we are interested in synchrony we suppose that all neurons have fired simultaneously at t̂ = 0. When will the neurons fire again? Since all neurons are identical we expect that the next firing time will also be synchronous. Let us calculate the period T between one synchronous pulse and the next. We start from the firing condition of SRM0 neurons θ = ui(t) = η(t− t̂i) + ∑",
"title": ""
},
{
"docid": "0ff8c4799b62c70ef6b7d70640f1a931",
"text": "Using on-chip interconnection networks in place of ad-hoc glo-bal wiring structures the top level wires on a chip and facilitates modular design. With this approach, system modules (processors, memories, peripherals, etc...) communicate by sending packets to one another over the network. The structured network wiring gives well-controlled electrical parameters that eliminate timing iterations and enable the use of high-performance circuits to reduce latency and increase bandwidth. The area overhead required to implement an on-chip network is modest, we estimate 6.6%. This paper introduces the concept of on-chip networks, sketches a simple network, and discusses some challenges in the architecture and design of these networks.",
"title": ""
},
{
"docid": "99698fc712b777dfb3d1eb782626586f",
"text": "Looking into the future, when the billion transitor ASICs will become reality, this p per presents Network on a chip (NOC) concept and its associated methodology as solu the design productivity problem. NOC is a network of computational, storage and I/O resou interconnected by a network of switches. Resources communcate with each other usi dressed data packets routed to their destination by the switch fabric. Arguments are pre to justify that in the billion transistor era, the area and performance penalty would be minim A concrete topology for the NOC, a honeycomb structure, is proposed and discussed. A odology to support NOC is presented. This methodology outlines steps from requirements to implementation. As an illustration of the concepts, a plausible mapping of an entire ba tion on hypothetical NOC is discussed.",
"title": ""
}
] | [
{
"docid": "ce7fdc16d6d909a4e0c3294ed55af51d",
"text": "In this work, we perform an empirical comparison among the CTC, RNN-Transducer, and attention-based Seq2Seq models for end-to-end speech recognition. We show that, without any language model, Seq2Seq and RNN-Transducer models both outperform the best reported CTC models with a language model, on the popular Hub5'00 benchmark. On our internal diverse dataset, these trends continue — RNN-Transducer models rescored with a language model after beam search outperform our best CTC models. These results simplify the speech recognition pipeline so that decoding can now be expressed purely as neural network operations. We also study how the choice of encoder architecture affects the performance of the three models — when all encoder layers are forward only, and when encoders downsample the input representation aggressively.",
"title": ""
},
{
"docid": "8b6d5e7526e58ce66cf897d17b094a91",
"text": "Regression testing is an expensive maintenance process used to revalidate modified software. Regression test selection (RTS) techniques try to lower the cost of regression testing by selecting and running a subset of the existing test cases. Many such techniques have been proposed and initial studies show that they can produce savings. We believe, however, that issues such as the frequency with which testing is done have a strong effect on the behavior of these techniques. Therefore, we conducted an experiment to assess the effects of test application frequency on the costs and benefits of regression test selection techniques. Our results expose essential tradeoffs that should be considered when using these techniques over a series of software releases.",
"title": ""
},
{
"docid": "e226452a288c3067ef8ee613f0b64090",
"text": "Deep neural networks with discrete latent variables offer the promise of better symbolic reasoning, and learning abstractions that are more useful to new tasks. There has been a surge in interest in discrete latent variable models, however, despite several recent improvements, the training of discrete latent variable models has remained challenging and their performance has mostly failed to match their continuous counterparts. Recent work on vector quantized autoencoders (VQVAE) has made substantial progress in this direction, with its perplexity almost matching that of a VAE on datasets such as CIFAR-10. In this work, we investigate an alternate training technique for VQ-VAE, inspired by its connection to the Expectation Maximization (EM) algorithm. Training the discrete bottleneck with EM helps us achieve better image generation results on CIFAR-10, and together with knowledge distillation, allows us to develop a non-autoregressive machine translation model whose accuracy almost matches a strong greedy autoregressive baseline Transformer, while being 3.3 times faster at inference.",
"title": ""
},
{
"docid": "e913d5a0d898df3db28b97b27757b889",
"text": "Speech-language pathologists tend to rely on the noninstrumental swallowing evaluation in making recommendations about a patient’s diet and management plan. The present study was designed to examine the sensitivity and specificity of the accuracy of using the chin-down posture during the clinical/bedside swallowing assessment. In 15 patients with acute stroke and clinically suspected oropharyngeal dysphagia, the correlation between clinical and videofluoroscopic findings was examined. Results identified that there is a difference in outcome prediction using the chin-down posture during the clinical/bedside assessment of swallowing compared to assessment by videofluoroscopy. Results are discussed relative to statistical and clinical perspectives, including site of lesion and factors to be considered in the design of an overall treatment plan for a patient with disordered swallowing.",
"title": ""
},
{
"docid": "50b0ecff19de467ab8558134fb666a87",
"text": "Real-time video objects detection, tracking, and recognition are challenging issues due to the real-time processing requirements of the machine learning algorithms. In recent years, video processing is performed by deep learning (DL) based techniques that achieve higher accuracy but require higher computations cost. This paper presents a recent survey of the state-of-the-art DL platforms and architectures used for deep vision systems. It highlights the contributions and challenges from over numerous research studies. In particular, this paper first describes the architecture of various DL models such as AutoEncoders, deep Boltzmann machines, convolution neural networks, recurrent neural networks and deep residual learning. Next, deep real-time video objects detection, tracking and recognition studies are highlighted to illustrate the key trends in terms of cost of computation, number of layers and the accuracy of results. Finally, the paper discusses the challenges of applying DL for real-time video processing and draw some directions for the future of DL algorithms.",
"title": ""
},
{
"docid": "e2d63fece5536aa4668cd5027a2f42b9",
"text": "To ensure integrity, trust, immutability and authenticity of software and information (cyber data, user data and attack event data) in a collaborative environment, research is needed for cross-domain data communication, global software collaboration, sharing, access auditing and accountability. Blockchain technology can significantly automate the software export auditing and tracking processes. It allows to track and control what data or software components are shared between entities across multiple security domains. Our blockchain-based solution relies on role-based and attribute-based access control and prevents unauthorized data accesses. It guarantees integrity of provenance data on who updated what software module and when. Furthermore, our solution detects data leakages, made behind the scene by authorized blockchain network participants, to unauthorized entities. Our approach is used for data forensics/provenance, when the identity of those entities who have accessed/ updated/ transferred the sensitive cyber data or sensitive software is determined. All the transactions in the global collaborative software development environment are recorded in the blockchain public ledger and can be verified any time in the future. Transactions can not be repudiated by invokers. We also propose modified transaction validation procedure to improve performance and to protect permissioned IBM Hyperledger-based blockchains from DoS attacks, caused by bursts of invalid transactions.",
"title": ""
},
{
"docid": "0ab28f6fee235eb3e2e0897d7fb2a182",
"text": "Internet of things (IoT) applications have become increasingly popular in recent years, with applications ranging from building energy monitoring to personal health tracking and activity recognition. In order to leverage these data, automatic knowledge extraction – whereby we map from observations to interpretable states and transitions – must be done at scale. As such, we have seen many recent IoT data sets include annotations with a human expert specifying states, recorded as a set of boundaries and associated labels in a data sequence. ese data can be used to build automatic labeling algorithms that produce labels as an expert would. Here, we refer to human-specified boundaries as breakpoints. Traditional changepoint detection methods only look for statistically-detectable boundaries that are defined as abrupt variations in the generative parameters of a data sequence. However, we observe that breakpoints occur on more subtle boundaries that are non-trivial to detect with these statistical methods. In this work, we propose a new unsupervised approach, based on deep learning, that outperforms existing techniques and learns the more subtle, breakpoint boundaries with a high accuracy. rough extensive experiments on various real-world data sets – including human-activity sensing data, speech signals, and electroencephalogram (EEG) activity traces – we demonstrate the effectiveness of our algorithm for practical applications. Furthermore, we show that our approach achieves significantly beer performance than previous methods. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for thirdparty components of this work must be honored. For all other uses, contact the owner/author(s).",
"title": ""
},
{
"docid": "52f95d1c0e198c64455269fd09108703",
"text": "Dynamic control theory has long been used in solving optimal asset allocation problems, and a number of trading decision systems based on reinforcement learning methods have been applied in asset allocation and portfolio rebalancing. In this paper, we extend the existing work in recurrent reinforcement learning (RRL) and build an optimal variable weight portfolio allocation under a coherent downside risk measure, the expected maximum drawdown, E(MDD). In particular, we propose a recurrent reinforcement learning method, with a coherent risk adjusted performance objective function, the Calmar ratio, to obtain both buy and sell signals and asset allocation weights. Using a portfolio consisting of the most frequently traded exchange-traded funds, we show that the expected maximum drawdown risk based objective function yields superior return performance compared to previously proposed RRL objective functions (i.e. the Sharpe ratio and the Sterling ratio), and that variable weight RRL long/short portfolios outperform equal weight RRL long/short portfolios under different transaction cost scenarios. We further propose an adaptive E(MDD) risk based RRL portfolio rebalancing decision system with a transaction cost and market condition stop-loss retraining mechanism, and we show that the ∗Corresponding author: Steve Y. Yang, Postal address: School of Business, Stevens Institute of Technology, 1 Castle Point on Hudson, Hoboken, NJ 07030 USA. Tel.: +1 201 216 3394 Fax: +1 201 216 5385 Email addresses: salmahdi@stevens.edu (Saud Almahdi), steve.yang@stevens.edu (Steve Y. Yang) Preprint submitted to Expert Systems with Applications June 15, 2017",
"title": ""
},
{
"docid": "55aace95d409340750eecf02c6cc72f3",
"text": "The paper addresses the stability of the co-authorship networks in time. The analysis is done on the networks of Slovenian researchers in two time periods (1991-2000 and 2001-2010). Two researchers are linked if they published at least one scientific bibliographic unit in a given time period. As proposed by Kronegger et al. (2011), the global network structures are examined by generalized blockmodeling with the assumed multi-core--semi-periphery--periphery blockmodel type. The term core denotes a group of researchers who published together in a systematic way with each other. The obtained blockmodels are comprehensively analyzed by visualizations and through considering several statistics regarding the global network structure. To measure the stability of the obtained blockmodels, different adjusted modified Rand and Wallace indices are applied. Those enable to distinguish between the splitting and merging of cores when operationalizing the stability of cores. Also, the adjusted modified indices can be used when new researchers occur in the second time period (newcomers) and when some researchers are no longer present in the second time period (departures). The research disciplines are described and clustered according to the values of these indices. Considering the obtained clusters, the sources of instability of the research disciplines are studied (e.g., merging or splitting of cores, newcomers or departures). Furthermore, the differences in the stability of the obtained cores on the level of scientific disciplines are studied by linear regression analysis where some personal characteristics of the researchers (e.g., age, gender), are also considered.",
"title": ""
},
{
"docid": "5cb8c778f0672d88241cc22da9347415",
"text": "Phishing websites, fraudulent sites that impersonate a trusted third party to gain access to private data, continue to cost Internet users over a billion dollars each year. In this paper, we describe the design and performance characteristics of a scalable machine learning classifier we developed to detect phishing websites. We use this classifier to maintain Google’s phishing blacklist automatically. Our classifier analyzes millions of pages a day, examining the URL and the contents of a page to determine whether or not a page is phishing. Unlike previous work in this field, we train the classifier on a noisy dataset consisting of millions of samples from previously collected live classification data. Despite the noise in the training data, our classifier learns a robust model for identifying phishing pages which correctly classifies more than 90% of phishing pages several weeks after training concludes.",
"title": ""
},
{
"docid": "d45b084040e5f07d39f622fc3543e10b",
"text": "Low-shot learning methods for image classification support learning from sparse data. We extend these techniques to support dense semantic image segmentation. Specifically, we train a network that, given a small set of annotated images, produces parameters for a Fully Convolutional Network (FCN). We use this FCN to perform dense pixel-level prediction on a test image for the new semantic class. Our architecture shows a 25% relative meanIoU improvement compared to the best baseline methods for one-shot segmentation on unseen classes in the PASCAL VOC 2012 dataset and is at least 3× faster. The code is publicly available at: https://github.com/lzzcd001/OSLSM.",
"title": ""
},
{
"docid": "d93609853422aed1c326d35ab820095d",
"text": "We present a method for inferring a 4D light field of a hidden scene from 2D shadows cast by a known occluder on a diffuse wall. We do this by determining how light naturally reflected off surfaces in the hidden scene interacts with the occluder. By modeling the light transport as a linear system, and incorporating prior knowledge about light field structures, we can invert the system to recover the hidden scene. We demonstrate results of our inference method across simulations and experiments with different types of occluders. For instance, using the shadow cast by a real house plant, we are able to recover low resolution light fields with different levels of texture and parallax complexity. We provide two experimental results: a human subject and two planar elements at different depths.",
"title": ""
},
{
"docid": "fc9ee686c2a339f2f790074aeee5432b",
"text": "Recent work using auxiliary prediction task classifiers to investigate the properties of LSTM representations has begun to shed light on why pretrained representations, like ELMo (Peters et al., 2018) and CoVe (McCann et al., 2017), are so beneficial for neural language understanding models. We still, though, do not yet have a clear understanding of how the choice of pretraining objective affects the type of linguistic information that models learn. With this in mind, we compare four objectives—language modeling, translation, skip-thought, and autoencoding—on their ability to induce syntactic and part-of-speech information. We make a fair comparison between the tasks by holding constant the quantity and genre of the training data, as well as the LSTM architecture. We find that representations from language models consistently perform best on our syntactic auxiliary prediction tasks, even when trained on relatively small amounts of data. These results suggest that language modeling may be the best data-rich pretraining task for transfer learning applications requiring syntactic information. We also find that the representations from randomly-initialized, frozen LSTMs perform strikingly well on our syntactic auxiliary tasks, but this effect disappears when the amount of training data for the auxiliary tasks is reduced.",
"title": ""
},
{
"docid": "2215fd5b4f1e884a66b62675c8c92d33",
"text": "In the context of structural optimization we propose a new numerical method based on a combination of the classical shape derivative and of the level-set method for front propagation. We implement this method in two and three space dimensions for a model of linear or nonlinear elasticity. We consider various objective functions with weight and perimeter constraints. The shape derivative is computed by an adjoint method. The cost of our numerical algorithm is moderate since the shape is captured on a fixed Eulerian mesh. Although this method is not specifically designed for topology optimization, it can easily handle topology changes. However, the resulting optimal shape is strongly dependent on the initial guess. 2003 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "b78dfbd9640d53c6bd782af9be1f278a",
"text": "Code analyzers such as Error Prone and FindBugs detect code patterns symptomatic of bugs, performance issues, or bad style. These tools express patterns as quick fixes that detect and rewrite unwanted code. However, it is difficult to come up with new quick fixes and decide which ones are useful and frequently appear in real code. We propose to rely on the collective wisdom of programmers and learn quick fixes from revision histories in software repositories. We present REVISAR, a tool for discovering common Java edit patterns in code repositories. Given code repositories and their revision histories, REVISAR (i) identifies code edits from revisions and (ii) clusters edits into sets that can be described using an edit pattern. The designers of code analyzers can then inspect the patterns and add the corresponding quick fixes to their tools. We ran REVISAR on nine popular GitHub projects, and it discovered 89 useful edit patterns that appeared in 3 or more projects. Moreover, 64% of the discovered patterns did not appear in existing tools. We then conducted a survey with 164 programmers from 124 projects and found that programmers significantly preferred eight out of the nine of the discovered patterns. Finally, we submitted 16 pull requests applying our patterns to 9 projects and, at the time of the writing, programmers accepted 6 (60%) of them. The results of this work aid toolsmiths in discovering quick fixes and making informed decisions about which quick fixes to prioritize based on patterns programmers actually apply in practice.",
"title": ""
},
{
"docid": "dbcdcd2cdf8894f853339b5fef876dde",
"text": "Genicular nerve radiofrequency ablation (RFA) has recently gained popularity as an intervention for chronic knee pain in patients who have failed other conservative or surgical treatments. Long-term efficacy and adverse events are still largely unknown. Under fluoroscopic guidance, thermal RFA targets the lateral superior, medial superior, and medial inferior genicular nerves, which run in close proximity to the genicular arteries that play a crucial role in supplying the distal femur, knee joint, meniscus, and patella. RFA targets nerves by relying on bony landmarks, but fails to provide visualization of vascular structures. Although vascular injuries after genicular nerve RFA have not been reported, genicular vascular complications are well documented in the surgical literature. This article describes the anatomy, including detailed cadaveric dissections and schematic drawings, of the genicular neurovascular bundle. The present investigation also included a comprehensive literature review of genicular vascular injuries involving those arteries which lie near the targets of genicular nerve RFA. These adverse vascular events are documented in the literature as case reports. Of the 27 cases analyzed, 25.9% (7/27) involved the lateral superior genicular artery, 40.7% (11/27) involved the medial superior genicular artery, and 33.3% (9/27) involved the medial inferior genicular artery. Most often, these vascular injuries result in the formation of pseudoaneurysm, arteriovenous fistula (AVF), hemarthrosis, and/or osteonecrosis of the patella. Although rare, these complications carry significant morbidities. Based on the detailed dissections and review of the literature, our investigation suggests that vascular injury is a possible risk of genicular RFA. Lastly, recommendations are offered to minimize potential iatrogenic complications.",
"title": ""
},
{
"docid": "27cf1715f4cf77f098ea4f64b690ff0d",
"text": "Existing mechanical circuit breakers can not satisfy the requirements of fast operation in power system due to noise, electric arc and long switching response time. Moreover the non-grid-connected wind power system is based on the Flexible Direct Current Transmission (FDCT) technique. It is especially necessary to research the Solid-State Circuit Breakers (SSCB) to realize the rapid and automatic control for the circuit breakers in the system. Meanwhile, the newly-developed Solid-State Circuit Breakers (SSCB) operating at the natural zero-crossing point of AC system is not suitable for a DC system. Based on the characteristics of the DC system, a novel circuit scheme has been proposed in this paper. The new scheme makes full use of ideology of soft-switching and current-commutation forced by resonance. This scheme successfully realizes the soft turn-on and fast turn-off. In this paper, the topology of current limiter is presented and analytical mathematical models are derived through comprehensive analysis. Finally, normal turn-on and turn-off experiments and overload delay protection test were conducted. The results show the reliability of the novel theory and feasibility of proposed topology. The proposed scheme can be applied in the grid-connected and non-grid-connected DC transmission and distribution systems.",
"title": ""
},
{
"docid": "de7b16961bb4aa2001a3d0859f68e4c6",
"text": "A new practical method is given for the self-calibration of a camera. In this method, at least three images are taken from the same point in space with different orientations of the camera and calibration is computed from an analysis of point matches between the images. The method requires no knowledge of the orientations of the camera. Calibration is based on the image correspondences only. This method differs fundamentally from previous results by Maybank and Faugeras on selfcalibration using the epipolar structure of image pairs. In the method of this paper, there is no epipolar structure since all images are taken from the same point in space. Since the images are all taken from the same point in space, determination of point matches is considerably easier than for images taken with a moving camera, since problems of occlusion or change of aspect or illumination do not occur. The calibration method is evaluated on several sets of synthetic and real image data.",
"title": ""
},
{
"docid": "342d074c84d55b60a617d31026fe23e1",
"text": "Fractured bones heal by a cascade of cellular events in which mesenchymal cells respond to unknown regulators by proliferating, differentiating, and synthesizing extracellular matrix. Current concepts suggest that growth factors may regulate different steps in this cascade (10). Recent studies suggest regulatory roles for PDGF, aFGF, bFGF, and TGF-beta in the initiation and the development of the fracture callus. Fracture healing begins immediately following injury, when growth factors, including TGF-beta 1 and PDGF, are released into the fracture hematoma by platelets and inflammatory cells. TGF-beta 1 and FGF are synthesized by osteoblasts and chondrocytes throughout the healing process. TGF-beta 1 and PDGF appear to have an influence on the initiation of fracture repair and the formation of cartilage and intramembranous bone in the initiation of callus formation. Acidic FGF is synthesized by chondrocytes, chondrocyte precursors, and macrophages. It appears to stimulate the proliferation of immature chondrocytes or precursors, and indirectly regulates chondrocyte maturation and the expression of the cartilage matrix. Presumably, growth factors in the callus at later times regulate additional steps in repair of the bone after fracture. These studies suggest that growth factors are central regulators of cellular proliferation, differentiation, and extracellular matrix synthesis during fracture repair. Abnormal growth factor expression has been implicated as causing impaired or abnormal healing in other tissues, suggesting that altered growth factor expression also may be responsible for abnormal or delayed fracture repair. As a complete understanding of fracture-healing regulation evolves, we expect new insights into the etiology of abnormal or delayed fracture healing, and possibly new therapies for these difficult clinical problems.",
"title": ""
},
{
"docid": "483578f69e60298f5afba28eff514120",
"text": "This paper proposes a multiport power electronic transformer (PET) topology with multiwinding medium-frequency transformer (MW-MFT) isolation along with the associated modeling analysis and control scheme. The power balance at different ports can be controlled using the multiwinding transformer's common flux linkage. The potential applications of the proposed multiport PET are high-power traction systems for locomotives and electric multiple units, marine propulsion, wind power generation, and utility grid distribution applications. The complementary polygon equivalent circuit modeling of an MW-MFT is presented. The current and power characteristics of the virtual circuit branches and the multiports with general-phase-shift control are described. The general current and power analysis for the multiple active bridge (MAB) isolation units is investigated. Power decoupling methods, including nonlinear solution for power balancing are proposed. The zero-voltage-switching conditions for the MAB are discussed. Control strategies including soft-switching-phase-shift control and voltage balancing control based on the power decoupling calculations are described. Simulations and experiments are presented to verify the performance of the proposed topology and control algorithms.",
"title": ""
}
] | scidocsrr |
dcf8cff45ebdd25d6815418d29ddca7d | "Owl" and "Lizard": Patterns of Head Pose and Eye Pose in Driver Gaze Classification | [
{
"docid": "9b1e1e91b8aacd1ed5d1aee823de7fd3",
"text": "—This paper presents a novel adaptive algorithm to detect the center of pupil in frontal view faces. This algorithm, at first, employs the viola-Jones face detector to find the approximate location of face in an image. The knowledge of the face structure is exploited to detect the eye region. The histogram of the detected region is calculated and its CDF is employed to extract the eyelids and iris region in an adaptive way. The center of this region is considered as the pupil center. The experimental results show ninety one percent's accuracy in detecting pupil center.",
"title": ""
}
] | [
{
"docid": "4fc356024295824f6c68360bf2fcb860",
"text": "Detecting depression is a key public health challenge, as almost 12% of all disabilities can be attributed to depression. Computational models for depression detection must prove not only that can they detect depression, but that they can do it early enough for an intervention to be plausible. However, current evaluations of depression detection are poor at measuring model latency. We identify several issues with the currently popular ERDE metric, and propose a latency-weighted F1 metric that addresses these concerns. We then apply this evaluation to several models from the recent eRisk 2017 shared task on depression detection, and show how our proposed measure can better capture system differences.",
"title": ""
},
{
"docid": "e870d5f8daac0d13bdcffcaec4ba04c1",
"text": "In this paper the design, fabrication and test of X-band and 2-18 GHz wideband high power SPDT MMIC switches in microstrip GaN technology are presented. Such switches have demonstrated state-of-the-art performances. In particular the X-band switch exhibits 1 dB insertion loss, better than 37 dB isolation and a power handling capability at 9 GHz of better than 39 dBm at 1 dB insertion loss compression point; the wideband switch has an insertion loss lower than 2.2 dB, better than 25 dB isolation and a power handling capability of better than 38 dBm in the entire bandwidth.",
"title": ""
},
{
"docid": "b93ab92ac82a34d3a83240e251cf714e",
"text": "Short text is becoming ubiquitous in many modern information systems. Due to the shortness and sparseness of short texts, there are less informative word co-occurrences among them, which naturally pose great difficulty for classification tasks on such data. To overcome this difficulty, this paper proposes a new way for effectively classifying the short texts. Our method is based on a key observation that there usually exists ordered subsets in short texts, which is termed ``information path'' in this work, and classification on each subset based on the classification results of some pervious subsets can yield higher overall accuracy than classifying the entire data set directly. We propose a method to detect the information path and employ it in short text classification. Different from the state-of-art methods, our method does not require any external knowledge or corpus that usually need careful fine-tuning, which makes our method easier and more robust on different data sets. Experiments on two real world data sets show the effectiveness of the proposed method and its superiority over the existing methods.",
"title": ""
},
{
"docid": "fd1e327327068a1373e35270ef257c59",
"text": "We consider the problem of building high-level, class-specific feature detectors from only unlabeled data. For example, is it possible to learn a face detector using only unlabeled images? To answer this, we train a deep sparse autoencoder on a large dataset of images (the model has 1 billion connections, the dataset has 10 million 200×200 pixel images downloaded from the Internet). We train this network using model parallelism and asynchronous SGD on a cluster with 1,000 machines (16,000 cores) for three days. Contrary to what appears to be a widely-held intuition, our experimental results reveal that it is possible to train a face detector without having to label images as containing a face or not. Control experiments show that this feature detector is robust not only to translation but also to scaling and out-of-plane rotation. We also find that the same network is sensitive to other high-level concepts such as cat faces and human bodies. Starting from these learned features, we trained our network to recognize 22,000 object categories from ImageNet and achieve a leap of 70% relative improvement over the previous state-of-the-art.",
"title": ""
},
{
"docid": "42db53797dc57cfdb7f963c55bb7f039",
"text": "Vast amounts of artistic data is scattered on-line from both museums and art applications. Collecting, processing and studying it with respect to all accompanying attributes is an expensive process. With a motivation to speed up and improve the quality of categorical analysis in the artistic domain, in this paper we propose an efficient and accurate method for multi-task learning with a shared representation applied in the artistic domain. We continue to show how different multi-task configurations of our method behave on artistic data and outperform handcrafted feature approaches as well as convolutional neural networks. In addition to the method and analysis, we propose a challenge like nature to the new aggregated data set with almost half a million samples and structuredmeta-data to encourage further research and societal engagement. ACM Reference format: Gjorgji Strezoski and Marcel Worring. 2017. OmniArt: Multi-task Deep Learning for Artistic Data Analysis.",
"title": ""
},
{
"docid": "617ec3be557749e0646ad7092a1afcb6",
"text": "The difficulty of directly measuring gene flow has lead to the common use of indirect measures extrapolated from genetic frequency data. These measures are variants of FST, a standardized measure of the genetic variance among populations, and are used to solve for Nm, the number of migrants successfully entering a population per generation. Unfortunately, the mathematical model underlying this translation makes many biologically unrealistic assumptions; real populations are very likely to violate these assumptions, such that there is often limited quantitative information to be gained about dispersal from using gene frequency data. While studies of genetic structure per se are often worthwhile, and FST is an excellent measure of the extent of this population structure, it is rare that FST can be translated into an accurate estimate of Nm.",
"title": ""
},
{
"docid": "40f32d675f581230ca70fa2ba9389eb6",
"text": "We depend on exposure to light to guide us, inform us about the outside world, and regulate the biological rhythms in our bodies. We think about turning lights on to improve our lives; however, for some people, exposure to light creates pain and distress that can overwhelm their desire to see. Photophobia is ocular or headache pain caused by normal or dim light. People are symptomatic when irradiance levels inducing pain fall into a range needed for functionality and productivity, making photoallodynia a more accurate term. “Dazzle” is a momentary and normal aversion response to bright lights that subsides within seconds, but photoallodynia only subsides when light exposure is reduced. Milder degrees of sensitivity may manifest as greater perceived comfort in dim illumination. In severe cases, the pain is so debilitating that people are physically and socially isolated into darkness. The suffering and loss of function associated with photoallodynia can be devastating, but it is underappreciated in clinical assessment, treatment, and basic and clinical research. Transient photoallodynia generally improves when the underlying condition resolves, as in association with ocular inflammation, dry eye syndrome and laser-assisted in situ keratomileusis surgery. Migraine-associated light sensitivity can be severe during migraine or mild (and non-clinical) during the interictal period. With so many causes of photoallodynia, a singular underlying mechanism is unlikely, although different etiologies likely have shared and unique components and pathways. Photoallodynia may originate by alteration of a trigeminal nociceptive pathway or possibly through direct retinal projections to higher brain regions involved in pain perception, including but not limited to the periaqueductal gray, the anterior cingulate and somatorsensory cortices, which are collectively termed the “pain matrix.” However, persistent photoallodynia, occurring in a number of ocular and central brain causes, can be remarkably resistant to therapy. The initial light detection that triggers a pain response likely arises through interaction of cone photoreceptors (color and acuity), rod photoreceptors (low light vision), and intrinsically photosensitive retinal ganglion cells (ipRGCs, pupil light reflex and circadian photoentrainment). We can gain clues as to these interactions by examining retinal diseases that cause – or do not cause – photoallodynia.",
"title": ""
},
{
"docid": "d6cf367f29ed1c58fb8fd0b7edf69458",
"text": "Diabetes mellitus is a chronic disease that leads to complications including heart disease, stroke, kidney failure, blindness and nerve damage. Type 2 diabetes, characterized by target-tissue resistance to insulin, is epidemic in industrialized societies and is strongly associated with obesity; however, the mechanism by which increased adiposity causes insulin resistance is unclear. Here we show that adipocytes secrete a unique signalling molecule, which we have named resistin (for resistance to insulin). Circulating resistin levels are decreased by the anti-diabetic drug rosiglitazone, and increased in diet-induced and genetic forms of obesity. Administration of anti-resistin antibody improves blood sugar and insulin action in mice with diet-induced obesity. Moreover, treatment of normal mice with recombinant resistin impairs glucose tolerance and insulin action. Insulin-stimulated glucose uptake by adipocytes is enhanced by neutralization of resistin and is reduced by resistin treatment. Resistin is thus a hormone that potentially links obesity to diabetes.",
"title": ""
},
{
"docid": "1569bcea0c166d9bf2526789514609c5",
"text": "In this paper, we present the developmert and initial validation of a new self-report instrument, the Differentiation of Self Inventory (DSI). T. DSI represents the first attempt to create a multi-dimensional measure of differentiation based on Bowen Theory, focusing specifically on adults (ages 25 +), their current significant relationships, and their relations with families of origin. Principal components factor analysis on a sample of 313 normal adults (mean age = 36.8) suggested four dimensions: Emotional Reactivity, Reactive Distancing, Fusion with Parents, and \"I\" Position. Scales constructed from these factors were found to be moderately correlated in the expected direction, internally consistent, and significantly predictive of trait anxiety. The potential contribution of the DSI is discussed -for testing Bowen Theory, as a clinical assessment tool, and as an indicator of psychotherapeutic outcome.",
"title": ""
},
{
"docid": "9d9afbd6168c884f54f72d3daea57ca7",
"text": "0167-8655/$ see front matter 2009 Elsevier B.V. A doi:10.1016/j.patrec.2009.06.012 * Corresponding author. Tel.: +82 2 705 8931; fax: E-mail addresses: sjyoon@sogang.ac.kr (S. Yoon), sa Computer aided diagnosis (CADx) systems for digitized mammograms solve the problem of classification between benign and malignant tissues while studies have shown that using only a subset of features generated from the mammograms can yield higher classification accuracy. To this end, we propose a mutual information-based Support Vector Machine Recursive Feature Elimination (SVM-RFE) as the classification method with feature selection in this paper. We have conducted extensive experiments on publicly available mammographic data and the obtained results indicate that the proposed method outperforms other SVM and SVM-RFE-based methods. 2009 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "8d3f65dbeba6c158126ae9d82c886687",
"text": "Using dealer’s quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are highly cross-correlated, and principal components analysis implies they are mostly driven by a single common factor. Although we consider several macroeconomic and financial variables as candidate proxies, we cannot explain this common systematic component. Our results suggest that monthly credit spread changes are principally driven by local supply0 demand shocks that are independent of both credit-risk factors and standard proxies for liquidity. THE RELATION BETWEEN STOCK AND BOND RETURNS has been widely studied at the aggregate level ~see, e.g., Keim and Stambaugh ~1986!, Fama and French ~1989, 1993!, Campbell and Ammer ~1993!!. Recently, a few studies have investigated that relation at both the individual firm level ~see, e.g., Kwan ~1996!! and portfolio level ~see, e.g., Blume, Keim, and Patel ~1991!, Cornell and Green ~1991!!. These studies focus on corporate bond returns, or yield changes. The main conclusions of these papers are: ~1! high-grade bonds behave like Treasury bonds, and ~2! low-grade bonds are more sensitive to stock returns. The implications of these studies may be limited in many situations of interest, however. For example, hedge funds often take highly levered positions in corporate bonds while hedging away interest rate risk by shorting treasuries. As a consequence, their portfolios become extremely sensitive to changes in credit spreads rather than changes in bond yields. The distinc* Collin-Dufresne is at Carnegie Mellon University. Goldstein is at Washington University in St. Louis. Martin is at Arizona State University. A significant portion of this paper was written while Goldstein and Martin were at The Ohio State University. We thank Rui Albuquerque, Gurdip Bakshi, Greg Bauer, Dave Brown, Francesca Carrieri, Peter Christoffersen, Susan Christoffersen, Greg Duffee, Darrell Duffie, Vihang Errunza, Gifford Fong, Mike Gallmeyer, Laurent Gauthier, Rick Green, John Griffin, Jean Helwege, Kris Jacobs, Chris Jones, Andrew Karolyi, Dilip Madan, David Mauer, Erwan Morellec, Federico Nardari, N.R. Prabhala, Tony Sanders, Sergei Sarkissian, Bill Schwert, Ken Singleton, Chester Spatt, René Stulz ~the editor!, Suresh Sundaresan, Haluk Unal, Karen Wruck, and an anonymous referee for helpful comments. We thank Ahsan Aijaz, John Puleo, and Laura Tuttle for research assistance. We are also grateful to seminar participants at Arizona State University, University of Maryland, McGill University, The Ohio State University, University of Rochester, and Southern Methodist University. THE JOURNAL OF FINANCE • VOL. LVI, NO. 6 • DEC. 2001",
"title": ""
},
{
"docid": "ce2e955ef4fba68411cafab52d206b52",
"text": "Voice-enabled user interfaces have become a popular means of interaction with various kinds of applications and services. In addition to more traditional interaction paradigms such as keyword search, voice interaction can be a convenient means of communication for many groups of users. Amazon Alexa has become a valuable tool for building custom voice-enabled applications. In this demo paper we describe how we use Amazon Alexa technologies to build a Semantic Web applications able to answer factual questions using the Wikidata knowledge graph. We describe how the Amazon Alexa voice interface allows the user to communicate with the metaphactory knowledge graph management platform and a reusable procedure for producing the Alexa application configuration from semantic data in an automated way.",
"title": ""
},
{
"docid": "151fd47f87944978edfafb121b655ad8",
"text": "We introduce a pair of tools, Rasa NLU and Rasa Core, which are open source python libraries for building conversational software. Their purpose is to make machine-learning based dialogue management and language understanding accessible to non-specialist software developers. In terms of design philosophy, we aim for ease of use, and bootstrapping from minimal (or no) initial training data. Both packages are extensively documented and ship with a comprehensive suite of tests. The code is available at https://github.com/RasaHQ/",
"title": ""
},
{
"docid": "bc758b1dd8e3a75df2255bb880a716ef",
"text": "In recent years, convolutional neural networks (CNNs) based machine learning algorithms have been widely applied in computer vision applications. However, for large-scale CNNs, the computation-intensive, memory-intensive and resource-consuming features have brought many challenges to CNN implementations. This work proposes an end-to-end FPGA-based CNN accelerator with all the layers mapped on one chip so that different layers can work concurrently in a pipelined structure to increase the throughput. A methodology which can find the optimized parallelism strategy for each layer is proposed to achieve high throughput and high resource utilization. In addition, a batch-based computing method is implemented and applied on fully connected layers (FC layers) to increase the memory bandwidth utilization due to the memory-intensive feature. Further, by applying two different computing patterns on FC layers, the required on-chip buffers can be reduced significantly. As a case study, a state-of-the-art large-scale CNN, AlexNet, is implemented on Xilinx VC709. It can achieve a peak performance of 565.94 GOP/s and 391 FPS under 156MHz clock frequency which outperforms previous approaches.",
"title": ""
},
{
"docid": "b2ba44fb536ad11295bac85ed23daedd",
"text": "This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requirements as constraints, and developing satisfaction arguments for the security requirements. The system context is described using a problem-oriented notation, then is validated against the security requirements through construction of a satisfaction argument. The satisfaction argument consists of two parts: a formal argument that the system can meet its security requirements and a structured informal argument supporting the assumptions expressed in the formal argument. The construction of the satisfaction argument may fail, revealing either that the security requirement cannot be satisfied in the context or that the context does not contain sufficient information to develop the argument. In this case, designers and architects are asked to provide additional design information to resolve the problems. We evaluate the framework by applying it to a security requirements analysis within an air traffic control technology evaluation project.",
"title": ""
},
{
"docid": "857658968e3e237b33073ed87ff0fa1a",
"text": "Analysis of a worldwide sample of sudden deaths of politicians reveals a market-adjusted 1.7% decline in the value of companies headquartered in the politician’s hometown. The decline in value is followed by a drop in the rate of growth in sales and access to credit. Our results are particularly pronounced for family firms, firms with high growth prospects, firms in industries over which the politician has jurisdiction, and firms headquartered in highly corrupt countries.",
"title": ""
},
{
"docid": "7a4c7c21ae35d4056844af341495f655",
"text": "The development of a new measure of concussion knowledge and attitudes that is more comprehensive and psychometrically sound than previous measures is described. A group of high-school students (N = 529) completed the measure. The measure demonstrated fair to satisfactory test-retest reliability (knowledge items, r = .67; attitude items, r = .79). Exploratory factor analysis of the attitude items revealed a four-factor solution (eigenvalues ranged from 1.07-3.35) that displayed adequate internal consistency (Cohen's alpha range = .59-.72). Cluster analysis of the knowledge items resulted in a three-cluster solution distributed according to their level of difficulty. The potential uses for the measure are described.",
"title": ""
},
{
"docid": "6d2abcdd728a2355259c60c870b411a4",
"text": "Although providing feedback is commonly practiced in education, there is no general agreement regarding what type of feedback is most helpful and why it is helpful. This study examined the relationship between various types of feedback, potential internal mediators, and the likelihood of implementing feedback. Five main predictions were developed from the feedback literature in writing, specifically regarding feedback features (summarization, identifying problems, providing solutions, localization, explanations, scope, praise, and mitigating language) as they relate to potential causal mediators of problem or solution understanding and problem or solution agreement, leading to the final outcome of feedback implementation. To empirically test the proposed feedback model, 1,073 feedback segments from writing assessed by peers was analyzed. Feedback was collected using SWoRD, an online peer review system. Each segment was coded for each of the feedback features, implementation, agreement, and understanding. The correlations between the feedback features, levels of mediating variables, and implementation rates revealed several significant relationships. Understanding was the only significant mediator of implementation. Several feedback features were associated with understanding: including solutions, a summary of the performance, and the location of the problem were associated with increased understanding; and explanations of problems were associated with decreased understanding. Implications of these results are discussed.",
"title": ""
},
{
"docid": "3f1939623798f46dec5204793bedab9e",
"text": "Predictive business process monitoring exploits event logs to predict how ongoing (uncompleted) cases will unfold up to their completion. A predictive process monitoring framework collects a range of techniques that allow users to get accurate predictions about the achievement of a goal or about the time required for such an achievement for a given ongoing case. These techniques can be combined and their parameters configured in different framework instances. Unfortunately, a unique framework instance that is general enough to outperform others for every dataset, goal or type of prediction is elusive. Thus, the selection and configuration of a framework instance needs to be done for a given dataset. This paper presents a predictive process monitoring framework armed with a hyperparameter optimization method to select a suitable framework instance for a given dataset.",
"title": ""
}
] | scidocsrr |
3af68298cc4f70c5636c1706c7607b38 | Identification of Move Method Refactoring Opportunities | [
{
"docid": "3b7ac492add26938636ae694ebb14b65",
"text": "This paper presents the results of a study conducted at the University of Maryland in which we experimentally investigated the suite of Object-Oriented (OO) design metrics introduced by [Chidamber&Kemerer, 1994]. In order to do this, we assessed these metrics as predictors of fault-prone classes. This study is complementary to [Li&Henry, 1993] where the same suite of metrics had been used to assess frequencies of maintenance changes to clas es. To perform our validation accurately, we collected data on the development of eight medium-sized information management systems based on identical requirements. All eight projects were developed using a sequential life cycle model, a well-known OO analysis/design method and the C++ programming language. Based on experimental results, the advantages and drawbacks of these OO metrics are discussed. Several of Chidamber&Kemerer’s OO metrics appear to be useful to predict class fault-proneness during the early phases of the life-cycle. We also showed that they are, on our data set, better predictors than “traditional” code metrics, which can only be collected at a later phase of the software development processes. Key-words: Object-Oriented Design Metrics; Error Prediction Model; Object-Oriented Software Development; C++ Programming Language. * V. Basili and W. Melo are with the University of Maryland, Institute for Advanced Computer Studies and Computer Science Dept., A. V. Williams Bldg., College Park, MD 20742 USA. {basili | melo}@cs.umd.edu L. Briand is with the CRIM, 1801 McGill College Av., Montréal (Québec), H3A 2N4, Canada. lbriand@crim.ca Technical Report, Univ. of Maryland, Dep. of Computer Science, College Park, MD, 20742 USA. April 1995. CS-TR-3443 2 UMIACS-TR-95-40 1 . Introduction",
"title": ""
},
{
"docid": "ab35dcaf3e240921225b639e8c17f2de",
"text": "Refactorings are widely recognised as ways to improve the internal structure of object-oriented software while maintaining its external behaviour. Unfortunately, refactorings concentrate on the treatment of symptoms (the so called code-smells), thus improvements depend a lot on the skills of the maintained coupling and cohesion on the other hand are quality attributes which are generally recognized as being among the most likely quantifiable indicators for software maintainability. Therefore, this paper analyzes how refactorings manipulate coupling/cohesion characteristics, and how to identify refactoring opportunities that improve these characteristics. As such we provide practical guidelines for the optimal usage of refactoring in a software maintenance process.",
"title": ""
},
{
"docid": "1f8be01ff656d9414a8bd1e12111081d",
"text": "Gaining an architectural level understanding of a software system is important for many reasons. When the description of a system's architecture does not exist, attempts must be made to recover it. In recent years, researchers have explored the use of clustering for recovering a software system's architecture, given only its source code. The main contributions of this paper are given as follows. First, we review hierarchical clustering research in the context of software architecture recovery and modularization. Second, to employ clustering meaningfully, it is necessary to understand the peculiarities of the software domain, as well as the behavior of clustering measures and algorithms in this domain. To this end, we provide a detailed analysis of the behavior of various similarity and distance measures that may be employed for software clustering. Third, we analyze the clustering process of various well-known clustering algorithms by using multiple criteria, and we show how arbitrary decisions taken by these algorithms during clustering affect the quality of their results. Finally, we present an analysis of two recently proposed clustering algorithms, revealing close similarities in their apparently different clustering approaches. Experiments on four legacy software systems provide insight into the behavior of well-known clustering algorithms and their characteristics in the software domain.",
"title": ""
}
] | [
{
"docid": "a38e863016bfcead5fd9af46365d4d5c",
"text": "Social networks generate a large amount of text content over time because of continuous interaction between participants. The mining of such social streams is more challenging than traditional text streams, because of the presence of both text content and implicit network structure within the stream. The problem of event detection is also closely related to clustering, because the events can only be inferred from aggregate trend changes in the stream. In this paper, we will study the two related problems of clustering and event detection in social streams. We will study both the supervised and unsupervised case for the event detection problem. We present experimental results illustrating the effectiveness of incorporating network structure in event discovery over purely content-based",
"title": ""
},
{
"docid": "ba2597379304852f36c5b427eebc7223",
"text": "Constituent parsing is typically modeled by a chart-based algorithm under probabilistic context-free grammars or by a transition-based algorithm with rich features. Previous models rely heavily on richer syntactic information through lexicalizing rules, splitting categories, or memorizing long histories. However enriched models incur numerous parameters and sparsity issues, and are insufficient for capturing various syntactic phenomena. We propose a neural network structure that explicitly models the unbounded history of actions performed on the stack and queue employed in transition-based parsing, in addition to the representations of partially parsed tree structure. Our transition-based neural constituent parsing achieves performance comparable to the state-of-the-art parsers, demonstrating F1 score of 90.68% for English and 84.33% for Chinese, without reranking, feature templates or additional data to train model parameters.",
"title": ""
},
{
"docid": "ca74dda60d449933ff72d14fe5c7493c",
"text": "We introduce a novel training principle for generative probabilistic models that is an alternative to maximum likelihood. The proposed Generative Stochastic Networks (GSN) framework generalizes Denoising Auto-Encoders (DAE) and is based on learning the transition operator of a Markov chain whose stationary distribution estimates the data distribution. The transition distribution is a conditional distribution that generally involves a small move, so it has fewer dominant modes and is unimodal in the limit of small moves. This simplifies the learning problem, making it less like density estimation and more akin to supervised function approximation, with gradients that can be obtained by backprop. The theorems provided here provide a probabilistic interpretation for denoising autoencoders and generalize them; seen in the context of this framework, auto-encoders that learn with injected noise are a special case of GSNs and can be interpreted as generative models. The theorems also provide an interesting justification for dependency networks and generalized pseudolikelihood and define an appropriate joint distribution and sampling mechanism, even when the conditionals are not consistent. GSNs can be used with missing inputs and can be used to sample subsets of variables given the rest. Experiments validating these theoretical results are conducted on both synthetic datasets and image datasets. The experiments employ a particular architecture that mimics the Deep Boltzmann Machine Gibbs sampler but that allows training to proceed with backprop through a recurrent neural network with noise injected inside and without the need for layerwise pretraining.",
"title": ""
},
{
"docid": "ce9084c2ac96db6bca6ddebe925c3d42",
"text": "Tactical driving decision making is crucial for autonomous driving systems and has attracted considerable interest in recent years. In this paper, we propose several practical components that can speed up deep reinforcement learning algorithms towards tactical decision making tasks: 1) nonuniform action skipping as a more stable alternative to action-repetition frame skipping, 2) a counterbased penalty for lanes on which ego vehicle has less right-of-road, and 3) heuristic inference-time action masking for apparently undesirable actions. We evaluate the proposed components in a realistic driving simulator and compare them with several baselines. Results show that the proposed scheme provides superior performance in terms of safety, efficiency, and comfort.",
"title": ""
},
{
"docid": "27210f1cce1cbb126e1c6d6b1bcbae62",
"text": "Challenges in many real-world optimization problems arise from limited hardware availability, particularly when the optimization must be performed on a device whose hardware is highly restricted due to cost or space. This paper proposes a new algorithm, namely Enhanced compact Artificial Bee Colony (EcABC) to address this class of optimization problems. The algorithm benefits from the search logic of the Artificial Bee Colony (ABC) algorithm, and similar to other compact algorithms, it does not store the actual population of tentative solutions. Instead, EcABC employs a novel probabilistic representation of the population that is introduced in this paper. The proposed algorithm has been tested on a set of benchmark functions from the CEC2013 benchmark suite, and compared against a number of algorithms including modern compact algorithms, recent population-based ABC variants and some advanced meta-heuristics. Numerical results demonstrate that EcABC significantly outperforms other state of the art compact algorithms. In addition, simulations also indicate that the proposed algorithm shows a comparative performance when compared against its population-based versions. 2014 Elsevier Inc. All rights reserved.",
"title": ""
},
{
"docid": "7662a9d5d31ed2307837a04ec7a4e27c",
"text": "Automating the navigation of unmanned aerial vehicles (UAVs) in diverse scenarios has gained much attention in recent years. However, teaching UAVs to fly in challenging environments remains an unsolved problem, mainly due to the lack of training data. In this paper, we train a deep neural network to predict UAV controls from raw image data for the task of autonomous UAV racing in a photo-realistic simulation. Training is done through imitation learning with data augmentation to allow for the correction of navigation mistakes. Extensive experiments demonstrate that our trained network (when sufficient data augmentation is used) outperforms state-of-the-art methods and flies more consistently than many human pilots. Additionally, we show that our optimized network architecture can run in real-time on embedded hardware, allowing for efficient onboard processing critical for real-world deployment. From a broader perspective, our results underline the importance of extensive data augmentation techniques to improve robustness in end-to-end learning setups.",
"title": ""
},
{
"docid": "12cc45cf2e1d97b8d76e4fdaad1fbdce",
"text": "We propose a real-time, direct monocular SLAM method for omnidirectional or wide field-of-view fisheye cameras. Both tracking (direct image alignment) and mapping (pixel-wise distance filtering) are directly formulated for the unified omnidirectional model, which can model central imaging devices with a field of view above 180°. This is in contrast to existing direct mono-SLAM approaches like DTAM or LSD-SLAM, which operate on rectified images, in practice limiting the field of view to around 130° diagonally. Not only does this allows to observe - and reconstruct - a larger portion of the surrounding environment, but it also makes the system more robust to degenerate (rotation-only) movement. The two main contribution are (1) the formulation of direct image alignment for the unified omnidirectional model, and (2) a fast yet accurate approach to incremental stereo directly on distorted images. We evaluated our framework on real-world sequences taken with a 185° fisheye lens, and compare it to a rectified and a piecewise rectified approach.",
"title": ""
},
{
"docid": "ad389d8ee2c45746c3a44c7e0f86de40",
"text": "Deep Convolutional Neural Networks (CNN) have recently been shown to outperform previous state of the art approaches for image classification. Their success must in parts be attributed to the availability of large labeled training sets such as provided by the ImageNet benchmarking initiative. When training data is scarce, however, CNNs have proven to fail to learn descriptive features. Recent research shows that supervised pre-training on external data followed by domain-specific fine-tuning yields a significant performance boost when external data and target domain show similar visual characteristics. Transfer-learning from a base task to a highly dissimilar target task, however, has not yet been fully investigated. In this paper, we analyze the performance of different feature representations for classification of paintings into art epochs. Specifically, we evaluate the impact of training set sizes on CNNs trained with and without external data and compare the obtained models to linear models based on Improved Fisher Encodings. Our results underline the superior performance of fine-tuned CNNs but likewise propose Fisher Encodings in scenarios were training data is limited.",
"title": ""
},
{
"docid": "279302300cbdca5f8d7470532928f9bd",
"text": "The problem of feature selection is a difficult combinatorial task in Machine Learning and of high practical relevance, e.g. in bioinformatics. Genetic Algorithms (GAs) of fer a natural way to solve this problem. In this paper we present a special Genetic Algorithm, which especially take s into account the existing bounds on the generalization erro r for Support Vector Machines (SVMs). This new approach is compared to the traditional method of performing crossvalidation and to other existing algorithms for feature selection.",
"title": ""
},
{
"docid": "479c83803b5b53c72cc1715ffdad084f",
"text": "SPADE is an open source software infrastructure for data provenance collection and management. The underlying data model used throughout the system is graph-based, consisting of vertices and directed edges that are modeled after the node and relationship types described in the Open Provenance Model. The system has been designed to decouple the collection, storage, and querying of provenance metadata. At its core is a novel provenance kernel that mediates between the producers and consumers of provenance information, and handles the persistent storage of records. It operates as a service, peering with remote instances to enable distributed provenance queries. The provenance kernel on each host handles the buffering, filtering, and multiplexing of incoming metadata from multiple sources, including the operating system, applications, and manual curation. Provenance elements can be located locally with queries that use wildcard, fuzzy, proximity, range, and Boolean operators. Ancestor and descendant queries are transparently propagated across hosts until a terminating expression is satisfied, while distributed path queries are accelerated with provenance sketches.",
"title": ""
},
{
"docid": "fa065201fb8c95487eb6a55942befc41",
"text": "Numerous machine learning algorithms applied on Intrusion Detection System (IDS) to detect enormous attacks. However, it is difficult for machine to learn attack properties globally since there are huge and complex input features. Feature selection can overcome this problem by selecting the most important features only to reduce the dimensionality of input features. We leverage Artificial Neural Network (ANN) for the feature selection. In addition, in order to be suitable for resource-constrained devices, we can divide the IDS into smaller parts based on TCP/IP layer since different layer has specific attack types. We show the IDS for transport layer only as a prove of concept. We apply Stacked Auto Encoder (SAE) which belongs to deep learning algorithm as a classifier for KDD99 Dataset. Our experiment shows that the reduced input features are sufficient for classification task. 한국정보보호학회 하계학술대회 논문집 Vol. 26, No. 1",
"title": ""
},
{
"docid": "21f6a18e34579ae482c93c3476828729",
"text": "A low power highly sensitive Thoracic Impedance Variance (TIV) and Electrocardiogram (ECG) monitoring SoC is designed and implemented into a poultice-like plaster sensor for wearable cardiac monitoring. 0.1 Ω TIV detection is possible with a sensitivity of 3.17 V/Ω and SNR > 40 dB. This is achieved with the help of a high quality (Q-factor > 30) balanced sinusoidal current source and low noise reconfigurable readout electronics. A cm-range 13.56 MHz fabric inductor coupling is adopted to start/stop the SoC remotely. Moreover, a 5% duty-cycled Body Channel Communication (BCC) is exploited for 0.2 nJ/b 1 Mbps energy efficient external data communication. The proposed SoC occupies 5 mm × 5 mm including pads in a standard 0.18 μm 1P6M CMOS technology. It dissipates a peak power of 3.9 mW when operating in body channel receiver mode, and consumes 2.4 mW when operating in TIV and ECG detection mode. The SoC is integrated on a 15 cm × 15 cm fabric circuit board together with a flexible battery to form a compact wearable sensor. With 25 adhesive screen-printed fabric electrodes, detection of TIV and ECG at 16 different sites of the heart is possible, allowing optimal detection sites to be configured to accommodate different user dependencies.",
"title": ""
},
{
"docid": "edf548598375ea1e36abd57dd3bad9c7",
"text": "processes associated with social identity. Group identification, as self-categorization, constructs an intragroup prototypicality gradient that invests the most prototypical member with the appearance of having influence; the appearance arises because members cognitively and behaviorally conform to the prototype. The appearance of influence becomes a reality through depersonalized social attraction processes that makefollowers agree and comply with the leader's ideas and suggestions. Consensual social attraction also imbues the leader with apparent status and creates a status-based structural differentiation within the group into leader(s) and followers, which has characteristics ofunequal status intergroup relations. In addition, afundamental attribution process constructs a charismatic leadership personality for the leader, which further empowers the leader and sharpens the leader-follower status differential. Empirical supportfor the theory is reviewed and a range of implications discussed, including intergroup dimensions, uncertainty reduction and extremism, power, and pitfalls ofprototype-based leadership.",
"title": ""
},
{
"docid": "47d8feb4c7ee6bc6e2b2b9bd21591a3b",
"text": "BACKGROUND\nAlthough local anesthetics (LAs) are hyperbaric at room temperature, density drops within minutes after administration into the subarachnoid space. LAs become hypobaric and therefore may cranially ascend during spinal anesthesia in an uncontrolled manner. The authors hypothesized that temperature and density of LA solutions have a nonlinear relation that may be described by a polynomial equation, and that conversion of this equation may provide the temperature at which individual LAs are isobaric.\n\n\nMETHODS\nDensity of cerebrospinal fluid was measured using a vibrating tube densitometer. Temperature-dependent density data were obtained from all LAs commonly used for spinal anesthesia, at least in triplicate at 5 degrees, 20 degrees, 30 degrees, and 37 degrees C. The hypothesis was tested by fitting the obtained data into polynomial mathematical models allowing calculations of substance-specific isobaric temperatures.\n\n\nRESULTS\nCerebrospinal fluid at 37 degrees C had a density of 1.000646 +/- 0.000086 g/ml. Three groups of local anesthetics with similar temperature (T, degrees C)-dependent density (rho) characteristics were identified: articaine and mepivacaine, rho1(T) = 1.008-5.36 E-06 T2 (heavy LAs, isobaric at body temperature); L-bupivacaine, rho2(T) = 1.007-5.46 E-06 T2 (intermediate LA, less hypobaric than saline); bupivacaine, ropivacaine, prilocaine, and lidocaine, rho3(T) = 1.0063-5.0 E-06 T (light LAs, more hypobaric than saline). Isobaric temperatures (degrees C) were as follows: 5 mg/ml bupivacaine, 35.1; 5 mg/ml L-bupivacaine, 37.0; 5 mg/ml ropivacaine, 35.1; 20 mg/ml articaine, 39.4.\n\n\nCONCLUSION\nSophisticated measurements and mathematic models now allow calculation of the ideal injection temperature of LAs and, thus, even better control of LA distribution within the cerebrospinal fluid. The given formulae allow the adaptation on subpopulations with varying cerebrospinal fluid density.",
"title": ""
},
{
"docid": "54d9985cd849605eb1c4c1369fc734cb",
"text": "Arjan Graybill Clinical Profile of the Juvenile Delinquent 1999 Dr. J. Klanderman Seminar in School Psychology This study attempted to explore the relationship that a juvenile delinquent has with three major influences: school, peers, and family. It was hypothesized that juvenile delinquents possess a poor relationship with these influences. Subjects were administered a survey which assesses the relationship with school, peers and family. 19 inmates in a juvenile detention center were administered the survey. There were 15 subjects in the control group who were administered the survey as well. Results from independent tscores reveal a significant difference in the relationship with school, peers, and family for the two groups. Juvenile delinquents were found to have a poor relationship with these major influences.",
"title": ""
},
{
"docid": "aeb4af864a4e2435486a69f5694659dc",
"text": "A great amount of research has been developed around the early cognitive impairments that best predict the onset of Alzheimer's disease (AD). Given that mild cognitive impairment (MCI) is no longer considered to be an intermediate state between normal aging and AD, new paths have been traced to acquire further knowledge about this condition and its subtypes, and to determine which of them have a higher risk of conversion to AD. It is now known that other deficits besides episodic and semantic memory impairments may be present in the early stages of AD, such as visuospatial and executive function deficits. Furthermore, recent investigations have proven that the hippocampus and the medial temporal lobe structures are not only involved in memory functioning, but also in visual processes. These early changes in memory, visual, and executive processes may also be detected with the study of eye movement patterns in pathological conditions like MCI and AD. In the present review, we attempt to explore the existing literature concerning these patterns of oculomotor changes and how these changes are related to the early signs of AD. In particular, we argue that deficits in visual short-term memory, specifically in iconic memory, attention processes, and inhibitory control, may be found through the analysis of eye movement patterns, and we discuss how they might help to predict the progression from MCI to AD. We add that the study of eye movement patterns in these conditions, in combination with neuroimaging techniques and appropriate neuropsychological tasks based on rigorous concepts derived from cognitive psychology, may highlight the early presence of cognitive impairments in the course of the disease.",
"title": ""
},
{
"docid": "67622b8dfa339b63a37439b07ec9b3f7",
"text": "⁎ Corresponding author. E-mail addresses: mkunda@vanderbilt.edu (M. Kunda (I. Soulières), agata@gatech.edu (A. Rozga), ashok.goel@c 1 Present Address: Department of Electrical Engine Vanderbilt University, PMB 351679, 2301 Vanderbilt Pla USA. 2 Terminology: Raven's Progressive Matrices (RPM) refe Specific test versions include: Standard ProgressiveMatric and adults in average ability ranges; Colored ProgressiveM with children, the elderly, or other individuals falling Advanced Progressive Matrices (APM), intended for highe",
"title": ""
},
{
"docid": "462a0746875e35116f669b16d851f360",
"text": "We previously have applied deep autoencoder (DAE) for noise reduction and speech enhancement. However, the DAE was trained using only clean speech. In this study, by using noisyclean training pairs, we further introduce a denoising process in learning the DAE. In training the DAE, we still adopt greedy layer-wised pretraining plus fine tuning strategy. In pretraining, each layer is trained as a one-hidden-layer neural autoencoder (AE) using noisy-clean speech pairs as input and output (or transformed noisy-clean speech pairs by preceding AEs). Fine tuning was done by stacking all AEs with pretrained parameters for initialization. The trained DAE is used as a filter for speech estimation when noisy speech is given. Speech enhancement experiments were done to examine the performance of the trained denoising DAE. Noise reduction, speech distortion, and perceptual evaluation of speech quality (PESQ) criteria are used in the performance evaluations. Experimental results show that adding depth of the DAE consistently increase the performance when a large training data set is given. In addition, compared with a minimum mean square error based speech enhancement algorithm, our proposed denoising DAE provided superior performance on the three objective evaluations.",
"title": ""
},
{
"docid": "c0a9e0cb0e3c0ffa6409e5020795f059",
"text": "Credit-card-based purchases can be categorized into two types: 1) physical card and 2) virtual card. In a physical-card based purchase, the cardholder presents his card physically to a merchant for making a payment. To carry out fraudulent transactions in this kind of purchase, an attacker has to steal the credit card. If the cardholder does not realize the loss of card, it can lead to a substantial financial loss to the credit card company. In the second kind of purchase, only some important information about a card (card number, expiration date, secure code) is required to make the payment. Such purchases are normally done on the Internet or over the telephone. To commit fraud in these types of purchases, a fraudster simply needs to know the card details. Most of the time, the genuine cardholder is not aware that someone else has seen or stolen his card information.The only way to detect this kind of fraud is to analyze the spending patterns on every card and to figure out any inconsistency with respect to the “usual” spending patterns. Fraud detection based on the analysis of existing purchase data of cardholder is a promising way to reduce the rate of successful credit card frauds. The existing nondata mining detection system of business rules and scorecards, and known fraud matching have limitations. To address these limitations and combat identity crime in real time, this paper proposes a new multilayered detection system complemented withtwo additional layers: communal detection (CD) and spike detection (SD).CD finds realsocial relationships to reduce the suspicion score, and is tamper resistant to synthetic social relationships. It is the whitelist-oriented approach on a fixed set of attributes. SD finds spikes in duplicates to increase the suspicion score, and is probe-resistant for attributes. Key words— communal detection, spike detection, fraud detection, support vector machine",
"title": ""
}
] | scidocsrr |
141c71face17d9bb610db565c06038d3 | ThingPot: an interactive Internet-of-Things honeypot | [
{
"docid": "9ed5fdb991edd5de57ffa7f13121f047",
"text": "We analyze the increasing threats against IoT devices. We show that Telnet-based attacks that target IoT devices have rocketed since 2014. Based on this observation, we propose an IoT honeypot and sandbox, which attracts and analyzes Telnet-based attacks against various IoT devices running on different CPU architectures such as ARM, MIPS, and PPC. By analyzing the observation results of our honeypot and captured malware samples, we show that there are currently at least 5 distinct DDoS malware families targeting Telnet-enabled IoT devices and one of the families has quickly evolved to target more devices with as many as 9 different CPU architectures.",
"title": ""
}
] | [
{
"docid": "ec24b9b58bd95b28756e6b9b1796f4de",
"text": "This article surveys contemporary trends in leadership theory as well as its current status and the social context that has shaped the contours of leadership studies. Emphasis is placed on the urgent need for collaboration among social-neuro-cognitive scientists in order to achieve an integrated theory, and the author points to promising leads for accomplishing this. He also asserts that the 4 major threats to world stability are a nuclear/biological catastrophe, a world-wide pandemic, tribalism, and the leadership of human institutions. Without exemplary leadership, solving the problems stemming from the first 3 threats will be impossible.",
"title": ""
},
{
"docid": "3ab1e2768c1f612f1f85ddb192b37e1f",
"text": "The vertical Cup-to-Disc Ratio (CDR) is an important indicator in the diagnosis of glaucoma. Automatic segmentation of the optic disc (OD) and optic cup is crucial towards a good computer-aided diagnosis (CAD) system. This paper presents a statistical model-based method for the segmentation of the optic disc and optic cup from digital color fundus images. The method combines knowledge-based Circular Hough Transform and a novel optimal channel selection for segmentation of the OD. Moreover, we extended the method to optic cup segmentation, which is a more challenging task. The system was tested on a dataset of 325 images. The average Dice coefficient for the disc and cup segmentation is 0.92 and 0.81 respectively, which improves significantly over existing methods. The proposed method has a mean absolute CDR error of 0.10, which outperforms existing methods. The results are promising and thus demonstrate a good potential for this method to be used in a mass screening CAD system.",
"title": ""
},
{
"docid": "df1db7eae960d3b16edb8d001b7b1f22",
"text": "This letter presents a novel approach for providing substrate-integrated waveguide tunable resonators by means of placing an additional metalized via-hole on the waveguide cavity. The via-hole contains an open-loop slot on the top metallic wall. The dimensions, position and orientation of the open-loop slot defines the tuning range. Fabrication of some designs reveals good agreement between simulation and measurements. Additionally, a preliminary prototype which sets the open-loop slot orientation manually is also presented, achieving a continuous tuning range of 8%.",
"title": ""
},
{
"docid": "7b4c5206475d124574c99a5285ca9886",
"text": "The concept of Mars Sample Return (MSR) has been considered since the 1960s and is still a top priority for the planetary science community. [1] Although a plan on the number and types of samples to be collected for MSR has been outlined, as articulated in the Mars 2020 Science Definition Team report [2], the trade space of options to return this sample from the surface of Mars to the surface of the Earth is still being explored. One of the main challenges with MSR is that it is inherently a multi-vehicle system where each vehicle's design impacts that of the others. Defining the trade space must therefore be treated as a System of Systems (SoS) problem. The work presented puts forward a framework to rapidly explore such spatially and temporally distributed systems. It investigates the possible vehicle and technology options for MSR, assuming that a packaged sample has been left on the surface of Mars. It also evaluates how launch sequencing choices affect the expected return on investment of different architectures. The paper explores eight key trades, including different types of landing and propulsion systems, as well as low-cost direct return options. A large set of architectures are compared to the baseline proposed in the Planetary Science Decadal Survey [1] for MSR, which consists of a stationary lander, a small fetch rover, a Mars Ascent Vehicle (MAV), and a return orbiter with chemical propulsion. Overall, the baseline is found to be well optimized, although a few options, including the use of solar electric propulsion and of a roving vehicle carrying the MAV to the sample, are shown to offer a better return on investment. Furthermore, when considering only the goals of MSR, an approach where the lander is sent to Mars at least one launch window ahead of the return orbiter is demonstrated to be preferable.",
"title": ""
},
{
"docid": "b540fb20a265d315503543a5d752f486",
"text": "Deep convolutional networks have witnessed unprecedented success in various machine learning applications. Formal understanding on what makes these networks so successful is gradually unfolding, but for the most part there are still significant mysteries to unravel. The inductive bias, which reflects prior knowledge embedded in the network architecture, is one of them. In this work, we establish a fundamental connection between the fields of quantum physics and deep learning. We use this connection for asserting novel theoretical observations regarding the role that the number of channels in each layer of the convolutional network fulfills in the overall inductive bias. Specifically, we show an equivalence between the function realized by a deep convolutional arithmetic circuit (ConvAC) and a quantum many-body wave function, which relies on their common underlying tensorial structure. This facilitates the use of quantum entanglement measures as welldefined quantifiers of a deep network’s expressive ability to model intricate correlation structures of its inputs. Most importantly, the construction of a deep convolutional arithmetic circuit in terms of a Tensor Network is made available. This description enables us to carry a graph-theoretic analysis of a convolutional network, tying its expressiveness to a min-cut in the graph which characterizes it. Thus, we demonstrate a direct control over the inductive bias of the designed deep convolutional network via its channel numbers, which we show to be related to this min-cut in the underlying graph. This result is relevant to any practitioner designing a convolutional network for a specific task. We theoretically analyze convolutional arithmetic circuits, and empirically validate our findings on more common convolutional networks which involve ReLU activations and max pooling. Beyond the results described above, the description of a deep convolutional network in well-defined graph-theoretic tools and the formal structural connection to quantum entanglement, are two interdisciplinary bridges that are brought forth by this work.",
"title": ""
},
{
"docid": "1c770d3ffd7b7bf4ba2ea39c5e161168",
"text": "Website: http://hcsi.cs.tsinghua.edu.cn/ • Stress is composed of two key factors: stressor and stress level. • Stressor, comprising of stressor event and stressor subject, triggers stress • Measuring stress via social media is complicated: • Stressor subject detection • Stressor events happening to other subjects can also be someone’s stress trigger. • Social media postings are usually informal and ambiguous • Stressor event detection • Stressor events are correlated • For some specific event categories, such as death, there are insufficient training samples Challenges: Measuring Psychological Stress via Social Media",
"title": ""
},
{
"docid": "758880e02554dd63b92da065742147d5",
"text": "1Department of Computer Science, Faculty of Science and Technology, Universidade Nova de Lisboa, Lisboa, Portugal 2Center for Biomedical Technology, Universidad Politécnica de Madrid, 28223 Pozuelo de Alarcón, Madrid, Spain 3Data, Networks and Cybersecurity Research Institute, Univ. Rey Juan Carlos, 28028 Madrid, Spain 4Department of Applied Mathematics, Universidad Rey Juan Carlos, 28933 Móstoles, Madrid, Spain 5Center for Computational Simulation, 28223 Pozuelo de Alarcón, Madrid, Spain 6Cyber Security & Digital Trust, BBVA Group, 28050 Madrid, Spain",
"title": ""
},
{
"docid": "4453c85d0fc1513e9657731d84896864",
"text": "A number of studies have looked at the prevalence rates of psychiatric disorders in the community in Pakistan over the last two decades. However, a very little information is available on psychiatric morbidity in primary health care. We therefore decided to measure prevalence of psychiatric disorders and their correlates among women from primary health care facilities in Lahore. We interviewed 650 women in primary health care settings in Lahore. We used a semi-structured interview and questionnaires to collect information during face-to-face interviews. Nearly two-third of the women (64.3%) in our study were diagnosed to have a psychiatric problem, while one-third (30.4%) suffered with Major Depressive Disorder. Stressful life events, verbal violence and battering were positively correlated with psychiatric morbidity and social support, using reasoning to resolve conflicts and education were negatively correlated with psychiatric morbidity. The prevalence of psychiatric disorders is in line with the prevalence figures found in community studies. Domestic violence is an important correlate which can be the focus of interventions.",
"title": ""
},
{
"docid": "17dce24f26d7cc196e56a889255f92a8",
"text": "As known, to finish this book, you may not need to get it at once in a day. Doing the activities along the day may make you feel so bored. If you try to force reading, you may prefer to do other entertaining activities. But, one of concepts we want you to have this book is that it will not make you feel bored. Feeling bored when reading will be only unless you don't like the book. computational principles of mobile robotics really offers what everybody wants.",
"title": ""
},
{
"docid": "755f7d663e813d7450089fc0d7058037",
"text": "This paper presents a new approach for learning in structured domains (SDs) using a constructive neural network for graphs (NN4G). The new model allows the extension of the input domain for supervised neural networks to a general class of graphs including both acyclic/cyclic, directed/undirected labeled graphs. In particular, the model can realize adaptive contextual transductions, learning the mapping from graphs for both classification and regression tasks. In contrast to previous neural networks for structures that had a recursive dynamics, NN4G is based on a constructive feedforward architecture with state variables that uses neurons with no feedback connections. The neurons are applied to the input graphs by a general traversal process that relaxes the constraints of previous approaches derived by the causality assumption over hierarchical input data. Moreover, the incremental approach eliminates the need to introduce cyclic dependencies in the definition of the system state variables. In the traversal process, the NN4G units exploit (local) contextual information of the graphs vertices. In spite of the simplicity of the approach, we show that, through the compositionality of the contextual information developed by the learning, the model can deal with contextual information that is incrementally extended according to the graphs topology. The effectiveness and the generality of the new approach are investigated by analyzing its theoretical properties and providing experimental results.",
"title": ""
},
{
"docid": "fb763a2142bd744cc61718939054747f",
"text": "A new method of image transmission and cryptography on the basis of Mobius transformation is proposed in this paper. Based on the Mobius transformation, the method of modulation and demodulation in Chen-Mobius communication system, which is quite different from the traditional one, is applied in the image transmission and cryptography. To make such a processing, the Chen-Mobius inverse transformed functions act as the “modulation” waveforms and the receiving end is coherently “demodulated” by the often-used digital waveforms. Simulation results are discussed in some detail. It shows that the new application has excellent performances that the digital image signals can be restored from intense noise and encrypted ones.",
"title": ""
},
{
"docid": "bc1f7e30b8dcef97c1d8de2db801c4f6",
"text": "In this paper a novel method is introduced based on the use of an unsupervised version of kernel least mean square (KLMS) algorithm for solving ordinary differential equations (ODEs). The algorithm is unsupervised because here no desired signal needs to be determined by user and the output of the model is generated by iterating the algorithm progressively. However, there are several new implementation, fast convergence and also little error. Furthermore, it is also a KLMS with obvious characteristics. In this paper the ability of KLMS is used to estimate the answer of ODE. First a trial solution of ODE is written as a sum of two parts, the first part satisfies the initial condition and the second part is trained using the KLMS algorithm so as the trial solution solves the ODE. The accuracy of the method is illustrated by solving several problems. Also the sensitivity of the convergence is analyzed by changing the step size parameters and kernel functions. Finally, the proposed method is compared with neuro-fuzzy [21] approach. Crown Copyright & 2011 Published by Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "f51a1451a1e011bd7fee3cc70f549f84",
"text": "The present study examined relations among neighborhood structural and social characteristics, parenting practices, peer group affiliations, and delinquency among a group of serious adolescent offenders. The sample of 14-18-year-old boys (N=488) was composed primarily of economically disadvantaged, ethnic-minority youth living in urban communities. The results indicate that weak neighborhood social organization is indirectly related to delinquency through its associations with parenting behavior and peer deviance and that a focus on just 1 of these microsystems can lead to oversimplified models of risk for juvenile offending. The authors also find that community social ties may confer both pro- and antisocial influences to youth, and they advocate for a broad conceptualization of neighborhood social processes as these relate to developmental risk for youth living in disadvantaged communities.",
"title": ""
},
{
"docid": "85cfda0c6a2964d342035b45d2ad47ab",
"text": "Distributed Denial of Service (DDoS) attacks grow rapidly and become one of the fatal threats to the Internet. Automatically detecting DDoS attack packets is one of the main defense mechanisms. Conventional solutions monitor network traffic and identify attack activities from legitimate network traffic based on statistical divergence. Machine learning is another method to improve identifying performance based on statistical features. However, conventional machine learning techniques are limited by the shallow representation models. In this paper, we propose a deep learning based DDoS attack detection approach (DeepDefense). Deep learning approach can automatically extract high-level features from low-level ones and gain powerful representation and inference. We design a recurrent deep neural network to learn patterns from sequences of network traffic and trace network attack activities. The experimental results demonstrate a better performance of our model compared with conventional machine learning models. We reduce the error rate from 7.517% to 2.103% compared with conventional machine learning method in the larger data set.",
"title": ""
},
{
"docid": "5b79a4fcedaebf0e64b7627b2d944e22",
"text": "Self-replication is a key aspect of biological life that has been largely overlooked in Artificial Intelligence systems. Here we describe how to build and train self-replicating neural networks. The network replicates itself by learning to output its own weights. The network is designed using a loss function that can be optimized with either gradient-based or nongradient-based methods. We also describe a method we call regeneration to train the network without explicit optimization, by injecting the network with predictions of its own parameters. The best solution for a self-replicating network was found by alternating between regeneration and optimization steps. Finally, we describe a design for a self-replicating neural network that can solve an auxiliary task such as MNIST image classification. We observe that there is a trade-off between the network’s ability to classify images and its ability to replicate, but training is biased towards increasing its specialization at image classification at the expense of replication. This is analogous to the trade-off between reproduction and other tasks observed in nature. We suggest that a selfreplication mechanism for artificial intelligence is useful because it introduces the possibility of continual improvement through natural selection.",
"title": ""
},
{
"docid": "b0385e647424e56cb8b854a4d78dd762",
"text": "Trustworthy operation of industrial control systems depends on secure and real-time code execution on the embedded programmable logic controllers (PLCs). The controllers monitor and control the critical infrastructures, such as electric power grids and healthcare platforms, and continuously report back the system status to human operators. We present Zeus, a contactless embedded controller security monitor to ensure its execution control flow integrity. Zeus leverages the electromagnetic emission by the PLC circuitry during the execution of the controller programs. Zeus's contactless execution tracking enables non-intrusive monitoring of security-critical controllers with tight real-time constraints. Those devices often cannot tolerate the cost and performance overhead that comes with additional traditional hardware or software monitoring modules. Furthermore, Zeus provides an air-gap between the monitor (trusted computing base) and the target (potentially compromised) PLC. This eliminates the possibility of the monitor infection by the same attack vectors.\n Zeus monitors for control flow integrity of the PLC program execution. Zeus monitors the communications between the human machine interface and the PLC, and captures the control logic binary uploads to the PLC. Zeus exercises its feasible execution paths, and fingerprints their emissions using an external electromagnetic sensor. Zeus trains a neural network for legitimate PLC executions, and uses it at runtime to identify the control flow based on PLC's electromagnetic emissions. We implemented Zeus on a commercial Allen Bradley PLC, which is widely used in industry, and evaluated it on real-world control program executions. Zeus was able to distinguish between different legitimate and malicious executions with 98.9% accuracy and with zero overhead on PLC execution by design.",
"title": ""
},
{
"docid": "45a4b46a303d120838037328e6606a5d",
"text": "Learned models composed of probabilistic logical rules are useful for many tasks, such as knowledge base completion. Unfortunately this learning problem is difficult, since determining the structure of the theory normally requires solving a discrete optimization problem. In this paper, we propose an alternative approach: a completely differentiable model for learning sets of first-order rules. The approach is inspired by a recently-developed differentiable logic, i.e. a subset of first-order logic for which inference tasks can be compiled into sequences of differentiable operations. Here we describe a neural controller system which learns how to sequentially compose the these primitive differentiable operations to solve reasoning tasks, and in particular, to perform knowledge base completion. The long-term goal of this work is to develop integrated, end-to-end systems that can learn to perform high-level logical reasoning as well as lower-level perceptual tasks.",
"title": ""
},
{
"docid": "6e1de72d7882139c7b94f762bd45424b",
"text": "We introduce Texar, an open-source toolkit aiming to support the broad set of text generation tasks. Different from many existing toolkits that are specialized for specific applications (e.g., neural machine translation), Texar is designed to be highly flexible and versatile. This is achieved by abstracting the common patterns underlying the diverse tasks and methodologies, creating a library of highly reusable modules and functionalities, and enabling arbitrary model architectures and various algorithmic paradigms. The features make Texar particularly suitable for technique sharing and generalization across different text generation applications. The toolkit emphasizes heavily on extensibility and modularized system design, so that components can be freely plugged in or swapped out. We conduct extensive experiments and case studies to demonstrate the use and advantage of the toolkit.",
"title": ""
},
{
"docid": "b0de8371b0f5bfcecd8370bb0fdac174",
"text": "We study two quite different approaches to understanding the complexity of fundamental problems in numerical analysis. We show that both hinge on the question of understanding the complexity of the following problem, which we call PosSLP; given a division-free straight-line program producing an integer N, decide whether N > 0. We show that PosSLP lies in the counting hierarchy, and combining our results with work of Tiwari, we show that the Euclidean traveling salesman problem lies in the counting hierarchy - the previous best upper bound for this important problem (in terms of classical complexity classes) being PSPACE",
"title": ""
},
{
"docid": "7adbcbcf5d458087d6f261d060e6c12b",
"text": "Operation of MOS devices in the strong, moderate, and weak inversion regions is considered. The advantages of designing the input differential stage of a CMOS op amp to operate in the weak or moderate inversion region are presented. These advantages include higher voltage gain, less distortion, and ease of compensation. Specific design guidelines are presented to optimize amplifier performance. Simulations that demonstrate the expected improvements are given.",
"title": ""
}
] | scidocsrr |
9b823e18e400b96b06489419ed3ce92c | Bimodal Modelling of Source Code and Natural Language | [
{
"docid": "30bbe536486261cc09d213633c47a1d9",
"text": "We present the first method for automatically mining code idioms from a corpus of previously written, idiomatic software projects. We take the view that a code idiom is a syntactic fragment that recurs across projects and has a single semantic purpose. Idioms may have metavariables, such as the body of a for loop. Modern IDEs commonly provide facilities for manually defining idioms and inserting them on demand, but this does not help programmers to write idiomatic code in languages or using libraries with which they are unfamiliar. We present Haggis, a system for mining code idioms that builds on recent advanced techniques from statistical natural language processing, namely, nonparametric Bayesian probabilistic tree substitution grammars. We apply Haggis to several of the most popular open source projects from GitHub. We present a wide range of evidence that the resulting idioms are semantically meaningful, demonstrating that they do indeed recur across software projects and that they occur more frequently in illustrative code examples collected from a Q&A site. Manual examination of the most common idioms indicate that they describe important program concepts, including object creation, exception handling, and resource management.",
"title": ""
},
{
"docid": "527d7c091cfc63c8e9d36afdd6b7bdfe",
"text": "Previous work on Recursive Neural Networks (RNNs) shows that these models can produce compositional feature vectors for accurately representing and classifying sentences or images. However, the sentence vectors of previous models cannot accurately represent visually grounded meaning. We introduce the DT-RNN model which uses dependency trees to embed sentences into a vector space in order to retrieve images that are described by those sentences. Unlike previous RNN-based models which use constituency trees, DT-RNNs naturally focus on the action and agents in a sentence. They are better able to abstract from the details of word order and syntactic expression. DT-RNNs outperform other recursive and recurrent neural networks, kernelized CCA and a bag-of-words baseline on the tasks of finding an image that fits a sentence description and vice versa. They also give more similar representations to sentences that describe the same image.",
"title": ""
}
] | [
{
"docid": "77bc1c8c80f756845b87428382e8fd91",
"text": "Previous research has proposed different types for and contingency factors affecting information technology governance. Yet, in spite of this valuable work, it is still unclear through what mechanisms IT governance affects organizational performance. We make a detailed argument for the mediation of strategic alignment in this process. Strategic alignment remains a top priority for business and IT executives, but theory-based empirical research on the relative importance of the factors affecting strategic alignment is still lagging. By consolidating strategic alignment and IT governance models, this research proposes a nomological model showing how organizational value is created through IT governance mechanisms. Our research model draws upon the resource-based view of the firm and provides guidance on how strategic alignment can mediate the effectiveness of IT governance on organizational performance. As such, it contributes to the knowledge bases of both alignment and IT governance literatures. Using dyadic data collected from 131 Taiwanese companies (cross-validated with archival data from 72 firms), we uncover a positive, significant, and impactful linkage between IT governance mechanisms and strategic alignment and, further, between strategic alignment and organizational performance. We also show that the effect of IT governance mechanisms on organizational performance is fully mediated by strategic alignment. Besides making contributions to construct and measure items in this domain, this research contributes to the theory base by integrating and extending the literature on IT governance and strategic alignment, both of which have long been recognized as critical for achieving organizational goals.",
"title": ""
},
{
"docid": "520de9b576c112171ce0d08650a25093",
"text": "Figurative language represents one of the most difficult tasks regarding natural language processing. Unlike literal language, figurative language takes advantage of linguistic devices such as irony, humor, sarcasm, metaphor, analogy, and so on, in order to communicate indirect meanings which, usually, are not interpretable by simply decoding syntactic or semantic information. Rather, figurative language reflects patterns of thought within a communicative and social framework that turns quite challenging its linguistic representation, as well as its computational processing. In this Ph. D. thesis we address the issue of developing a linguisticbased framework for figurative language processing. In particular, our efforts are focused on creating some models capable of automatically detecting instances of two independent figurative devices in social media texts: humor and irony. Our main hypothesis relies on the fact that language reflects patterns of thought; i.e. to study language is to study patterns of conceptualization. Thus, by analyzing two specific domains of figurative language, we aim to provide arguments concerning how people mentally conceive humor and irony, and how they verbalize each device in social media platforms. In this context, we focus on showing how fine-grained knowledge, which relies on shallow and deep linguistic layers, can be translated into valuable patterns to automatically identify figurative uses of language. Contrary to most researches that deal with figurative language, we do not support our arguments on prototypical examples neither of humor nor of irony. Rather, we try to find patterns in texts such as blogs, web comments, tweets, etc., whose intrinsic characteristics are quite different to the characteristics described in the specialized literature. Apart from providing a linguistic inventory for detecting humor and irony at textual level, in this investigation we stress out the importance of considering user-generated tags in order to automatically build resources for figurative language processing, such as ad hoc corpora in which human annotation is not necessary. Finally, each model is evaluated in terms of its relevance to properly identify instances of humor and irony, respectively. To this end, several experiments are carried out taking into consideration different data sets and applicability scenarios. Our findings point out that figurative language processing (especially humor and irony) can provide fine-grained knowledge in tasks as diverse as sentiment analysis, opinion mining, information retrieval, or trend discovery.",
"title": ""
},
{
"docid": "417100b3384ec637b47846134bc6d1fd",
"text": "The electronic way of learning and communicating with students offers a lot of advantages that can be achieved through different solutions. Among them, the most popular approach is the use of a learning management system. Teachers and students do not have the possibility to use all of the available learning system tools and modules. Even for modules that are used it is necessary to find the most effective method of approach for any given situation. Therefore, in this paper we make a usability evaluation of standard modules in Moodle, one of the leading open source learning management systems. With this research, we obtain significant results and informationpsilas for administrators, teachers and students on how to improve effective usage of this system.",
"title": ""
},
{
"docid": "09d51d7170661d91a8ff0b36bdb9c16b",
"text": "For large-scale, complex systems, both simulation and optimization methods are needed to support system design and operational decision making. Integrating the two methodologies, however, presents a number of conceptual and technical problems. This paper argues that the required integration can be successfully achieved, within a specific domain, by using a formal domain specific language for specifying instance problems and for structuring the analysis models and their interfaces. The domain must include a large enough class of problems to justify the resulting specialization of analysis models.",
"title": ""
},
{
"docid": "3205d04f2f5648397ee1524b682ad938",
"text": "Sequential models achieve state-of-the-art results in audio, visual and textual domains with respect to both estimating the data distribution and generating high-quality samples. Efficient sampling for this class of models has however remained an elusive problem. With a focus on text-to-speech synthesis, we describe a set of general techniques for reducing sampling time while maintaining high output quality. We first describe a single-layer recurrent neural network, the WaveRNN, with a dual softmax layer that matches the quality of the state-of-the-art WaveNet model. The compact form of the network makes it possible to generate 24 kHz 16-bit audio 4× faster than real time on a GPU. Second, we apply a weight pruning technique to reduce the number of weights in the WaveRNN. We find that, for a constant number of parameters, large sparse networks perform better than small dense networks and this relationship holds for sparsity levels beyond 96%. The small number of weights in a Sparse WaveRNN makes it possible to sample high-fidelity audio on a mobile CPU in real time. Finally, we propose a new generation scheme based on subscaling that folds a long sequence into a batch of shorter sequences and allows one to generate multiple samples at once. The Subscale WaveRNN produces 16 samples per step without loss of quality and offers an orthogonal method for increasing sampling efficiency.",
"title": ""
},
{
"docid": "0bda1444c37dd394e505c19a487cbc1e",
"text": "Automatic information extraction (IE) enables the construction of very large knowledge bases (KBs), with relational facts on millions of entities from text corpora and Web sources. However, such KBs contain errors and they are far from being complete. This motivates the need for exploiting human intelligence and knowledge using crowd-based human computing (HC) for assessing the validity of facts and for gathering additional knowledge. This paper presents a novel system architecture, called Higgins, which shows how to effectively integrate an IE engine and a HC engine. Higgins generates game questions where players choose or fill in missing relations for subject-relation-object triples. For generating multiple-choice answer candidates, we have constructed a large dictionary of entity names and relational phrases, and have developed specifically designed statistical language models for phrase relatedness. To this end, we combine semantic resources like WordNet, ConceptNet, and others with statistics derived from a large Web corpus. We demonstrate the effectiveness of Higgins for knowledge acquisition by crowdsourced gathering of relationships between characters in narrative descriptions of movies and books.",
"title": ""
},
{
"docid": "4d1d343f03f6a1fae94f630a64e10081",
"text": "This paper describes our system participating in the aspect-based sentiment analysis task of Semeval 2014. The goal was to identify the aspects of given target entities and the sentiment expressed towards each aspect. We firstly introduce a system based on supervised machine learning, which is strictly constrained and uses the training data as the only source of information. This system is then extended by unsupervised methods for latent semantics discovery (LDA and semantic spaces) as well as the approach based on sentiment vocabularies. The evaluation was done on two domains, restaurants and laptops. We show that our approach leads to very promising results.",
"title": ""
},
{
"docid": "cc2822b15ccf29978252b688111d58cd",
"text": "Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. Configuring these devices to work in unison is difficult, especially if they are made by different vendors. Even testing or reverse-engineering an existing configuration (say, when a new security administrator takes over) is hard. Firewall configuration files are written in low-level formalisms, whose readability is comparable to assembly code, and the global policy is spread over all the firewalls that are involved. To alleviate some of these difficulties, we designed and implemented a novel firewall analysis tool. Our software allows the administrator to easily discover and test the global firewall policy (either a deployed policy or a planned one). Our tool uses a minimal description of the network topology, and directly parses the various vendor-specific lowlevel configuration files. It interacts with the user through a query-and-answer session, which is conducted at a much higher level of abstraction. A typical question our tool can answer is “from which machines can our DMZ be reached, and with which services?”. Thus, our tool complements existing vulnerability analysis tools, as it can be used before a policy is actually deployed, it operates on a more understandable level of abstraction, and it deals with all the firewalls at once.",
"title": ""
},
{
"docid": "94848d407b2c4b709210c35d316eff9d",
"text": "This paper presents a novel large-scale dataset and comprehensive baselines for end-to-end pedestrian detection and person recognition in raw video frames. Our baselines address three issues: the performance of various combinations of detectors and recognizers, mechanisms for pedestrian detection to help improve overall re-identification (re-ID) accuracy and assessing the effectiveness of different detectors for re-ID. We make three distinct contributions. First, a new dataset, PRW, is introduced to evaluate Person Re-identification in the Wild, using videos acquired through six synchronized cameras. It contains 932 identities and 11,816 frames in which pedestrians are annotated with their bounding box positions and identities. Extensive benchmarking results are presented on this dataset. Second, we show that pedestrian detection aids re-ID through two simple yet effective improvements: a cascaded fine-tuning strategy that trains a detection model first and then the classification model, and a Confidence Weighted Similarity (CWS) metric that incorporates detection scores into similarity measurement. Third, we derive insights in evaluating detector performance for the particular scenario of accurate person re-ID.",
"title": ""
},
{
"docid": "1ade1bea5fece2d1882c6b6fac1ef63e",
"text": "Probe-based confocal laser endomicroscopy is a recent tissue imaging technology that requires placing a probe in contact with the tissue to be imaged and provides real time images with a microscopic resolution. Additionally, generating adequate probe movements to sweep the tissue surface can be used to reconstruct a wide mosaic of the scanned region while increasing the resolution which is appropriate for anatomico-pathological cancer diagnosis. However, properly controlling the motion along the scanning trajectory is a major problem. Indeed, the tissue exhibits deformations under friction forces exerted by the probe leading to deformed mosaics. In this paper we propose a visual servoing approach for controlling the probe movements relative to the tissue while rejecting the tissue deformation disturbance. The probe displacement with respect to the tissue is firstly estimated using the confocal images and an image registration real-time algorithm. Secondly, from this real-time image-based position measurement, the probe motion is controlled thanks to a simple proportional-integral compensator and a feedforward term. Ex vivo experiments using a Stäubli TX40 robot and a Mauna Kea Technologies Cellvizio imaging device demonstrate the effectiveness of the approach on liver and muscle tissue.",
"title": ""
},
{
"docid": "9f9493c695ca8ed62447f4ce1a0c4907",
"text": "Our focus in this research is on the use of deep learning approaches for human activity recognition (HAR) scenario, in which inputs are multichannel time series signals acquired from a set of body-worn inertial sensors and outputs are predefined human activities. Here, we present a feature learning method that deploys convolutional neural networks (CNN) to automate feature learning from the raw inputs in a systematic way. The influence of various important hyper-parameters such as number of convolutional layers and kernel size on the performance of CNN was monitored. Experimental results indicate that CNNs achieved significant speed-up in computing and deciding the final class and marginal improvement in overall classification accuracy compared to the baseline models such as Support Vector Machines and Multi-layer perceptron networks.",
"title": ""
},
{
"docid": "2eebebc33b83bfcc7490723883ec66a9",
"text": "Getting clear images in underwater environments is an important issue in ocean engineering . The quality of underwater images plays a important role in scientific world. Capturing images underwater is difficult, generally due to deflection and reflection of water particles, and color change due to light travelling in water with different wavelengths. Light dispersion and color transform result in contrast loss and color deviation in images acquired underwater. Restoration and Enhancement of an underwater object from an image distorted by moving water waves is a very challenging task. This paper proposes wavelength compensation and image dehazing technique to balance the color change and light scattering respectively. It also removes artificial light by using depth map technique. Water depth is estimated by background color. Color change compensation is done by residual energy ratio method. A new approach is presented in this paper. We make use of a special technique called wavelength compensation and dehazing technique along with the artificial light removal technique simultaneously to analyze the raw image sequences and recover the true object. We test our approach on both pretended and data of real world, separately. Such technique has wide applications to areas such.",
"title": ""
},
{
"docid": "e9bc802e8ce6a823526084c82aa89c95",
"text": "Non-orthogonal multiple access (NOMA) is a promising radio access technique for further cellular enhancements toward 5G. Single-user multiple-input multiple-output (SU-MIMO) is one of the key technologies in LTE /LTE-Advanced systems. Thus, it is of great interest to study how to efficiently and effectively combine NOMA and SU-MIMO techniques together for further system performance improvement. This paper investigates the combination of NOMA with open-loop and closed-loop SU-MIMO. The key issues involved in the combination are presented and discussed, including scheduling algorithm, successive interference canceller (SIC) order determination, transmission power assignment and feedback design. The performances of NOMA with SU-MIMO are investigated by system-level simulations with very practical assumptions. Simulation results show that compared to orthogonal multiple access system, NOMA can achieve large performance gains both open-loop and closed-loop SU-MIMO, which are about 23% for cell average throughput and 33% for cell-edge user throughput.",
"title": ""
},
{
"docid": "0947728fbeeda33a5ca88ad0bfea5258",
"text": "The cybersecurity community typically reacts to attacks after they occur. Being reactive is costly and can be fatal where attacks threaten lives, important data, or mission success. But can cybersecurity be done proactively? Our research capitalizes on the Germination Period—the time lag between hacker communities discussing software flaw types and flaws actually being exploited—where proactive measures can be taken. We argue for a novel proactive approach, utilizing big data, for (I) identifying potential attacks before they come to fruition; and based on this identification, (II) developing preventive countermeasures. The big data approach resulted in our vision of the Proactive Cybersecurity System (PCS), a layered, modular service platform that applies big data collection and processing tools to a wide variety of unstructured data sources to predict vulnerabilities and develop countermeasures. Our exploratory study is the first to show the promise of this novel proactive approach and illuminates challenges that need to be addressed.",
"title": ""
},
{
"docid": "38ec75b8195ace3cec2b771e87ef3885",
"text": "With the proliferation of social networks and blogs, the Internet is increasingly being used to disseminate personal health information rather than just as a source of information. In this paper we exploit the wealth of user-generated data, available through the micro-blogging service Twitter, to estimate and track the incidence of health conditions in society. The method is based on two stages: we start by extracting possibly relevant tweets using a set of specially crafted regular expressions, and then classify these initial messages using machine learning methods. Furthermore, we selected relevant features to improve the results and the execution times. To test the method, we considered four health states or conditions, namely flu, depression, pregnancy and eating disorders, and two locations, Portugal and Spain. We present the results obtained and demonstrate that the detection results and the performance of the method are improved after feature selection. The results are promising, with areas under the receiver operating characteristic curve between 0.7 and 0.9, and f-measure values around 0.8 and 0.9. This fact indicates that such approach provides a feasible solution for measuring and tracking the evolution of health states within the society.",
"title": ""
},
{
"docid": "8be72e103853aeac601aa65b61b98fd2",
"text": "Opinion surveys usually employ multiple items to measure the respondent’s underlying value, belief, or attitude. To analyze such types of data, researchers have often followed a two-step approach by first constructing a composite measure and then using it in subsequent analysis. This paper presents a class of hierarchical item response models that help integrate measurement and analysis. In this approach, individual responses to multiple items stem from a latent preference, of which both the mean and variance may depend on observed covariates. Compared with the two-step approach, the hierarchical approach reduces bias, increases efficiency, and facilitates direct comparison across surveys covering different sets of items. Moreover, it enables us to investigate not only how preferences differ among groups, vary across regions, and evolve over time, but also levels, patterns, and trends of attitude polarization and ideological constraint. An open-source R package, hIRT, is available for fitting the proposed models. ∗Direct all correspondence to Xiang Zhou, Department of Government, Harvard University, 1737 Cambridge Street, Cambridge, MA 02138, USA; email: xiang zhou@fas.harvard.edu. The author thanks Kenneth Bollen, Bryce Corrigan, Ryan Enos, Max Goplerud, Gary King, Jonathan Kropko, Horacio Larreguy, Jie Lv, Christoph Mikulaschek, Barum Park, Pia Raffler, Yunkyu Sohn, Yu-Sung Su, Dustin Tingley, Yuhua Wang, Yu Xie, and Kazuo Yamaguchi for helpful comments on previous versions of this work.",
"title": ""
},
{
"docid": "c19f986d747f4d6a3448607f76d961ab",
"text": "We propose Stochastic Neural Architecture Search (SNAS), an economical endto-end solution to Neural Architecture Search (NAS) that trains neural operation parameters and architecture distribution parameters in same round of backpropagation, while maintaining the completeness and differentiability of the NAS pipeline. In this work, NAS is reformulated as an optimization problem on parameters of a joint distribution for the search space in a cell. To leverage the gradient information in generic differentiable loss for architecture search, a novel search gradient is proposed. We prove that this search gradient optimizes the same objective as reinforcement-learning-based NAS, but assigns credits to structural decisions more efficiently. This credit assignment is further augmented with locally decomposable reward to enforce a resource-efficient constraint. In experiments on CIFAR-10, SNAS takes fewer epochs to find a cell architecture with state-of-theart accuracy than non-differentiable evolution-based and reinforcement-learningbased NAS, which is also transferable to ImageNet. It is also shown that child networks of SNAS can maintain the validation accuracy in searching, with which attention-based NAS requires parameter retraining to compete, exhibiting potentials to stride towards efficient NAS on big datasets.",
"title": ""
},
{
"docid": "50cc2033252216368c3bf19ea32b8a2c",
"text": "Sometimes you just have to clench your teeth and go for the differential matrix algebra. And the central limit theorems. Together with the maximum likelihood techniques. And the static mean variance portfolio theory. Not forgetting the dynamic asset pricing models. And these are just the tools you need before you can start making empirical inferences in financial economics.” So wrote Ruben Lee, playfully, in a review of The Econometrics of Financial Markets, winner of TIAA-CREF’s Paul A. Samuelson Award. In economist Harry M. Markowitz, who in won the Nobel Prize in Economics, published his landmark thesis “Portfolio Selection” as an article in the Journal of Finance, and financial economics was born. Over the subsequent decades, this young and burgeoning field saw many advances in theory but few in econometric technique or empirical results. Then, nearly four decades later, Campbell, Lo, and MacKinlay’s The Econometrics of Financial Markets made a bold leap forward by integrating theory and empirical work. The three economists combined their own pathbreaking research with a generation of foundational work in modern financial theory and research. The book includes treatment of topics from the predictability of asset returns to the capital asset pricing model and arbitrage pricing theory, from statistical fractals to chaos theory. Read widely in academe as well as in the business world, The Econometrics of Financial Markets has become a new landmark in financial economics, extending and enhancing the Nobel Prize– winning work established by the early trailblazers in this important field.",
"title": ""
},
{
"docid": "b177f4c2f038b708622dbb9753e99dfc",
"text": "A technique is proposed for the adaptation of automatic speech recognition systems using hybrid models combining artificial neural networks with hidden Markov models. The application of linear transformations not only to the input features, but also to the outputs of the internal layers is investigated. The motivation is that the outputs of an internal layer represent a projection of the input pattern into a space where it should be easier to learn the classification or transformation expected at the output of the network. A new solution, called conservative training, is proposed that compensates for the lack of adaptation samples in certain classes. Supervised adaptation experiments with different corpora and for different adaptation types are described. The results show that the proposed approach always outperforms the use of transformations in the feature space and yields even better results when combined with linear input transformations",
"title": ""
},
{
"docid": "265e9de6c65996e639fd265be170e039",
"text": "Topical crawling is a young and creative area of research that holds the promise of benefiting from several sophisticated data mining techniques. The use of classification algorithms to guide topical crawlers has been sporadically suggested in the literature. No systematic study, however, has been done on their relative merits. Using the lessons learned from our previous crawler evaluation studies, we experiment with multiple versions of different classification schemes. The crawling process is modeled as a parallel best-first search over a graph defined by the Web. The classifiers provide heuristics to the crawler thus biasing it towards certain portions of the Web graph. Our results show that Naive Bayes is a weak choice for guiding a topical crawler when compared with Support Vector Machine or Neural Network. Further, the weak performance of Naive Bayes can be partly explained by extreme skewness of posterior probabilities generated by it. We also observe that despite similar performances, different topical crawlers cover subspaces on the Web with low overlap.",
"title": ""
}
] | scidocsrr |
d34c16e0088ecc96d5a99da85ad63f4b | Emotion Communication System | [
{
"docid": "7e78dbc7ae4fd9a2adbf7778db634b33",
"text": "Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables a user to check the integrity of outsourced files and to efficiently update the files in a cloud server. Although researchers have proposed many dynamic PoS schemes in singleuser environments, the problem in multi-user environments has not been investigated sufficiently. A practical multi-user cloud storage system needs the secure client-side cross-user deduplication technique, which allows a user to skip the uploading process and obtain the ownership of the files immediately, when other owners of the same files have uploaded them to the cloud server. To the best of our knowledge, none of the existing dynamic PoSs can support this technique. In this paper, we introduce the concept of deduplicatable dynamic proof of storage and propose an efficient construction called DeyPoS, to achieve dynamic PoS and secure cross-user deduplication, simultaneously. Considering the challenges of structure diversity and private tag generation, we exploit a novel tool called Homomorphic Authenticated Tree (HAT). We prove the security of our construction, and the theoretical analysis and experimental results show that our construction is efficient in practice.",
"title": ""
},
{
"docid": "9df0df8eb4f71d8c6952e07a179b2ec4",
"text": "In interpersonal interactions, speech and body gesture channels are internally coordinated towards conveying communicative intentions. The speech-gesture relationship is influenced by the internal emotion state underlying the communication. In this paper, we focus on uncovering the emotional effect on the interrelation between speech and body gestures. We investigate acoustic features describing speech prosody (pitch and energy) and vocal tract configuration (MFCCs), as well as three types of body gestures, viz., head motion, lower and upper body motions. We employ mutual information to measure the coordination between the two communicative channels, and analyze the quantified speech-gesture link with respect to distinct levels of emotion attributes, i.e., activation and valence. The results reveal that the speech-gesture coupling is generally tighter for low-level activation and high-level valence, compared to high-level activation and low-level valence. We further propose a framework for modeling the dynamics of speech-gesture interaction. Experimental studies suggest that such quantified coupling representations can well discriminate different levels of activation and valence, reinforcing that emotions are encoded in the dynamics of the multimodal link. We also verify that the structures of the coupling representations are emotiondependent using subspace-based analysis.",
"title": ""
}
] | [
{
"docid": "0d8c38444954a0003117e7334195cb00",
"text": "Although mature technologies exist for acquiring images, geometry, and normals of small objects, they remain cumbersome and time-consuming for non-experts to employ on a large scale. In an archaeological setting, a practical acquisition system for routine use on every artifact and fragment would open new possibilities for archiving, analysis, and dissemination. We present an inexpensive system for acquiring all three types of information, and associated metadata, for small objects such as fragments of wall paintings. The acquisition system requires minimal supervision, so that a single, non-expert user can scan at least 10 fragments per hour. To achieve this performance, we introduce new algorithms to robustly and automatically align range scans, register 2-D scans to 3-D geometry, and compute normals from 2-D scans. As an illustrative application, we present a novel 3-D matching algorithm that efficiently searches for matching fragments using the scanned geometry.",
"title": ""
},
{
"docid": "8f97eed7ae59062915b422cb65c7729b",
"text": "In this modern scientific world, technologies are transforming rapidly but along with the ease and comfort they also bring in a big concern for security. Taking into account the physical security of the system to ensure access control and authentication of users, made us to switch to a new system of Biometric combined with ATM PIN as PIN can easily be guessed, stolen or misused. Biometric is added with the existing technology to double the security in order to reduce ATM frauds but it has also put forward several issues which include sensor durability and time consumption. This paper envelops two questions “Is it really worthy to go through the entire biometric process to just debit a low amount?” and “What could be the maximum amount one can lose if one's card is misused?” As an answer we propose a constraint on transactions by ATM involving biometric to improve the system performance and to solve the defined issues. The proposal is divided in two parts. The first part solves sensor performance issue by adding a limit on amount of cash and number of transactions is defined in such a way that if one need to withdraw a big amount OR attempts for multiple transactions by withdrawing small amount again and again, it shall be necessary to present biometric. On the other hand if one need to make only balance enquiry or the cash is low and the number of transactions in a day is less than defined attempts, biometric presentation is not mandatory. It may help users to save time and maintain sensor performance by not furnishing their biometric for few hundred apart from maintaining security. In the second part this paper explains how fingerprint verification is conducted if the claimant is allowed to access the system and what could be the measures to increase performance of fingerprint biometric system which could be added to our proposed system to enhance the overall system performance.",
"title": ""
},
{
"docid": "de0d2808f949723f1c0ee8e87052f889",
"text": "The notion of Cloud computing has not only reshaped the field of distributed systems but also fundamentally changed how businesses utilize computing today. While Cloud computing provides many advanced features, it still has some shortcomings such as the relatively high operating cost for both public and private Clouds. The area of Green computing is also becoming increasingly important in a world with limited energy resources and an ever-rising demand for more computational power. In this paper a new framework is presented that provides efficient green enhancements within a scalable Cloud computing architecture. Using power-aware scheduling techniques, variable resource management, live migration, and a minimal virtual machine design, overall system efficiency will be vastly improved in a data center based Cloud with minimal performance overhead.",
"title": ""
},
{
"docid": "9f328d46c30cac9bb210582113683432",
"text": "Clinical and hematologic studies of 16 adult patients whose leukemic cells had Tcell markers are reported from Japan, where the incidence of various lymphoproliferative diseases differs considerably from that in Western countries. Leukemic cells were studied by cytotoxicity tests with specific antisera against human T (ATS) and B cells (ABS) in addition to the usual Tand B-cell markers (E rosette, EAC rosette, and surface immunoglobulins). Characteristics of the clinical and hematologic findings were as follows: (1) onset in adulthood; (2) subacute or chronic leukemia with rapidly progressive terminal course; (3) leukemic cells killed by ATS and forming E rosettes; (4) Icykemic cells not morphologically monotonous and frequent cells with deeply indented or lobulated nuclei; (5) frequent skin involvement (9 patients); (6) common lymphadenopathy and hepatosplenomegaly; (7) no mediastinal mass; and, the most striking finding, (8) the clustering of the patients’ birthplaces, namely, 13 patients born in Kyushu. The relation. ship between our cases and other subacute or chronic adult T-ceIl malignancies such as chronic lymphocytic leukemia of T-cell origin, prolymphocytic leukemia with 1cell properties, S#{233}zarysyndrome, and mycosis fungoides is discussed.",
"title": ""
},
{
"docid": "a1af04cc0616533bd47bb660f0eff3cd",
"text": "Separating point clouds into ground and non-ground measurements is an essential step to generate digital terrain models (DTMs) from airborne LiDAR (light detection and ranging) data. However, most filtering algorithms need to carefully set up a number of complicated parameters to achieve high accuracy. In this paper, we present a new filtering method which only needs a few easy-to-set integer and Boolean parameters. Within the proposed approach, a LiDAR point cloud is inverted, and then a rigid cloth is used to cover the inverted surface. By analyzing the interactions between the cloth nodes and the corresponding LiDAR points, the locations of the cloth nodes can be determined to generate an approximation of the ground surface. Finally, the ground points can be extracted from the LiDAR point cloud by comparing the original LiDAR points and the generated surface. Benchmark datasets provided by ISPRS (International Society for Photogrammetry and Remote Sensing) working Group III/3 are used to validate the proposed filtering method, and the experimental results yield an average total error of 4.58%, which is comparable with most of the state-of-the-art filtering algorithms. The proposed easy-to-use filtering method may help the users without much experience to use LiDAR data and related technology in their own applications more easily.",
"title": ""
},
{
"docid": "d19503f965e637089d9fa200329f1349",
"text": "Almost a half century ago, regular endurance exercise was shown to improve the capacity of skeletal muscle to oxidize substrates to produce ATP for muscle work. Since then, adaptations in skeletal muscle mRNA level were shown to happen with a single bout of exercise. Protein changes occur within days if daily endurance exercise continues. Some of the mRNA and protein changes cause increases in mitochondrial concentrations. One mitochondrial adaptation that occurs is an increase in fatty acid oxidation at a given absolute, submaximal workload. Mechanisms have been described as to how endurance training increases mitochondria. Importantly, Pgc-1α is a master regulator of mitochondrial biogenesis by increasing many mitochondrial proteins. However, not all adaptations to endurance training are associated with increased mitochondrial concentrations. Recent evidence suggests that the energetic demands of muscle contraction are by themselves stronger controllers of body weight and glucose control than is muscle mitochondrial content. Endurance exercise has also been shown to regulate the processes of mitochondrial fusion and fission. Mitophagy removes damaged mitochondria, a process that maintains mitochondrial quality. Skeletal muscle fibers are composed of different phenotypes, which are based on concentrations of mitochondria and various myosin heavy chain protein isoforms. Endurance training at physiological levels increases type IIa fiber type with increased mitochondria and type IIa myosin heavy chain. Endurance training also improves capacity of skeletal muscle blood flow. Endurance athletes possess enlarged arteries, which may also exhibit decreased wall thickness. VEGF is required for endurance training-induced increases in capillary-muscle fiber ratio and capillary density.",
"title": ""
},
{
"docid": "fed52ce31aa0011f0ccb5392ded78979",
"text": "BACKGROUND\nEconomy, velocity/power at maximal oxygen uptake ([Formula: see text]) and endurance-specific muscle power tests (i.e. maximal anaerobic running velocity; vMART), are now thought to be the best performance predictors in elite endurance athletes. In addition to cardiovascular function, these key performance indicators are believed to be partly dictated by the neuromuscular system. One technique to improve neuromuscular efficiency in athletes is through strength training.\n\n\nOBJECTIVE\nThe aim of this systematic review was to search the body of scientific literature for original research investigating the effect of strength training on performance indicators in well-trained endurance athletes-specifically economy, [Formula: see text] and muscle power (vMART).\n\n\nMETHODS\nA search was performed using the MEDLINE, PubMed, ScienceDirect, SPORTDiscus and Web of Science search engines. Twenty-six studies met the inclusion criteria (athletes had to be trained endurance athletes with ≥6 months endurance training, training ≥6 h per week OR [Formula: see text] ≥50 mL/min/kg, the strength interventions had to be ≥5 weeks in duration, and control groups used). All studies were reviewed using the PEDro scale.\n\n\nRESULTS\nThe results showed that strength training improved time-trial performance, economy, [Formula: see text] and vMART in competitive endurance athletes.\n\n\nCONCLUSION\nThe present research available supports the addition of strength training in an endurance athlete's programme for improved economy, [Formula: see text], muscle power and performance. However, it is evident that further research is needed. Future investigations should include valid strength assessments (i.e. squats, jump squats, drop jumps) through a range of velocities (maximal-strength ↔ strength-speed ↔ speed-strength ↔ reactive-strength), and administer appropriate strength programmes (exercise, load and velocity prescription) over a long-term intervention period (>6 months) for optimal transfer to performance.",
"title": ""
},
{
"docid": "8c596d99bb1ba18f2fb444583c255d90",
"text": "FFT literature has been mostly concerned with minimizing the number of floating-point operations performed by an algorithm. Unfortunately, on present-day microprocessors this measure is far less important than it used to be, and interactions with the processor pipeline and the memory hierarchy have a larger impact on performance. Consequently, one must know the details of a computer architecture in order to design a fast algorithm. In this paper, we propose an adaptive FFT program that tunes the computation automatically for any particular hardware. We compared our program, called FFTW, with over 40 implementations of the FFT on 7 machines. Our tests show that FFTW’s self-optimizing approach usually yields significantly better performance than all other publicly available software. FFTW also compares favorably with machine-specific, vendor-optimized libraries.",
"title": ""
},
{
"docid": "cbcdc411e22786dcc1b3655c5e917fae",
"text": "Local intracellular Ca(2+) transients, termed Ca(2+) sparks, are caused by the coordinated opening of a cluster of ryanodine-sensitive Ca(2+) release channels in the sarcoplasmic reticulum of smooth muscle cells. Ca(2+) sparks are activated by Ca(2+) entry through dihydropyridine-sensitive voltage-dependent Ca(2+) channels, although the precise mechanisms of communication of Ca(2+) entry to Ca(2+) spark activation are not clear in smooth muscle. Ca(2+) sparks act as a positive-feedback element to increase smooth muscle contractility, directly by contributing to the global cytoplasmic Ca(2+) concentration ([Ca(2+)]) and indirectly by increasing Ca(2+) entry through membrane potential depolarization, caused by activation of Ca(2+) spark-activated Cl(-) channels. Ca(2+) sparks also have a profound negative-feedback effect on contractility by decreasing Ca(2+) entry through membrane potential hyperpolarization, caused by activation of large-conductance, Ca(2+)-sensitive K(+) channels. In this review, the roles of Ca(2+) sparks in positive- and negative-feedback regulation of smooth muscle function are explored. We also propose that frequency and amplitude modulation of Ca(2+) sparks by contractile and relaxant agents is an important mechanism to regulate smooth muscle function.",
"title": ""
},
{
"docid": "c3c15cc4edc816e53d1a8c19472ad203",
"text": "Among different Business Process Management strategies and methodologies, one common feature is to capture existing processes and representing the new processes adequately. Business Process Modelling (BPM) plays a crucial role on such an effort. This paper proposes a “to-be” inbound logistics business processes model using BPMN 2.0 standard specifying the structure and behaviour of the system within the SME environment. The generic framework of inbound logistics model consists of one main high-level module-based system named Order System comprising of four main sub-systems of the Order core, Procure, Auction, and Purchase systems. The system modelingis elaborately discussed to provide a business analytical perspective from various activities in inbound logistics system. Since the main purpose of the paper is to map out the functionality and behaviour of Logistics system requirements, employing the model is of a great necessity on the future applications at system development such as in the data modelling effort. Moreover, employing BPMN 2.0 method and providing explanatory techniques as a nifty guideline and framework to assist the business process practitioners, analysts and managers at identical systems.",
"title": ""
},
{
"docid": "69b1c87a06b1d83fd00d9764cdadc2e9",
"text": "Sarcos Research Corporation, and the Center for Engineering Design at the University of Utah, have long been interested in both the fundamental and the applied aspects of robots and other computationally driven machines. We have produced substantial numbers of systems that function as products for commercial applications, and as advanced research tools specifically designed for experimental",
"title": ""
},
{
"docid": "9edd6f8e6349689b71a351f5947497f7",
"text": "Convolutional Neural Networks (CNNs) have been applied to visual tracking with demonstrated success in recent years. Most CNN-based trackers utilize hierarchical features extracted from a certain layer to represent the target. However, features from a certain layer are not always effective for distinguishing the target object from the backgrounds especially in the presence of complicated interfering factors (e.g., heavy occlusion, background clutter, illumination variation, and shape deformation). In this work, we propose a CNN-based tracking algorithm which hedges deep features from different CNN layers to better distinguish target objects and background clutters. Correlation filters are applied to feature maps of each CNN layer to construct a weak tracker, and all weak trackers are hedged into a strong one. For robust visual tracking, we propose a hedge method to adaptively determine weights of weak classifiers by considering both the difference between the historical as well as instantaneous performance, and the difference among all weak trackers over time. In addition, we design a siamese network to define the loss of each weak tracker for the proposed hedge method. Extensive experiments on large benchmark datasets demonstrate the effectiveness of the proposed algorithm against the state-of-the-art tracking methods.",
"title": ""
},
{
"docid": "887a80309231e055fd46b9341a4ab83b",
"text": "This paper presents radar cross section (RCS) measurement for pedestrian detection in 79GHz-band radar system. For a human standing at 6.2 meters, the RCS distribution's median value is -11.1 dBsm and the 90 % of RCS fluctuation is between -20.7 dBsm and -4.8 dBsm. Other measurement results (human body poses beside front) are shown. And we calculated the coefficient values of the Weibull distribution fitting to the human body RCS distribution.",
"title": ""
},
{
"docid": "07e93064b1971a32b5c85b251f207348",
"text": "With the growing demand on automotive electronics for the advanced driver assistance systems and autonomous driving, the functional safety becomes one of the most important issues in the hardware development. Thus, the safety standard for automotive E/E system, ISO-26262, becomes state-of-the-art guideline to ensure that the required safety level can be achieved. In this study, we base on ISO-26262 to develop a FMEDA-based fault injection and data analysis framework. The main contribution of this study is to effectively reduce the effort for generating FMEDA report which is used to evaluate hardware's safety level based on ISO-26262 standard.",
"title": ""
},
{
"docid": "adf3678a3f1fcd5db580a417194239f2",
"text": "In training deep neural networks for semantic segmentation, the main limiting factor is the low amount of ground truth annotation data that is available in currently existing datasets. The limited availability of such data is due to the time cost and human effort required to accurately and consistently label real images on a pixel level. Modern sandbox video game engines provide open world environments where traffic and pedestrians behave in a pseudo-realistic manner. This caters well to the collection of a believable road-scene dataset. Utilizing open-source tools and resources found in single-player modding communities, we provide a method for persistent, ground truth, asset annotation of a game world. By collecting a synthetic dataset containing upwards of 1, 000, 000 images, we demonstrate realtime, on-demand, ground truth data annotation capability of our method. Supplementing this synthetic data to Cityscapes dataset, we show that our data generation method provides qualitative as well as quantitative improvements—for training networks—over previous methods that use video games as surrogate.",
"title": ""
},
{
"docid": "d3e8dce306eb20a31ac6b686364d0415",
"text": "Lung diseases are the deadliest disease in the world. The computer aided detection system in lung diseases needed accurate lung segmentation to preplan the pulmonary treatment and surgeries. The researchers undergone the lung segmentation need a deep study and understanding of the traditional and recent papers developed in the lung segmentation field so that they can continue their research journey in an efficient way with successful outcomes. The need of reviewing the research papers is now a most wanted one for researches so this paper makes a survey on recent trends of pulmonary lung segmentation. Seven recent papers are carried out to analyze the performance characterization of themselves. The working methods, purpose for development, name of algorithm and drawbacks of the method are taken into consideration for the survey work. The tables and charts are drawn based on the reviewed papers. The study of lung segmentation research is more helpful to new and fresh researchers who are committed their research in lung segmentation.",
"title": ""
},
{
"docid": "b1845c42902075de02c803e77345a30f",
"text": "Unsupervised representation learning algorithms such as word2vec and ELMo improve the accuracy of many supervised NLP models, mainly because they can take advantage of large amounts of unlabeled text. However, the supervised models only learn from taskspecific labeled data during the main training phase. We therefore propose Cross-View Training (CVT), a semi-supervised learning algorithm that improves the representations of a Bi-LSTM sentence encoder using a mix of labeled and unlabeled data. On labeled examples, standard supervised learning is used. On unlabeled examples, CVT teaches auxiliary prediction modules that see restricted views of the input (e.g., only part of a sentence) to match the predictions of the full model seeing the whole input. Since the auxiliary modules and the full model share intermediate representations, this in turn improves the full model. Moreover, we show that CVT is particularly effective when combined with multitask learning. We evaluate CVT on five sequence tagging tasks, machine translation, and dependency parsing, achieving state-of-the-art results.1",
"title": ""
},
{
"docid": "5b67f07b5ce37c0dd1bb9be1af6c6005",
"text": "Anomaly detection is the identification of items or observations which deviate from an expected pattern in a dataset. This paper proposes a novel real time anomaly detection framework for dynamic resource scheduling of a VMware-based cloud data center. The framework monitors VMware performance stream data (e.g. CPU load, memory usage, etc.). Hence, the framework continuously needs to collect data and make decision without any delay. We have used Apache Storm, distributed framework for handling performance stream data and making prediction without any delay. Storm is chosen over a traditional distributed framework (e.g., Hadoop and MapReduce, Mahout) that is good for batch processing. An incremental clustering algorithm to model benign characteristics is incorporated in our storm-based framework. During continuous incoming test stream, if the model finds data deviated from its benign behavior, it considers that as an anomaly. We have shown effectiveness of our framework by providing real-time complex analytic functionality over stream data.",
"title": ""
},
{
"docid": "955882547c8d7d455f3d0a6c2bccd2b4",
"text": "Recently there has been quite a number of independent research activities that investigate the potentialities of integrating social networking concepts into Internet of Things (IoT) solutions. The resulting paradigm, named Social Internet of Things (SIoT), has the potential to support novel applications and networking services for the IoT in more effective and efficient ways. In this context, the main contributions of this paper are the following: i) we identify appropriate policies for the establishment and the management of social relationships between objects in such a way that the resulting social network is navigable; ii) we describe a possible architecture for the IoT that includes the functionalities required to integrate things into a social network; iii) we analyze the characteristics of the SIoT network structure by means of simulations.",
"title": ""
},
{
"docid": "3567ec67dc263a6585e8d3af62b1d9f1",
"text": "SemStim is a graph-based recommendation algorithm which is based on Spreading Activation and adds targeted activation and duration constraints. SemStim is not affected by data sparsity, the cold-start problem or data quality issues beyond the linking of items to DBpedia. The overall results show that the performance of SemStim for the diversity task of the challenge is comparable to the other participants, as it took 3rd place out of 12 participants with 0.0413 F1@20 and 0.476 ILD@20. In addition, as SemStim has been designed for the requirements of cross-domain recommendations with different target and source domains, this shows that SemStim can also provide competitive single-domain recommendations.",
"title": ""
}
] | scidocsrr |
a4083eef0dba8b7853624cc18373d1e8 | A cloud robot system using the dexterity network and berkeley robotics and automation as a service (Brass) | [
{
"docid": "1eca0e6a170470a483dc25196e6cca63",
"text": "Benchmarks for Cloud Robotics",
"title": ""
}
] | [
{
"docid": "fec4b030280f228c2568c4a5eccbac28",
"text": "Distillation columns with a high-purity product (down to 7 ppm) have been studied. A steady state m odel is developed using a commercial process simulator. The model is validated against industrial data. Based on the mod el, three major optimal operational changes are identified. T hese are, lowering the location of the feed & side draw strea ms, increasing the pressure at the top of the distillat ion column and changing the configuration of the products draw. It is estimated that these three changes will increase th e throughput of each column by ~5%. The validated model is also u ed to quantify the effects on key internal column paramet ers such as the flooding factor, in the event of significant ch anges to product purity and throughput. Keywordshigh-purity distillation columns; steady state model, operating condition optimization",
"title": ""
},
{
"docid": "731df77ded13276e7bdb9f67474f3810",
"text": "Given a graph <i>G</i> = (<i>V,E</i>) and positive integral vertex weights <i>w</i> : <i>V</i> → N, the <i>max-coloring problem</i> seeks to find a proper vertex coloring of <i>G</i> whose color classes <i>C</i><inf>1,</inf> <i>C</i><inf>2,</inf>...,<i>C</i><inf><i>k</i></inf>, minimize Σ<sup><i>k</i></sup><inf><i>i</i> = 1</inf> <i>max</i><inf>ν∈<i>C</i><inf>i</inf></inf><i>w</i>(ν). This problem, restricted to interval graphs, arises whenever there is a need to design dedicated memory managers that provide better performance than the general purpose memory management of the operating system. Specifically, companies have tried to solve this problem in the design of memory managers for wireless protocol stacks such as GPRS or 3G.Though this problem seems similar to the wellknown dynamic storage allocation problem, we point out fundamental differences. We make a connection between max-coloring and on-line graph coloring and use this to devise a simple 2-approximation algorithm for max-coloring on interval graphs. We also show that a simple first-fit strategy, that is a natural choice for this problem, yields a 10-approximation algorithm. We show this result by proving that the first-fit algorithm for on-line coloring an interval graph <i>G</i> uses no more than 10.<i>x</i>(<i>G</i>) colors, significantly improving the bound of 26.<i>x</i>(<i>G</i>) by Kierstead and Qin (<i>Discrete Math.</i>, 144, 1995). We also show that the max-coloring problem is NP-hard.",
"title": ""
},
{
"docid": "417186e59f537a0f6480fc7e05eafb0c",
"text": "Retrieving correct answers for non-factoid queries poses significant challenges for current answer retrieval methods. Methods either involve the laborious task of extracting numerous features or are ineffective for longer answers. We approach the task of non-factoid question answering using deep learning methods without the need of feature extraction. Neural networks are capable of learning complex relations based on relatively simple features which make them a prime candidate for relating non-factoid questions to their answers. In this paper, we show that end to end training with a Bidirectional Long Short Term Memory (BLSTM) network with a rank sensitive loss function results in significant performance improvements over previous approaches without the need for combining additional models.",
"title": ""
},
{
"docid": "55772e55adb83d4fd383ddebcf564a71",
"text": "The generation of multi-functional drug delivery systems, namely solid dosage forms loaded with nano-sized carriers, remains little explored and is still a challenge for formulators. For the first time, the coupling of two important technologies, 3D printing and nanotechnology, to produce innovative solid dosage forms containing drug-loaded nanocapsules was evaluated here. Drug delivery devices were prepared by fused deposition modelling (FDM) from poly(ε-caprolactone) (PCL) and Eudragit® RL100 (ERL) filaments with or without a channelling agent (mannitol). They were soaked in deflazacort-loaded nanocapsules (particle size: 138nm) to produce 3D printed tablets (printlets) loaded with them, as observed by SEM. Drug loading was improved by the presence of the channelling agent and a linear correlation was obtained between the soaking time and the drug loading (r2=0.9739). Moreover, drug release profiles were dependent on the polymeric material of tablets and the presence of the channelling agent. In particular, tablets prepared with a partially hollow core (50% infill) had a higher drug loading (0.27% w/w) and faster drug release rate. This study represents an original approach to convert nanocapsules suspensions into solid dosage forms as well as an efficient 3D printing method to produce novel drug delivery systems, as personalised nanomedicines.",
"title": ""
},
{
"docid": "11747931101b7dd3fed01380396b8fa5",
"text": "Unsupervised word translation from nonparallel inter-lingual corpora has attracted much research interest. Very recently, neural network methods trained with adversarial loss functions achieved high accuracy on this task. Despite the impressive success of the recent techniques, they suffer from the typical drawbacks of generative adversarial models: sensitivity to hyper-parameters, long training time and lack of interpretability. In this paper, we make the observation that two sufficiently similar distributions can be aligned correctly with iterative matching methods. We present a novel method that first aligns the second moment of the word distributions of the two languages and then iteratively refines the alignment. Our simple linear method is able to achieve better or equal performance to recent state-of-theart deep adversarial approaches and typically does a little better than the supervised baseline. Our method is also efficient, easy to parallelize and interpretable.",
"title": ""
},
{
"docid": "773c4a4640d587e58cf80c9371ad20fc",
"text": "Building automation systems are traditionally concerned with the control of heating, ventilation, and air conditioning, as well as lighting and shading, systems. They have their origin in a time where security has been considered as a side issue at best. Nowadays, with the rising desire to integrate security-critical services that were formerly provided by isolated subsystems, security must no longer be neglected. Thus, the development of a comprehensive security concept is of utmost importance. This paper starts with a security threat analysis and identifies the challenges of providing security in the building automation domain. Afterward, the security mechanisms of available standards are thoroughly analyzed. Finally, two approaches that provide both secure communication and secure execution of possibly untrusted control applications are presented.",
"title": ""
},
{
"docid": "c5d2238833ab8332a71b64010f034970",
"text": "Dimensionality Reduction (DR) is a core building block in visualizing multidimensional data. For DR techniques to be useful in exploratory data analysis, they need to be adapted to human needs and domain-specific problems, ideally, interactively, and on-the-fly. Many visual analytics systems have already demonstrated the benefits of tightly integrating DR with interactive visualizations. Nevertheless, a general, structured understanding of this integration is missing. To address this, we systematically studied the visual analytics and visualization literature to investigate how analysts interact with automatic DR techniques. The results reveal seven common interaction scenarios that are amenable to interactive control such as specifying algorithmic constraints, selecting relevant features, or choosing among several DR algorithms. We investigate specific implementations of visual analysis systems integrating DR, and analyze ways that other machine learning methods have been combined with DR. Summarizing the results in a “human in the loop” process model provides a general lens for the evaluation of visual interactive DR systems. We apply the proposed model to study and classify several systems previously described in the literature, and to derive future research opportunities.",
"title": ""
},
{
"docid": "fc63dbad7a3c6769ee1a1df19da6e235",
"text": "For global companies that compete in high-velocity industries, business strategies and initiatives change rapidly, and thus the CIO struggles to keep the IT organization aligned with a moving target. In this paper we report on research-in-progress that focuses on how the CIO attempts to meet this challenge. Specifically, we are conducting case studies to closely examine how toy industry CIOs develop their IT organizations’ assets, competencies, and dynamic capabilities in alignment with their companies’ evolving strategy and business priorities (which constitute the “moving target”). We have chosen to study toy industry CIOs, because their companies compete in a global, high-velocity environment, yet this industry has been largely overlooked by the information systems research community. Early findings reveal that four IT application areas are seen as holding strong promise: supply chain management, knowledge management, data mining, and eCommerce, and that toy CIO’s are attempting to both cope with and capitalize on the current financial crisis by more aggressively pursuing offshore outsourcing than heretofore. We conclude with a discussion of next steps as the study proceeds.",
"title": ""
},
{
"docid": "d3fcda423467ef93f37ef2b7dbe9be13",
"text": "The Java programming language [1,3] from its inception has been publicized as a web programming language. Many programmers have developed simple applications such as games, clocks, news tickers and stock tickers in order to create informative, innovative web sites. However, it is important to note that the Java programming language possesses much more capability. The language components and constructs originally designed to enhance the functionality of Java as a web-based programming language can be utilized in a broader extent. Java provides a developer with the tools allowing for the creation of innovative network, database, and Graphical User Interface (GUI) applications. In fact, Java and its associated technologies such as JDBC API [11,5], JDBC drivers [2,12], threading [10], and AWT provide the programmer with the much-needed assistance for the development of platform-independent database-independent interfaces. Thus, it is possible to build a graphical database interface capable of connecting and querying distributed databases [13,14]. Here are components that are important for building the database interface we have in mind.",
"title": ""
},
{
"docid": "5ee21318b1601a1d42162273a7c9026c",
"text": "We used a knock-in strategy to generate two lines of mice expressing Cre recombinase under the transcriptional control of the dopamine transporter promoter (DAT-cre mice) or the serotonin transporter promoter (SERT-cre mice). In DAT-cre mice, immunocytochemical staining of adult brains for the dopamine-synthetic enzyme tyrosine hydroxylase and for Cre recombinase revealed that virtually all dopaminergic neurons in the ventral midbrain expressed Cre. Crossing DAT-cre mice with ROSA26-stop-lacZ or ROSA26-stop-YFP reporter mice revealed a near perfect correlation between staining for tyrosine hydroxylase and beta-galactosidase or YFP. YFP-labeled fluorescent dopaminergic neurons could be readily identified in live slices. Crossing SERT-cre mice with the ROSA26-stop-lacZ or ROSA26-stop-YFP reporter mice similarly revealed a near perfect correlation between staining for serotonin-synthetic enzyme tryptophan hydroxylase and beta-galactosidase or YFP. Additional Cre expression in the thalamus and cortex was observed, reflecting the known pattern of transient SERT expression during early postnatal development. These findings suggest a general strategy of using neurotransmitter transporter promoters to drive selective Cre expression and thus control mutations in specific neurotransmitter systems. Crossed with fluorescent-gene reporters, this strategy tags neurons by neurotransmitter status, providing new tools for electrophysiology and imaging.",
"title": ""
},
{
"docid": "6379e89db7d9063569a342ef2056307a",
"text": "Grounded Theory is a research method that generates theory from data and is useful for understanding how people resolve problems that are of concern to them. Although the method looks deceptively simple in concept, implementing Grounded Theory research can often be confusing in practice. Furthermore, despite many papers in the social science disciplines and nursing describing the use of Grounded Theory, there are very few examples and relevant guides for the software engineering researcher. This paper describes our experience using classical (i.e., Glaserian) Grounded Theory in a software engineering context and attempts to interpret the canons of classical Grounded Theory in a manner that is relevant to software engineers. We provide model to help the software engineering researchers interpret the often fuzzy definitions found in Grounded Theory texts and share our experience and lessons learned during our research. We summarize these lessons learned in a set of fifteen guidelines.",
"title": ""
},
{
"docid": "9df0df8eb4f71d8c6952e07a179b2ec4",
"text": "In interpersonal interactions, speech and body gesture channels are internally coordinated towards conveying communicative intentions. The speech-gesture relationship is influenced by the internal emotion state underlying the communication. In this paper, we focus on uncovering the emotional effect on the interrelation between speech and body gestures. We investigate acoustic features describing speech prosody (pitch and energy) and vocal tract configuration (MFCCs), as well as three types of body gestures, viz., head motion, lower and upper body motions. We employ mutual information to measure the coordination between the two communicative channels, and analyze the quantified speech-gesture link with respect to distinct levels of emotion attributes, i.e., activation and valence. The results reveal that the speech-gesture coupling is generally tighter for low-level activation and high-level valence, compared to high-level activation and low-level valence. We further propose a framework for modeling the dynamics of speech-gesture interaction. Experimental studies suggest that such quantified coupling representations can well discriminate different levels of activation and valence, reinforcing that emotions are encoded in the dynamics of the multimodal link. We also verify that the structures of the coupling representations are emotiondependent using subspace-based analysis.",
"title": ""
},
{
"docid": "5010761051983f5de1f18a11d477f185",
"text": "Financial forecasting has been challenging problem due to its high non-linearity and high volatility. An Artificial Neural Network (ANN) can model flexible linear or non-linear relationship among variables. ANN can be configured to produce desired set of output based on set of given input. In this paper we attempt at analyzing the usefulness of artificial neural network for forecasting financial data series with use of different algorithms such as backpropagation, radial basis function etc. With their ability of adapting non-linear and chaotic patterns, ANN is the current technique being used which offers the ability of predicting financial data more accurately. \"A x-y-1 network topology is adopted because of x input variables in which variable y was determined by the number of hidden neurons during network selection with single output.\" Both x and y were changed.",
"title": ""
},
{
"docid": "05f941acd4b2bd1188c7396d7edbd684",
"text": "A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process of assessing and gaining confidence in the resilience of a consensus protocols exposed to faults and adversarial nodes. We advocate to follow the established practice in cryptography and computer security, relying on public reviews, detailed models, and formal proofs; the designers of several practical systems appear to be unaware of this. Moreover, we review the consensus protocols in some prominent permissioned blockchain platforms with respect to their fault models and resilience against attacks. 1998 ACM Subject Classification C.2.4 Distributed Systems, D.1.3 Concurrent Programming",
"title": ""
},
{
"docid": "d5941d8af75741a9ee3a1e49eb3177ea",
"text": "The description of sphero-cylinder lenses is approached from the viewpoint of Fourier analysis of the power profile. It is shown that the familiar sine-squared law leads naturally to a Fourier series representation with exactly three Fourier coefficients, representing the natural parameters of a thin lens. The constant term corresponds to the mean spherical equivalent (MSE) power, whereas the amplitude and phase of the harmonic correspond to the power and axis of a Jackson cross-cylinder (JCC) lens, respectively. Expressing the Fourier series in rectangular form leads to the representation of an arbitrary sphero-cylinder lens as the sum of a spherical lens and two cross-cylinders, one at axis 0 degree and the other at axis 45 degrees. The power of these three component lenses may be interpreted as (x,y,z) coordinates of a vector representation of the power profile. Advantages of this power vector representation of a sphero-cylinder lens for numerical and graphical analysis of optometric data are described for problems involving lens combinations, comparison of different lenses, and the statistical distribution of refractive errors.",
"title": ""
},
{
"docid": "2b8311fa53968e7d7b6db90d81c35d4e",
"text": "Maintaining healthy blood glucose concentration levels is advantageous for the prevention of diabetes and obesity. Present day technologies limit such monitoring to patients who already have diabetes. The purpose of this project is to suggest a non-invasive method for measuring blood glucose concentration levels. Such a method would provide useful for even people without illness, addressing preventive care. This project implements near-infrared light of wavelengths 1450nm and 2050nm through the use of light emitting diodes and measures transmittance through solutions of distilled water and d-glucose of concentrations 50mg/dL, 100mg/dL, 150mg/dL, and 200mg/dL by using an InGaAs photodiode. Regression analysis is done. Transmittance results were observed when using near-infrared light of wavelength 1450nm. As glucose concentration increases, output voltage from the photodiode also increases. The relation observed was linear. No significant transmittance results were obtained with the use of 2050nm infrared light due to high absorbance and low power. The use of 1450nm infrared light provides a means of measuring glucose concentration levels.",
"title": ""
},
{
"docid": "5bb390a0c9e95e0691ac4ba07b5eeb9d",
"text": "Clearing the clouds away from the true potential and obstacles posed by this computing capability.",
"title": ""
},
{
"docid": "4142b1fc9e37ffadc6950105c3d99749",
"text": "Just-noticeable distortion (JND), which refers to the maximum distortion that the human visual system (HVS) cannot perceive, plays an important role in perceptual image and video processing. In comparison with JND estimation for images, estimation of the JND profile for video needs to take into account the temporal HVS properties in addition to the spatial properties. In this paper, we develop a spatio-temporal model estimating JND in the discrete cosine transform domain. The proposed model incorporates the spatio-temporal contrast sensitivity function, the influence of eye movements, luminance adaptation, and contrast masking to be more consistent with human perception. It is capable of yielding JNDs for both still images and video with significant motion. The experiments conducted in this study have demonstrated that the JND values estimated for video sequences with moving objects by the model are in line with the HVS perception. The accurate JND estimation of the video towards the actual visibility bounds can be translated into resource savings (e.g., for bandwidth/storage or computation) and performance improvement in video coding and other visual processing tasks (such as perceptual quality evaluation, visual signal restoration/enhancement, watermarking, authentication, and error protection)",
"title": ""
},
{
"docid": "1b1dc71cd5ae84c2ae27a1c36f638073",
"text": "Despite a prevalent industry perception to the contrary, the agile practices of Test-Driven Development and Continuous Integration can be successfully applied to embedded software. We present here a holistic set of practices, platform independent tools, and a new design pattern (Model Conductor Hardware MCH) that together produce: good design from tests programmed first, logic decoupled from hardware, and systems testable under automation. Ultimately, this approach yields an order of magnitude or more reduction in software flaws, predictable progress, and measurable velocity for data-driven project management. We use the approach discussed herein for real-world production systems and have included a full C-based sample project (using an Atmel AT91SAM7X ARM7) to illustrate it. This example demonstrates transforming requirements into test code, system, integration, and unit tests driving development, daily “micro design” fleshing out a system’s architecture, the use of the MCH itself, and the use of mock functions in tests.",
"title": ""
},
{
"docid": "22951590c72e3f7a7c913ab8956dc06a",
"text": "In the precursor paper, a many-objective optimization method (NSGA-III), based on the NSGA-II framework, was suggested and applied to a number of unconstrained test and practical problems with box constraints alone. In this paper, we extend NSGA-III to solve generic constrained many-objective optimization problems. In the process, we also suggest three types of constrained test problems that are scalable to any number of objectives and provide different types of challenges to a many-objective optimizer. A previously suggested MOEA/D algorithm is also extended to solve constrained problems. Results using constrained NSGA-III and constrained MOEA/D show an edge of the former, particularly in solving problems with a large number of objectives. Furthermore, the NSGA-III algorithm is made adaptive in updating and including new reference points on the fly. The resulting adaptive NSGA-III is shown to provide a denser representation of the Pareto-optimal front, compared to the original NSGA-III with an identical computational effort. This, and the original NSGA-III paper, together suggest and amply test a viable evolutionary many-objective optimization algorithm for handling constrained and unconstrained problems. These studies should encourage researchers to use and pay further attention in evolutionary many-objective optimization.",
"title": ""
}
] | scidocsrr |
920b475e55e68a6aadf7289885d0ee8f | Boosting for transfer learning with multiple sources | [
{
"docid": "3bb905351ce1ea2150f37059ed256a90",
"text": "A major assumption in many machine learning and data mining algorithms is that the training and future data must be in the same feature space and have the same distribution. However, in many real-world applications, this assumption may not hold. For example, we sometimes have a classification task in one domain of interest, but we only have sufficient training data in another domain of interest, where the latter data may be in a different feature space or follow a different data distribution. In such cases, knowledge transfer, if done successfully, would greatly improve the performance of learning by avoiding much expensive data-labeling efforts. In recent years, transfer learning has emerged as a new learning framework to address this problem. This survey focuses on categorizing and reviewing the current progress on transfer learning for classification, regression, and clustering problems. In this survey, we discuss the relationship between transfer learning and other related machine learning techniques such as domain adaptation, multitask learning and sample selection bias, as well as covariate shift. We also explore some potential future issues in transfer learning research.",
"title": ""
},
{
"docid": "794c597a786486ac4d91d861d89eb242",
"text": "Human learners appear to have inherent ways to transfer knowledge between tasks. That is, we recognize and apply relevant knowledge from previous learning experiences when we encounter new tasks. The more related a new task is to our previous experience, the more easily we can master it. Common machine learning algorithms, in contrast, traditionally address isolated tasks. Transfer learning attempts to improve on traditional machine learning by transferring knowledge learned in one or more source tasks and using it to improve learning in a related target task (see Figure 1). Techniques that enable knowledge transfer represent progress towards making machine learning as efficient as human learning. This chapter provides an introduction to the goals, settings, and challenges of transfer learning. It surveys current research in this area, giving an overview of the state of the art and outlining the open problems. ABStrAct",
"title": ""
},
{
"docid": "418a5ef9f06f8ba38e63536671d605c1",
"text": "Learning visual models of object categories notoriously requires hundreds or thousands of training examples. We show that it is possible to learn much information about a category from just one, or a handful, of images. The key insight is that, rather than learning from scratch, one can take advantage of knowledge coming from previously learned categories, no matter how different these categories might be. We explore a Bayesian implementation of this idea. Object categories are represented by probabilistic models. Prior knowledge is represented as a probability density function on the parameters of these models. The posterior model for an object category is obtained by updating the prior in the light of one or more observations. We test a simple implementation of our algorithm on a database of 101 diverse object categories. We compare category models learned by an implementation of our Bayesian approach to models learned from by maximum likelihood (ML) and maximum a posteriori (MAP) methods. We find that on a database of more than 100 categories, the Bayesian approach produces informative models when the number of training examples is too small for other methods to operate successfully.",
"title": ""
}
] | [
{
"docid": "5c0994fab71ea871fad6915c58385572",
"text": "We present FaceWarehouse, a database of 3D facial expressions for visual computing applications. We use Kinect, an off-the-shelf RGBD camera, to capture 150 individuals aged 7-80 from various ethnic backgrounds. For each person, we captured the RGBD data of her different expressions, including the neutral expression and 19 other expressions such as mouth-opening, smile, kiss, etc. For every RGBD raw data record, a set of facial feature points on the color image such as eye corners, mouth contour, and the nose tip are automatically localized, and manually adjusted if better accuracy is required. We then deform a template facial mesh to fit the depth data as closely as possible while matching the feature points on the color image to their corresponding points on the mesh. Starting from these fitted face meshes, we construct a set of individual-specific expression blendshapes for each person. These meshes with consistent topology are assembled as a rank-3 tensor to build a bilinear face model with two attributes: identity and expression. Compared with previous 3D facial databases, for every person in our database, there is a much richer matching collection of expressions, enabling depiction of most human facial actions. We demonstrate the potential of FaceWarehouse for visual computing with four applications: facial image manipulation, face component transfer, real-time performance-based facial image animation, and facial animation retargeting from video to image.",
"title": ""
},
{
"docid": "61a2b0e51b27f46124a8042d59c0f022",
"text": "We address the highly challenging problem of real-time 3D hand tracking based on a monocular RGB-only sequence. Our tracking method combines a convolutional neural network with a kinematic 3D hand model, such that it generalizes well to unseen data, is robust to occlusions and varying camera viewpoints, and leads to anatomically plausible as well as temporally smooth hand motions. For training our CNN we propose a novel approach for the synthetic generation of training data that is based on a geometrically consistent image-to-image translation network. To be more specific, we use a neural network that translates synthetic images to \"real\" images, such that the so-generated images follow the same statistical distribution as real-world hand images. For training this translation network we combine an adversarial loss and a cycle-consistency loss with a geometric consistency loss in order to preserve geometric properties (such as hand pose) during translation. We demonstrate that our hand tracking system outperforms the current state-of-the-art on challenging RGB-only footage.",
"title": ""
},
{
"docid": "a48ada0e9d835f26a484d90c62ffc4cf",
"text": "Plastics have become an important part of modern life and are used in different sectors of applications like packaging, building materials, consumer products and much more. Each year about 100 million tons of plastics are produced worldwide. Demand for plastics in India reached about 4.3 million tons in the year 2001-02 and would increase to about 8 million tons in the year 2006-07. Degradation is defined as reduction in the molecular weight of the polymer. The Degradation types are (a).Chain end degradation/de-polymerization (b).Random degradation/reverse of the poly condensation process. Biodegradation is defined as reduction in the molecular weight by naturally occurring microorganisms such as bacteria, fungi, and actinomycetes. That is involved in the degradation of both natural and synthetic plastics. Examples of Standard Testing for Polymer Biodegradability in Various Environments. ASTM D5338: Standard Test Method for Determining the Aerobic Biodegradation of Plastic Materials under Controlled Composting Conditions, ASTM D5210: Standard Test Method for Determining the Anaerobic Biodegradation of Plastic Materials in the Presence of Municipal Sewage Sludge, ASTM D5526: Standard Test Method for Determining Anaerobic Biodegradation of Plastic Materials under Accelerated Landfill Conditions, ASTM D5437: Standard Practice for Weathering of Plastics under Marine Floating Exposure. Plastics are biodegraded, (1).In wild nature by aerobic conditions CO2, water are produced,(2).In sediments & landfills by anaerobic conditions CO2, water, methane are produced, (3).In composts and soil by partial aerobic & anaerobic conditions. This review looks at the technological advancement made in the development of more easily biodegradable plastics and the biodegradation of conventional plastics by microorganisms. Additives, such as pro-oxidants and starch, are applied in synthetic materials to modify and make plastics biodegradable. Reviewing published and ongoing studies on plastic biodegradation, this paper attempts to make conclusions on potentially viable methods to reduce impacts of plastic waste on the",
"title": ""
},
{
"docid": "6ccd0d743360b18365210456c56efc19",
"text": "Falls are leading cause of injury and death for elderly people. T herefore it is necessary to design a proper fall prevention system to prevent falls at old age The use of MEMS sensor drastically reduces the size of the system which enables the module to be developed as a wearable suite. A special alert notification regarding the fall is activated using twitter. The state of the person can be viewed every 30sec and is well suited for monitoring aged persons. On a typical fall motion the device releases the compressed air module which is to be designed and alarms the concerned.",
"title": ""
},
{
"docid": "04a8932566311e2e4abacf196b83aadb",
"text": "Remote sensing and Geographic Information System play a pivotal role in environmental mapping, mineral exploration, agriculture, forestry, geology, water, ocean, infrastructure planning and management, disaster mitigation and management etc. Remote Sensing and GIS has grown as a major tool for collecting information on almost every aspect on the earth for last few decades. In the recent years, very high spatial and spectral resolution satellite data are available and the applications have multiplied with respect to various purpose. Remote sensing and GIS has contributed significantly towards developmental activities for the four decades in India. In the present paper, we have discussed the remote sensing and GIS applications of few environmental issues like Mining environment, Urban environment, Coastal and marine environment and Wasteland environment.",
"title": ""
},
{
"docid": "6fb416991c80cb94ad09bc1bb09f81c7",
"text": "Children with Autism Spectrum Disorder often require therapeutic interventions to support engagement in effective social interactions. In this paper, we present the results of a study conducted in three public schools that use an educational and behavioral intervention for the instruction of social skills in changing situational contexts. The results of this study led to the concept of interaction immediacy to help children maintain appropriate spatial boundaries, reply to conversation initiators, disengage appropriately at the end of an interaction, and identify potential communication partners. We describe design principles for Ubicomp technologies to support interaction immediacy and present an example design. The contribution of this work is twofold. First, we present an understanding of social skills in mobile and dynamic contexts. Second, we introduce the concept of interaction immediacy and show its effectiveness as a guiding principle for the design of Ubicomp applications.",
"title": ""
},
{
"docid": "cb5ec5bc55e825289fc8c3251c5b8f92",
"text": "This research presents a review of the psychometric measures on boredom that have been developed over the past 25 years. Specifically, the author examined the Boredom Proneness Scale (BPS; R. Farmer & N. D. Sundberg, 1986), the job boredom scales by E. A. Grubb (1975) and T. W. Lee (1986), a boredom coping measure (J. A. Hamilton, R. J. Haier, & M. S. Buchsbaum, 1984), 2 scales that assess leisure and free-time boredom (S. E. Iso-Ahola & E. Weissinger, 1990; M. G. Ragheb & S. P. Merydith, 2001), the Sexual Boredom Scale (SBS; J. D. Watt & J. E. Ewing, 1996), and the Boredom Susceptibility (BS) subscale of the Sensation Seeking Scale (M. Zuckerman, 1979a). Particular attention is devoted to discussing the literature regarding the psychometric properties of the BPS because it is the only full-scale measure on the construct of boredom.",
"title": ""
},
{
"docid": "ac6fa78301c58ba516e22ac17b908c98",
"text": "Human facial expressions change with different states of health; therefore, a facial-expression recognition system can be beneficial to a healthcare framework. In this paper, a facial-expression recognition system is proposed to improve the service of the healthcare in a smart city. The proposed system applies a bandlet transform to a face image to extract sub-bands. Then, a weighted, center-symmetric local binary pattern is applied to each sub-band block by block. The CS-LBP histograms of the blocks are concatenated to produce a feature vector of the face image. An optional feature-selection technique selects the most dominant features, which are then fed into two classifiers: a Gaussian mixture model and a support vector machine. The scores of these classifiers are fused by weight to produce a confidence score, which is used to make decisions about the facial expression’s type. Several experiments are performed using a large set of data to validate the proposed system. Experimental results show that the proposed system can recognize facial expressions with 99.95% accuracy.",
"title": ""
},
{
"docid": "f2e2a19506651498eea81c984e8c61d7",
"text": "MicroRNAs (miRNA) are crucial post-transcriptional regulators of gene expression and control cell differentiation and proliferation. However, little is known about their targeting of specific developmental pathways. Hedgehog (Hh) signalling controls cerebellar granule cell progenitor development and a subversion of this pathway leads to neoplastic transformation into medulloblastoma (MB). Using a miRNA high-throughput profile screening, we identify here a downregulated miRNA signature in human MBs with high Hh signalling. Specifically, we identify miR-125b and miR-326 as suppressors of the pathway activator Smoothened together with miR-324-5p, which also targets the downstream transcription factor Gli1. Downregulation of these miRNAs allows high levels of Hh-dependent gene expression leading to tumour cell proliferation. Interestingly, the downregulation of miR-324-5p is genetically determined by MB-associated deletion of chromosome 17p. We also report that whereas miRNA expression is downregulated in cerebellar neuronal progenitors, it increases alongside differentiation, thereby allowing cell maturation and growth inhibition. These findings identify a novel regulatory circuitry of the Hh signalling and suggest that misregulation of specific miRNAs, leading to its aberrant activation, sustain cancer development.",
"title": ""
},
{
"docid": "d06cb1f4699757d95a00014e340f927f",
"text": "Because of appearance variations, training samples of the tracked targets collected by the online tracker are required for updating the tracking model. However, this often leads to tracking drift problem because of potentially corrupted samples: 1) contaminated/outlier samples resulting from large variations (e.g. occlusion, illumination), and 2) misaligned samples caused by tracking inaccuracy. Therefore, in order to reduce the tracking drift while maintaining the adaptability of a visual tracker, how to alleviate these two issues via an effective model learning (updating) strategy is a key problem to be solved. To address these issues, this paper proposes a novel and optimal model learning (updating) scheme which aims to simultaneously eliminate the negative effects from these two issues mentioned above in a unified robust feature template learning framework. Particularly, the proposed feature template learning framework is capable of: 1) adaptively learning uncontaminated feature templates by separating out contaminated samples, and 2) resolving label ambiguities caused by misaligned samples via a probabilistic multiple instance learning (MIL) model. Experiments on challenging video sequences show that the proposed tracker performs favourably against several state-of-the-art trackers.",
"title": ""
},
{
"docid": "d3984f8562288fabf0627b15af4dd64a",
"text": "Volumetric representation has been widely used for 3D deep learning in shape analysis due to its generalization ability and regular data format. However, for fine-grained tasks like part segmentation, volumetric data has not been widely adopted compared to other representations. Aiming at delivering an effective volumetric method for 3D shape part segmentation, this paper proposes a novel volumetric convolutional neural network. Our method can extract discriminative features encoding detailed information from voxelized 3D data under limited resolution. To this purpose, a spatial dense extraction (SDE) module is designed to preserve spatial resolution during feature extraction procedure, alleviating the loss of details caused by sub-sampling operations such as max pooling. An attention feature aggregation (AFA) module is also introduced to adaptively select informative features from different abstraction levels, leading to segmentation with both semantic consistency and high accuracy of details. Experimental results demonstrate that promising results can be achieved by using volumetric data, with part segmentation accuracy comparable or superior to state-of-the-art non-volumetric methods.",
"title": ""
},
{
"docid": "c9e9e00924b215c8c14e3756ea0d1ffc",
"text": "A complex activity is a temporal composition of sub-events, and a sub-event typically consists of several low level micro-actions, such as body movement of different actors. Extracting these micro actions explicitly is beneficial for complex activity recognition due to actor selectivity, higher discriminative power, and motion clutter suppression. Moreover, considering both static and motion features is vital for activity recognition. However, optimally controlling the contribution from static and motion features still remains uninvestigated. In this work, we extract motion features at micro level, preserving the actor identity, to later obtain a high-level motion descriptor using a probabilistic model. Furthermore, we propose two novel schemas for combining static and motion features: Cholesky-transformation based and entropy-based. The former allows to control the contribution ratio precisely, while the latter obtains the optimal ratio mathematically. The ratio given by the entropy based method matches well with the experimental values obtained by the Choleksy transformation based method. This analysis also provides the ability to characterize a dataset, according to its richness in motion information. Finally, we study the effectiveness of modeling the temporal evolution of sub-event using an LSTM network. Experimental results demonstrate that the proposed technique outperforms state-of-the-art, when tested against two popular datasets.",
"title": ""
},
{
"docid": "ad9f00a73306cba20073385c7482ba43",
"text": "We present a novel algorithm for fuzzy segmentation of magnetic resonance imaging (MRI) data and estimation of intensity inhomogeneities using fuzzy logic. MRI intensity inhomogeneities can be attributed to imperfections in the radio-frequency coils or to problems associated with the acquisition sequences. The result is a slowly varying shading artifact over the image that can produce errors with conventional intensity-based classification. Our algorithm is formulated by modifying the objective function of the standard fuzzy c-means (FCM) algorithm to compensate for such inhomogeneities and to allow the labeling of a pixel (voxel) to be influenced by the labels in its immediate neighborhood. The neighborhood effect acts as a regularizer and biases the solution toward piecewise-homogeneous labelings. Such a regularization is useful in segmenting scans corrupted by salt and pepper noise. Experimental results on both synthetic images and MR data are given to demonstrate the effectiveness and efficiency of the proposed algorithm.",
"title": ""
},
{
"docid": "dbbd9f6440ee0c137ee0fb6a4aadba38",
"text": "In local differential privacy (LDP), each user perturbs her data locally before sending the noisy data to a data collector. The latter then analyzes the data to obtain useful statistics. Unlike the setting of centralized differential privacy, in LDP the data collector never gains access to the exact values of sensitive data, which protects not only the privacy of data contributors but also the collector itself against the risk of potential data leakage. Existing LDP solutions in the literature are mostly limited to the case that each user possesses a tuple of numeric or categorical values, and the data collector computes basic statistics such as counts or mean values. To the best of our knowledge, no existing work tackles more complex data mining tasks such as heavy hitter discovery over set-valued data. In this paper, we present a systematic study of heavy hitter mining under LDP. We first review existing solutions, extend them to the heavy hitter estimation, and explain why their effectiveness is limited. We then propose LDPMiner, a two-phase mechanism for obtaining accurate heavy hitters with LDP. The main idea is to first gather a candidate set of heavy hitters using a portion of the privacy budget, and focus the remaining budget on refining the candidate set in a second phase, which is much more efficient budget-wise than obtaining the heavy hitters directly from the whole dataset. We provide both in-depth theoretical analysis and extensive experiments to compare LDPMiner against adaptations of previous solutions. The results show that LDPMiner significantly improves over existing methods. More importantly, LDPMiner successfully identifies the majority true heavy hitters in practical settings.",
"title": ""
},
{
"docid": "173c0124ac81cfe8fa10fbdc20a1a094",
"text": "This paper presents a new approach to compare fuzzy numbers using α-distance. Initially, the metric distance on the interval numbers based on the convex hull of the endpoints is proposed and it is extended to fuzzy numbers. All the properties of the α-distance are proved in details. Finally, the ranking of fuzzy numbers by the α-distance is discussed. In addition, the proposed method is compared with some known ones, the validity of the new method is illustrated by applying its to several group of fuzzy numbers.",
"title": ""
},
{
"docid": "2ff15076533d1065209e0e62776eaa69",
"text": "In less than a decade, Cubesats have evolved from purely educational tools to a standard platform for technology demonstration and scientific instrumentation. The use of COTS (Commercial-Off-The-Shelf) components and the ongoing miniaturization of several technologies have already led to scattered instances of missions with promising scientific value. Furthermore, advantages in terms of development cost and development time with respect to larger satellites, as well as the possibility of launching several dozens of Cubesats with a single rocket launch, have brought forth the potential for radically new mission architectures consisting of very large constellations or clusters of Cubesats. These architectures promise to combine the temporal resolution of GEO missions with the spatial resolution of LEO missions, thus breaking a traditional tradeoff in Earth observation mission design. This paper assesses the current capabilities of Cubesats with respect to potential employment in Earth observation missions. A thorough review of Cubesat bus technology capabilities is performed, identifying potential limitations and their implications on 17 different Earth observation payload technologies. These results are matched to an exhaustive review of scientific requirements in the field of Earth observation, assessing the possibilities of Cubesats to cope with the requirements set for each one of 21 measurement categories. Based on this review, several Earth observation measurements are identified that can potentially be compatible with the current state-of-the-art of Cubesat technology although some of them have actually never been addressed by any Cubesat mission. Simultaneously, other measurements are identified which are unlikely to be performed by Cubesats in the next few years due to insuperable constraints. Ultimately, this paper is intended to supply a box of ideas for universities to design future Cubesat missions with high",
"title": ""
},
{
"docid": "27d1e83593d51b34974eb4080993afc2",
"text": "The use of on-demand techniques in routing protocols for multi-hop wireless ad hoc networks has been shown to have significant advantages in terms of reducing the routing protocol's overhead and improving its ability to react quickly to topology changes in the network. A number of on-demand multicast routing protocols have been proposed, but each also relies on significant periodic (non-on-demand) behavior within portions of the protocol. This paper presents the design and initial evluation of the Adaptive Demand-Driven Multicast Routing protocol (ADMR), a new on-demand ad hoc network multicast routing protocol that attemps to reduce as much as possible any non-on-demand components within the protocol. Multicast routing state is dynamically established and maintained only for active groups and only in nodes located between multicast senders and receivers. Each multicast data packet is forwarded along the shortest-delay path with multicast forwarding state, from the sender to the receivers, and receivers dynamically adapt to the sending pattern of senders in order to efficiently balance overhead and maintenance of the multicast routing state as nodes in the network move or as wireless transmission conditions in the network change. We describe the operation of the ADMR protocol and present an initial evaluation of its performance based on detailed simulation in ad hoc networks of 50 mobile nodes. We show that ADMR achieves packet delivery ratios within 1% of a flooding-based protocol, while incurring half to a quarter of the overhead.",
"title": ""
},
{
"docid": "56c7c065c390d1ed5f454f663289788d",
"text": "This paper presents a novel approach to character identification, that is an entity linking task that maps mentions to characters in dialogues from TV show transcripts. We first augment and correct several cases of annotation errors in an existing corpus so the corpus is clearer and cleaner for statistical learning. We also introduce the agglomerative convolutional neural network that takes groups of features and learns mention and mention-pair embeddings for coreference resolution. We then propose another neural model that employs the embeddings learned and creates cluster embeddings for entity linking. Our coreference resolution model shows comparable results to other state-of-the-art systems. Our entity linking model significantly outperforms the previous work, showing the F1 score of 86.76% and the accuracy of 95.30% for character identification.",
"title": ""
},
{
"docid": "4da2675e6e4af699e6d887dfe0c3ca51",
"text": "Using an original method of case evaluation which involved an analysis panel of over 80 Italian psychologists and included a lay case evaluation, the author has investigated the effectiveness of transactional analysis psychotherapy for a case of mixed anxiety and depression with a 39 year old white British male who attended 14 weekly sessions. CORE-OM (Evans, Mellor-Clark , Margison, Barkham, Audin, Connell and McGrath, 2000), PHQ-9 (Kroenke, Spitzer & Williams, 2001), GAD-7) Spitzer, Kroenke, Williams & Löwe, 2006, Hamilton Rating Scale for Depression (Hamilton, 1980) were used for screening and also for outcome measurement, along with Session Rating Scale (SRS v.3.0) (Duncan, Miller, Sparks, Claud, Reynolds, Brown and Johnson, 2003) and Comparative Psychotherapy Process Scale (CPPS) (Hilsenroth, Blagys, Ackerman, Bonge and Blais, 2005), within an overall adjudicational case study method. The conclusion of the analysis panel and the lay judge was unanimously that this was a good outcome case and that the client’s changes had been as a direct result of therapy. Previous case study research has demonstrated that TA is effective for depression, and this present case provides foundation evidence for the effectiveness of TA for depression with comorbid anxiety.",
"title": ""
},
{
"docid": "e12410e92e3f4c0f9c78bc5988606c93",
"text": "Semiarid environments are known for climate extremes such as high temperatures, low humidity, irregular precipitations, and apparent resource scarcity. We aimed to investigate how a small neotropical primate (Callithrix jacchus; the common marmoset) manages to survive under the harsh conditions that a semiarid environment imposes. The study was carried out in a 400-ha area of Caatinga in the northeast of Brazil. During a 6-month period (3 months of dry season and 3 months of wet season), we collected data on the diet of 19 common marmosets (distributed in five groups) and estimated their behavioral time budget during both the dry and rainy seasons. Resting significantly increased during the dry season, while playing was more frequent during the wet season. No significant differences were detected regarding other behaviors. In relation to the diet, we recorded the consumption of prey items such as insects, spiders, and small vertebrates. We also observed the consumption of plant items, including prickly cladodes, which represents a previously undescribed food item for this species. Cladode exploitation required perceptual and motor skills to safely access the food resource, which is protected by sharp spines. Our findings show that common marmosets can survive under challenging conditions in part because of adjustments in their behavior and in part because of changes in their diet.",
"title": ""
}
] | scidocsrr |
8b8856272d36781748085a4f327f6c51 | Toward Seamless Multiview Scene Analysis From Satellite to Street Level | [
{
"docid": "adc9f2a82ed4bccd2405eaf95d026962",
"text": "Each corner of the inhabited world is imaged from multiple viewpoints with increasing frequency. Online map services like Google Maps or Here Maps provide direct access to huge amounts of densely sampled, georeferenced images from street view and aerial perspective. There is an opportunity to design computer vision systems that will help us search, catalog and monitor public infrastructure, buildings and artifacts. We explore the architecture and feasibility of such a system. The main technical challenge is combining test time information from multiple views of each geographic location (e.g., aerial and street views). We implement two modules: det2geo, which detects the set of locations of objects belonging to a given category, and geo2cat, which computes the fine-grained category of the object at a given location. We introduce a solution that adapts state-of the-art CNN-based object detectors and classifiers. We test our method on \"Pasadena Urban Trees\", a new dataset of 80,000 trees with geographic and species annotations, and show that combining multiple views significantly improves both tree detection and tree species classification, rivaling human performance.",
"title": ""
}
] | [
{
"docid": "51f63ccb338706e59b81cb3dfd36cfc6",
"text": "As the first decentralized cryptocurrency, Bitcoin [1] has ignited much excitement, not only for its novel realization of a central bank-free financial instrument, but also as an alternative approach to classical distributed computing problems, such as reaching agreement distributedly in the presence of misbehaving parties, as well as to numerous other applications-contracts, reputation systems, name services, etc. The soundness and security of these applications, however, hinges on the thorough understanding of the fundamental properties of its underlying blockchain data structure, which parties (\"miners\") maintain and try to extend by generating \"proofs of work\" (POW, aka \"cryptographic puzzle\"). In this talk we follow the approach introduced in [2], formulating such fundamental properties of the blockchain, and then showing how applications such as consensus and a robust public transaction ledger can be built ``on top'' of them. The properties are as follows, assuming the adversary's hashing power (our analysis holds against arbitrary attacks) is strictly less than ½ and high network synchrony:\n Common prefix: The blockchains maintained by the honest parties possess a large common prefix. More specifically, if two honest parties \"prune\" (i.e., cut off) k blocks from the end of their local chains, the probability that the resulting pruned chains will not be mutual prefixes of each other drops exponentially in the that parameter.\n Chain quality: We show a bound on the ratio of blocks in the chain of any honest party contributed by malicious parties. In particular, as the adversary's hashing power approaches ½, we show that blockchains are only guaranteed to have few, but still some, blocks contributed by honest parties.\n Chain growth: We quantify the number of blocks that are added to the blockchain during any given number of rounds during the execution of the protocol. (N.B.: This property, which in [2] was proven and used directly in the form of a lemma, was explicitly introduced in [3]. Identifying it as a separate property enables modular proofs of applications' properties.)\n The above properties hold assuming that all parties-honest and adversarial-\"wake up\" and start computing at the same time, or, alternatively, that they compute on a common random string (the \"genesis\" block) only made available at the exact time when the protocol execution is to begin. In this talk we also consider the question of whether such a trusted setup/behavioral assumption is necessary, answering it in the negative by presenting a Bitcoin-like blockchain protocol that is provably secure without trusted setup, and, further, overcomes such lack in a scalable way-i.e., with running time independent of the number of parties [4].\n A direct consequence of our construction above is that consensus can be solved directly by a blockchain protocol without trusted setup assuming an honest majority (in terms of computational power).",
"title": ""
},
{
"docid": "be64b2dc295c61a2978221b4838e4469",
"text": "In sentiment analysis of product reviews, one important problem is to produce a summary of opinions based on product features/attributes (also called aspects). However, for the same feature, people can express it with many different words or phrases. To produce a useful summary, these words and phrases, which are domain synonyms, need to be grouped under the same feature group. Although several methods have been proposed to extract product features from reviews, limited work has been done on clustering or grouping of synonym features. This paper focuses on this task. Classic methods for solving this problem are based on unsupervised learning using some forms of distributional similarity. However, we found that these methods do not do well. We then model it as a semi-supervised learning problem. Lexical characteristics of the problem are exploited to automatically identify some labeled examples. Empirical evaluation shows that the proposed method outperforms existing state-of-the-art methods by a large margin.",
"title": ""
},
{
"docid": "eb150ae59ceffae1894c8985931ddfc9",
"text": "This paper presents the design and implementation of Constant-Fraction-Discriminators (CFD) suitable for multi-channel mixed-mode ICs. Issues related to area occupation, power consumption and timing accuracy are discussed in detail. The circuits have been designed targeting a 0.13µm CMOS process.",
"title": ""
},
{
"docid": "11c397d0158350bccf741e34c1731a6c",
"text": "The purpose of this study is to evaluate the impact of brand awareness to repurchase intention of customers with trilogy of emotions approach. The study population consisted if all the people in Yazd. As the research sample, 384 people who went to cell phone shopping centers in Yazd province responded to the questionnaire. Cronbach's alpha was used to determine the reliability of the questionnaire, and its values was 0.87. To examine the effects of brand awareness on purchase intention, structural equation modeling and AMOUS and SPSS softwares were used. The results of this study show that consumers cognition does not affect the purchase intention, but the customers’ conation and affection affect the re-purchase intention. In addition, brand awareness affects emotions (cognition, affection, and conation) and consumer purchase intention.",
"title": ""
},
{
"docid": "d31646394ff4e6aa66bbb3c61651592e",
"text": "The computer vision strategies used to recognize a fruit rely on four basic features which characterize the object: intensity, color, shape and texture. This paper proposes an efficient fusion of color and texture features for fruit recognition. The recognition is done by the minimum distance classifier based upon the statistical and co-occurrence features derived from the Wavelet transformed subbands. Experimental results on a database of about 2635 fruits from 15 different classes confirm the effectiveness of the proposed approach.",
"title": ""
},
{
"docid": "bb19e122737f08997585999575d2a394",
"text": "In this paper, shadow detection and compensation are treated as image enhancement tasks. The principal components analysis (PCA) and luminance based multi-scale Retinex (LMSR) algorithm are explored to detect and compensate shadow in high resolution satellite image. PCA provides orthogonally channels, thus allow the color to remain stable despite the modification of luminance. Firstly, the PCA transform is used to obtain the luminance channel, which enables us to detect shadow regions using histogram threshold technique. After detection, the LMSR technique is used to enhance the image only in luminance channel to compensate for shadows. Then the enhanced image is obtained by inverse transform of PCA. The final shadow compensation image is obtained by comparison of the original image, the enhanced image and the shadow detection image. Experiment results show the effectiveness of the proposed method.",
"title": ""
},
{
"docid": "a310039e0fd3f732805a6088ad3d1777",
"text": "Unsupervised learning of visual similarities is of paramount importance to computer vision, particularly due to lacking training data for fine-grained similarities. Deep learning of similarities is often based on relationships between pairs or triplets of samples. Many of these relations are unreliable and mutually contradicting, implying inconsistencies when trained without supervision information that relates different tuples or triplets to each other. To overcome this problem, we use local estimates of reliable (dis-)similarities to initially group samples into compact surrogate classes and use local partial orders of samples to classes to link classes to each other. Similarity learning is then formulated as a partial ordering task with soft correspondences of all samples to classes. Adopting a strategy of self-supervision, a CNN is trained to optimally represent samples in a mutually consistent manner while updating the classes. The similarity learning and grouping procedure are integrated in a single model and optimized jointly. The proposed unsupervised approach shows competitive performance on detailed pose estimation and object classification.",
"title": ""
},
{
"docid": "a63f9b27e27393bb432198f18c3d89e1",
"text": "Accounting information system had been widely used by many organizations to automate and integrate their business operations .The main objective s of many businesses to adopt this system are to improve their business efficiency and increase competitiveness. The qualitative characteristic of any Accounting Information System can be maintained if there is a sound internal control system. Internal control is run to ensure the achievement of operational goals and performance. Therefore the purpose of this study is to examine the efficiency of Accounting Information System on performance measures using the secondary data in which it was found that accounting information system is of great importance to both businesses and organization in which it helps in facilitating management decision making, internal controls ,quality of the financial report ,and it facilitates the company’s transaction and it also plays an important role in economic system, and the study recommends that businesses, firms and organization should adopt the use of AIS because adequate accounting information is essential for every effective decision making process and adequate information is possible if accounting information systems are run efficiently also, efficient Accounting Information Systems ensures that all levels of management get sufficient, adequate, relevant and true information for planning and controlling activities of the business organization.",
"title": ""
},
{
"docid": "0d706058ff906f643d35295075fa4199",
"text": "[Purpose] The present study examined the effects of treatment using PNF extension techniques on the pain, pressure pain, and neck and shoulder functions of the upper trapezius muscles of myofascial pain syndrome (MPS) patients. [Subjects] Thirty-two patients with MPS in the upper trapezius muscle were divided into two groups: a PNF group (n=16), and a control group (n=16) [Methods] The PNF group received upper trapezius muscle relaxation therapy and shoulder joint stabilizing exercises. Subjects in the control group received only the general physical therapies for the upper trapezius muscles. Subjects were measured for pain on a visual analog scale (VAS), pressure pain threshold (PPT), the neck disability index (NDI), and the Constant-Murley scale (CMS). [Results] None of the VAS, PPT, and NDI results showed significant differences between the groups, while performing postures, internal rotation, and external rotation among the CMS items showed significant differences between the groups. [Conclusion] Exercise programs that apply PNF techniques can be said to be effective at improving the function of MPS patients.",
"title": ""
},
{
"docid": "ce3e6a5a00a29948ebf9d8fee4bba40f",
"text": "The innovative ideas behind blockchain offer exciting perspectives in research and development of electronic distributed ledger technologies. Bitcoin introduced an \"eventual consistency\" blockchain with the apparent intent of providing an open and inclusive system for secure, anonymous, yet cost-effective financial transactions based on peer-to-peer computing. It uses Proof ofWork as a cryptographic puzzle to control growth of a chain and to strengthen the resiliency of a chain against subsequent rewrite attempts. Commercial sectors and the public sector have realized the potential of this technical approach, and we now see a number of blockchains that may be called private, closed or permissioned – and that may eschew the values inherent in the design of Bitcoin type systems. From a value-neutral research perspective, there are no clear definitions of blockchain attributes such as \"private\" or \"permissioned\", nor is there typically a good understanding of the trust assumptions that clients must make when using such services – for example in systems that do not rely on Proof of Work but on a limited and controlled set of consensus-creating agents. We believe that more research in this direction could establish firm foundations for domain-specific or coalition-specific blockchains, and that such underpinnings would offer novel trust architectures beyond those provided by completely open/public blockchains and third-party operated, closed/private blockchains.",
"title": ""
},
{
"docid": "c4144108562408238992d7529cf77ad7",
"text": "This article presents an approach to context-aware services for “smart buildings” based on Web and Semantic Web techniques. The services striven for are first described, then their realization using Web and Semantic Web services is explained. Finally, advantages of the approach are stressed.",
"title": ""
},
{
"docid": "c5a09b33a0b36f0c2ec6304a7993607c",
"text": "Algorithms are well presented for estimation of harmonics and their elimination in a three phase system for power quality improvement. This paper presents the application of KF-Adaline Algorithm for estimation of power system harmonics and shunt active power filter with hysteresis current controller based on space vector modulation for perfect elimination of harmonics. The space vector modulation (SVM) based hysteresis current controller (HCC) combines both the advantages of SVM and HCC. This controller determines a set of space vector from a region detector and then applies a space vector according to the Hysteresis current controller. Reference current extraction is done by the synchronous detection technique which is compared to the actual current and the error current is fed to the Shunt Active Power Filter (SAPF). Shunt Active Power Filter manages to provide better compensation signals to eliminate the harmonics for power quality improvement which is fed to the distribution system. Simulation results are provided to verify the better performance of SAPF due to the proposed controller.",
"title": ""
},
{
"docid": "03726ab44d068b69eb361a1603db05b9",
"text": "Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and networks emerge. In addition, the Deep Web has contributed to the growth of illegal activities in cyberspace. As a result, cybercriminals are taking advantage of system vulnerabilities for their own benefit. This article presents the history and conceptualization of cybercrime, explores different categorizations of cybercriminals and cyberattacks, and sets forth our exhaustive cyberattack typology, or taxonomy. Common categories include where the computer is the target to commit the crime, where the computer is used as a tool to perpetrate the felony, or where a digital device is an incidental condition to the execution of a crime. We conclude our study by analyzing lessons learned and future actions that can be undertaken to tackle cybercrime and harden cybersecurity at all levels.",
"title": ""
},
{
"docid": "7c0b40fc536d22612e38a68b194f7784",
"text": "Clothing may both cause death and contribute to ongoing lethal mechanisms by a variety of quite disparate mechanisms. The manner of death may be accidental, suicidal, or homicidal. Accidental deaths include burning from clothing catching on fire, strangulation from clothing tangling in vehicle wheels or exposed machinery, and drowning. Entanglement of clothing in machinery may also result in significant injuries, which are not uncommon in farming communities. Excessive clothing, or its absence, may significantly alter body temperature, and hanging from clothing is a feature in the young or in mentally or physically handicapped adults, or in adults who are intoxicated with alcohol or drugs. In previous years, potentially lethal amounts of arsenic were present in clothing and accessories from dyes. Clothing may also be used to form nooses or to pad ropes in suicides and may be used in cases of strangulation, suffocation, or choking in homicides. The contribution of clothing to mortality has changed over the years with changes in fashions and in manufacturing techniques. Geographical differences in clothing-related deaths persist because of variable social and cultural practices and legislative frameworks.",
"title": ""
},
{
"docid": "2aabe5c6f1ccb8dfd241f0c208609738",
"text": "Exposing the weaknesses of neural models is crucial for improving their performance and robustness in real-world applications. One common approach is to examine how input perturbations affect the output. Our analysis takes this to an extreme on natural language processing tasks by removing as many words as possible from the input without changing the model prediction. For question answering and natural language inference, this often reduces the inputs to just one or two words, while model confidence remains largely unchanged. This is an undesireable behavior: the model gets the Right Answer for the Wrong Reason (RAWR). We introduce a simple training technique that mitigates this problem while maintaining performance on regular examples.",
"title": ""
},
{
"docid": "5b5ab6f57fbc1c7d4351246332e8dde5",
"text": "This paper examines how secondary teachers of the core subjects of English, Mathematics and Science have begun to integrate information and communication technology (ICT) into mainstream classroom practice in English schools. It draws on an analysis of 18 focus group interviews with core subject departments. The analysis culminated in a thematic model of professional thinking about how the integrated use of ICT can support subject teaching and learning. Evident commitment to incorporating ICT was tempered by a cautious, critical approach and the influence of external constraints operating. Teacher accounts emphasised both the use of ICT to enhance and extend existing classroom practice, and change in terms of emerging forms of activity which complemented or modified practice. A gradual process of pedagogical evolution was apparent; teachers were developing and trialling new strategies specifically for mediating ICT-supported learning. In particular, these overcame the potentially obstructive role of some forms of ICT by focusing pupils’ attention onto underlying learning objectives.",
"title": ""
},
{
"docid": "c16d93488fd3d08e2c2143d5ffb28ebc",
"text": "Many mobile and wireless authentication systems are prone to relay attacks whereby two non co-presence colluding entities can subvert the authentication functionality by simply relaying the data between a legitimate prover (P) and verifier (V). Examples include payment systems involving NFC and RFID devices, and zero-interaction token-based authentication approaches. Utilizing the contextual information to determine P-V proximity, or lack thereof, is a recently proposed approach to defend against relay attacks. Prior work considered WiFi, Bluetooth, GPS and Audio as different contextual modalities for the purpose of relay-resistant authentication. In this paper, we explore purely ambient physical sensing capabilities to address the problem of relay attacks in authentication systems. Specifically, we consider the use of four new sensor modalities, ambient temperature, precision gas, humidity, and altitude, for P-V proximity detection. Using an off-the-shelf ambient sensing platform, called Sensordrone, connected to Android devices, we show that combining these different modalities provides a robust proximity detection mechanism, yielding very low false positives (security against relay attacks) and very low false negatives (good usability). Such use of multiple ambient sensor modalities offers unique security advantages over traditional sensors (WiFi, Bluetooth, GPS or Audio) because it requires the attacker to simultaneously manipulate the multiple characteristics of the physical environment.",
"title": ""
},
{
"docid": "87211acb55f352a026bc4d837eadfa14",
"text": "Estimating an accurate and naturalistic dense depth map from a single monocular photographic image is a difficult problem. Nevertheless, human observers have little difficulty understanding the depth structure implied by photographs. Two-dimensional (2D) images of the real-world environment contain significant statistical information regarding the three-dimensional (3D) structure of the world that the vision system likely exploits to compute perceived depth, monocularly as well as binocularly. Toward understanding how this might be accomplished, we propose a Bayesian model of monocular depth computation that recovers detailed 3D scene structures by extracting reliable, robust, depth-sensitive statistical features from single natural images. These features are derived using well-accepted univariate natural scene statistics (NSS) models and recent bivariate/correlation NSS models that describe the relationships between 2D photographic images and their associated depth maps. This is accomplished by building a dictionary of canonical local depth patterns from which NSS features are extracted as prior information. The dictionary is used to create a multivariate Gaussian mixture (MGM) likelihood model that associates local image features with depth patterns. A simple Bayesian predictor is then used to form spatial depth estimates. The depth results produced by the model, despite its simplicity, correlate well with ground-truth depths measured by a current-generation terrestrial light detection and ranging (LIDAR) scanner. Such a strong form of statistical depth information could be used by the visual system when creating overall estimated depth maps incorporating stereopsis, accommodation, and other conditions. Indeed, even in isolation, the Bayesian predictor delivers depth estimates that are competitive with state-of-the-art \"computer vision\" methods that utilize highly engineered image features and sophisticated machine learning algorithms.",
"title": ""
},
{
"docid": "283708fe3c950ac08bf932d68feb6d56",
"text": "Diabetic wounds are unlike typical wounds in that they are slower to heal, making treatment with conventional topical medications an uphill process. Among several different alternative therapies, honey is an effective choice because it provides comparatively rapid wound healing. Although honey has been used as an alternative medicine for wound healing since ancient times, the application of honey to diabetic wounds has only recently been revived. Because honey has some unique natural features as a wound healer, it works even more effectively on diabetic wounds than on normal wounds. In addition, honey is known as an \"all in one\" remedy for diabetic wound healing because it can combat many microorganisms that are involved in the wound process and because it possesses antioxidant activity and controls inflammation. In this review, the potential role of honey's antibacterial activity on diabetic wound-related microorganisms and honey's clinical effectiveness in treating diabetic wounds based on the most recent studies is described. Additionally, ways in which honey can be used as a safer, faster, and effective healing agent for diabetic wounds in comparison with other synthetic medications in terms of microbial resistance and treatment costs are also described to support its traditional claims.",
"title": ""
},
{
"docid": "f1cb2ce5a32d09383745284cfa838e90",
"text": "In the information age, as we have become increasingly dependent upon complex information systems, there has been a focus on the vulnerability of these systems to computer crime and security attacks, exemplified by the work of the President's Commission on Critical Infrastructure Protection. Because of the high-tech nature of these systems and the technological expertise required to develop and maintain them, it is not surprising that overwhelming attention has been devoted by computer security experts to technological vulnerabilities and solutions. Yet, as captured in the title of a 1993 conference sponsored by the Defense Personnel Security Research Center, 2 Computer Crime: A Peopleware Problem, it is people who designed the systems, people who attack the systems, and understanding the psychology of information systems criminals is crucial to protecting those systems. s A Management Information Systems (MIS) professional at a military facility learns she is going to be downsized. She decides to encrypt large parts of the organization's database and hold it hostage. She contacts the systems administrator responsible for the database and offers to decode the data for $10,000 in \" severance pay \" and a promise of no prosecution. He agrees to her terms before consulting with proper authorities. Prosecutors reviewing the case determine that the administrator's deal precludes them from pursuing charges. s A postcard written by an enlisted man is discovered during the arrest of several members of a well-known hacker organization by the FBI. Writing from his military base where he serves as a computer specialist, he has inquired about establishing a relationship with the group. Investigation reveals the enlisted man to be a convicted hacker and former group member who had been offered a choice between prison and enlistment. While performing computer duties for the military, he is caught breaking into local phone systems. s An engineer at an energy processing plant becomes angry with his new supervisor, a non-technical administrator. The engineer's wife is terminally ill, and he is on probation after a series of angry and disruptive episodes at work. After he is sent home, the engineering staff discovers that he has made a series of idiosyncratic modifications to plant controls and safety systems. In response to being confronted about these changes, the engineer decides to withhold the password, threatening the productivity and safety of the plant. s At the regional headquarters of an international energy company, an MIS contractor effectively \" captures …",
"title": ""
}
] | scidocsrr |
9d7233877a79481ef40fe83b7edbf01f | Who Owns the Data? Open Data for Healthcare | [
{
"docid": "f1294ba7d894db9c5145d11f1251a498",
"text": "A grand goal of future medicine is in modelling the complexity of patients to tailor medical decisions, health practices and therapies to the individual patient. This trend towards personalized medicine produces unprecedented amounts of data, and even though the fact that human experts are excellent at pattern recognition in dimensions of ≤ 3, the problem is that most biomedical data is in dimensions much higher than 3, making manual analysis difficult and often impossible. Experts in daily medical routine are decreasingly capable of dealing with the complexity of such data. Moreover, they are not interested the data, they need knowledge and insight in order to support their work. Consequently, a big trend in computer science is to provide efficient, useable and useful computational methods, algorithms and tools to discover knowledge and to interactively gain insight into high-dimensional data. A synergistic combination of methodologies of two areas may be of great help here: Human–Computer Interaction (HCI) and Knowledge Discovery/Data Mining (KDD), with the goal of supporting human intelligence with machine learning. A trend in both disciplines is the acquisition and adaptation of representations that support efficient learning. Mapping higher dimensional data into lower dimensions is a major task in HCI, and a concerted effort of computational methods including recent advances from graphtheory and algebraic topology may contribute to finding solutions. Moreover, much biomedical data is sparse, noisy and timedependent, hence entropy is also amongst promising topics. This paper provides a rough overview of the HCI-KDD approach and focuses on three future trends: graph-based mining, topological data mining and entropy-based data mining.",
"title": ""
}
] | [
{
"docid": "21af4ea62f07966097c8ab46f7226907",
"text": "With the introduction of Microsoft Kinect, there has been considerable interest in creating various attractive and feasible applications in related research fields. Kinect simultaneously captures the depth and color information and provides real-time reliable 3D full-body human-pose reconstruction that essentially turns the human body into a controller. This article presents a finger-writing system that recognizes characters written in the air without the need for an extra handheld device. This application adaptively merges depth, skin, and background models for the hand segmentation to overcome the limitations of the individual models, such as hand-face overlapping problems and the depth-color nonsynchronization. The writing fingertip is detected by a new real-time dual-mode switching method. The recognition accuracy rate is greater than 90 percent for the first five candidates of Chinese characters, English characters, and numbers.",
"title": ""
},
{
"docid": "7654ada6aabee2f8abf411dba5383d96",
"text": "In the past decade, Convolutional Neural Networks (CNNs) have been demonstrated successful for object detections. However, the size of network input is limited by the amount of memory available on GPUs. Moreover, performance degrades when detecting small objects. To alleviate the memory usage and improve the performance of detecting small traffic signs, we proposed an approach for detecting small traffic signs from large images under real world conditions. In particular, large images are broken into small patches as input to a Small-Object-Sensitive-CNN (SOS-CNN) modified from a Single Shot Multibox Detector (SSD) framework with a VGG-16 network as the base network to produce patch-level object detection results. Scale invariance is achieved by applying the SOS-CNN on an image pyramid. Then, image-level object detection is obtained by projecting all the patch-level detection results to the image at the original scale. Experimental results on a real-world conditioned traffic sign dataset have demonstrated the effectiveness of the proposed method in terms of detection accuracy and recall, especially for those with small sizes.",
"title": ""
},
{
"docid": "947a96e2115f5b271f5550e090859133",
"text": "Degenerative lumbar spinal stenosis is caused by mechanical factors and/or biochemical alterations within the intervertebral disk that lead to disk space collapse, facet joint hypertrophy, soft-tissue infolding, and osteophyte formation, which narrows the space available for the thecal sac and exiting nerve roots. The clinical consequence of this compression is neurogenic claudication and varying degrees of leg and back pain. Degenerative lumbar spinal stenosis is a major cause of pain and impaired quality of life in the elderly. The natural history of this condition varies; however, it has not been shown to worsen progressively. Nonsurgical management consists of nonsteroidal anti-inflammatory drugs, physical therapy, and epidural steroid injections. If nonsurgical management is unsuccessful and neurologic decline persists or progresses, surgical treatment, most commonly laminectomy, is indicated. Recent prospective randomized studies have demonstrated that surgery is superior to nonsurgical management in terms of controlling pain and improving function in patients with lumbar spinal stenosis.",
"title": ""
},
{
"docid": "4261e44dad03e8db3c0520126b9c7c4d",
"text": "One of the major drawbacks of magnetic resonance imaging (MRI) has been the lack of a standard and quantifiable interpretation of image intensities. Unlike in other modalities, such as X-ray computerized tomography, MR images taken for the same patient on the same scanner at different times may appear different from each other due to a variety of scanner-dependent variations and, therefore, the absolute intensity values do not have a fixed meaning. The authors have devised a two-step method wherein all images (independent of patients and the specific brand of the MR scanner used) can be transformed in such a may that for the same protocol and body region, in the transformed images similar intensities will have similar tissue meaning. Standardized images can be displayed with fixed windows without the need of per-case adjustment. More importantly, extraction of quantitative information about healthy organs or about abnormalities can be considerably simplified. This paper introduces and compares new variants of this standardizing method that can help to overcome some of the problems with the original method.",
"title": ""
},
{
"docid": "a949afe3f53bf7695a35c0c1cc8374c3",
"text": "Increasingly complex proteins can be made by a recombinant chemical approach where proteins that can be made easily can be combined by site-specific chemical conjugation to form multifunctional or more active protein therapeutics. Protein dimers may display increased avidity for cell surface receptors. The increased size of protein dimers may also increase circulation times. Cytokines bind to cell surface receptors that dimerise, so much of the solvent accessible surface of a cytokine is involved in binding to its target. Interferon (IFN) homo-dimers (IFN-PEG-IFN) were prepared by two methods: site-specific bis-alkylation conjugation of PEG to the two thiols of a native disulphide or to two imidazoles on a histidine tag of two His8-tagged IFN (His8IFN). Several control conjugates were also prepared to assess the relative activity of these IFN homo-dimers. The His8IFN-PEG20-His8IFN obtained by histidine-specific conjugation displayed marginally greater in vitro antiviral activity compared to the IFN-PEG20-IFN homo-dimer obtained by disulphide re-bridging conjugation. This result is consistent with previous observations in which enhanced retention of activity was made possible by conjugation to an N-terminal His-tag on the IFN. Comparison of the antiviral and antiproliferative activities of the two IFN homo-dimers prepared by disulphide re-bridging conjugation indicated that IFN-PEG10-IFN was more biologically active than IFN-PEG20-IFN. This result suggests that the size of PEG may influence the antiviral activity of IFN-PEG-IFN homo-dimers.",
"title": ""
},
{
"docid": "49ff096deb6621438286942b792d6af3",
"text": "Fast fashion is a business model that offers (the perception of) fashionable clothes at affordable prices. From an operations standpoint, fast fashion requires a highly responsive supply chain that can support a product assortment that is periodically changing. Though the underlying principles are simple, the successful execution of the fast-fashion business model poses numerous challenges. We present a careful examination of this business model and discuss its execution by analyzing the most prominent firms in the industry. We then survey the academic literature for research that is specifically relevant or directly related to fast fashion. Our goal is to expose the main components of fast fashion and to identify untapped research opportunities.",
"title": ""
},
{
"docid": "274373d46b748d92e6913496507353b1",
"text": "This paper introduces a blind watermarking based on a convolutional neural network (CNN). We propose an iterative learning framework to secure robustness of watermarking. One loop of learning process consists of the following three stages: Watermark embedding, attack simulation, and weight update. We have learned a network that can detect a 1-bit message from a image sub-block. Experimental results show that this learned network is an extension of the frequency domain that is widely used in existing watermarking scheme. The proposed scheme achieved robustness against geometric and signal processing attacks with a learning time of one day.",
"title": ""
},
{
"docid": "3fd8092faee792a316fb3d1d7c2b6244",
"text": "The complete dynamics model of a four-Mecanum-wheeled robot considering mass eccentricity and friction uncertainty is derived using the Lagrange’s equation. Then based on the dynamics model, a nonlinear stable adaptive control law is derived using the backstepping method via Lyapunov stability theory. In order to compensate for the model uncertainty, a nonlinear damping term is included in the control law, and the parameter update law with σ-modification is considered for the uncertainty estimation. Computer simulations are conducted to illustrate the suggested control approach.",
"title": ""
},
{
"docid": "a6b5f49b8161b45540bdd333d8588cd8",
"text": "Personality inconsistency is one of the major problems for chit-chat sequence to sequence conversational agents. Works studying this problem have proposed models with the capability of generating personalized responses, but there is not an existing evaluation method for measuring the performance of these models on personality. This thesis develops a new evaluation method based on the psychological study of personality, in particular the Big Five personality traits. With the new evaluation method, the thesis examines if the responses generated by personalized chit-chat sequence to sequence conversational agents are distinguished for speakers with different personalities. The thesis also proposes a new model that generates distinguished responses based on given personalities. The results of our experiments in the thesis show that: for both the existing personalized model and the new model that we propose, the generated responses for speakers with different personalities are significantly more distinguished than a random baseline; specially for our new model, it has the capability of generating distinguished responses for different types of personalities measured by the Big Five personality traits.",
"title": ""
},
{
"docid": "1148cc41ee6d016a495856789a7b739d",
"text": "Visual reasoning is a special visual question answering problem that is multi-step and compositional by nature, and also requires intensive text-vision interactions. We propose CMM: Cascaded Mutual Modulation as a novel end-to-end visual reasoning model. CMM includes a multi-step comprehension process for both question and image. In each step, we use a Feature-wise Linear Modulation (FiLM) technique to enable textual/visual pipeline to mutually control each other. Experiments show that CMM significantly outperforms most related models, and reach stateof-the-arts on two visual reasoning benchmarks: CLEVR and NLVR, collected from both synthetic and natural languages. Ablation studies confirm that both our multistep framework and our visual-guided language modulation are critical to the task. Our code is available at https://github. com/FlamingHorizon/CMM-VR.",
"title": ""
},
{
"docid": "dfb83ad16854797137e34a5c7cb110ae",
"text": "The increasing computing requirements for GPUs (Graphics Processing Units) have favoured the design and marketing of commodity devices that nowadays can also be used to accelerate general purpose computing. Therefore, future high performance clusters intended for HPC (High Performance Computing) will likely include such devices. However, high-end GPU-based accelerators used in HPC feature a considerable energy consumption, so that attaching a GPU to every node of a cluster has a strong impact on its overall power consumption. In this paper we detail a framework that enables remote GPU acceleration in HPC clusters, thus allowing a reduction in the number of accelerators installed in the cluster. This leads to energy, acquisition, maintenance, and space savings.",
"title": ""
},
{
"docid": "15a76f43782ef752e4b8e61e38726d69",
"text": "This paper considers invariant texture analysis. Texture analysis approaches whose performances are not a,ected by translation, rotation, a.ne, and perspective transform are addressed. Existing invariant texture analysis algorithms are carefully studied and classi0ed into three categories: statistical methods, model based methods, and structural methods. The importance of invariant texture analysis is presented 0rst. Each approach is reviewed according to its classi0cation, and its merits and drawbacks are outlined. The focus of possible future work is also suggested. ? 2001 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.",
"title": ""
},
{
"docid": "18968ed6bec670e4c8ba93933d0cc3e3",
"text": "The medial prefrontal cortex (MPFC) is regarded as a region of the brain that supports self-referential processes, including the integration of sensory information with self-knowledge and the retrieval of autobiographical information. I used functional magnetic resonance imaging and a novel procedure for eliciting autobiographical memories with excerpts of popular music dating to one's extended childhood to test the hypothesis that music and autobiographical memories are integrated in the MPFC. Dorsal regions of the MPFC (Brodmann area 8/9) were shown to respond parametrically to the degree of autobiographical salience experienced over the course of individual 30 s excerpts. Moreover, the dorsal MPFC also responded on a second, faster timescale corresponding to the signature movements of the musical excerpts through tonal space. These results suggest that the dorsal MPFC associates music and memories when we experience emotionally salient episodic memories that are triggered by familiar songs from our personal past. MPFC acted in concert with lateral prefrontal and posterior cortices both in terms of tonality tracking and overall responsiveness to familiar and autobiographically salient songs. These findings extend the results of previous autobiographical memory research by demonstrating the spontaneous activation of an autobiographical memory network in a naturalistic task with low retrieval demands.",
"title": ""
},
{
"docid": "04c52aa382cf53c3ab208bd3c0fc5354",
"text": "This article is the last of our series of articles on survey research. In it, we discuss how to analyze survey data. We provide examples of correct and incorrect analysis techniques used in software engineering surveys.",
"title": ""
},
{
"docid": "bb547f90a98aa25d0824dc63b9de952d",
"text": "When designing distributed web services, there are three properties that are commonly desired: consistency, availability, and partition tolerance. It is impossible to achieve all three. In this note, we prove this conjecture in the asynchronous network model, and then discuss solutions to this dilemma in the partially synchronous model.",
"title": ""
},
{
"docid": "0e2a3870af4b7636c0f5e56d658fcc77",
"text": "In this review, we provide an overview of protein synthesis in the yeast Saccharomyces cerevisiae The mechanism of protein synthesis is well conserved between yeast and other eukaryotes, and molecular genetic studies in budding yeast have provided critical insights into the fundamental process of translation as well as its regulation. The review focuses on the initiation and elongation phases of protein synthesis with descriptions of the roles of translation initiation and elongation factors that assist the ribosome in binding the messenger RNA (mRNA), selecting the start codon, and synthesizing the polypeptide. We also examine mechanisms of translational control highlighting the mRNA cap-binding proteins and the regulation of GCN4 and CPA1 mRNAs.",
"title": ""
},
{
"docid": "8695757545e44358fd63f06936335903",
"text": "We propose a neural language model capable of unsupervised syntactic structure induction. The model leverages the structure information to form better semantic representations and better language modeling. Standard recurrent neural networks are limited by their structure and fail to efficiently use syntactic information. On the other hand, tree-structured recursive networks usually require additional structural supervision at the cost of human expert annotation. In this paper, We propose a novel neural language model, called the Parsing-Reading-Predict Networks (PRPN), that can simultaneously induce the syntactic structure from unannotated sentences and leverage the inferred structure to learn a better language model. In our model, the gradient can be directly back-propagated from the language model loss into the neural parsing network. Experiments show that the proposed model can discover the underlying syntactic structure and achieve state-of-the-art performance on word/character-level language model tasks.",
"title": ""
},
{
"docid": "a06274d9bf6dba90ea0178ec11a20fb6",
"text": "Osteoporosis has become one of the most prevalent and costly diseases in the world. It is a metabolic disease characterized by reduction in bone mass due to an imbalance between bone formation and resorption. Osteoporosis causes fractures, prolongs bone healing, and impedes osseointegration of dental implants. Its pathological features include osteopenia, degradation of bone tissue microstructure, and increase of bone fragility. In traditional Chinese medicine, the herb Rhizoma Drynariae has been commonly used to treat osteoporosis and bone nonunion. However, the precise underlying mechanism is as yet unclear. Osteoprotegerin is a cytokine receptor shown to play an important role in osteoblast differentiation and bone formation. Hence, activators and ligands of osteoprotegerin are promising drug targets and have been the focus of studies on the development of therapeutics against osteoporosis. In the current study, we found that naringin could synergistically enhance the action of 1α,25-dihydroxyvitamin D3 in promoting the secretion of osteoprotegerin by osteoblasts in vitro. In addition, naringin can also influence the generation of osteoclasts and subsequently bone loss during organ culture. In conclusion, this study provides evidence that natural compounds such as naringin have the potential to be used as alternative medicines for the prevention and treatment of osteolysis.",
"title": ""
},
{
"docid": "3907bddf6a56b96c4e474d46ddd04359",
"text": "The aim of this review is to discuss the accumulating evidence that suggests that grape extracts and purified grape polyphenols possess a diverse array of biological actions and may be beneficial in the prevention of some inflammatory-mediated diseases including cardiovascular disease. The active components from grape extracts, which include the grape seed, grape skin, and grape juice, that have been identified thus far include polyphenols such as resveratrol, phenolic acids, anthocyanins, and flavonoids. All possess potent antioxidant properties and have been shown to decrease low-density lipoprotein-cholesterol oxidation and platelet aggregation. These compounds also possess a range of additional cardioprotective and vasoprotective properties including antiatherosclerotic, antiarrhythmic, and vasorelaxation actions. Although not exclusive, antioxidant properties of grape polyphenols are likely to be central to their mechanism(s) of action, which also include cellular signaling mechanisms and interactions at the genomic level. This review discusses some of the evidence favoring the consumption of grape extracts rich in polyphenols in the prevention of cardiovascular disease. Consumption of grape and grape extracts and/or grape products such as red wine may be beneficial in preventing the development of chronic degenerative diseases such as cardiovascular disease.",
"title": ""
}
] | scidocsrr |
5460f529bb783aca18ae3078d5e0fcbb | Nonlocal Operators with Applications to Image Processing | [
{
"docid": "3442a266eaaf878a507f58124e15fee3",
"text": "The application of kernel-based learning algorithms has, so far, largely been confined to realvalued data and a few special data types, such as strings. In this paper we propose a general method of constructing natural families of kernels over discrete structures, based on the matrix exponentiation idea. In particular, we focus on generating kernels on graphs, for which we propose a special class of exponential kernels called diffusion kernels, which are based on the heat equation and can be regarded as the discretization of the familiar Gaussian kernel of Euclidean space.",
"title": ""
}
] | [
{
"docid": "00309acd08acb526f58a70ead2d99249",
"text": "As mainstream news media and political campaigns start to pay attention to the political discourse online, a systematic analysis of political speech in social media becomes more critical. What exactly do people say on these sites, and how useful is this data in estimating political popularity? In this study we examine Twitter discussions surrounding seven US Republican politicians who were running for the US Presidential nomination in 2011. We show this largely negative rhetoric to be laced with sarcasm and humor and dominated by a small portion of users. Furthermore, we show that using out-of-the-box classification tools results in a poor performance, and instead develop a highly optimized multi-stage approach designed for general-purpose political sentiment classification. Finally, we compare the change in sentiment detected in our dataset before and after 19 Republican debates, concluding that, at least in this case, the Twitter political chatter is not indicative of national political polls.",
"title": ""
},
{
"docid": "4dbea47c322122623836ff2537c86e0a",
"text": "Fully convolutional neural networks (FCNNs) trained on a large number of images with strong pixel-level annotations have become the new state of the art for the semantic segmentation task. While there have been recent attempts to learn FCNNs from image-level weak annotations, they need additional constraints, such as the size of an object, to obtain reasonable performance. To address this issue, we present motion-CNN (M-CNN), a novel FCNN framework which incorporates motion cues and is learned from video-level weak annotations. Our learning scheme to train the network uses motion segments as soft constraints, thereby handling noisy motion information. When trained on weakly-annotated videos, our method outperforms the state-of-the-art approach [28] on the PASCAL VOC 2012 image segmentation benchmark. We also demonstrate that the performance of M-CNN learned with 150 weak video annotations is on par with state-of-the-art weakly-supervised methods trained with thousands of images. Finally, M-CNN substantially outperforms recent approaches in a related task of video co-localization on the YouTube-Objects dataset. This is an extended version of our ECCV paper [39].",
"title": ""
},
{
"docid": "8a0e33cc8d9e6c81555ba35f4b97f838",
"text": "BACKGROUND\nThe enactment of the General Data Protection Regulation (GDPR) will impact on European data science. Particular concerns relating to consent requirements that would severely restrict medical data research have been raised.\n\n\nOBJECTIVE\nOur objective is to explain the changes in data protection laws that apply to medical research and to discuss their potential impact.\n\n\nMETHODS\nAnalysis of ethicolegal requirements imposed by the GDPR.\n\n\nRESULTS\nThe GDPR makes the classification of pseudonymised data as personal data clearer, although it has not been entirely resolved. Biomedical research on personal data where consent has not been obtained must be of substantial public interest.\n\n\nCONCLUSIONS\nThe GDPR introduces protections for data subjects that aim for consistency across the EU. The proposed changes will make little impact on biomedical data research.",
"title": ""
},
{
"docid": "cbbe1d60d580dccba44c13a7b88630e0",
"text": "OF THE DISSERTATION Sampling Algorithms to Handle Nuisances in Large-Scale Recognition",
"title": ""
},
{
"docid": "208a0855181c0d3d44e8bc98b6d4aa7d",
"text": "We present Sequential Attend, Infer, Repeat (SQAIR), an interpretable deep generative model for videos of moving objects. It can reliably discover and track objects throughout the sequence of frames, and can also generate future frames conditioning on the current frame, thereby simulating expected motion of objects. This is achieved by explicitly encoding object presence, locations and appearances in the latent variables of the model. SQAIR retains all strengths of its predecessor, Attend, Infer, Repeat (AIR, Eslami et al., 2016), including learning in an unsupervised manner, and addresses its shortcomings. We use a moving multi-MNIST dataset to show limitations of AIR in detecting overlapping or partially occluded objects, and show how SQAIR overcomes them by leveraging temporal consistency of objects. Finally, we also apply SQAIR to real-world pedestrian CCTV data, where it learns to reliably detect, track and generate walking pedestrians with no supervision.",
"title": ""
},
{
"docid": "3cde70842ee80663cbdc04db6a871d46",
"text": "Artificial perception, in the context of autonomous driving, is the process by which an intelligent system translates sensory data into an effective model of the environment surrounding a vehicle. In this paper, and considering data from a 3D-LIDAR mounted onboard an intelligent vehicle, a 3D perception system based on voxels and planes is proposed for ground modeling and obstacle detection in urban environments. The system, which incorporates time-dependent data, is composed of two main modules: (i) an effective ground surface estimation using a piecewise plane fitting algorithm and RANSAC-method, and (ii) a voxel-grid model for static and moving obstacles detection using discriminative analysis and ego-motion information. This perception system has direct application in safety systems for intelligent vehicles, particularly in collision avoidance and vulnerable road users detection, namely pedestrians and cyclists. Experiments, using point-cloud data from a Velodyne LIDAR and localization data from an Inertial Navigation System were conducted for both a quantitative and a qualitative assessment of the static/moving obstacle detection module and for the surface estimation approach. Reported results, from experiments using the KITTI database, demonstrate the applicability and efficiency of the proposed approach in urban scenarios.",
"title": ""
},
{
"docid": "d677bf6517a04ec4ff2420a6842b1143",
"text": "This paper proposes a new experimental paradigm to explore the discriminability of languages, a question which is crucial to the child born in a bilingual environment. This paradigm employs the speech resynthesis technique, enabling the experimenter to preserve or degrade acoustic cues such as phonotactics, syllabic rhythm, or intonation from natural utterances. English and Japanese sentences were resynthesized, preserving broad phonotactics, rhythm, and intonation (condition 1), rhythm and intonation (condition 2), intonation only (condition 3), or rhythm only (condition 4). The findings support the notion that syllabic rhythm is a necessary and sufficient cue for French adult subjects to discriminate English from Japanese sentences. The results are consistent with previous research using low-pass filtered speech, as well as with phonological theories predicting rhythmic differences between languages. Thus, the new methodology proposed appears to be well suited to study language discrimination. Applications for other domains of psycholinguistic research and for automatic language identification are considered.",
"title": ""
},
{
"docid": "0b357696dd2b68a7cef39695110e4e1b",
"text": "Polypharmacology has emerged as novel means in drug discovery for improving treatment response in clinical use. However, to really capitalize on the polypharmacological effects of drugs, there is a critical need to better model and understand how the complex interactions between drugs and their cellular targets contribute to drug efficacy and possible side effects. Network graphs provide a convenient modeling framework for dealing with the fact that most drugs act on cellular systems through targeting multiple proteins both through on-target and off-target binding. Network pharmacology models aim at addressing questions such as how and where in the disease network should one target to inhibit disease phenotypes, such as cancer growth, ideally leading to therapies that are less vulnerable to drug resistance and side effects by means of attacking the disease network at the systems level through synergistic and synthetic lethal interactions. Since the exponentially increasing number of potential drug target combinations makes pure experimental approach quickly unfeasible, this review depicts a number of computational models and algorithms that can effectively reduce the search space for determining the most promising combinations for experimental evaluation. Such computational-experimental strategies are geared toward realizing the full potential of multi-target treatments in different disease phenotypes. Our specific focus is on system-level network approaches to polypharmacology designs in anticancer drug discovery, where we give representative examples of how network-centric modeling may offer systematic strategies toward better understanding and even predicting the phenotypic responses to multi-target therapies.",
"title": ""
},
{
"docid": "59433ea14c58dafae7746df2dcfc6197",
"text": "Learning a high-dimensional dense representation for vocabulary terms, also known as a word embedding, has recently attracted much attention in natural language processing and information retrieval tasks. The embedding vectors are typically learned based on term proximity in a large corpus. This means that the objective in well-known word embedding algorithms, e.g., word2vec, is to accurately predict adjacent word(s) for a given word or context. However, this objective is not necessarily equivalent to the goal of many information retrieval (IR) tasks. The primary objective in various IR tasks is to capture relevance instead of term proximity, syntactic, or even semantic similarity. This is the motivation for developing unsupervised relevance-based word embedding models that learn word representations based on query-document relevance information. In this paper, we propose two learning models with different objective functions; one learns a relevance distribution over the vocabulary set for each query, and the other classifies each term as belonging to the relevant or non-relevant class for each query. To train our models, we used over six million unique queries and the top ranked documents retrieved in response to each query, which are assumed to be relevant to the query. We extrinsically evaluate our learned word representation models using two IR tasks: query expansion and query classification. Both query expansion experiments on four TREC collections and query classification experiments on the KDD Cup 2005 dataset suggest that the relevance-based word embedding models significantly outperform state-of-the-art proximity-based embedding models, such as word2vec and GloVe.",
"title": ""
},
{
"docid": "454c47333a0e5d9df19fe98929ed7fd7",
"text": "The number of malware is growing significantly fast. Traditional malware detectors based on signature matching or code emulation are easy to get around. To overcome this problem, model-checking emerges as a technique that has been extensively applied for malware detection recently. Pushdown systems were proposed as a natural model for programs, since they allow to keep track of the stack, while extensions of LTL and CTL were considered for malicious behavior specification. However, LTL and CTL like formulas don't allow to express behaviors with matching calls and returns. In this paper, we propose to use CARET for malicious behavior specification. Since CARET formulas for malicious behaviors are huge, we propose to extend CARET with variables, quantifiers and predicates over the stack. Our new logic is called SPCARET. We reduce the malware detection problem to the model checking problem of PDSs against SPCARET formulas, and we propose efficient algorithms to model check SPCARET formulas for PDSs. We implemented our algorithms in a tool for malware detection. We obtained encouraging results.",
"title": ""
},
{
"docid": "667a2ea2b8ed7d2c709f04d8cd6617c6",
"text": "Knowledge centric activities of developing new products and services are becoming the primary source of sustainable competitive advantage in an era characterized by short product life cycles, dynamic markets and complex processes. We Ž . view new product development NPD as a knowledge-intensive activity. Based on a case study in the consumer electronics Ž . industry, we identify problems associated with knowledge management KM in the context of NPD by cross-functional collaborative teams. We map these problems to broad Information Technology enabled solutions and subsequently translate these into specific system characteristics and requirements. A prototype system that meets these requirements developed to capture and manage tacit and explicit process knowledge is further discussed. The functionalities of the system include functions for representing context with informal components, easy access to process knowledge, assumption surfacing, review of past knowledge, and management of dependencies. We demonstrate the validity our proposed solutions using scenarios drawn from our case study. q 1999 Elsevier Science B.V. All rights reserved.",
"title": ""
},
{
"docid": "e9e37212a793588b0e86075961ed8b9f",
"text": "This paper presents a method to use View based approach in Bangla Optical Character Recognition (OCR) system providing reduced data set to the ANN classification engine rather than the traditional OCR methods. It describes how Bangla characters are processed, trained and then recognized with the use of a Backpropagation Artificial neural network. This is the first published account of using a segmentation-free optical character recognition system for Bangla using a view based approach. The methodology presented here assumes that the OCR pre-processor has presented the input images to the classification engine described here. The size and the font face used to render the characters are also significant in both training and classification. The images are first converted into greyscale and then to binary images; these images are then scaled to a fit a pre-determined area with a fixed but significant number of pixels. The feature vectors are then formed extracting the characteristics points, which in this case is simply a series of 0s and 1s of fixed length. Finally, a Artificial neural network is chosen for the training and classification process. Although the steps are simple, and the simplest network is chosen for the training and recognition process.",
"title": ""
},
{
"docid": "81ec51ca319ab957c0e951c9de31859c",
"text": "Photography has been striving to capture an ever increasing amount of visual information in a single image. Digital sensors, however, are limited to recording a small subset of the desired information at each pixel. A common approach to overcoming the limitations of sensing hardware is the optical multiplexing of high-dimensional data into a photograph. While this is a well-studied topic for imaging with color filter arrays, we develop a mathematical framework that generalizes multiplexed imaging to all dimensions of the plenoptic function. This framework unifies a wide variety of existing approaches to analyze and reconstruct multiplexed data in either the spatial or the frequency domain. We demonstrate many practical applications of our framework including high-quality light field reconstruction, the first comparative noise analysis of light field attenuation masks, and an analysis of aliasing in multiplexing applications.",
"title": ""
},
{
"docid": "0dd2d46a63731cd67d5c9ed1243e8bac",
"text": "We describe an open-source toolkit for statistical machine translation whose novel contributions are (a) support for linguistically motivated factors, (b) confusion network decoding, and (c) efficient data formats for translation models and language models. In addition to the SMT decoder, the toolkit also includes a wide variety of tools for training, tuning and applying the system to many translation tasks.",
"title": ""
},
{
"docid": "6142b6b038aa04da5e2bc107639dbfcc",
"text": "The reproductive strategies of the sea urchin, Paracentrotus lividus, was studied in the Bay of Tunis. Samples were collected monthly, from September 1993 to August 1995, in two sites which differ in their marine vegetation and their exposure to wave action. Histological examination demonstrated a cycle of gametogenesis with six reproductive stages and a main breeding period occurring between April and June. Gonad indices varied between sites and years, the sheltered site presenting a higher investment in reproduction. This difference was essentially induced by the largest sea urchins (above 40 mm in diameter). Repletion indices showed a clear pattern without difference between sites and years. The sea urchin increase in feeding activity was controlled by the need to allocate nutrient to the gonad during the mature stage. But the gonad investment was not correlated with the intensity of food intake. Hydrodynamic conditions might play a key role in diverting energy to the maintenance in an exposed environment at the expense of reproduction.",
"title": ""
},
{
"docid": "8d4d34d8eddf39b9ce276d6c098d128a",
"text": "For any stream of time-stamped edges that form a dynamic network, an important choice is the aggregation granularity that an analyst uses to bin the data. Picking such a windowing of the data is often done by hand, or left up to the technology that is collecting the data. However, the choice can make a big difference in the properties of the dynamic network. Finding a good windowing is the time scale detection problem. In previous work, this problem is often solved with an unsupervised heuristic. As an unsupervised problem, it is difficult to measure how well a given windowing algorithm performs. In addition, we show that there is little correlation between the quality of a windowing across different tasks. Therefore the time scale detection problem should not be handled independently from the rest of the analysis of the network. Given this, in accordance with standard supervised machine learning practices, we introduce new windowing algorithms that automatically adapt to the task the analyst wants to perform by treating windowing as a hyperparameter for the task, rather than using heuristics. This approach measures the quality of the windowing by how well a given task is accomplished on the resulting network. This also allows us, for the first time, to directly compare different windowing algorithms to each other, by comparing how well the task is accomplished using that windowing algorithm. We compare this approach to previous approaches and several baselines",
"title": ""
},
{
"docid": "91dd4e52f1ab0752499b9026ff6cc8d7",
"text": "Augmented reality has recently achieved a rapid growth through its applications in various industries, including education and entertainment. Despite the growing attraction of augmented reality, trend analyses in this emerging technology have relied on qualitative literature review, failing to provide comprehensive competitive intelligence analysis using objective data. Therefore, tracing industrial competition trends in augmented reality will provide technology experts with a better understanding of evolving competition trends and insights for further technology and sustainable business planning. In this paper, we apply a topic modeling approach to 3595 patents related to augmented reality technology to identify technology subjects and their knowledge stocks, thereby analyzing industrial competitive intelligence in light of technology subject and firm levels. As a result, we were able to obtain some findings from an inventional viewpoint: technological development of augmented reality will soon enter a mature stage, technologies of infrastructural requirements have been a focal subject since 2001, and several software firms and camera manufacturing firms have dominated the recent development of augmented reality.",
"title": ""
},
{
"docid": "f9823fc9ac0750cc247cfdbf0064c8b5",
"text": "Scene segmentation is a challenging task as it need label every pixel in the image. It is crucial to exploit discriminative context and aggregate multi-scale features to achieve better segmentation. In this paper, we first propose a novel context contrasted local feature that not only leverages the informative context but also spotlights the local information in contrast to the context. The proposed context contrasted local feature greatly improves the parsing performance, especially for inconspicuous objects and background stuff. Furthermore, we propose a scheme of gated sum to selectively aggregate multi-scale features for each spatial position. The gates in this scheme control the information flow of different scale features. Their values are generated from the testing image by the proposed network learnt from the training data so that they are adaptive not only to the training data, but also to the specific testing image. Without bells and whistles, the proposed approach achieves the state-of-the-arts consistently on the three popular scene segmentation datasets, Pascal Context, SUN-RGBD and COCO Stuff.",
"title": ""
},
{
"docid": "d8f2eaa583d5a287ab5ad1a1694bf1bb",
"text": "The application of smart card technology in many industries locally and abroad is common nowadays. The technology is used in ensuring security and attaining functional capabilities. Based on an Internet search, there appears to be several reported cases of successful smart card technology implementation projects. However, there may not be as many challenged projects reported. In this paper, we report a challenged implementation of smart card technology in a higher education institution using the Project Management Body of Knowledge (PMBoK) as the framework.",
"title": ""
},
{
"docid": "cd23761c6e6eb8be8915612c995c29e4",
"text": "In this paper, we propose a novel representation learning framework, namely HIN2Vec, for heterogeneous information networks (HINs). The core of the proposed framework is a neural network model, also called HIN2Vec, designed to capture the rich semantics embedded in HINs by exploiting different types of relationships among nodes. Given a set of relationships specified in forms of meta-paths in an HIN, HIN2Vec carries out multiple prediction training tasks jointly based on a target set of relationships to learn latent vectors of nodes and meta-paths in the HIN. In addition to model design, several issues unique to HIN2Vec, including regularization of meta-path vectors, node type selection in negative sampling, and cycles in random walks, are examined. To validate our ideas, we learn latent vectors of nodes using four large-scale real HIN datasets, including Blogcatalog, Yelp, DBLP and U.S. Patents, and use them as features for multi-label node classification and link prediction applications on those networks. Empirical results show that HIN2Vec soundly outperforms the state-of-the-art representation learning models for network data, including DeepWalk, LINE, node2vec, PTE, HINE and ESim, by 6.6% to 23.8% of $micro$-$f_1$ in multi-label node classification and 5% to 70.8% of $MAP$ in link prediction.",
"title": ""
}
] | scidocsrr |
48464a669170e50b8671e779355d6e92 | EgoGesture: A New Dataset and Benchmark for Egocentric Hand Gesture Recognition | [
{
"docid": "9c562763cac968ce38359635d1826ff9",
"text": "This paper proposes a novel multi-layered gesture recognition method with Kinect. We explore the essential linguistic characters of gestures: the components concurrent character and the sequential organization character, in a multi-layered framework, which extracts features from both the segmented semantic units and the whole gesture sequence and then sequentially classifies the motion, location and shape components. In the first layer, an improved principle motion is applied to model the motion component. In the second layer, a particle-based descriptor and a weighted dynamic time warping are proposed for the location component classification. In the last layer, the spatial path warping is further proposed to classify the shape component represented by unclosed shape context. The proposed method can obtain relatively high performance for one-shot learning gesture recognition on the ChaLearn Gesture Dataset comprising more than 50, 000 gesture sequences recorded with Kinect.",
"title": ""
}
] | [
{
"docid": "2eb303f3382491ae1977a3e907f197c0",
"text": "Image-to-image translation tasks have been widely investigated with Generative Adversarial Networks (GANs) and dual learning. However, existing models lack the ability to control the translated results in the target domain and their results usually lack of diversity in the sense that a fixed image usually leads to (almost) deterministic translation result. In this paper, we study a new problem, conditional image-to-image translation, which is to translate an image from the source domain to the target domain conditioned on a given image in the target domain. It requires that the generated image should inherit some domain-specific features of the conditional image from the target domain. Therefore, changing the conditional image in the target domain will lead to diverse translation results for a fixed input image from the source domain, and therefore the conditional input image helps to control the translation results. We tackle this problem with unpaired data based on GANs and dual learning. We twist two conditional translation models (one translation from A domain to B domain, and the other one from B domain to A domain) together for inputs combination and reconstruction while preserving domain independent features. We carry out experiments on men's faces from-to women's faces translation and edges to shoes&bags translations. The results demonstrate the effectiveness of our proposed method.",
"title": ""
},
{
"docid": "ce305309d82e2d2a3177852c0bb08105",
"text": "BACKGROUND\nEmpathizing is a specific component of social cognition. Empathizing is also specifically impaired in autism spectrum condition (ASC). These are two dimensions, measurable using the Empathy Quotient (EQ) and the Autism Spectrum Quotient (AQ). ASC also involves strong systemizing, a dimension measured using the Systemizing Quotient (SQ). The present study examined the relationship between the EQ, AQ and SQ. The EQ and SQ have been used previously to test for sex differences in 5 'brain types' (Types S, E, B and extremes of Type S or E). Finally, people with ASC have been conceptualized as an extreme of the male brain.\n\n\nMETHOD\nWe revised the SQ to avoid a traditionalist bias, thus producing the SQ-Revised (SQ-R). AQ and EQ were not modified. All 3 were administered online.\n\n\nSAMPLE\nStudents (723 males, 1038 females) were compared to a group of adults with ASC group (69 males, 56 females).\n\n\nAIMS\n(1) To report scores from the SQ-R. (2) To test for SQ-R differences among students in the sciences vs. humanities. (3) To test if AQ can be predicted from EQ and SQ-R scores. (4) To test for sex differences on each of these in a typical sample, and for the absence of a sex difference in a sample with ASC if both males and females with ASC are hyper-masculinized. (5) To report percentages of males, females and people with an ASC who show each brain type.\n\n\nRESULTS\nAQ score was successfully predicted from EQ and SQ-R scores. In the typical group, males scored significantly higher than females on the AQ and SQ-R, and lower on the EQ. The ASC group scored higher than sex-matched controls on the SQ-R, and showed no sex differences on any of the 3 measures. More than twice as many typical males as females were Type S, and more than twice as many typical females as males were Type E. The majority of adults with ASC were Extreme Type S, compared to 5% of typical males and 0.9% of typical females. The EQ had a weak negative correlation with the SQ-R.\n\n\nDISCUSSION\nEmpathizing is largely but not completely independent of systemizing. The weak but significant negative correlation may indicate a trade-off between them. ASC involves impaired empathizing alongside intact or superior systemizing. Future work should investigate the biological basis of these dimensions, and the small trade-off between them.",
"title": ""
},
{
"docid": "a1c1c0402902712c033e999ffc060b4f",
"text": "The traditional Vivaldi antenna has an ultrawide bandwidth, but low directivity. To enhance the directivity, we propose a high-gain Vivaldi antenna based on compactly anisotropic zero-index metamaterials (ZIM). Such anisotropic ZIM are designed and fabricated using resonant meander-line structures, which are integrated with the Vivaldi antenna smoothly and hence have compact size. Measurement results show that the directivity and gain of the Vivaldi antenna have been enhanced significantly in the designed bandwidth of anisotropic ZIM (9.5-10.5 GHz), but not affected in other frequency bands (2.5-9.5 GHz and 10.5-13.5 GHz).",
"title": ""
},
{
"docid": "2313822a08269b3dd125190c4874b808",
"text": "General-purpose knowledge bases are increasingly growing in terms of depth (content) and width (coverage). Moreover, algorithms for entity linking and entity retrieval have improved tremendously in the past years. These developments give rise to a new line of research that exploits and combines these developments for the purposes of text-centric information retrieval applications. This tutorial focuses on a) how to retrieve a set of entities for an ad-hoc query, or more broadly, assessing relevance of KB elements for the information need, b) how to annotate text with such elements, and c) how to use this information to assess the relevance of text. We discuss different kinds of information available in a knowledge graph and how to leverage each most effectively.\n We start the tutorial with a brief overview of different types of knowledge bases, their structure and information contained in popular general-purpose and domain-specific knowledge bases. In particular, we focus on the representation of entity-centric information in the knowledge base through names, terms, relations, and type taxonomies. Next, we will provide a recap on ad-hoc object retrieval from knowledge graphs as well as entity linking and retrieval. This is essential technology, which the remainder of the tutorial builds on. Next we will cover essential components within successful entity linking systems, including the collection of entity name information and techniques for disambiguation with contextual entity mentions. We will present the details of four previously proposed systems that successfully leverage knowledge bases to improve ad-hoc document retrieval. These systems combine the notion of entity retrieval and semantic search on one hand, with text retrieval models and entity linking on the other. Finally, we also touch on entity aspects and links in the knowledge graph as it can help to understand the entities' context.\n This tutorial is the first to compile, summarize, and disseminate progress in this emerging area and we provide both an overview of state-of-the-art methods and outline open research problems to encourage new contributions.",
"title": ""
},
{
"docid": "6ec4079c4afdd545b531146c86c1e2fb",
"text": "A thorough comprehension of image content demands a complex grasp of the interactions that may occur in the natural world. One of the key issues is to describe the visual relationships between objects. When dealing with real world data, capturing these very diverse interactions is a difficult problem. It can be alleviated by incorporating common sense in a network. For this, we propose a framework that makes use of semantic knowledge and estimates the relevance of object pairs during both training and test phases. Extracted from precomputed models and training annotations, this information is distilled into the neural network dedicated to this task. Using this approach, we observe a significant improvement on all classes of Visual Genome, a challenging visual relationship dataset. A 68.5 % relative gain on the recall at 100 is directly related to the relevance estimate and a 32.7% gain to the knowledge distillation.",
"title": ""
},
{
"docid": "33b1c3b2a999c62fe4f1da5d3cc7f534",
"text": "Individuals often appear with multiple names when considering large bibliographic datasets, giving rise to the synonym ambiguity problem. Although most related works focus on resolving name ambiguities, this work focus on classifying and characterizing multiple name usage patterns—the root cause for such ambiguity. By considering real examples bibliographic datasets, we identify and classify patterns of multiple name usage by individuals, which can be interpreted as name change, rare name usage, and name co-appearance. In particular, we propose a methodology to classify name usage patterns through a supervised classification task and show that different classes are robust (across datasets) and exhibit significantly different properties. We show that the collaboration network structure emerging around nodes corresponding to ambiguous names from different name usage patterns have strikingly different characteristics, such as their common neighborhood and degree evolution. We believe such differences in network structure and in name usage patterns can be leveraged to design more efficient name disambiguation algorithms that target the synonym problem.",
"title": ""
},
{
"docid": "1234c156c0dcebf9c3d1794cd7cbca59",
"text": "We present the mathematical basis of a new approach to the analysis of temporal coding. The foundation of the approach is the construction of several families of novel distances (metrics) between neuronal impulse trains. In contrast to most previous approaches to the analysis of temporal coding, the present approach does not attempt to embed impulse trains in a vector space, and does not assume a Euclidean notion of distance. Rather, the proposed metrics formalize physiologically based hypotheses for those aspects of the firing pattern that might be stimulus dependent, and make essential use of the point-process nature of neural discharges. We show that these families of metrics endow the space of impulse trains with related but inequivalent topological structures. We demonstrate how these metrics can be used to determine whether a set of observed responses has a stimulus-dependent temporal structure without a vector-space embedding. We show how multidimensional scaling can be used to assess the similarity of these metrics to Euclidean distances. For two of these families of metrics (one based on spike times and one based on spike intervals), we present highly efficient computational algorithms for calculating the distances. We illustrate these ideas by application to artificial data sets and to recordings from auditory and visual cortex.",
"title": ""
},
{
"docid": "873bb52a5fe57335c30a0052b5bde4af",
"text": "Firth and Wagner (1997) questioned the dichotomies nonnative versus native speaker, learner versus user , and interlanguage versus target language , which reflect a bias toward innateness, cognition, and form in language acquisition. Research on lingua franca English (LFE) not only affirms this questioning, but reveals what multilingual communities have known all along: Language learning and use succeed through performance strategies, situational resources, and social negotiations in fluid communicative contexts. Proficiency is therefore practicebased, adaptive, and emergent. These findings compel us to theorize language acquisition as multimodal, multisensory, multilateral, and, therefore, multidimensional. The previously dominant constructs such as form, cognition, and the individual are not ignored; they get redefined as hybrid, fluid, and situated in a more socially embedded, ecologically sensitive, and interactionally open model.",
"title": ""
},
{
"docid": "dedc509f31c9b7e6c4409d655a158721",
"text": "Envelope tracking (ET) is by now a well-established technique that improves the efficiency of microwave power amplifiers (PAs) compared to what can be obtained with conventional class-AB or class-B operation for amplifying signals with a time-varying envelope, such as most of those used in present wireless communication systems. ET is poised to be deployed extensively in coming generations of amplifiers for cellular handsets because it can reduce power dissipation for signals using the long-term evolution (LTE) standard required for fourthgeneration (4G) wireless systems, which feature high peak-to-average power ratios (PAPRs). The ET technique continues to be actively developed for higher carrier frequencies and broader bandwidths. This article reviews the concepts and history of ET, discusses several applications currently on the drawing board, presents challenges for future development, and highlights some directions for improving the technique.",
"title": ""
},
{
"docid": "8c50fc49815e406e732f282caba67c7b",
"text": "This paper presents GOM, a language for describing abstract syntax trees and generating a Java implementation for those trees. GOM includes features allowing to specify and modify the interface of the data structure. These features provide in particular the capability to maintain the internal representation of data in canonical form with respect to a rewrite system. This explicitly guarantees that the client program only manipulates normal forms for this rewrite system, a feature which is only implicitly used in many implementations.",
"title": ""
},
{
"docid": "d6496dd2c1e8ac47dc12fde28c83a3d4",
"text": "We describe a natural extension of the banker’s algorithm for deadlock avoidance in operating systems. Representing the control flow of each process as a rooted tree of nodes corresponding to resource requests and releases, we propose a quadratic-time algorithm which decomposes each flow graph into a nested family of regions, such that all allocated resources are released before the control leaves a region. Also, information on the maximum resource claims for each of the regions can be extracted prior to process execution. By inserting operating system calls when entering a new region for each process at runtime, and applying the original banker’s algorithm for deadlock avoidance, this method has the potential to achieve better resource utilization because information on the “localized approximate maximum claims” is used for testing system safety.",
"title": ""
},
{
"docid": "2f2c36452ab45c4234904d9b11f28eb7",
"text": "Bitcoin is a potentially disruptive new crypto-currency based on a decentralized opensource protocol which is gradually gaining popularity. Perhaps the most important question that will affect Bitcoin’s success, is whether or not it will be able to scale to support the high volume of transactions required from a global currency system. We investigate the restrictions on the rate of transaction processing in Bitcoin as a function of both the bandwidth available to nodes and the network delay, both of which lower the efficiency of Bitcoin’s transaction processing. The security analysis done by Bitcoin’s creator Satoshi Nakamoto [12] assumes that block propagation delays are negligible compared to the time between blocks—an assumption that does not hold when the protocol is required to process transactions at high rates. We improve upon the original analysis and remove this assumption. Using our results, we are able to give bounds on the number of transactions per second the protocol can handle securely. Building on previously published measurements by Decker and Wattenhofer [5], we show these bounds are currently more restrictive by an order of magnitude than the bandwidth needed to stream all transactions. We additionally show how currently planned improvements to the protocol, namely the use of transaction hashes in blocks (instead of complete transaction records), will dramatically alleviate these restrictions. Finally, we present an easily implementable modification to the way Bitcoin constructs its main data structure, the blockchain, that immensely improves security from attackers, especially when the network operates at high rates. This improvement allows for further increases in the number of transactions processed per second. We show that with our proposed modification, significant speedups can be gained in confirmation time of transactions as well. The block generation rate can be securely increased to more than one block per second – a 600 fold speedup compared to today’s rate, while still allowing the network to processes many transactions per second.",
"title": ""
},
{
"docid": "ba1cbd5fcd98158911f4fb6f677863f9",
"text": "Classical approaches to clean data have relied on using integrity constraints, statistics, or machine learning. These approaches are known to be limited in the cleaning accuracy, which can usually be improved by consulting master data and involving experts to resolve ambiguity. The advent of knowledge bases KBs both general-purpose and within enterprises, and crowdsourcing marketplaces are providing yet more opportunities to achieve higher accuracy at a larger scale. We propose KATARA, a knowledge base and crowd powered data cleaning system that, given a table, a KB, and a crowd, interprets table semantics to align it with the KB, identifies correct and incorrect data, and generates top-k possible repairs for incorrect data. Experiments show that KATARA can be applied to various datasets and KBs, and can efficiently annotate data and suggest possible repairs.",
"title": ""
},
{
"docid": "9001ffb48ab4dc2437094284df78dfd8",
"text": "This paper develops two motion generation methods for the upper body of humanoid robots based on compensating for the yaw moment of whole body during motion. These upper body motions can effectively solve the stability problem of feet spin for robot walk. We analyze the ground reactive torque, separate the yaw moment as the compensating object and discuss the effect of arms swinging on whole body locomotion. By taking the ZMP as the reference point, trunk spin motion and arms swinging motion are generated to improve the biped motion stability, based on compensating for the yaw moment. The methods are further compared from the energy consumption point of view. Simulated experimental results validate the performance and the feasibility of the proposed methods.",
"title": ""
},
{
"docid": "f530ebff8396da2345537363449b99c9",
"text": "In this research, a fast, accurate, and stable system of lung cancer detection based on novel deep learning techniques is proposed. A convolutional neural network (CNN) structure akin to that of GoogLeNet was built using a transfer learning approach. In contrast to previous studies, Median Intensity Projection (MIP) was employed to include multi-view features of three-dimensional computed tomography (CT) scans. The system was evaluated on the LIDC-IDRI public dataset of lung nodule images and 100-fold data augmentation was performed to ensure training efficiency. The trained system produced 81% accuracy, 84% sensitivity, and 78% specificity after 300 epochs, better than other available programs. In addition, a t-based confidence interval for the population mean of the validation accuracies verified that the proposed system would produce consistent results for multiple trials. Subsequently, a controlled variable experiment was performed to elucidate the net effects of two core factors of the system - fine-tuned GoogLeNet and MIPs - on its detection accuracy. Four treatment groups were set by training and testing fine-tuned GoogLeNet and Alexnet on MIPs and common 2D CT scans, respectively. It was noteworthy that MIPs improved the network's accuracy by 12.3%, and GoogLeNet outperformed Alexnet by 2%. Lastly, remote access to the GPU-based system was enabled through a web server, which allows long-distance management of the system and its future transition into a practical tool.",
"title": ""
},
{
"docid": "88bf67ec7ff0cfa3f1dc6af12140d33b",
"text": "Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. General example of cloud services is Google apps, provided by Google and Microsoft SharePoint. The rapid growth in field of “cloud computing” also increases severe security concerns. Security has remained a constant issue for Open Systems and internet, when we are talking about security cloud really suffers. Lack of security is the only hurdle in wide adoption of cloud computing. Cloud computing is surrounded by many security issues like securing data, and examining the utilization of cloud by the cloud computing vendors. The wide acceptance www has raised security risks along with the uncountable benefits, so is the case with cloud computing. The boom in cloud computing has brought lots of security challenges for the consumers and service providers. How the end users of cloud computing know that their information is not having any availability and security issues? Every one poses, Is their information secure? This study aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing. Our work will enable researchers and security professionals to know about users and vendors concerns and critical analysis about the different security models and tools proposed.",
"title": ""
},
{
"docid": "ce0f21b03d669b72dd954352e2c35ab1",
"text": "In this letter, a new technique is proposed for the design of a compact high-power low-pass rectangular waveguide filter with a wide spurious-free frequency behavior. Specifically, the new filter is intended for the suppression of the fundamental mode over a wide band in much higher power applications than the classical corrugated filter with the same frequency specifications. Moreover, the filter length is dramatically reduced when compared to alternative techniques previously considered.",
"title": ""
},
{
"docid": "cc8c46399664594cdaa1bfc6c480a455",
"text": "INTRODUCTION\nPatients will typically undergo awake surgery for permanent implantation of spinal cord stimulation (SCS) in an attempt to optimize electrode placement using patient feedback about the distribution of stimulation-induced paresthesia. The present study compared efficacy of first-time electrode placement under awake conditions with that of neurophysiologically guided placement under general anesthesia.\n\n\nMETHODS\nA retrospective review was performed of 387 SCS surgeries among 259 patients which included 167 new stimulator implantation to determine whether first time awake surgery for placement of spinal cord stimulators is preferable to non-awake placement.\n\n\nRESULTS\nThe incidence of device failure for patients implanted using neurophysiologically guided placement under general anesthesia was one-half that for patients implanted awake (14.94% vs. 29.7%).\n\n\nCONCLUSION\nNon-awake surgery is associated with fewer failure rates and therefore fewer re-operations, making it a viable alternative. Any benefits of awake implantation should carefully be considered in the future.",
"title": ""
},
{
"docid": "41c69d2cc40964e54d9ea8a8d4f5f154",
"text": "In computer vision, action recognition refers to the act of classifying an action that is present in a given video and action detection involves locating actions of interest in space and/or time. Videos, which contain photometric information (e.g. RGB, intensity values) in a lattice structure, contain information that can assist in identifying the action that has been imaged. The process of action recognition and detection often begins with extracting useful features and encoding them to ensure that the features are specific to serve the task of action recognition and detection. Encoded features are then processed through a classifier to identify the action class and their spatial and/or temporal locations. In this report, a thorough review of various action recognition and detection algorithms in computer vision is provided by analyzing the two-step process of a typical action recognition and detection algorithm: (i) extraction and encoding of features, and (ii) classifying features into action classes. In efforts to ensure that computer vision-based algorithms reach the capabilities that humans have of identifying actions irrespective of various nuisance variables that may be present within the field of view, the state-of-the-art methods are reviewed and some remaining problems are addressed in the final chapter.",
"title": ""
}
] | scidocsrr |
aada452949a24e57489e7bb6d45a177a | Technology addiction's contribution to mental wellbeing: The positive effect of online social capital | [
{
"docid": "94d0d80880adeb6ad7a333cf6382fa90",
"text": "In 2 daily experience studies and a laboratory study, the authors test predictions from approach-avoidance motivational theory to understand how dating couples can maintain feelings of relationship satisfaction in their daily lives and over the course of time. Approach goals were associated with increased relationship satisfaction on a daily basis and over time, particularly when both partners were high in approach goals. Avoidance goals were associated with decreases in relationship satisfaction over time, and people were particularly dissatisfied when they were involved with a partner with high avoidance goals. People high in approach goals and their partners were rated as relatively more satisfied and responsive to a partner's needs by outside observers in the lab, whereas people with high avoidance goals and their partners were rated as less satisfied and responsive. Positive emotions mediated the link between approach goals and daily satisfaction in both studies, and responsiveness to the partner's needs was an additional behavioral mechanism in Study 2. Implications of these findings for approach-avoidance motivational theory and for the maintenance of satisfying relationships over time are discussed.",
"title": ""
}
] | [
{
"docid": "d99b2bab853f867024d1becb0835548d",
"text": "In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in the cloud. Such hybrid architectures enable enterprises to benefit from cloud-based architectures, while honoring application performance requirements, and privacy restrictions on what services may be migrated to the cloud. We make several contributions. First, we highlight the complexity inherent in enterprise applications today in terms of their multi-tiered nature, large number of application components, and interdependencies. Second, we have developed a model to explore the benefits of a hybrid migration approach. Our model takes into account enterprise-specific constraints, cost savings, and increased transaction delays and wide-area communication costs that may result from the migration. Evaluations based on real enterprise applications and Azure-based cloud deployments show the benefits of a hybrid migration approach, and the importance of planning which components to migrate. Third, we shed insight on security policies associated with enterprise applications in data centers. We articulate the importance of ensuring assurable reconfiguration of security policies as enterprise applications are migrated to the cloud. We present algorithms to achieve this goal, and demonstrate their efficacy on realistic migration scenarios.",
"title": ""
},
{
"docid": "7974d8e70775f1b7ef4d8c9aefae870e",
"text": "Low-rank decomposition plays a central role in accelerating convolutional neural network (CNN), and the rank of decomposed kernel-tensor is a key parameter that determines the complexity and accuracy of a neural network. In this paper, we define rank selection as a combinatorial optimization problem and propose a methodology to minimize network complexity while maintaining the desired accuracy. Combinatorial optimization is not feasible due to search space limitations. To restrict the search space and obtain the optimal rank, we define the space constraint parameters with a boundary condition. We also propose a linearly-approximated accuracy function to predict the fine-tuned accuracy of the optimized CNN model during the cost reduction. Experimental results on AlexNet and VGG-16 show that the proposed rank selection algorithm satisfies the accuracy constraint. Our method combined with truncated-SVD outperforms state-of-the-art methods in terms of inference and training time at almost the same accuracy.",
"title": ""
},
{
"docid": "d64c30da6f8d94ca4effd83075b15901",
"text": "The task of natural question generation is to generate a corresponding question given the input passage (fact) and answer. It is useful for enlarging the training set of QA systems. Previous work has adopted sequence-to-sequence models that take a passage with an additional bit to indicate answer position as input. However, they do not explicitly model the information between answer and other context within the passage. We propose a model that matches the answer with the passage before generating the question. Experiments show that our model outperforms the existing state of the art using rich features.",
"title": ""
},
{
"docid": "414160c5d5137def904c38cccc619628",
"text": "Side-channel attacks, particularly differential power analysis (DPA) attacks, are efficient ways to extract secret keys of the attacked devices by leaked physical information. To resist DPA attacks, hiding and masking methods are commonly used, but it usually resulted in high area overhead and performance degradation. In this brief, a DPA countermeasure circuit based on digital controlled ring oscillators is presented to efficiently resist the first-order DPA attack. The implementation of the critical S-box of the advanced encryption standard (AES) algorithm shows that the area overhead of a single S-box is about 19% without any extra delay in the critical path. Moreover, the countermeasure circuit can be mounted onto different S-box implementations based on composite field or look-up table (LUT). Based on our approach, a DPA-resistant AES chip can be proposed to maintain the same throughput with less than 2K extra gates.",
"title": ""
},
{
"docid": "17c6859c2ec80d4136cb8e76859e47a6",
"text": "This paper describes a complete and efficient vision system d eveloped for the robotic soccer team of the University of Aveiro, CAMB ADA (Cooperative Autonomous Mobile roBots with Advanced Distributed Ar chitecture). The system consists on a firewire camera mounted vertically on th e top of the robots. A hyperbolic mirror placed above the camera reflects the 360 d egrees of the field around the robot. The omnidirectional system is used to find t he ball, the goals, detect the presence of obstacles and the white lines, used by our localization algorithm. In this paper we present a set of algorithms to extract efficiently the color information of the acquired images and, in a second phase, ex tract the information of all objects of interest. Our vision system architect ure uses a distributed paradigm where the main tasks, namely image acquisition, co lor extraction, object detection and image visualization, are separated in se veral processes that can run at the same time. We developed an efficient color extracti on algorithm based on lookup tables and a radial model for object detection. Our participation in the last national robotic contest, ROBOTICA 2007, where we have obtained the first place in the Medium Size League of robotic soccer, shows the e ffectiveness of our algorithms. Moreover, our experiments show that the sys tem is fast and accurate having a maximum processing time independently of the r obot position and the number of objects found in the field.",
"title": ""
},
{
"docid": "5229fb13c66ca8a2b079f8fe46bb9848",
"text": "We put forth a lookup-table-based modular reduction method which partitions the binary string of an integer to be reduced into blocks according to its runs. Its complexity depends on the amount of runs in the binary string. We show that the new reduction is almost twice as fast as the popular Barrett’s reduction, and provide a thorough complexity analysis of the method.",
"title": ""
},
{
"docid": "306136e7ffd6b1839956d9f712afbda2",
"text": "Dynamic scheduling cloud resources according to the change of the load are key to improve cloud computing on-demand service capabilities. This paper proposes a load-adaptive cloud resource scheduling model based on ant colony algorithm. By real-time monitoring virtual machine of performance parameters, once judging overload, it schedules fast cloud resources using ant colony algorithm to bear some load on the load-free node. So that it can meet changing load requirements. By analyzing an example result, the model can meet the goals and requirements of self-adaptive cloud resources scheduling and improve the efficiency of the resource utilization.",
"title": ""
},
{
"docid": "f1255742f2b1851457dd92ad97db7c8e",
"text": "Model transformations are frequently applied in business process modeling to bridge between languages on a different level of abstraction and formality. In this paper, we define a transformation between BPMN which is developed to enable business user to develop readily understandable graphical representations of business processes and YAWL, a formal workflow language that is able to capture all of the 20 workflow patterns reported. We illustrate the transformation challenges and present a suitable transformation algorithm. The benefit of the transformation is threefold. Firstly, it clarifies the semantics of BPMN via a mapping to YAWL. Secondly, the deployment of BPMN business process models is simplified. Thirdly, BPMN models can be analyzed with YAWL verification tools.",
"title": ""
},
{
"docid": "2f8439098872e3af2c8d0ade5fbb15e8",
"text": "Natural language explanations of deep neural network decisions provide an intuitive way for a AI agent to articulate a reasoning process. Current textual explanations learn to discuss class discriminative features in an image. However, it is also helpful to understand which attributes might change a classification decision if present in an image (e.g., “This is not a Scarlet Tanager because it does not have black wings.”) We call such textual explanations counterfactual explanations, and propose an intuitive method to generate counterfactual explanations by inspecting which evidence in an input is missing, but might contribute to a different classification decision if present in the image. To demonstrate our method we consider a fine-grained image classification task in which we take as input an image and a counterfactual class and output text which explains why the image does not belong to a counterfactual class. We then analyze our generated counterfactual explanations both qualitatively and quantitatively using proposed automatic metrics.",
"title": ""
},
{
"docid": "aaba5dc8efc9b6a62255139965b6f98d",
"text": "The interaction of an autonomous mobile robot with the real world critically depends on the robots morphology and on its environment. Building a model of these aspects is extremely complex, making simulation insu cient for accurate validation of control algorithms. If simulation environments are often very e cient, the tools for experimenting with real robots are often inadequate. The traditional programming languages and tools seldom provide enought support for realtime experiments, thus hindering the understanding of the control algorithms and making the experimentation complex and time-consuming. A miniature robot is presented: it has a cylindrical shape measuring 55 mm in diameter and 30 mm in height. Due to its small size, experiments can be performed quickly and cost-e ectively in a small working area. Small peripherals can be designed and connected to the basic module and can take advantage of a versatile communication scheme. A serial-link is provided to run control algorithms on a workstation during debugging, thereby giving the user the opportunity of employing all available graphical tools. Once debugged, the algorithm can be downloaded to the robot and run on its own processor. Experimentation with groups of robots is hardly possible with commercially available hardware. The size and the price of the described robot open the way to cost-e ective investigations into collective behaviour. This aspect of research drives the design of the robot described in this paper. Experiments with some twenty units are planned for the near future.",
"title": ""
},
{
"docid": "70859cc5754a4699331e479a566b70f1",
"text": "The relationship between mind and brain has philosophical, scientific, and practical implications. Two separate but related surveys from the University of Edinburgh (University students, n= 250) and the University of Liège (health-care workers, lay public, n= 1858) were performed to probe attitudes toward the mind-brain relationship and the variables that account for differences in views. Four statements were included, each relating to an aspect of the mind-brain relationship. The Edinburgh survey revealed a predominance of dualistic attitudes emphasizing the separateness of mind and brain. In the Liège survey, younger participants, women, and those with religious beliefs were more likely to agree that the mind and brain are separate, that some spiritual part of us survives death, that each of us has a soul that is separate from the body, and to deny the physicality of mind. Religious belief was found to be the best predictor for dualistic attitudes. Although the majority of health-care workers denied the distinction between consciousness and the soma, more than one-third of medical and paramedical professionals regarded mind and brain as separate entities. The findings of the study are in line with previous studies in developmental psychology and with surveys of scientists' attitudes toward the relationship between mind and brain. We suggest that the results are relevant to clinical practice, to the formulation of scientific questions about the nature of consciousness, and to the reception of scientific theories of consciousness by the general public.",
"title": ""
},
{
"docid": "024b739dc047e17310fe181591fcd335",
"text": "In this paper, a Ka-Band patch sub-array structure for millimeter-wave phased array applications is demonstrated. The conventional corner truncated patch is modified to improve the impedance and CP bandwidth alignment. A new sub-array feed approach is introduced to reduce complexity of the feed line between elements and increase the radiation efficiency. A sub-array prototype is built and tested. Good agreement with the theoretical results is obtained.",
"title": ""
},
{
"docid": "64cbd9f9644cc71f5108c3f2ee7851e7",
"text": "The use of neurofeedback as an operant conditioning paradigm has disclosed that participants are able to gain some control over particular aspects of their electroencephalogram (EEG). Based on the association between theta activity (4-7 Hz) and working memory performance, and sensorimotor rhythm (SMR) activity (12-15 Hz) and attentional processing, we investigated the possibility that training healthy individuals to enhance either of these frequencies would specifically influence a particular aspect of cognitive performance, relative to a non-neurofeedback control-group. The results revealed that after eight sessions of neurofeedback the SMR-group were able to selectively enhance their SMR activity, as indexed by increased SMR/theta and SMR/beta ratios. In contrast, those trained to selectively enhance theta activity failed to exhibit any changes in their EEG. Furthermore, the SMR-group exhibited a significant and clear improvement in cued recall performance, using a semantic working memory task, and to a lesser extent showed improved accuracy of focused attentional processing using a 2-sequence continuous performance task. This suggests that normal healthy individuals can learn to increase a specific component of their EEG activity, and that such enhanced activity may facilitate semantic processing in a working memory task and to a lesser extent focused attention. We discuss possible mechanisms that could mediate such effects and indicate a number of directions for future research.",
"title": ""
},
{
"docid": "84ad547eb8a3435b214ed1a192fa96a9",
"text": "We present the first known case of somatic PTEN mosaicism causing features of Cowden syndrome (CS) and inheritance in the subsequent generation. A 20-year-old woman presented for genetics evaluation with multiple ganglioneuromas of the colon. On examination, she was found to have a thyroid goiter, macrocephaly, and tongue papules, all suggestive of CS. However, her reported family history was not suspicious for CS. A deleterious PTEN mutation was identified in blood lymphocytes, 966A>G, 967delA. Genetic testing was recommended for her parents. Her 48-year-old father was referred for evaluation and was found to have macrocephaly and a history of Hashimoto’s thyroiditis, but no other features of CS. Site-specific genetic testing carried out on blood lymphocytes showed mosaicism for the same PTEN mutation identified in his daughter. Identifying PTEN mosaicism in the proband’s father had significant implications for the risk assessment/genetic testing plan for the rest of his family. His result also provides impetus for somatic mosaicism in a parent to be considered when a de novo PTEN mutation is suspected.",
"title": ""
},
{
"docid": "f631cca2bd0c22f60af1d5f63a7522b5",
"text": "We introduce the problem of k-pattern set mining, concerned with finding a set of k related patterns under constraints. This contrasts to regular pattern mining, where one searches for many individual patterns. The k-pattern set mining problem is a very general problem that can be instantiated to a wide variety of well-known mining tasks including concept-learning, rule-learning, redescription mining, conceptual clustering and tiling. To this end, we formulate a large number of constraints for use in k-pattern set mining, both at the local level, that is, on individual patterns, and on the global level, that is, on the overall pattern set. Building general solvers for the pattern set mining problem remains a challenge. Here, we investigate to what extent constraint programming (CP) can be used as a general solution strategy. We present a mapping of pattern set constraints to constraints currently available in CP. This allows us to investigate a large number of settings within a unified framework and to gain insight in the possibilities and limitations of these solvers. This is important as it allows us to create guidelines in how to model new problems successfully and how to model existing problems more efficiently. It also opens up the way for other solver technologies.",
"title": ""
},
{
"docid": "ee2c37fd2ebc3fd783bfe53213e7470e",
"text": "Mind-body interventions are beneficial in stress-related mental and physical disorders. Current research is finding associations between emotional disorders and vagal tone as indicated by heart rate variability. A neurophysiologic model of yogic breathing proposes to integrate research on yoga with polyvagal theory, vagal stimulation, hyperventilation, and clinical observations. Yogic breathing is a unique method for balancing the autonomic nervous system and influencing psychologic and stress-related disorders. Many studies demonstrate effects of yogic breathing on brain function and physiologic parameters, but the mechanisms have not been clarified. Sudarshan Kriya yoga (SKY), a sequence of specific breathing techniques (ujjayi, bhastrika, and Sudarshan Kriya) can alleviate anxiety, depression, everyday stress, post-traumatic stress, and stress-related medical illnesses. Mechanisms contributing to a state of calm alertness include increased parasympathetic drive, calming of stress response systems, neuroendocrine release of hormones, and thalamic generators. This model has heuristic value, research implications, and clinical applications.",
"title": ""
},
{
"docid": "957a179c41a641f337b89dbfdc8ea1a9",
"text": "Medical staff around the world must take reasonable steps to identify newborns and infants clearly, so as to prevent mix-ups, and to ensure the correct medication reaches the correct child. Footprints are frequently taken despite verification with footprints being challenging due to strong noise. The noise is introduced by the tininess of the structures, movement during capture, and the infant's rapid growth. In this article we address the image processing part of the problem and introduce a novel algorithm for the extraction of creases from infant footprints. The algorithm uses directional filtering on different resolution levels, morphological processing, and block-wise crease line reconstruction. We successfully test our method on noise-affected infant footprints taken from the same infants at different ages.",
"title": ""
},
{
"docid": "45c19ce0417a5f873184dc72eb107cea",
"text": "Common Information Model (CIM) is emerging as a standard for information modelling for power control centers. While, IEC 61850 by International Electrotechnical Commission (IEC) is emerging as a standard for achieving interoperability and automation at the substation level. In future, once these two standards are well adopted, the issue of integration of these standards becomes imminent. Some efforts reported towards the integration of these standards have been surveyed. This paper describes a possible approach for the integration of IEC 61850 and CIM standards based on mapping between the representation of elements of these two standards. This enables seamless data transfer from one standard to the other. Mapping between the objects of IEC 61850 and CIM standards both in the static and dynamic models is discussed. A CIM based topology processing application is used to demonstrate the design of the data transfer between the standards. The scope and status of implementation of CIM in the Indian power sector is briefed.",
"title": ""
},
{
"docid": "39036fc99ab177774593bd0fb0fbeef0",
"text": "Manipulation of deformable objects, such as ropes and cloth, is an important but challenging problem in robotics. We present a learning-based system where a robot takes as input a sequence of images of a human manipulating a rope from an initial to goal configuration, and outputs a sequence of actions that can reproduce the human demonstration, using only monocular images as input. To perform this task, the robot learns a pixel-level inverse dynamics model of rope manipulation directly from images in a self-supervised manner, using about 60K interactions with the rope collected autonomously by the robot. The human demonstration provides a high-level plan of what to do and the low-level inverse model is used to execute the plan. We show that by combining the high and low-level plans, the robot can successfully manipulate a rope into a variety of target shapes using only a sequence of human-provided images for direction.",
"title": ""
},
{
"docid": "feef714b024ad00086a5303a8b74b0a4",
"text": "Detecting and recognizing text in natural scene images is a challenging, yet not completely solved task. In recent years several new systems that try to solve at least one of the two sub-tasks (text detection and text recognition) have been proposed. In this paper we present STN-OCR, a step towards semi-supervised neural networks for scene text recognition that can be optimized end-to-end. In contrast to most existing works that consist of multiple deep neural networks and several pre-processing steps we propose to use a single deep neural network that learns to detect and recognize text from natural images in a semi-supervised way. STN-OCR is a network that integrates and jointly learns a spatial transformer network [16], that can learn to detect text regions in an image, and a text recognition network that takes the identified text regions and recognizes their textual content. We investigate how our model behaves on a range of different tasks (detection and recognition of characters, and lines of text). Experimental results on public benchmark datasets show the ability of our model to handle a variety of different tasks, without substantial changes in its overall network structure.",
"title": ""
}
] | scidocsrr |
6ef3f5e01f0c969cc5b1bef43db31f6c | Joint Optic Disc and Cup Segmentation Based on Multi-Label Deep Network and Polar Transformation | [
{
"docid": "01f08a2710177959bf37698577fefd4f",
"text": "Glaucoma is a chronic eye disease that leads to vision loss. As it cannot be cured, detecting the disease in time is important. Current tests using intraocular pressure (IOP) are not sensitive enough for population based glaucoma screening. Optic nerve head assessment in retinal fundus images is both more promising and superior. This paper proposes optic disc and optic cup segmentation using superpixel classification for glaucoma screening. In optic disc segmentation, histograms, and center surround statistics are used to classify each superpixel as disc or non-disc. A self-assessment reliability score is computed to evaluate the quality of the automated optic disc segmentation. For optic cup segmentation, in addition to the histograms and center surround statistics, the location information is also included into the feature space to boost the performance. The proposed segmentation methods have been evaluated in a database of 650 images with optic disc and optic cup boundaries manually marked by trained professionals. Experimental results show an average overlapping error of 9.5% and 24.1% in optic disc and optic cup segmentation, respectively. The results also show an increase in overlapping error as the reliability score is reduced, which justifies the effectiveness of the self-assessment. The segmented optic disc and optic cup are then used to compute the cup to disc ratio for glaucoma screening. Our proposed method achieves areas under curve of 0.800 and 0.822 in two data sets, which is higher than other methods. The methods can be used for segmentation and glaucoma screening. The self-assessment will be used as an indicator of cases with large errors and enhance the clinical deployment of the automatic segmentation and screening.",
"title": ""
}
] | [
{
"docid": "775080dc04241460f585c49752850148",
"text": "In this paper, we propose a general purpose approach to handwriting beautification using online input from a stylus. Given a sample of writings, drawings, or sketches from the same user, our method improves a user's strokes in real-time as they are drawn. Our approach relies on one main insight. The appearance of the average of multiple instances of the same written word or shape is better than most of the individual instances. We utilize this observation using a two-stage approach. First, we propose an efficient real-time method for finding matching sets of stroke samples called tokens in a potentially large database of writings from a user. Second, we refine the user's most recently written strokes by averaging them with the matching tokens. Our approach works without handwriting recognition, and does not require a database of predefined letters, words, or shapes. Our results show improved results for a wide range of writing styles and drawings.",
"title": ""
},
{
"docid": "0db63eb4f0b54767f97138312d5da8cd",
"text": "In real-world applications such as emotion recognition from recorded brain activity, data are captured from electrodes over time. These signals constitute a multidimensional time series. In this paper, Echo State Network (ESN), a recurrent neural network with a great success in time series prediction and classification, is optimized with different neural plasticity rules for classification of emotions based on electroencephalogram (EEG) time series. Actually, the neural plasticity rules are a kind of unsupervised learning adapted for the reservoir, i.e. the hidden layer of ESN. More specifically, an investigation of Oja’s rule, BCM rule and gaussian intrinsic plasticity rule was carried out in the context of EEG-based emotion recognition. The study, also, includes a comparison of the offline and online training of the ESN. When testing on the well-known affective benchmark ”DEAP dataset” which contains EEG signals from 32 subjects, we find that pretraining ESN with gaussian intrinsic plasticity enhanced the classification accuracy and outperformed the results achieved with an ESN pretrained with synaptic plasticity. Four classification problems were conducted in which the system complexity is increased and the discrimination is more challenging, i.e. inter-subject emotion discrimination. Our proposed method achieves higher performance over the state of the art methods.",
"title": ""
},
{
"docid": "a84d4d2815a6d870055514f633770c80",
"text": "BACKGROUND\nNeuroimaging studies have shown that major depressive disorder (MDD) is accompanied by structural and functional abnormalities in specific brain regions and connections; yet, little is known about alterations of the topological organization of whole-brain networks in MDD patients.\n\n\nMETHODS\nThirty drug-naive, first-episode MDD patients and 63 healthy control subjects underwent a resting-state functional magnetic resonance imaging scan. The whole-brain functional networks were constructed by thresholding partial correlation matrices of 90 brain regions, and their topological properties (e.g., small-world, efficiency, and nodal centrality) were analyzed using graph theory-based approaches. Nonparametric permutation tests were further used for group comparisons of topological metrics.\n\n\nRESULTS\nBoth the MDD and control groups showed small-world architecture in brain functional networks, suggesting a balance between functional segregation and integration. However, compared with control subjects, the MDD patients showed altered quantitative values in the global properties, characterized by lower path length and higher global efficiency, implying a shift toward randomization in their brain networks. The MDD patients exhibited increased nodal centralities, predominately in the caudate nucleus and default-mode regions, including the hippocampus, inferior parietal, medial frontal, and parietal regions, and reduced nodal centralities in the occipital, frontal (orbital part), and temporal regions. The altered nodal centralities in the left hippocampus and the left caudate nucleus were correlated with disease duration and severity.\n\n\nCONCLUSIONS\nThese results suggest that depressive disorder is associated with disruptions in the topological organization of functional brain networks and that this disruption may contribute to disturbances in mood and cognition in MDD patients.",
"title": ""
},
{
"docid": "88785ff4fe8ff37edebbf8c74f8e2465",
"text": "We propose a data-driven method for automatic deception detection in real-life trial data using visual and verbal cues. Using OpenFace with facial action unit recognition, we analyze the movement of facial features of the witness when posed with questions and the acoustic patterns using OpenSmile. We then perform a lexical analysis on the spoken words, emphasizing the use of pauses and utterance breaks, feeding that to a Support Vector Machine to test deceit or truth prediction. We then try out a method to incorporate utterance-based fusion of visual and lexical analysis, using string based matching.",
"title": ""
},
{
"docid": "50b6f8067784fe4b9b3adf6db17ab4d1",
"text": "Available online 23 November 2012",
"title": ""
},
{
"docid": "7e5d83af3c6496e41c19b36b2392f076",
"text": "JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage documents and browser windows, however, it has also opened the door for many browser-based security attacks. Insecure engineering practices of using JavaScript may not directly lead to security breaches, but they can create new attack vectors and greatly increase the risks of browser-based attacks. In this article, we present the first measurement study on insecure practices of using JavaScript on the Web. Our focus is on the insecure practices of JavaScript inclusion and dynamic generation, and we examine their severity and nature on 6,805 unique websites. Our measurement results reveal that insecure JavaScript practices are common at various websites: (1) at least 66.4% of the measured websites manifest the insecure practices of including JavaScript files from external domains into the top-level documents of their webpages; (2) over 44.4% of the measured websites use the dangerous eval() function to dynamically generate and execute JavaScript code on their webpages; and (3) in JavaScript dynamic generation, using the document.write() method and the innerHTML property is much more popular than using the relatively secure technique of creating script elements via DOM methods. Our analysis indicates that safe alternatives to these insecure practices exist in common cases and ought to be adopted by website developers and administrators for reducing potential security risks.",
"title": ""
},
{
"docid": "3f2e76d16149b2591262befc0957e4e2",
"text": "In order to improve the performance of the high-speed brushless direct current motor drives, a novel high-precision sensorless drive has been developed. It is well known that the inevitable voltage pulses, which are generated during the commutation periods, will impact the rotor position detecting accuracy, and further impact the performance of the overall sensorless drive, especially in the higher speed range or under the heavier load conditions. For this reason, the active compensation method based on the virtual third harmonic back electromotive force incorporating the SFF-SOGI-PLL (synchronic-frequency filter incorporating the second-order generalized integrator based phase-locked loop) is proposed to precise detect the commutation points for sensorless drive. An experimental driveline system used for testing the electrical performance of the developed magnetically suspended motor is built. The mathematical analysis and the comparable experimental results have been shown to validate the effectiveness of the proposed sensorless drive algorithm.",
"title": ""
},
{
"docid": "b1488b35284b6610d44d178d56cc89eb",
"text": "We introduce an unsupervised discriminative model for the task of retrieving experts in online document collections. We exclusively employ textual evidence and avoid explicit feature engineering by learning distributed word representations in an unsupervised way. We compare our model to state-of-the-art unsupervised statistical vector space and probabilistic generative approaches. Our proposed log-linear model achieves the retrieval performance levels of state-of-the-art document-centric methods with the low inference cost of so-called profile-centric approaches. It yields a statistically significant improved ranking over vector space and generative models in most cases, matching the performance of supervised methods on various benchmarks. That is, by using solely text we can do as well as methods that work with external evidence and/or relevance feedback. A contrastive analysis of rankings produced by discriminative and generative approaches shows that they have complementary strengths due to the ability of the unsupervised discriminative model to perform semantic matching.",
"title": ""
},
{
"docid": "360389616377a67ee206cd4ede5c77d6",
"text": "We present a wrist worn medical monitoring computer designed to free high risk patient from the constraints of stationary monitoring equipment. The system combines complex medical monitoring, data analysis and communication capabilities in a truly wearable watchlike form. The paper summarizes the functionality, architecture and implementation of the system.",
"title": ""
},
{
"docid": "2af670323d2857cd79ac967bd71c61c1",
"text": "This paper describes a new architecture for synthetic aperture radar (SAR) automatic target recognition (ATR) based on the premise that the pose of the target is estimated within a high degree of precision. The advantage of our classifier design is that the input space complexity is decreased with the pose information, which enables fewer features to classify targets with a higher degree of accuracy. Moreover, the training of the classifier can be done discriminantely, which also improves performance and decreases the complexity of the classifier. Three strategies of learning and representation to build the pattern space and discriminant functions are compared: Vapnik's support vector machine (SVM), a newly developed quadratic mutual information (QMI) cost function for neural networks, and a principal component analysis extended recently with multi-resolution (PCA-M). Experimental results obtained in the MSTAR database show that the performance of our classifiers is better than that of standard template matching in the same dataset. We also rate the quality of the classifiers for detection using confusers, and show significant improvement in rejection.",
"title": ""
},
{
"docid": "a2013a7c9212829187fff9bfa42665e5",
"text": "As companies increase their efforts in retaining customers, being able to predict accurately ahead of time, whether a customer will churn in the foreseeable future is an extremely powerful tool for any marketing team. The paper describes in depth the application of Deep Learning in the problem of churn prediction. Using abstract feature vectors, that can generated on any subscription based company’s user event logs, the paper proves that through the use of the intrinsic property of Deep Neural Networks (learning secondary features in an unsupervised manner), the complete pipeline can be applied to any subscription based company with extremely good churn predictive performance. Furthermore the research documented in the paper was performed for Framed Data (a company that sells churn prediction as a service for other companies) in conjunction with the Data Science Institute at Lancaster University, UK. This paper is the intellectual property of Framed Data.",
"title": ""
},
{
"docid": "95fcfb3a94bf2cf5a1f47b0cf708bd01",
"text": "We launch the new probabilistic model checker Storm. It features the analysis of discrete-and continuous-time variants of both Markov chains and MDPs. It supports the Prism and JANI modeling languages, probabilistic programs, dynamic fault trees and generalized stochastic Petri nets. It has a modular setup in which solvers and symbolic engines can easily be exchanged. It offers a Python API for rapid prototyping by encapsulating Storm's fast and scalable algorithms. Experiments on a variety of benchmarks show its competitive performance.",
"title": ""
},
{
"docid": "331316a9b4d4a66c322e72728cf9a190",
"text": "As part of health sector reform, most developing countries are in the process of restructuring the Health Information Systems (HIS) by way of standardizing and integrating various vertical reporting systems. Nevertheless, the pressure resulting from the vertical systems supported by donors renders the integration goal challenging and unachievable. While many studies have argued for the heterogeneity of interests and multiple data needs of the donors as the major cause of the problem, this paper argue for more detailed and critical analysis of the problem. To contribute to this, the paper emphasize the need to understand the main actors involved in the process in terms of the resources and rules available to them; and their implication in the HIS integration venture. By drawing on an empirical case study and Structuration Theory concepts, the paper identified the dialectic power relations between the actors resulting from the asymmetric ownership and control of resources and rules. To alleviate the power tensions, the paper proposed i) the need to build shared meaning of the integration process through communication approaches ii) and the need to distribute the control of the integrated HIS using modularization approach facilitating ‘the tapping on’ of the resources available to each group of actors.",
"title": ""
},
{
"docid": "659deeead04953483a3ed6c5cc78cd76",
"text": "We describe ParsCit, a freely available, open-source imple entation of a reference string parsing package. At the core of ParsCit is a trained conditional random field (CRF) model used to label th token sequences in the reference string. A heuristic model wraps this core with added functionality to identify reference string s from a plain text file, and to retrieve the citation contexts . The package comes with utilities to run it as a web service or as a standalone uti lity. We compare ParsCit on three distinct reference string datasets and show that it compares well with other previously published work.",
"title": ""
},
{
"docid": "8bef38182a5cd0f05cfa9c51887c74f5",
"text": "The limited number of oral vaccines currently approved for use in humans and veterinary species clearly illustrates that development of efficacious and safe oral vaccines has been a challenge not only for fish immunologists. The insufficient efficacy of oral vaccines is partly due to antigen breakdown in the harsh gastric environment, but also to the high tolerogenic gut environment and to inadequate vaccine design. In this review we discuss current approaches used to develop oral vaccines for mass vaccination of farmed fish species. Furthermore, using various examples from the human and veterinary vaccine development, we propose additional approaches to fish vaccine design also considering recent advances in fish mucosal immunology and novel molecular tools. Finally, we discuss the pros and cons of using the zebrafish as a pre-screening animal model to potentially speed up vaccine design and testing for aquaculture fish species.",
"title": ""
},
{
"docid": "7f848facaa535d53e7a6fe7aa2435473",
"text": "The data structure used to represent image information can be critical to the successful completion of an image processing task. One structure that has attracted considerable attention is the image pyramid This consists of a set of lowpass or bandpass copies of an image, each representing pattern information of a different scale. Here we describe a variety of pyramid methods that we have developed for image data compression, enhancement, analysis and graphics. ©1984 RCA Corporation Final manuscript received November 12, 1984 Reprint Re-29-6-5 that can perform most of the routine visual tasks that humans do effortlessly. It is becoming increasingly clear that the format used to represent image data can be as critical in image processing as the algorithms applied to the data. A digital image is initially encoded as an array of pixel intensities, but this raw format is not suited to most asks. Alternatively, an image may be represented by its Fourier transform, with operations applied to the transform coefficients rather than to the original pixel values. This is appropriate for some data compression and image enhancement tasks, but inappropriate for others. The transform representation is particularly unsuited for machine vision and computer graphics, where the spatial location of pattem elements is critical. Recently there has been a great deal of interest in representations that retain spatial localization as well as localization in the spatial—frequency domain. This is achieved by decomposing the image into a set of spatial frequency bandpass component images. Individual samples of a component image represent image pattern information that is appropriately localized, while the bandpassed image as a whole represents information about a particular fineness of detail or scale. There is evidence that the human visual system uses such a representation, 1 and multiresolution schemes are becoming increasingly popular in machine vision and in image processing in general. The importance of analyzing images at many scales arises from the nature of images themselves. Scenes in the world contain objects of many sizes, and these objects contain features of many sizes. Moreover, objects can be at various distances from the viewer. As a result, any analysis procedure that is applied only at a single scale may miss information at other scales. The solution is to carry out analyses at all scales simultaneously. Convolution is the basic operation of most image analysis systems, and convolution with large weighting functions is a notoriously expensive computation. In a multiresolution system one wishes to perform convolutions with kernels of many sizes, ranging from very small to very large. and the computational problems appear forbidding. Therefore one of the main problems in working with multiresolution representations is to develop fast and efficient techniques. Members of the Advanced Image Processing Research Group have been actively involved in the development of multiresolution techniques for some time. Most of the work revolves around a representation known as a \"pyramid,\" which is versatile, convenient, and efficient to use. We have applied pyramid-based methods to some fundamental problems in image analysis, data compression, and image manipulation.",
"title": ""
},
{
"docid": "3e6c4f94570670e13f357a5ceff83ed3",
"text": "Day by day more and more devices are getting connected to the Internet and with the advent of the Internet of Things, this rate has had an exponential growth. The lack of security in devices connected to the IoT is making them hot targets for cyber-criminals and strength of botnet attacks have increased drastically. Botnets are the technological backbones of multitudinous attacks including Distributed Denial of Service (DDoS), SPAM, identity theft and organizational spying. The 2016 Dyn cyber attack involved multiple DDoS attacks with an estimated throughput of 1.2 terabits per second; the attack is the largest DDoS attack on record. In this paper, we compare three different techniques for botnet detection with each having its unique use cases. The results of the detection methods were verified using ISCX Intrusion Detection Dataset and the CTU-13 Dataset.",
"title": ""
},
{
"docid": "7bf0e8eb4a70abcc36d101a300e4a03c",
"text": "In this paper, we present a new algorithm that automatically classifies wandering patterns (or behaviors) of patients with Alzheimer's disease and other different types of dementia. Experimental results on a real-life dataset show that this algorithm can provide a robust and credible assistive technology for monitoring patients with dementia (PWD) who are prone to wandering. Combined with indoor and outdoor location technologies using ubiquitous devices such as smart phones, we also demonstrate the feasibility of a remote mobile healthcare monitoring solution that is capable of reasoning about wandering behaviors of PWD and real-time detection of abnormalities that require timely intervention from caregivers.",
"title": ""
},
{
"docid": "3f72e02928b5fcc6e8a9155f0344e6e1",
"text": "Due to the limitations of power amplifiers or loudspeakers, the echo signals captured in the microphones are not in a linear relationship with the far-end signals even when the echo path is perfectly linear. The nonlinear components of the echo cannot be successfully removed by a linear acoustic echo canceller. Residual echo suppression (RES) is a technique to suppress the remained echo after acoustic echo suppression (AES). Conventional approaches compute RES gain using Wiener filter or spectral subtraction method based on the estimated statistics on related signals. In this paper, we propose a deep neural network (DNN)-based RES gain estimation based on both the far-end and the AES output signals in all frequency bins. A DNN architecture, which is suitable to model a complicated nonlinear mapping between high-dimensional vectors, is employed as a regression function from these signals to the optimal RES gain. The proposed method can suppress the residual components without any explicit double-talk detectors. The experimental results show that our proposed approach outperforms a conventional method in terms of the echo return loss enhancement (ERLE) for single-talk periods and the perceptual evaluation of speech quality (PESQ) score for double-talk periods.",
"title": ""
}
] | scidocsrr |
d9f5438e76dc0fddb745e99e13477dcf | Edgecourier: an edge-hosted personal service for low-bandwidth document synchronization in mobile cloud storage services | [
{
"docid": "2c4babb483ddd52c9f1333cbe71a3c78",
"text": "The proliferation of Internet of Things (IoT) and the success of rich cloud services have pushed the horizon of a new computing paradigm, edge computing, which calls for processing the data at the edge of the network. Edge computing has the potential to address the concerns of response time requirement, battery life constraint, bandwidth cost saving, as well as data safety and privacy. In this paper, we introduce the definition of edge computing, followed by several case studies, ranging from cloud offloading to smart home and city, as well as collaborative edge to materialize the concept of edge computing. Finally, we present several challenges and opportunities in the field of edge computing, and hope this paper will gain attention from the community and inspire more research in this direction.",
"title": ""
}
] | [
{
"docid": "9d28e5b6ad14595cd2d6b4071a867f6f",
"text": "This paper presents the analysis and the comparison study of a High-voltage High-frequency Ozone Generator using PWM and Phase-Shifted PWM full-bridge inverter as a power supply. The circuits operations of the inverters are fully described. In order to ensure that zero voltage switching (ZVS) mode always operated over a certain range of a frequency variation, a series-compensated resonant inductor is included. The comparison study are ozone quantity and output voltage that supplied by the PWM and Phase-Shifted PWM full-bridge inverter. The ozone generator fed by Phase-Shifted PWM full-bridge inverter, is capability of varying ozone gas production quantity by varying the frequency and phase shift angle of the converter whilst the applied voltage to the electrode is kept constant. However, the ozone generator fed by PWM full-bridge inverter, is capability of varying ozone gas production quantity by varying the frequency of the converter whilst the applied voltage to the electrode is decreased. As a consequence, the absolute ozone quantity affected by the frequency is possibly achieved.",
"title": ""
},
{
"docid": "423cba015a9cfc247943dd7d3c4ea1cf",
"text": "No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or informa tion storage and retrieval) without permission in writing from the publisher. Preface Probability is common sense reduced to calculation Laplace This book is an outgrowth of our involvement in teaching an introductory prob ability course (\"Probabilistic Systems Analysis'�) at the Massachusetts Institute of Technology. The course is attended by a large number of students with diverse back grounds, and a broad range of interests. They span the entire spectrum from freshmen to beginning graduate students, and from the engineering school to the school of management. Accordingly, we have tried to strike a balance between simplicity in exposition and sophistication in analytical reasoning. Our key aim has been to develop the ability to construct and analyze probabilistic models in a manner that combines intuitive understanding and mathematical precision. In this spirit, some of the more mathematically rigorous analysis has been just sketched or intuitively explained in the text. so that complex proofs do not stand in the way of an otherwise simple exposition. At the same time, some of this analysis is developed (at the level of advanced calculus) in theoretical prob lems, that are included at the end of the corresponding chapter. FUrthermore, some of the subtler mathematical issues are hinted at in footnotes addressed to the more attentive reader. The book covers the fundamentals of probability theory (probabilistic mod els, discrete and continuous random variables, multiple random variables, and limit theorems), which are typically part of a first course on the subject. It also contains, in Chapters 4-6 a number of more advanced topics, from which an instructor can choose to match the goals of a particular course. In particular, in Chapter 4, we develop transforms, a more advanced view of conditioning, sums of random variables, least squares estimation, and the bivariate normal distribu-v vi Preface tion. Furthermore, in Chapters 5 and 6, we provide a fairly detailed introduction to Bernoulli, Poisson, and Markov processes. Our M.LT. course covers all seven chapters in a single semester, with the ex ception of the material on the bivariate normal (Section 4.7), and on continuous time Markov chains (Section 6.5). However, in an alternative course, the material on stochastic processes could be omitted, thereby allowing additional emphasis on foundational material, or coverage of other topics of the instructor's choice. Our …",
"title": ""
},
{
"docid": "7e1712f9e2846862d072c902a84b2832",
"text": "Reinforcement learning is a computational approach to learn from interaction. However, learning from scratch using reinforcement learning requires exorbitant number of interactions with the environment even for simple tasks. One way to alleviate the problem is to reuse previously learned skills as done by humans. This thesis provides frameworks and algorithms to build and reuse Skill Library. Firstly, we extend the Parameterized Action Space formulation using our Skill Library to multi-goal setting and show improvements in learning using hindsight at coarse level. Secondly, we use our Skill Library for exploring at a coarser level to learn the optimal policy for continuous control. We demonstrate the benefits, in terms of speed and accuracy, of the proposed approaches for a set of real world complex robotic manipulation tasks in which some state-of-the-art methods completely fail.",
"title": ""
},
{
"docid": "6f484310532a757a28c427bad08f7623",
"text": "We address the problem of tracking and recognizing faces in real-world, noisy videos. We track faces using a tracker that adaptively builds a target model reflecting changes in appearance, typical of a video setting. However, adaptive appearance trackers often suffer from drift, a gradual adaptation of the tracker to non-targets. To alleviate this problem, our tracker introduces visual constraints using a combination of generative and discriminative models in a particle filtering framework. The generative term conforms the particles to the space of generic face poses while the discriminative one ensures rejection of poorly aligned targets. This leads to a tracker that significantly improves robustness against abrupt appearance changes and occlusions, critical for the subsequent recognition phase. Identity of the tracked subject is established by fusing pose-discriminant and person-discriminant features over the duration of a video sequence. This leads to a robust video-based face recognizer with state-of-the-art recognition performance. We test the quality of tracking and face recognition on real-world noisy videos from YouTube as well as the standard Honda/UCSD database. Our approach produces successful face tracking results on over 80% of all videos without video or person-specific parameter tuning. The good tracking performance induces similarly high recognition rates: 100% on Honda/UCSD and over 70% on the YouTube set containing 35 celebrities in 1500 sequences.",
"title": ""
},
{
"docid": "09e9a3c3ae9552d675aea363b672312d",
"text": "Substrate Integrated Waveguides (SIW) are used for transmission of Electromagnetic waves. They are planar structures belonging to the family of Substrate Integrated Circuits. Because of their planar nature, they can be fabricated on planar circuits like Printed Circuit Boards (PCB) and can be integrated with other planar transmission lines like microstrips. They retain the low loss property of their conventional metallic waveguides and are widely used as interconnection in high speed circuits, filters, directional couplers, antennas. This paper is a comprehensive review of Substrate Integrated Waveguide and its integration with Microstrip line. In this paper, design techniques for SIW and its microstrip interconnect are presented. HFSS is used for simulation results. The objective of this paper is to provide broad perspective of SIW Technology.",
"title": ""
},
{
"docid": "c2f807e336be1b8d918d716c07668ae1",
"text": "The present article proposes and describes a new ZCS non-isolated bidirectional buck-boost DC-DC converter for energy storage applications in electric vehicles. Usually, the conventional converters are adapted with an auxiliary resonant cell to provide the zero current switching turn-on/turn-off condition for the main switching devices. The advantages of proposed converter has reduced switching losses, reduced component count and improved efficiency. The proposed converter operates either in boost or buck mode. This paper mainly deals with the operating principles, analysis and design simulations of the proposed converter in order to prove the better soft-switching capability, reduced switching losses and efficiency improvement than the conventional converter.",
"title": ""
},
{
"docid": "e92f19a7d99df50321f21ce639a84a35",
"text": "Software tagging has been shown to be an efficient, lightweight social computing mechanism to improve different social and technical aspects of software development. Despite the importance of tags, there exists limited support for automatic tagging for software artifacts, especially during the evolutionary process of software development. We conducted an empirical study on IBM Jazz's repository and found that there are several missing tags in artifacts and more precise tags are desirable. This paper introduces a novel, accurate, automatic tagging recommendation tool that is able to take into account users' feedbacks on tags, and is very efficient in coping with software evolution. The core technique is an automatic tagging algorithm that is based on fuzzy set theory. Our empirical evaluation on the real-world IBM Jazz project shows the usefulness and accuracy of our approach and tool.",
"title": ""
},
{
"docid": "460aa0df99a3e88a752d5f657f1565de",
"text": "Recent case studies have suggested that emotion perception and emotional experience of music have independent cognitive processing. We report a patient who showed selective impairment of emotional experience only in listening to music, that is musical anhednia. A 71-year-old right-handed man developed an infarction in the right parietal lobe. He found himself unable to experience emotion in listening to music, even to which he had listened pleasantly before the illness. In neuropsychological assessments, his intellectual, memory, and constructional abilities were normal. Speech audiometry and recognition of environmental sounds were within normal limits. Neuromusicological assessments revealed no abnormality in the perception of elementary components of music, expression and emotion perception of music. Brain MRI identified the infarct lesion in the right inferior parietal lobule. These findings suggest that emotional experience of music could be selectively impaired without any disturbance of other musical, neuropsychological abilities. The right parietal lobe might participate in emotional experience in listening to music.",
"title": ""
},
{
"docid": "dfae6cf3df890c8cfba756384c4e88e6",
"text": "In this paper, we propose a second order optimization method to learn models where both the dimensionality of the parameter space and the number of training samples is high. In our method, we construct on each iteratio n a Krylov subspace formed by the gradient and an approximation to the Hess ian matrix, and then use a subset of the training data samples to optimize ove r this subspace. As with the Hessian Free (HF) method of [6], the Hessian matrix i s never explicitly constructed, and is computed using a subset of data. In p ractice, as in HF, we typically use a positive definite substitute for the Hessi an matrix such as the Gauss-Newton matrix. We investigate the effectiveness of o ur proposed method on learning the parameters of deep neural networks, and comp are its performance to widely used methods such as stochastic gradient descent, conjugate gradient descent and L-BFGS, and also to HF. Our method leads to faster convergence than either L-BFGS or HF, and generally performs better than either of them in cross-validation accuracy. It is also simpler and more gene ral than HF, as it does not require a positive semi-definite approximation of the He ssian matrix to work well nor the setting of a damping parameter. The chief drawba ck versus HF is the need for memory to store a basis for the Krylov subspace.",
"title": ""
},
{
"docid": "c92807c973f51ac56fe6db6c2bb3f405",
"text": "Machine learning relies on the availability of a vast amount of data for training. However, in reality, most data are scattered across different organizations and cannot be easily integrated under many legal and practical constraints. In this paper, we introduce a new technique and framework, known as federated transfer learning (FTL), to improve statistical models under a data federation. The federation allows knowledge to be shared without compromising user privacy, and enables complimentary knowledge to be transferred in the network. As a result, a target-domain party can build more flexible and powerful models by leveraging rich labels from a source-domain party. A secure transfer cross validation approach is also proposed to guard the FTL performance under the federation. The framework requires minimal modifications to the existing model structure and provides the same level of accuracy as the nonprivacy-preserving approach. This framework is very flexible and can be effectively adapted to various secure multi-party machine learning tasks.",
"title": ""
},
{
"docid": "c9077052caa804aaa58d43aaf8ba843f",
"text": "Many authors have laid down a concept about organizational learning and the learning organization. Amongst them They contributed an explanation on how organizations learn and provided tools to transfer the theoretical concepts of organizational learning into practice. Regarding the present situation it seems, that organizational learning becomes even more important. This paper provides a complementary view on the learning organization from the perspective of the evolutionary epistemology. The evolutionary epistemology gives an answer, where the subjective structures of cognition come from and why they are similar in all human beings. Applying this evolutionary concept to organizations it could be possible to provide a deeper insight of the cognition processes of organizations and explain the principles that lay behind a learning organization. It also could give an idea, which impediments in learning, caused by natural dispositions, deduced from genetic barriers of cognition in biology are existing and managers must be aware of when trying to facilitate organizational learning within their organizations.",
"title": ""
},
{
"docid": "ad0892ee2e570a8a2f5a90883d15f2d2",
"text": "Supervised event extraction systems are limited in their accuracy due to the lack of available training data. We present a method for self-training event extraction systems by bootstrapping additional training data. This is done by taking advantage of the occurrence of multiple mentions of the same event instances across newswire articles from multiple sources. If our system can make a highconfidence extraction of some mentions in such a cluster, it can then acquire diverse training examples by adding the other mentions as well. Our experiments show significant performance improvements on multiple event extractors over ACE 2005 and TAC-KBP 2015 datasets.",
"title": ""
},
{
"docid": "c08fa2224b8a38b572ea546abd084bd1",
"text": "Off-chip main memory has long been a bottleneck for system performance. With increasing memory pressure due to multiple on-chip cores, effective cache utilization is important. In a system with limited cache space, we would ideally like to prevent 1) cache pollution, i.e., blocks with low reuse evicting blocks with high reuse from the cache, and 2) cache thrashing, i.e., blocks with high reuse evicting each other from the cache.\n In this paper, we propose a new, simple mechanism to predict the reuse behavior of missed cache blocks in a manner that mitigates both pollution and thrashing. Our mechanism tracks the addresses of recently evicted blocks in a structure called the Evicted-Address Filter (EAF). Missed blocks whose addresses are present in the EAF are predicted to have high reuse and all other blocks are predicted to have low reuse. The key observation behind this prediction scheme is that if a block with high reuse is prematurely evicted from the cache, it will be accessed soon after eviction. We show that an EAF-implementation using a Bloom filter, which is cleared periodically, naturally mitigates the thrashing problem by ensuring that only a portion of a thrashing working set is retained in the cache, while incurring low storage cost and implementation complexity.\n We compare our EAF-based mechanism to five state-of-the-art mechanisms that address cache pollution or thrashing, and show that it provides significant performance improvements for a wide variety of workloads and system configurations.",
"title": ""
},
{
"docid": "ada1db1673526f98840291977998773d",
"text": "The effect of immediate versus delayed feedback on rule-based and information-integration category learning was investigated. Accuracy rates were examined to isolate global performance deficits, and model-based analyses were performed to identify the types of response strategies used by observers. Feedback delay had no effect on the accuracy of responding or on the distribution of best fitting models in the rule-based category-learning task. However, delayed feedback led to less accurate responding in the information-integration category-learning task. Model-based analyses indicated that the decline in accuracy with delayed feedback was due to an increase in the use of rule-based strategies to solve the information-integration task. These results provide support for a multiple-systems approach to category learning and argue against the validity of single-system approaches.",
"title": ""
},
{
"docid": "fee191728bc0b1fbf11344961be10215",
"text": "In recent years, there has been increased interest in topic-focused multi-document summarization. In this task, automatic summaries are produced in response to a specific information request, or topic, stated by the user. The system we have designed to accomplish this task comprises four main components: a generic extractive summarization system, a topic-focusing component, sentence simplification, and lexical expansion of topic words. This paper details each of these components, together with experiments designed to quantify their individual contributions. We include an analysis of our results on two large datasets commonly used to evaluate task-focused summarization, the DUC2005 and DUC2006 datasets, using automatic metrics. Additionally, we include an analysis of our results on the DUC2006 task according to human evaluation metrics. In the human evaluation of system summaries compared to human summaries, i.e., the Pyramid method, our system ranked first out of 22 systems in terms of overall mean Pyramid score; and in the human evaluation of summary responsiveness to the topic, our system ranked third out of 35 systems. Disciplines Computer Sciences Comments Vanderwende, L., Suzuki, H., Brockett, C., & Nenkova, A., Beyond SumBasic: Task-Focused Summarization with Sentence Simplification and Lexical Expansion, Information Processing and Management, Special Issue on Summarization Volume 43, Issue 6, 2007, doi: 10.1016/j.ipm.2007.01.023 This conference paper is available at ScholarlyCommons: http://repository.upenn.edu/cis_papers/736",
"title": ""
},
{
"docid": "5528f1ee010e7fba440f1f7ff84a3e8e",
"text": "In presenting this thesis in partial fulfillment of the requirements for a Master's degree at the University of Washington, I agree that the Library shall make its copies freely available for inspection. I further agree that extensive copying of this thesis is allowable only for scholarly purposes, consistent with \"fair use\" as prescribed in the U.S. Copyright Law. Any other reproduction for any purposes or by any means shall not be allowed without my written permission. PREFACE Over the last several years, professionals from many different fields have come to the Human Interface Technology Laboratory (H.I.T.L) to discover and learn about virtual environments. In general, they are impressed by their experiences and express the tremendous potential the tool has in their respective fields. But the potentials are always projected far in the future, and the tool remains just a concept. This is justifiable because the quality of the visual experience is so much less than what people are used to seeing; high definition television, breathtaking special cinematographic effects and photorealistic computer renderings. Instead, the models in virtual environments are very simple looking; they are made of small spaces, filled with simple or abstract looking objects of little color distinctions as seen through displays of noticeably low resolution and at an update rate which leaves much to be desired. Clearly, for most applications, the requirements of precision have not been met yet with virtual interfaces as they exist today. However, there are a few domains where the relatively low level of the technology could be perfectly appropriate. In general, these are applications which require that the information be presented in symbolic or representational form. Having studied architecture, I knew that there are moments during the early part of the design process when conceptual decisions are made which require precisely the simple and representative nature available in existing virtual environments. This was a marvelous discovery for me because I had found a viable use for virtual environments which could be immediately beneficial to architecture, my shared area of interest. It would be further beneficial to architecture in that the virtual interface equipment I would be evaluating at the H.I.T.L. happens to be relatively less expensive and more practical than other configurations such as the \"Walkthrough\" at the University of North Carolina. The setup at the H.I.T.L. could be easily introduced into architectural firms because it takes up very little physical room (150 …",
"title": ""
},
{
"docid": "980bc7323411806e6e4faffe0b7303e2",
"text": "The ability to generate intermediate frames between two given images in a video sequence is an essential task for video restoration and video post-processing. In addition, restoration requires robust denoising algorithms, must handle corrupted frames and recover from impaired frames accordingly. In this paper we present a unified framework for all these tasks. In our approach we use a variant of the TV-L denoising algorithm that operates on image sequences in a space-time volume. The temporal derivative is modified to take the pixels’ movement into account. In order to steer the temporal gradient in the desired direction we utilize optical flow to estimate the velocity vectors between consecutive frames. We demonstrate our approach on impaired movie sequences as well as on benchmark datasets where the ground-truth is known.",
"title": ""
},
{
"docid": "d690cfa0fbb63e53e3d3f7a1c7a6a442",
"text": "Ambient intelligence has acquired great importance in recent years and requires the development of new innovative solutions. This paper presents a distributed telemonitoring system, aimed at improving healthcare and assistance to dependent people at their homes. The system implements a service-oriented architecture based platform, which allows heterogeneous wireless sensor networks to communicate in a distributed way independent of time and location restrictions. This approach provides the system with a higher ability to recover from errors and a better flexibility to change their behavior at execution time. Preliminary results are presented in this paper.",
"title": ""
},
{
"docid": "cb1e6d11d372e72f7675a55c8f2c429d",
"text": "We evaluate the performance of a hardware/software architecture designed to perform a wide range of fast image processing tasks. The system ar chitecture is based on hardware featuring a Field Programmable Gate Array (FPGA) co-processor and a h ost computer. A LabVIEW TM host application controlling a frame grabber and an industrial camer a is used to capture and exchange video data with t he hardware co-processor via a high speed USB2.0 chann el, implemented with a standard macrocell. The FPGA accelerator is based on a Altera Cyclone II ch ip and is designed as a system-on-a-programmablechip (SOPC) with the help of an embedded Nios II so ftware processor. The SOPC system integrates the CPU, external and on chip memory, the communication channel and typical image filters appropriate for the evaluation of the system performance. Measured tran sfer rates over the communication channel and processing times for the implemented hardware/softw are logic are presented for various frame sizes. A comparison with other solutions is given and a rang e of applications is also discussed.",
"title": ""
},
{
"docid": "d88ce8a3e9f669c40b21710b69ac11be",
"text": "The smart city concept represents a compelling platform for IT-enabled service innovation. It offers a view of the city where service providers use information technologies to engage with citizens to create more effective urban organizations and systems that can improve the quality of life. The emerging Internet of Things (IoT) model is foundational to the development of smart cities. Integrated cloud-oriented architecture of networks, software, sensors, human interfaces, and data analytics are essential for value creation. IoT smart-connected products and the services they provision will become essential for the future development of smart cities. This paper will explore the smart city concept and propose a strategy development model for the implementation of IoT systems in a smart city context.",
"title": ""
}
] | scidocsrr |
4c392230acb383f80323c11d009eb2c5 | 3D Selective Search for obtaining object candidates | [
{
"docid": "d4ac0d6890cc89e2525b9537376cce39",
"text": "Unsupervised over-segmentation of an image into regions of perceptually similar pixels, known as super pixels, is a widely used preprocessing step in segmentation algorithms. Super pixel methods reduce the number of regions that must be considered later by more computationally expensive algorithms, with a minimal loss of information. Nevertheless, as some information is inevitably lost, it is vital that super pixels not cross object boundaries, as such errors will propagate through later steps. Existing methods make use of projected color or depth information, but do not consider three dimensional geometric relationships between observed data points which can be used to prevent super pixels from crossing regions of empty space. We propose a novel over-segmentation algorithm which uses voxel relationships to produce over-segmentations which are fully consistent with the spatial geometry of the scene in three dimensional, rather than projective, space. Enforcing the constraint that segmented regions must have spatial connectivity prevents label flow across semantic object boundaries which might otherwise be violated. Additionally, as the algorithm works directly in 3D space, observations from several calibrated RGB+D cameras can be segmented jointly. Experiments on a large data set of human annotated RGB+D images demonstrate a significant reduction in occurrence of clusters crossing object boundaries, while maintaining speeds comparable to state-of-the-art 2D methods.",
"title": ""
}
] | [
{
"docid": "5397a5e4fd0c3343724b1b8011582cb0",
"text": "BACKGROUND\nDeep brain stimulation of the subthalamic nucleus (STN DBS) is an increasingly common treatment for Parkinson's disease. Qualitative reviews have concluded that diminished verbal fluency is common after STN DBS, but that changes in global cognitive abilities, attention, executive functions, and memory are only inconsistently observed and, when present, often nominal or transient. We did a quantitative meta-analysis to improve understanding of the variability and clinical significance of cognitive dysfunction after STN DBS.\n\n\nMETHODS\nWe searched MedLine, PsycLIT, and ISI Web of Science electronic databases for articles published between 1990 and 2006, and extracted information about number of patients, exclusion criteria, confirmation of target by microelectrode recording, verification of electrode placement via radiographic means, stimulation parameters, assessment time points, assessment measures, whether patients were on levodopa or dopaminomimetics, and summary statistics needed for computation of effect sizes. We used the random-effects meta-analytical model to assess continuous outcomes before and after STN DBS.\n\n\nFINDINGS\nOf 40 neuropsychological studies identified, 28 cohort studies (including 612 patients) were eligible for inclusion in the meta-analysis. After adjusting for heterogeneity of variance in study effect sizes, the random effects meta-analysis revealed significant, albeit small, declines in executive functions and verbal learning and memory. Moderate declines were only reported in semantic (Cohen's d 0.73) and phonemic verbal fluency (0.51). Changes in verbal fluency were not related to patient age, disease duration, stimulation parameters, or change in dopaminomimetic dose after surgery.\n\n\nINTERPRETATION\nSTN DBS, in selected patients, seems relatively safe from a cognitive standpoint. However, difficulty in identification of factors underlying changes in verbal fluency draws attention to the need for uniform and detailed reporting of patient selection, demographic, disease, treatment, surgical, stimulation, and clinical outcome parameters.",
"title": ""
},
{
"docid": "201f6b0491ecab7bc89f7f18a4d11f25",
"text": "Gesture and speech combine to form a rich basis for human conversational interaction. To exploit these modalities in HCI, we need to understand the interplay between them and the way in which they support communication. We propose a framework for the gesture research done to date, and present our work on the cross-modal cues for discourse segmentation in free-form gesticulation accompanying speech in natural conversation as a new paradigm for such multimodal interaction. The basis for this integration is the psycholinguistic concept of the coequal generation of gesture and speech from the same semantic intent. We present a detailed case study of a gesture and speech elicitation experiment in which a subject describes her living space to an interlocutor. We perform two independent sets of analyses on the video and audio data: video and audio analysis to extract segmentation cues, and expert transcription of the speech and gesture data by microanalyzing the videotape using a frame-accurate videoplayer to correlate the speech with the gestural entities. We compare the results of both analyses to identify the cues accessible in the gestural and audio data that correlate well with the expert psycholinguistic analysis. We show that \"handedness\" and the kind of symmetry in two-handed gestures provide effective supersegmental discourse cues.",
"title": ""
},
{
"docid": "c8d4fad2d3f5c7c2402ca60bb4f6dcca",
"text": "The Pix2pix [17] and CycleGAN [40] losses have vastly improved the qualitative and quantitative visual quality of results in image-to-image translation tasks. We extend this framework by exploring approximately invertible architectures which are well suited to these losses. These architectures are approximately invertible by design and thus partially satisfy cycle-consistency before training even begins. Furthermore, since invertible architectures have constant memory complexity in depth, these models can be built arbitrarily deep. We are able to demonstrate superior quantitative output on the Cityscapes and Maps datasets at near constant memory budget.",
"title": ""
},
{
"docid": "d2343666a57124cca836ad9a5d784d5b",
"text": "In order to further advance research within management accounting and integrated information systems (IIS), an understanding of what research has already been done and what research is needed is of particular importance. The purpose of this paper is to uncover, classify and interpret current research within management accounting and IIS. This is done partly to identify research gaps and propose directions for future research and partly to guide researchers and practitioners investigating and making decisions on how to better synthesise the two areas. Based on the strengths of existing frameworks covering elements of management accounting and IIS a new and more comprehensive theoretical framework is developed. This is used as a basis for classifying and presentation of the reviewed literature in structured form. The outcome of the review is an identification of research gaps and a proposal of research opportunities within different research paradigms and with the use of different methods. © 2007 Elsevier Inc. All rights reserved.",
"title": ""
},
{
"docid": "56cfaf2e85696a9b42762c1f863a11ff",
"text": "With an increasing inflow and outflow of users from social media, understanding the factors the drive their adoption becomes even more pressing. This paper reports on a study with 494 users of Facebook and WhatsApp. Different from traditional uses & gratifications studies that probe into typical uses of social media, we sampled users' single recent, outstanding (either satisfying or unsatisfying) experiences, based on a contemporary theoretical and methodological framework of 10 universal human needs. Using quantitative and qualitative analyses, we found WhatsApp to unlock new opportunities for intimate communications, Facebook to be characterized by primarily non-social uses, and both media to be powerful lifelogging tools. Unsatisfying experiences were primarily rooted in the tools' breach of offline social norms, as well in content fatigue and exposure to undesirable content in the case of Facebook. We discuss the implications of the findings for the design of social media. © 2015 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "1e176f66a29b6bd3dfce649da1a4db9d",
"text": "In just a few years, crowdsourcing markets like Mechanical Turk have become the dominant mechanism for for building \"gold standard\" datasets in areas of computer science ranging from natural language processing to audio transcription. The assumption behind this sea change - an assumption that is central to the approaches taken in hundreds of research projects - is that crowdsourced markets can accurately replicate the judgments of the general population for knowledge-oriented tasks. Focusing on the important domain of semantic relatedness algorithms and leveraging Clark's theory of common ground as a framework, we demonstrate that this assumption can be highly problematic. Using 7,921 semantic relatedness judgements from 72 scholars and 39 crowdworkers, we show that crowdworkers on Mechanical Turk produce significantly different semantic relatedness gold standard judgements than people from other communities. We also show that algorithms that perform well against Mechanical Turk gold standard datasets do significantly worse when evaluated against other communities' gold standards. Our results call into question the broad use of Mechanical Turk for the development of gold standard datasets and demonstrate the importance of understanding these datasets from a human-centered point-of-view. More generally, our findings problematize the notion that a universal gold standard dataset exists for all knowledge tasks.",
"title": ""
},
{
"docid": "6d58e50c119f400af6bbeef7ce2a72bb",
"text": "Brushless DC (BLDC) Motors are widely used in industrial and consumer appliances due to their high efficiency, high power density, low maintenance and silent operation. However the need for position sensors makes the drive less reliable and expensive. Sensorless control is therefore gaining importance now-a-days. This paper proposes an indirect way of detecting the zero crossing instant of the back-EMF from the three terminal voltages without using the neutral potential. Inaccuracies due to device drops have been eliminated. This scheme is simple to implement. Simulation results show the validity of this scheme.",
"title": ""
},
{
"docid": "562df031fad2ed1583c1def457d74392",
"text": "Social interaction is a cornerstone of human life, yet the neural mechanisms underlying social cognition are poorly understood. Recently, research that integrates approaches from neuroscience and social psychology has begun to shed light on these processes, and converging evidence from neuroimaging studies suggests a unique role for the medial frontal cortex. We review the emerging literature that relates social cognition to the medial frontal cortex and, on the basis of anatomical and functional characteristics of this brain region, propose a theoretical model of medial frontal cortical function relevant to different aspects of social cognitive processing.",
"title": ""
},
{
"docid": "d710b31d51cd7c737505de9bbe2a31ad",
"text": "GAIL is a recent successful imitation learning architecture that exploits the adversarial training procedure introduced in GANs. Albeit successful at generating behaviours similar to those demonstrated to the agent, GAIL suffers from a high sample complexity in the number of interactions it has to carry out in the environment in order to achieve satisfactory performance. We dramatically shrink the amount of interactions with the environment necessary to learn well-behaved imitation policies, by up to several orders of magnitude. Our framework, operating in the model-free regime, exhibits a significant increase in sample-efficiency over previous methods by simultaneously a) learning a self-tuned adversarially-trained surrogate reward and b) leveraging an off-policy actor-critic architecture. We show that our approach is simple to implement and that the learned agents remain remarkably stable, as shown in our experiments that span a variety of continuous control tasks. Video visualisation available at: https://streamable.com/42l01",
"title": ""
},
{
"docid": "12d6aab2ecf0802fd59b77ed8a209e99",
"text": "This paper reviews the econometric issues in efforts to estimate the impact of the death penalty on murder, focusing on six recent studies published since 2003. We highlight the large number of choices that must be made when specifying the various panel data models that have been used to address this question. There is little clarity about the knowledge potential murderers have concerning the risk of execution: are they influenced by the passage of a death penalty statute, the number of executions in a state, the proportion of murders in a state that leads to an execution, and details about the limited types of murders that are potentially susceptible to a sentence of death? If an execution rate is a viable proxy, should it be calculated using the ratio of last year’s executions to last year’s murders, last year’s executions to the murders a number of years earlier, or some other values? We illustrate how sensitive various estimates are to these choices. Importantly, the most up-to-date OLS panel data studies generate no evidence of a deterrent effect, while three 2SLS studies purport to find such evidence. The 2SLS studies, none of which shows results that are robust to clustering their standard errors, are unconvincing because they all use a problematic structure based on poorly measured and theoretically inappropriate pseudo-probabilities that are",
"title": ""
},
{
"docid": "cbf96988cc476a76bbf650bfa5b88e0e",
"text": "The authors examined the generalizability of first impressions from faces previously documented in industrialized cultures to the Tsimane’ people in the remote Bolivian rainforest. Tsimane’ as well as U.S. judges showed within-culture agreement in impressions of attractiveness, babyfaceness, and traits (healthy, intelligent/knowledgeable, dominant/respected, and sociable/warm) of own-culture faces. Both groups also showed within-culture agreement for impressions of otherculture faces, although it was weaker than for own-culture faces, particularly among Tsimane’ judges. Moreover, there was between-culture agreement, particularly for Tsimane’ faces. Use of facial attractiveness to judge traits contributed to agreement within and between cultures but did not fully explain it. Furthermore, Tsimane’, like U.S., judges showed a strong attractiveness halo in impressions of faces from both cultures as well as the babyface stereotype, albeit more weakly. In addition to cross-cultural similarities in trait impressions from faces, supporting a universal mechanism, some effects were moderated by perceiver and face culture, consistent with perceiver attunements conditioned by culturally specific perceptual learning.",
"title": ""
},
{
"docid": "2a74e3be9866717b10a80c96fcbaeb6b",
"text": "This paper studies the economics of match formation using a novel dataset obtained from a major online dating service. Online dating takes place in a new market environment that has become a common means to find a date or a marriage partner. According to comScore (2006), 17 percent of all North American and 18 percent of all European Internet users visited an online personals site in July 2006. In the United States, 37 percent of all single Internet users looking for a partner have visited a dating Web site (Mary Madden and Amanda Lenhart 2006). The Web site we study provides detailed information on the users’ attributes and interactions, which we use to estimate a rich model of mate preferences. Based on the preference estimates, we then examine whether an economic matching model can explain the observed online matching patterns, and we evaluate the efficiency of the matches obtained on the Web site. Finally, we explore whether the estimated preferences and a matching model are helpful in understanding sorting patterns observed “offline,” among dating and married couples. Two distinct literatures motivate this study. The first is the market design literature, which focuses on designing and evaluating the performance of market institutions. A significant branch of this literature is devoted to matching markets (Alvin E. Roth and Marilda A. O. Sotomayor 1990), with the goal of understanding the allocation mechanism in a particular market, and assessing whether an alternative mechanism with better theoretical properties (typically in terms Matching and Sorting in Online Dating",
"title": ""
},
{
"docid": "1e4cf4cce07a24916e99c43aa779ac54",
"text": "Video captioning which automatically translates video clips into natural language sentences is a very important task in computer vision. By virtue of recent deep learning technologies, video captioning has made great progress. However, learning an effective mapping from the visual sequence space to the language space is still a challenging problem due to the long-term multimodal dependency modelling and semantic misalignment. Inspired by the facts that memory modelling poses potential advantages to longterm sequential problems [35] and working memory is the key factor of visual attention [33], we propose a Multimodal Memory Model (M) to describe videos, which builds a visual and textual shared memory to model the longterm visual-textual dependency and further guide visual attention on described visual targets to solve visual-textual alignments. Specifically, similar to [10], the proposed M attaches an external memory to store and retrieve both visual and textual contents by interacting with video and sentence with multiple read and write operations. To evaluate the proposed model, we perform experiments on two public datasets: MSVD and MSR-VTT. The experimental results demonstrate that our method outperforms most of the stateof-the-art methods in terms of BLEU and METEOR.",
"title": ""
},
{
"docid": "c721f79d7c20210b4ee388ecb75f241f",
"text": "The noble aim behind this project is to study and capture the Natural Eye movement detection and trying to apply it as assisting application for paralyzed patients those who cannot speak or use hands such disease as amyotrophic lateral sclerosis (ALS), Guillain-Barre Syndrome, quadriplegia & heniiparesis. Using electrophySiological genereted by the voluntary contradictions of the muscles around the eye. The proposed system which is based on the design and application of an electrooculogram (EOG) based an efficient human–computer interface (HCI). Establishing an alternative channel without speaking and hand movements is important in increasing the quality of life for the handicapped. EOG-based systems are more efficient than electroencephalogram (EEG)-based systems as easy acquisition, higher amplitude, and also easily classified. By using a realized virtual keyboard like graphical user interface, it is possible to notify in writing the needs of the patient in a relatively short time. Considering the bio potential measurement pitfalls, the novel EOG-based HCI system allows people to successfully communicate with their environment by using only eye movements. [1] Classifying horizontal and vertical EOG channel signals in an efficient interface is realized in this study. The nearest neighbourhood algorithm will be use to classify the signals. The novel EOG-based HCI system allows people to successfully and economically communicate with their environment by using only eye movements. [2] An Electrooculography is a method of tracking the ocular movement, based on the voltage changes that occur due to the medications on the special orientation of the eye dipole. The resulting signal has a myriad of possible applications. [2] In this dissertation phase one, the goal was to study the Eye movements and respective signal generation, EOG signal acquisition and also study of a Man-Machine Interface that made use of this signal. As per our goal we studied eye movements and design simple EOG acquisition circuit. We got efficient signal output in oscilloscope. I sure that result up to present stage will definitely leads us towards designing of novel assisting device for paralyzed patients. Thus, we set out to create an interface will be use by mobility impaired patients, allowing them to use their eyes to call nurse or attended person and some other requests. Keywords— Electro Oculogram, Natural Eye movement Detection, EOG acquisition & signal conditioning, Eye based Computer interface GUI, Paralysed assisting device, Eye movement recognization",
"title": ""
},
{
"docid": "d6379e449f1b7c6d845a004c59c1023c",
"text": "Phase-shifted ZVS PWM full-bridge converter realizes ZVS and eliminates the voltage oscillation caused by the reverse recovery of the rectifier diodes by introducing a resonant inductance and two clamping diodes. This paper improves the converter just by exchanging the position of the resonant inductance and the transformer such that the transformer is connected with the lagging leg. The improved converter has several advantages over the original counterpart, e.g., the clamping diodes conduct only once in a switching cycle, and the resonant inductance current is smaller in zero state, leading to a higher efficiency and reduced duty cycle loss. A blocking capacitor is usually introduced to the primary side to prevent the transformer from saturating, this paper analyzes the effects of the blocking capacitor in different positions, and a best scheme is determined. A 2850 W prototype converter is built to verify the effectiveness of the improved converter and the best scheme for the blocking capacitor.",
"title": ""
},
{
"docid": "33906623c1ac445e18a30805d2a122cf",
"text": "Diagnostic problems abound for individuals, organizations, and society. The stakes are high, often life and death. Such problems are prominent in the fields of health care, public safety, business, environment, justice, education, manufacturing, information processing, the military, and government. Particular diagnostic questions are raised repetitively, each time calling for a positive or negative decision about the presence of a given condition or the occurrence (often in the future) of a given event. Consider the following illustrations: Is a cancer present? Will this individual commit violence? Are there explosives in this luggage? Is this aircraft fit to fly? Will the stock market advance today? Is this assembly-line item flawed? Will an impending storm strike? Is there oil in the ground here? Is there an unsafe radiation level in my house? Is this person lying? Is this person using drugs? Will this applicant succeed? Will this book have the information I need? Is that plane intending to attack this ship? Is this applicant legally disabled? Does this tax return justify an audit? Each time such a question is raised, the available evidence is assessed by a person or a device or a combination of the two, and a choice is then made between the two alternatives, yes or no. The evidence may be a x-ray, a score on a psychiatric test, a chemical analysis, and so on. In considering just yes–no alternatives, such diagnoses do not exhaust the types of diagnostic questions that exist. Other questions, for example, a differential diagnosis in medicine, may require considering a half dozen or more possible alternatives. Decisions of the yes–no type, however, are prevalent and important, as the foregoing examples suggest, and they are the focus of our analysis. We suggest that diagnoses of this type rest on a general process with common characteristics across fields, and that the process warrants scientific analysis as a discipline in its own right (Swets, 1988, 1992). The main purpose of this article is to describe two ways, one obvious and one less obvious, in which diagnostic performance can be improved. The more obvious way to improve diagnosis is to improve its accuracy, that is, its ability to distinguish between the two diagnostic alternatives and to select the correct one. The less obvious way to improve diagnosis is to increase the utility of the diagnostic decisions that are made. That is, apart from improving accuracy, there is a need to produce decisions that are in tune both with the situational probabilities of the alternative diagnostic conditions and with the benefits and costs, respectively, of correct and incorrect decisions. Methods exist to achieve both goals. These methods depend on a measurement technique that separately and independently quantifies the two aspects of diagnostic performance, namely, its accuracy and the balance it provides among the various possible types of decision outcomes. We propose that together the method for measuring diagnostic performance and the methods for improving it constitute the fundamentals of a science of diagnosis. We develop the idea that this incipient discipline has been demonstrated to improve diagnosis in several fields, but is nonetheless virtually unknown and unused in others. We consider some possible reasons for the disparity between the general usefulness of the methods and their lack of general use, and we advance some ideas for reducing this disparity. To anticipate, we develop two successful examples of these methods in some detail: the prognosis of violent behavior and the diagnosis of breast and prostate cancer. We treat briefly other successful examples, such as weather forecasting and admission to a selective school. We also develop in detail two examples of fields that would markedly benefit from application of the methods, namely the detection of cracks in airplane wings and the detection of the virus of AIDS. Briefly treated are diagnoses of dangerous conditions for in-flight aircraft and of behavioral impairments that qualify as disabilities in individuals.",
"title": ""
},
{
"docid": "01c8b3612769216c21d8c16567faa430",
"text": "Optimal decision making during the business process execution is crucial for achieving the business goals of an enterprise. Process execution often involves the usage of the decision logic specified in terms of business rules represented as atomic elements of conditions leading to conclusions. However, the question of using and integrating the processand decision-centric approaches, i.e. harmonization of the widely accepted Business Process Model and Notation (BPMN) and the recent Decision Model and Notation (DMN) proposed by the OMG group, is important. In this paper, we propose a four-step approach to derive decision models from process models on the examples of DMN and BPMN: (1) Identification of decision points in a process model; (2) Extraction of decision logic encapsulating the data dependencies affecting the decisions in the process model; (3) Construction of a decision model; (4) Adaptation of the process model with respect to the derived decision logic. Our contribution also consists in proposing an enrichment of the extracted decision logic by taking into account the predictions of process performance measures corresponding to different decision outcomes. We demonstrate the applicability of the approach on an exemplary business process from the banking domain.",
"title": ""
},
{
"docid": "e6a913ca404c59cd4e0ecffaf18144e5",
"text": "SPARQL is the standard language for querying RDF data. In this article, we address systematically the formal study of the database aspects of SPARQL, concentrating in its graph pattern matching facility. We provide a compositional semantics for the core part of SPARQL, and study the complexity of the evaluation of several fragments of the language. Among other complexity results, we show that the evaluation of general SPARQL patterns is PSPACE-complete. We identify a large class of SPARQL patterns, defined by imposing a simple and natural syntactic restriction, where the query evaluation problem can be solved more efficiently. This restriction gives rise to the class of well-designed patterns. We show that the evaluation problem is coNP-complete for well-designed patterns. Moreover, we provide several rewriting rules for well-designed patterns whose application may have a considerable impact in the cost of evaluating SPARQL queries.",
"title": ""
},
{
"docid": "281f1b08f561271d245b08d54adbc49d",
"text": "OBJECTIVE\nMyofascial pain syndrome (MPS) is one of the most common causes of chronic musculoskeletal pain. Several methods have been recommended for the inactivation of trigger points (TrPs). We carried out this study to investigate the effectiveness of miniscalpel-needle (MSN) release and acupuncture needling and self neck-stretching exercises on myofascial TrPs of the upper trapezius muscle.\n\n\nMETHODS\nEighty-three TrPs in 43 patients with MPS were treated and randomly assigned to 3 groups: group 1 received MSN release in conjunction with self neck-stretching exercises; group 2 received acupuncture needling treatment and performed self neck-stretching exercises; and group 3, the control group, was assigned self neck-stretching exercises only. The therapeutic effectiveness was evaluated using subjective pain intensity (PI) with a visual analog scale, pressure pain threshold (PPT), and contralateral bending range of motion (ROM) of cervical spine at pretreatment, 2 weeks, and 3 months after treatment.\n\n\nRESULTS\nThe improvement of PI, PPT, and contralateral bending ROM of cervical spine was significantly greater in group 1 and 2 than that in control group at 2 weeks and 3 months follow-up. Compared with group 2, patients in group 1 had a statistically significant reduction in PI, an increase in PPT, contralateral bending ROM of cervical spine at 3 months follow-up.\n\n\nDISCUSSION\nThe effectiveness of MSN release for MPS is superior to that of acupuncture needling treatment or self neck-stretching exercises alone. The MSN release is also safe, without severe side effects in treatment of MPS.",
"title": ""
}
] | scidocsrr |
7790af0a9eff3fe9c19cf8bcd0395fef | On the evidential reasoning algorithm for multiple attribute decision analysis under uncertainty | [
{
"docid": "7b46cf9aa63423485f4f48d635cb8f5c",
"text": "It sounds good when knowing the multiple criteria decision analysis an integrated approach in this website. This is one of the books that many people looking for. In the past, many people ask about this book as their favourite book to read and collect. And now, we present hat you need quickly. It seems to be so happy to offer you this famous book. It will not become a unity of the way for you to get amazing benefits at all. But, it will serve something that will let you get the best time and moment to spend for reading the book.",
"title": ""
}
] | [
{
"docid": "d03f900c785a5d6abf8bb16434693e4d",
"text": "Juvenile gigantomastia is a benign disorder of the breast in which one or both of the breasts undergo a massive increase in size during adolescence. The authors present a series of four cases of juvenile gigantomastia, advances in endocrine management, and the results of surgical therapy. Three patients were treated for initial management of juvenile gigantomastia and one patient was evaluated for a gestationally induced recurrence of juvenile gigantomastia. The three women who presented for initial management had a complete evaluation to rule out other etiologies of breast enlargement. Endocrine therapy was used in 2 patients, one successfully. A 17-year-old girl had unilateral hypertrophy treated with reduction surgery. She had no recurrence and did not require additional surgery. Two patients, ages 10 and 12 years, were treated at a young age with reduction mammaplasty, and both of these girls required secondary surgery for treatment. One patient underwent subtotal mastectomy with implant reconstruction but required two subsequent operations for removal of recurrent hypertrophic breast tissue. The second patient started a course of tamoxifen followed by reduction surgery. While on tamoxifen, the second postoperative result remained stable, and the contralateral breast, which had exhibited some minor hypertrophy, regressed in size. The fourth patient was a gravid 24-year-old who had been treated for juvenile gigantomastia at age 14, and presented with gestationally induced recurrent hypertrophy. The authors' experience has been that juvenile gigantomastia in young patients is prone to recurrence, and is in agreement with previous studies that subcutaneous mastectomy provides definitive treatment. However, tamoxifen may be a useful adjunct and may allow stable results when combined with reduction mammaplasty. If successful, the use of tamoxifen would eliminate the potential complications of breast prostheses. Lastly, the 17-year-old patient did not require secondary surgery, suggesting that older patients may be treated definitively with reduction surgery alone.",
"title": ""
},
{
"docid": "7ef20dc3eb5ec7aee75f41174c9fae12",
"text": "As the data and ontology layers of the Semantic Web stack have achieved a certain level of maturity in standard recommendations such as RDF and OWL, the current focus lies on two related aspects. On the one hand, the definition of a suitable query language for RDF, SPARQL, is close to recommendation status within the W3C. The establishment of the rules layer on top of the existing stack on the other hand marks the next step to be taken, where languages with their roots in Logic Programming and Deductive Databases are receiving considerable attention. The purpose of this paper is threefold. First, we discuss the formal semantics of SPARQLextending recent results in several ways. Second, weprovide translations from SPARQL to Datalog with negation as failure. Third, we propose some useful and easy to implement extensions of SPARQL, based on this translation. As it turns out, the combination serves for direct implementations of SPARQL on top of existing rules engines as well as a basis for more general rules and query languages on top of RDF.",
"title": ""
},
{
"docid": "ad1000d0975bb0c605047349267c5e47",
"text": "A systematic review of randomized clinical trials was conducted to evaluate the acceptability and usefulness of computerized patient education interventions. The Columbia Registry, MEDLINE, Health, BIOSIS, and CINAHL bibliographic databases were searched. Selection was based on the following criteria: (1) randomized controlled clinical trials, (2) educational patient-computer interaction, and (3) effect measured on the process or outcome of care. Twenty-two studies met the selection criteria. Of these, 13 (59%) used instructional programs for educational intervention. Five studies (22.7%) tested information support networks, and four (18%) evaluated systems for health assessment and history-taking. The most frequently targeted clinical application area was diabetes mellitus (n = 7). All studies, except one on the treatment of alcoholism, reported positive results for interactive educational intervention. All diabetes education studies, in particular, reported decreased blood glucose levels among patients exposed to this intervention. Computerized educational interventions can lead to improved health status in several major areas of care, and appear not to be a substitute for, but a valuable supplement to, face-to-face time with physicians.",
"title": ""
},
{
"docid": "4261e44dad03e8db3c0520126b9c7c4d",
"text": "One of the major drawbacks of magnetic resonance imaging (MRI) has been the lack of a standard and quantifiable interpretation of image intensities. Unlike in other modalities, such as X-ray computerized tomography, MR images taken for the same patient on the same scanner at different times may appear different from each other due to a variety of scanner-dependent variations and, therefore, the absolute intensity values do not have a fixed meaning. The authors have devised a two-step method wherein all images (independent of patients and the specific brand of the MR scanner used) can be transformed in such a may that for the same protocol and body region, in the transformed images similar intensities will have similar tissue meaning. Standardized images can be displayed with fixed windows without the need of per-case adjustment. More importantly, extraction of quantitative information about healthy organs or about abnormalities can be considerably simplified. This paper introduces and compares new variants of this standardizing method that can help to overcome some of the problems with the original method.",
"title": ""
},
{
"docid": "c34b6fac632c05c73daee2f0abce3ae8",
"text": "OBJECTIVES\nUnilateral strength training produces an increase in strength of the contralateral homologous muscle group. This process of strength transfer, known as cross education, is generally attributed to neural adaptations. It has been suggested that unilateral strength training of the free limb may assist in maintaining the functional capacity of an immobilised limb via cross education of strength, potentially enhancing recovery outcomes following injury. Therefore, the purpose of this review is to examine the impact of immobilisation, the mechanisms that may contribute to cross education, and possible implications for the application of unilateral training to maintain strength during immobilisation.\n\n\nDESIGN\nCritical review of literature.\n\n\nMETHODS\nSearch of online databases.\n\n\nRESULTS\nImmobilisation is well known for its detrimental effects on muscular function. Early reductions in strength outweigh atrophy, suggesting a neural contribution to strength loss, however direct evidence for the role of the central nervous system in this process is limited. Similarly, the precise neural mechanisms responsible for cross education strength transfer remain somewhat unknown. Two recent studies demonstrated that unilateral training of the free limb successfully maintained strength in the contralateral immobilised limb, although the role of the nervous system in this process was not quantified.\n\n\nCONCLUSIONS\nCross education provides a unique opportunity for enhancing rehabilitation following injury. By gaining an understanding of the neural adaptations occurring during immobilisation and cross education, future research can utilise the application of unilateral training in clinical musculoskeletal injury rehabilitation.",
"title": ""
},
{
"docid": "19361b2d5e096f26e650b25b745e5483",
"text": "Multispectral pedestrian detection has attracted increasing attention from the research community due to its crucial competence for many around-the-clock applications (e.g., video surveillance and autonomous driving), especially under insufficient illumination conditions. We create a human baseline over the KAIST dataset and reveal that there is still a large gap between current top detectors and human performance. To narrow this gap, we propose a network fusion architecture, which consists of a multispectral proposal network to generate pedestrian proposals, and a subsequent multispectral classification network to distinguish pedestrian instances from hard negatives. The unified network is learned by jointly optimizing pedestrian detection and semantic segmentation tasks. The final detections are obtained by integrating the outputs from different modalities as well as the two stages. The approach significantly outperforms state-of-the-art methods on the KAIST dataset while remain fast. Additionally, we contribute a sanitized version of training annotations for the KAIST dataset, and examine the effects caused by different kinds of annotation errors. Future research of this problem will benefit from the sanitized version which eliminates the interference of annotation errors.",
"title": ""
},
{
"docid": "106ec8b5c3f5bff145be2bbadeeafe68",
"text": "Objective: To provide a parsimonious clustering pipeline that provides comparable performance to deep learning-based clustering methods, but without using deep learning algorithms, such as autoencoders. Materials and methods: Clustering was performed on six benchmark datasets, consisting of five image datasets used in object, face, digit recognition tasks (COIL20, COIL100, CMU-PIE, USPS, and MNIST) and one text document dataset (REUTERS-10K) used in topic recognition. K-means, spectral clustering, Graph Regularized Non-negative Matrix Factorization, and K-means with principal components analysis algorithms were used for clustering. For each clustering algorithm, blind source separation (BSS) using Independent Component Analysis (ICA) was applied. Unsupervised feature learning (UFL) using reconstruction cost ICA (RICA) and sparse filtering (SFT) was also performed for feature extraction prior to the cluster algorithms. Clustering performance was assessed using the normalized mutual information and unsupervised clustering accuracy metrics. Results: Performing, ICA BSS after the initial matrix factorization step provided the maximum clustering performance in four out of six datasets (COIL100, CMU-PIE, MNIST, and REUTERS-10K). Applying UFL as an initial processing component helped to provide the maximum performance in three out of six datasets (USPS, COIL20, and COIL100). Compared to state-of-the-art non-deep learning clustering methods, ICA BSS and/ or UFL with graph-based clustering algorithms outperformed all other methods. With respect to deep learning-based clustering algorithms, the new methodology presented here obtained the following rankings: COIL20, 2nd out of 5; COIL100, 2nd out of 5; CMU-PIE, 2nd out of 5; USPS, 3rd out of 9; MNIST, 8th out of 15; and REUTERS-10K, 4th out of 5. Discussion: By using only ICA BSS and UFL using RICA and SFT, clustering accuracy that is better or on par with many deep learning-based clustering algorithms was achieved. For instance, by applying ICA BSS to spectral clustering on the MNIST dataset, we obtained an accuracy of 0.882. This is better than the well-known Deep Embedded Clustering algorithm that had obtained an accuracy of 0.818 using stacked denoising autoencoders in its model. Open Access © The Author(s) 2018. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. RESEARCH Gultepe and Makrehchi Hum. Cent. Comput. Inf. Sci. (2018) 8:25 https://doi.org/10.1186/s13673-018-0148-3 *Correspondence: eren.gultepe@uoit.net Department of Electrical and Computer Engineering, University of Ontario Institute of Technology, 2000 Simcoe St N, Oshawa, ON L1H 7K4, Canada Page 2 of 19 Gultepe and Makrehchi Hum. Cent. Comput. Inf. Sci. (2018) 8:25 Conclusion: Using the new clustering pipeline presented here, effective clustering performance can be obtained without employing deep clustering algorithms and their accompanying hyper-parameter tuning procedure.",
"title": ""
},
{
"docid": "1ae3bacfff3bffad223eb6cad7250fc3",
"text": "The effects of a human head on the performance of small planar ultra-wideband (UWB) antennas in proximity of the head are investigated numerically and experimentally. In simulation, a numerical head model is used in the XFDTD software package. The head model developed by REMCOM is with the frequency-dependent dielectric constant and conductivity obtained from the average data of anatomical human heads. Two types of planar antennas printed on printed circuit board (PCB) are designed to cover the UWB band. The impedance and radiation performance of the antennas are examined when the antennas are placed very close to the human head. The study shows that the human head slightly affects the impedance performance of the antennas. The radiated field distributions and the gain of the antennas demonstrate that the human head significantly blocks and absorbs the radiation from the antennas so that the radiation patterns are directional in the horizontal planes and the average gain greatly decreases. The information derived from the study is helpful to engineers who are applying UWB devices around/on human heads.",
"title": ""
},
{
"docid": "e8758a9e2b139708ca472dd60397dc2e",
"text": "Multiple photovoltaic (PV) modules feeding a common load is the most common form of power distribution used in solar PV systems. In such systems, providing individual maximum power point tracking (MPPT) schemes for each of the PV modules increases the cost. Furthermore, its v-i characteristic exhibits multiple local maximum power points (MPPs) during partial shading, making it difficult to find the global MPP using conventional single-stage (CSS) tracking. To overcome this difficulty, the authors propose a novel MPPT algorithm by introducing a particle swarm optimization (PSO) technique. The proposed algorithm uses only one pair of sensors to control multiple PV arrays, thereby resulting in lower cost, higher overall efficiency, and simplicity with respect to its implementation. The validity of the proposed algorithm is demonstrated through experimental studies. In addition, a detailed performance comparison with conventional fixed voltage, hill climbing, and Fibonacci search MPPT schemes are presented. Algorithm robustness was verified for several complicated partial shading conditions, and in all cases this method took about 2 s to find the global MPP.",
"title": ""
},
{
"docid": "0af8cffabf74b5955e1a7bb6edf48cdf",
"text": "One of the main challenges in game AI is building agents that can intelligently react to unforeseen game situations. In real-time strategy games, players create new strategies and tactics that were not anticipated during development. In order to build agents capable of adapting to these types of events, we advocate the development of agents that reason about their goals in response to unanticipated game events. This results in a decoupling between the goal selection and goal execution logic in an agent. We present a reactive planning implementation of the Goal-Driven Autonomy conceptual model and demonstrate its application in StarCraft. Our system achieves a win rate of 73% against the builtin AI and outranks 48% of human players on a competitive ladder server.",
"title": ""
},
{
"docid": "f2fc46012fa4b767f514b9d145227ec7",
"text": "Derivation of backpropagation in convolutional neural network (CNN) is conducted based on an example with two convolutional layers. The step-by-step derivation is helpful for beginners. First, the feedforward procedure is claimed, and then the backpropagation is derived based on the example. 1 Feedforward",
"title": ""
},
{
"docid": "a712b6efb5c869619864cd817c2e27e1",
"text": "We measure the value of promotional activities and referrals by content creators to an online platform of user-generated content. To do so, we develop a modeling approach that explains individual-level choices of visiting the platform, creating, and purchasing content, as a function of consumer characteristics and marketing activities, allowing for the possibility of interdependence of decisions within and across users. Empirically, we apply our model to Hewlett-Packard’s (HP) print-on-demand service of user-created magazines, named MagCloud. We use two distinct data sets to show the applicability of our approach: an aggregate-level data set from Google Analytics, which is a widely available source of data to managers, and an individual-level data set from HP. Our results compare content creator activities, which include referrals and word-ofmouth efforts, with firm-based actions, such as price promotions and public relations. We show that price promotions have strong effects, but limited to the purchase decisions, while content creator referrals and public relations have broader effects which impact all consumer decisions at the platform. We provide recommendations to the level of the firm’s investments when “free” promotional activities by content creators exist. These “free” marketing campaigns are likely to have a substantial presence in most online services of user-generated content.",
"title": ""
},
{
"docid": "6264a8e43070f686375150b4beadaee7",
"text": "A control law for an integrated power/attitude control system (IPACS) for a satellite is presented. Four or more energy/momentum wheels in an arbitrary noncoplanar con guration and a set of three thrusters are used to implement the torque inputs. The energy/momentum wheels are used as attitude-control actuators, as well as an energy storage mechanism, providing power to the spacecraft. In that respect, they can replace the currently used heavy chemical batteries. The thrusters are used to implement the torques for large and fast (slew) maneuvers during the attitude-initialization and target-acquisition phases and to implement the momentum management strategies. The energy/momentum wheels are used to provide the reference-tracking torques and the torques for spinning up or down the wheels for storing or releasing kinetic energy. The controller published in a previous work by the authors is adopted here for the attitude-tracking function of the wheels. Power tracking for charging and discharging the wheels is added to complete the IPACS framework. The torques applied by the energy/momentum wheels are decomposed into two spaces that are orthogonal to each other, with the attitude-control torques and power-tracking torques in each space. This control law can be easily incorporated in an IPACS system onboard a satellite. The possibility of the occurrence of singularities, in which no arbitrary energy pro le can be tracked, is studied for a generic wheel cluster con guration. A standard momentum management scheme is considered to null the total angular momentum of the wheels so as to minimize the gyroscopic effects and prevent the singularity from occurring. A numerical example for a satellite in a low Earth near-polar orbit is provided to test the proposed IPACS algorithm. The satellite’s boresight axis is required to track a ground station, and the satellite is required to rotate about its boresight axis so that the solar panel axis is perpendicular to the satellite–sun vector.",
"title": ""
},
{
"docid": "0e153353fb8af1511de07c839f6eaca5",
"text": "The calculation of a transformer's parasitics, such as its self capacitance, is fundamental for predicting the frequency behavior of the device, reducing this capacitance value and moreover for more advanced aims of capacitance integration and cancellation. This paper presents a comprehensive procedure for calculating all contributions to the self-capacitance of high-voltage transformers and provides a detailed analysis of the problem, based on a physical approach. The advantages of the analytical formulation of the problem rather than a finite element method analysis are discussed. The approach and formulas presented in this paper can also be used for other wound components rather than just step-up transformers. Finally, analytical and experimental results are presented for three different high-voltage transformer architectures.",
"title": ""
},
{
"docid": "18c517f26bceeb7930a4418f7a6b2f30",
"text": "BACKGROUND\nWe aimed to study whether pulmonary hypertension (PH) and elevated pulmonary vascular resistance (PVR) could be predicted by conventional echo Doppler and novel tissue Doppler imaging (TDI) in a population of chronic obstructive pulmonary disease (COPD) free of LV disease and co-morbidities.\n\n\nMETHODS\nEchocardiography and right heart catheterization was performed in 100 outpatients with COPD. By echocardiography the time-integral of the TDI index, right ventricular systolic velocity (RVSmVTI) and pulmonary acceleration-time (PAAcT) were measured and adjusted for heart rate. The COPD patients were randomly divided in a derivation (n = 50) and a validation cohort (n = 50).\n\n\nRESULTS\nPH (mean pulmonary artery pressure (mPAP) ≥ 25mmHg) and elevated PVR ≥ 2Wood unit (WU) were predicted by satisfactory area under the curve for RVSmVTI of 0.93 and 0.93 and for PAAcT of 0.96 and 0.96, respectively. Both echo indices were 100% feasible, contrasting 84% feasibility for parameters relying on contrast enhanced tricuspid-regurgitation. RVSmVTI and PAAcT showed best correlations to invasive measured mPAP, but less so to PVR. PAAcT was accurate in 90- and 78% and RVSmVTI in 90- and 84% in the calculation of mPAP and PVR, respectively.\n\n\nCONCLUSIONS\nHeart rate adjusted-PAAcT and RVSmVTI are simple and reproducible methods that correlate well with pulmonary artery pressure and PVR and showed high accuracy in detecting PH and increased PVR in patients with COPD. Taken into account the high feasibility of these two echo indices, they should be considered in the echocardiographic assessment of COPD patients.",
"title": ""
},
{
"docid": "0141a93f93a7cf3c8ee8fd705b0a9657",
"text": "We systematically explore regularizing neural networks by penalizing low entropy output distributions. We show that penalizing low entropy output distributions, which has been shown to improve exploration in reinforcement learning, acts as a strong regularizer in supervised learning. Furthermore, we connect a maximum entropy based confidence penalty to label smoothing through the direction of the KL divergence. We exhaustively evaluate the proposed confidence penalty and label smoothing on 6 common benchmarks: image classification (MNIST and Cifar-10), language modeling (Penn Treebank), machine translation (WMT’14 English-to-German), and speech recognition (TIMIT and WSJ). We find that both label smoothing and the confidence penalty improve state-of-the-art models across benchmarks without modifying existing hyperparameters, suggesting the wide applicability of these regularizers.",
"title": ""
},
{
"docid": "459a3bc8f54b8f7ece09d5800af7c37b",
"text": "This material is brought to you by the Journals at AIS Electronic Library (AISeL). It has been accepted for inclusion in Communications of the Association for Information Systems by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org. As companies are increasingly exposed to information security threats, decision makers are permanently forced to pay attention to security issues. Information security risk management provides an approach for measuring the security through risk assessment, risk mitigation, and risk evaluation. Although a variety of approaches have been proposed, decision makers lack well-founded techniques that (1) show them what they are getting for their investment, (2) show them if their investment is efficient, and (3) do not demand in-depth knowledge of the IT security domain. This article defines a methodology for management decision makers that effectively addresses these problems. This work involves the conception, design, and implementation of the methodology into a software solution. The results from two qualitative case studies show the advantages of this methodology in comparison to established methodologies.",
"title": ""
},
{
"docid": "cdaa99f010b20906fee87d8de08e1106",
"text": "We propose a novel hierarchical clustering algorithm for data-sets in which only pairwise distances between the points are provided. The classical Hungarian method is an efficient algorithm for solving the problem of minimal-weight cycle cover. We utilize the Hungarian method as the basic building block of our clustering algorithm. The disjoint cycles, produced by the Hungarian method, are viewed as a partition of the data-set. The clustering algorithm is formed by hierarchical merging. The proposed algorithm can handle data that is arranged in non-convex sets. The number of the clusters is automatically found as part of the clustering process. We report an improved performance of our algorithm in a variety of examples and compare it to the spectral clustering algorithm.",
"title": ""
},
{
"docid": "e938ad7500cecd5458e4f68e564e6bc4",
"text": "In this article, an adaptive fuzzy sliding mode control (AFSMC) scheme is derived for robotic systems. In the AFSMC design, the sliding mode control (SMC) concept is combined with fuzzy control strategy to obtain a model-free fuzzy sliding mode control. The equivalent controller has been replaced by a fuzzy system and the uncertainties are estimated online. The approach of the AFSMC has the learning ability to generate the fuzzy control actions and adaptively compensates for the uncertainties. Despite the high nonlinearity and coupling effects, the control input of the proposed control algorithm has been decoupled leading to a simplified control mechanism for robotic systems. Simulations have been carried out on a two link planar robot. Results show the effectiveness of the proposed control system.",
"title": ""
}
] | scidocsrr |
d9f71acd36247ac5f2ce09592a3fc642 | A Survey of Communication Sub-systems for Intersatellite Linked Systems and CubeSat Missions | [
{
"docid": "60f6e3345aae1f91acb187ba698f073b",
"text": "A Cube-Satellite (CubeSat) is a small satellite weighing no more than one kilogram. CubeSats are used for space research, but their low-rate communication capability limits functionality. As greater payload and instrumentation functions are sought, increased data rate is needed. Since most CubeSats currently transmit at a 437 MHz frequency, several directional antenna types were studied for a 2.45 GHz, larger bandwidth transmission. This higher frequency provides the bandwidth needed for increasing the data rate. A deployable antenna mechanism maybe needed because most directional antennas are bigger than the CubeSat size constraints. From the study, a deployable hemispherical helical antenna prototype was built. Transmission between two prototype antenna equipped transceivers at varying distances tested the helical performance. When comparing the prototype antenna's maximum transmission distance to the other commercial antennas, the prototype outperformed all commercial antennas, except the patch antenna. The root cause was due to the helical antenna's narrow beam width. Future work can be done in attaining a more accurate alignment with the satellite's directional antenna to downlink with a terrestrial ground station.",
"title": ""
}
] | [
{
"docid": "a22bc61f0fa5733a1835f61056810422",
"text": "Humans are able to accelerate their learning by selecting training materials that are the most informative and at the appropriate level of difficulty. We propose a framework for distributing deep learning in which one set of workers search for the most informative examples in parallel while a single worker updates the model on examples selected by importance sampling. This leads the model to update using an unbiased estimate of the gradient which also has minimum variance when the sampling proposal is proportional to the L2-norm of the gradient. We show experimentally that this method reduces gradient variance even in a context where the cost of synchronization across machines cannot be ignored, and where the factors for importance sampling are not updated instantly across the training set.",
"title": ""
},
{
"docid": "7120cc5882438207ae432eb556d65e72",
"text": "A radar system with an ultra-wide FMCW ramp bandwidth of 25.6 GHz (≈32%) around a center frequency of 80 GHz is presented. The system is based on a monostatic fully integrated SiGe transceiver chip, which is stabilized using conventional fractional-N PLL chips at a reference frequency of 100 MHz. The achieved in-loop phase noise is ≈ -88 dBc/Hz (10 kHz offset frequency) for the center frequency and below ≈-80 dBc/Hz in the wide frequency band of 25.6 GHz for all offset frequencies >;1 kHz. The ultra-wide PLL-stabilization was achieved using a reverse frequency position mixer in the PLL (offset-PLL) resulting in a compensation of the variation of the oscillators tuning sensitivity with the variation of the N-divider in the PLL. The output power of the transceiver chip, as well as of the mm-wave module (containing a waveguide transition), is sufficiently flat versus the output frequency (variation <;3 dB). In radar measurements using the full bandwidth an ultra-high spatial resolution of 7.12 mm was achieved. The standard deviation between repeated measurements of the same target is 0.36 μm.",
"title": ""
},
{
"docid": "704cad33eed2b81125f856c4efbff4fa",
"text": "In order to realize missile real-time change flight trajectory, three-loop autopilot is setting up. The structure characteristics, autopilot model, and control parameters design method were researched. Firstly, this paper introduced the 11th order three-loop autopilot model. With the principle of systems reduce model order, the 5th order model was deduced. On that basis, open-loop frequency characteristic and closed-loop frequency characteristic were analyzed. The variables of velocity ratio, dynamic pressure ratio and elevator efficiency ratio were leading to correct system nonlinear. And then autopilot gains design method were induced. System flight simulations were done, and result shows that autopilot gains played a good job in the flight trajectory, autopilot satisfied the flight index.",
"title": ""
},
{
"docid": "8583f3735314a7d38bcb82f6acf781ce",
"text": "Safety critical systems involve the tight coupling between potentially conflicting control objectives and safety constraints. As a means of creating a formal framework for controlling systems of this form, and with a view toward automotive applications, this paper develops a methodology that allows safety conditions—expressed as control barrier functions— to be unified with performance objectives—expressed as control Lyapunov functions—in the context of real-time optimizationbased controllers. Safety conditions are specified in terms of forward invariance of a set, and are verified via two novel generalizations of barrier functions; in each case, the existence of a barrier function satisfying Lyapunov-like conditions implies forward invariance of the set, and the relationship between these two classes of barrier functions is characterized. In addition, each of these formulations yields a notion of control barrier function (CBF), providing inequality constraints in the control input that, when satisfied, again imply forward invariance of the set. Through these constructions, CBFs can naturally be unified with control Lyapunov functions (CLFs) in the context of a quadratic program (QP); this allows for the achievement of control objectives (represented by CLFs) subject to conditions on the admissible states of the system (represented by CBFs). The mediation of safety and performance through a QP is demonstrated on adaptive cruise control and lane keeping, two automotive control problems that present both safety and performance considerations coupled with actuator bounds.",
"title": ""
},
{
"docid": "07cd406cead1a086f61f363269de1aac",
"text": "Tolerating and recovering from link and switch failures are fundamental requirements of most networks, including Software-Defined Networks (SDNs). However, instead of traditional behaviors such as network-wide routing re-convergence, failure recovery in an SDN is determined by the specific software logic running at the controller. While this admits more freedom to respond to a failure event, it ultimately means that each controller application must include its own recovery logic, which makes the code more difficult to write and potentially more error-prone.\n In this paper, we propose a runtime system that automates failure recovery and enables network developers to write simpler, failure-agnostic code. To this end, upon detecting a failure, our approach first spawns a new controller instance that runs in an emulated environment consisting of the network topology excluding the failed elements. Then, it quickly replays inputs observed by the controller before the failure occurred, leading the emulated network into the forwarding state that accounts for the failed elements. Finally, it recovers the network by installing the difference ruleset between emulated and current forwarding states.",
"title": ""
},
{
"docid": "41611aef9542367f80d8898b1f71bead",
"text": "The economy-wide implications of sea level rise in 2050 are estimated using a static computable general equilibrium model. Overall, general equilibrium effects increase the costs of sea level rise, but not necessarily in every sector or region. In the absence of coastal protection, economies that rely most on agriculture are hit hardest. Although energy is substituted for land, overall energy consumption falls with the shrinking economy, hurting energy exporters. With full coastal protection, GDP increases, particularly in regions that do a lot of dike building, but utility falls, least in regions that build a lot of dikes and export energy. Energy prices rise and energy consumption falls. The costs of full protection exceed the costs of losing land.",
"title": ""
},
{
"docid": "816b2ed7d4b8ce3a8fc54e020bc2f712",
"text": "As a standardized communication protocol, OPC UA is the main focal point with regard to information exchange in the ongoing initiative Industrie 4.0. But there are also considerations to use it within the Internet of Things. The fact that currently no open reference implementation can be used in research for free represents a major problem in this context. The authors have the opinion that open source software can stabilize the ongoing theoretical work. Recent efforts to develop an open implementation for OPC UA were not able to meet the requirements of practical and industrial automation technology. This issue is addressed by the open62541 project which is presented in this article including an overview of its application fields and main research issues.",
"title": ""
},
{
"docid": "6f9be23e33910d44551b5befa219e557",
"text": "The Lecture Notes are used for the a short course on the theory and applications of the lattice Boltzmann methods for computational uid dynamics taugh by the author at Institut f ur Computeranwendungen im Bauingenieurwesen (CAB), Technischen Universitat Braunschweig, during August 7 { 12, 2003. The lectures cover the basic theory of the lattice Boltzmann equation and its applications to hydrodynamics. Lecture One brie y reviews the history of the lattice gas automata and the lattice Boltzmann equation and their connections. Lecture Two provides an a priori derivation of the lattice Boltzmann equation, which connects the lattice Boltzmann equation to the continuous Boltzmann equation and demonstrates that the lattice Boltzmann equation is indeed a special nite di erence form of the Boltzmann equation. Lecture Two also includes the derivation of the lattice Boltzmann model for nonideal gases from the Enskog equation for dense gases. Lecture Three studies the generalized lattice Boltzmann equation with multiple relaxation times. A summary is provided at the end of each Lecture. Lecture Four discusses the uid-solid boundary conditions in the lattice Boltzmann methods. Applications of the lattice Boltzmann mehod to particulate suspensions, turbulence ows, and other ows are also shown. An Epilogue on the rationale of the lattice Boltzmann method is given. Some key references in the literature is also provided.",
"title": ""
},
{
"docid": "0851caf6599f97bbeaf68b57e49b4da5",
"text": "Improving the quality of end-of-life care for hospitalized patients is a priority for healthcare organizations. Studies have shown that physicians tend to over-estimate prognoses, which in combination with treatment inertia results in a mismatch between patients wishes and actual care at the end of life. We describe a method to address this problem using Deep Learning and Electronic Health Record (EHR) data, which is currently being piloted, with Institutional Review Board approval, at an academic medical center. The EHR data of admitted patients are automatically evaluated by an algorithm, which brings patients who are likely to benefit from palliative care services to the attention of the Palliative Care team. The algorithm is a Deep Neural Network trained on the EHR data from previous years, to predict all-cause 3–12 month mortality of patients as a proxy for patients that could benefit from palliative care. Our predictions enable the Palliative Care team to take a proactive approach in reaching out to such patients, rather than relying on referrals from treating physicians, or conduct time consuming chart reviews of all patients. We also present a novel interpretation technique which we use to provide explanations of the model's predictions.",
"title": ""
},
{
"docid": "f8b201105e3b92ed4ef2a884cb626c0d",
"text": "Several years of academic and industrial research efforts have converged to a common understanding on fundamental security building blocks for the upcoming vehicular communication (VC) systems. There is a growing consensus toward deploying a special-purpose identity and credential management infrastructure, i.e., a vehicular public-key infrastructure (VPKI), enabling pseudonymous authentication, with standardization efforts toward that direction. In spite of the progress made by standardization bodies (IEEE 1609.2 and ETSI) and harmonization efforts [Car2Car Communication Consortium (C2C-CC)], significant questions remain unanswered toward deploying a VPKI. Deep understanding of the VPKI, a central building block of secure and privacy-preserving VC systems, is still lacking. This paper contributes to the closing of this gap. We present SECMACE, a VPKI system, which is compatible with the IEEE 1609.2 and ETSI standards specifications. We provide a detailed description of our state-of-the-art VPKI that improves upon existing proposals in terms of security and privacy protection, and efficiency. SECMACE facilitates multi-domain operations in the VC systems and enhances user privacy, notably preventing linking pseudonyms based on timing information and offering increased protection even against honest-but-curious VPKI entities. We propose multiple policies for the vehicle–VPKI interactions and two large-scale mobility trace data sets, based on which we evaluate the full-blown implementation of SECMACE. With very little attention on the VPKI performance thus far, our results reveal that modest computing resources can support a large area of vehicles with very few delays and the most promising policy in terms of privacy protection can be supported with moderate overhead.",
"title": ""
},
{
"docid": "9dc9b5bad3422a6f1c7f33ccb25fdead",
"text": "We present a named entity recognition (NER) system for extracting product attributes and values from listing titles. Information extraction from short listing titles present a unique challenge, with the lack of informative context and grammatical structure. In this work, we combine supervised NER with bootstrapping to expand the seed list, and output normalized results. Focusing on listings from eBay’s clothing and shoes categories, our bootstrapped NER system is able to identify new brands corresponding to spelling variants and typographical errors of the known brands, as well as identifying novel brands. Among the top 300 new brands predicted, our system achieves 90.33% precision. To output normalized attribute values, we explore several string comparison algorithms and found n-gram substring matching to work well in practice.",
"title": ""
},
{
"docid": "5c9ea5fcfef7bac1513a79fd918d3194",
"text": "Elderly suffers from injuries or disabilities through falls every year. With a high likelihood of falls causing serious injury or death, falling can be extremely dangerous, especially when the victim is home-alone and is unable to seek timely medical assistance. Our fall detection systems aims to solve this problem by automatically detecting falls and notify healthcare services or the victim’s caregivers so as to provide help. In this paper, development of a fall detection system based on Kinect sensor is introduced. Current fall detection algorithms were surveyed and we developed a novel posture recognition algorithm to improve the specificity of the system. Data obtained through trial testing with human subjects showed a 26.5% increase in fall detection compared to control algorithms. With our novel detection algorithm, the system conducted in a simulated ward scenario can achieve up to 90% fall detection rate.",
"title": ""
},
{
"docid": "47398ca11079b699e050f10e292855ac",
"text": "It is well known that 3DIC integration is the next generation semiconductor technology with the advantages of small form factor, high performance and low power consumption. However the device TSV process and design rules are not mature. Assembly the chips on top of the Si interposer is the current most desirable method to achieve the requirement of good performance. In this study, a new packaging concept, the Embedded Interposer Carrier (EIC) technology was developed. It aims to solve some of the problems facing current interposer assemble issues. It eliminates the joining process of silicon interposer to the laminate carrier substrate. The concept of EIC is to embed one or multiple interposer chips into the build-up dielectric layers in the laminated substrate. The process development of EIC structure is investigated in this paper. EIC technology not only can shrink an electronic package and system size but also provide a better electronic performance for high-bandwidth applications. EIC technology can be one of the potential solutions for 3D System-in-Package.",
"title": ""
},
{
"docid": "1c1a677e4e95ee6a7656db9683a19c9b",
"text": "With the rapid development of the Intelligent Transportation System (ITS), vehicular communication networks have been widely studied in recent years. Dedicated Short Range Communication (DSRC) can provide efficient real-time information exchange among vehicles without the need of pervasive roadside communication infrastructure. Although mobile cellular networks are capable of providing wide coverage for vehicular users, the requirements of services that require stringent real-time safety cannot always be guaranteed by cellular networks. Therefore, the Heterogeneous Vehicular NETwork (HetVNET), which integrates cellular networks with DSRC, is a potential solution for meeting the communication requirements of the ITS. Although there are a plethora of reported studies on either DSRC or cellular networks, joint research of these two areas is still at its infancy. This paper provides a comprehensive survey on recent wireless networks techniques applied to HetVNETs. Firstly, the requirements and use cases of safety and non-safety services are summarized and compared. Consequently, a HetVNET framework that utilizes a variety of wireless networking techniques is presented, followed by the descriptions of various applications for some typical scenarios. Building such HetVNETs requires a deep understanding of heterogeneity and its associated challenges. Thus, major challenges and solutions that are related to both the Medium Access Control (MAC) and network layers in HetVNETs are studied and discussed in detail. Finally, we outline open issues that help to identify new research directions in HetVNETs.",
"title": ""
},
{
"docid": "29fc090c5d1e325fd28e6bbcb690fb8d",
"text": "Many forensic computing practitioners work in a high workload and low resource environment. With the move by the discipline to seek ISO 17025 laboratory accreditation, practitioners are finding it difficult to meet the demands of validation and verification of their tools and still meet the demands of the accreditation framework. Many agencies are ill-equipped to reproduce tests conducted by organizations such as NIST since they cannot verify the results with their equipment and in many cases rely solely on an independent validation study of other peoples' equipment. This creates the issue of tools in reality never being tested. Studies have shown that independent validation and verification of complex forensic tools is expensive and time consuming, and many practitioners also use tools that were not originally designed for forensic purposes. This paper explores the issues of validation and verification in the accreditation environment and proposes a paradigm that will reduce the time and expense required to validate and verify forensic software tools",
"title": ""
},
{
"docid": "d537214f407128585d6a4e6bab55a45b",
"text": "It is well known that how to extract dynamical features is a key issue for video based face analysis. In this paper, we present a novel approach of facial action units (AU) and expression recognition based on coded dynamical features. In order to capture the dynamical characteristics of facial events, we design the dynamical haar-like features to represent the temporal variations of facial events. Inspired by the binary pattern coding, we further encode the dynamic haar-like features into binary pattern features, which are useful to construct weak classifiers for boosting learning. Finally the Adaboost is performed to learn a set of discriminating coded dynamic features for facial active units and expression recognition. Experiments on the CMU expression database and our own facial AU database show its encouraging performance.",
"title": ""
},
{
"docid": "8f0d90a605829209c7b6d777c11b299d",
"text": "Researchers and educators have designed curricula and resources for introductory programming environments such as Scratch, App Inventor, and Kodu to foster computational thinking in K-12. This paper is an empirical study of the effectiveness and usefulness of tiles and flashcards developed for Microsoft Kodu Game Lab to support students in learning how to program and develop games. In particular, we investigated the impact of physical manipulatives on 3rd -- 5th grade students' ability to understand, recognize, construct, and use game programming design patterns. We found that the students who used physical manipulatives performed well in rule construction, whereas the students who engaged more with the rule editor of the programming environment had better mental simulation of the rules and understanding of the concepts.",
"title": ""
},
{
"docid": "a0589d0c1df89328685bdabd94a1a8a2",
"text": "We present a translation of §§160–166 of Dedekind’s Supplement XI to Dirichlet’s Vorlesungen über Zahlentheorie, which contain an investigation of the subfields of C. In particular, Dedekind explores the lattice structure of these subfields, by studying isomorphisms between them. He also indicates how his ideas apply to Galois theory. After a brief introduction, we summarize the translated excerpt, emphasizing its Galois-theoretic highlights. We then take issue with Kiernan’s characterization of Dedekind’s work in his extensive survey article on the history of Galois theory; Dedekind has a nearly complete realization of the modern “fundamental theorem of Galois theory” (for subfields of C), in stark contrast to the picture presented by Kiernan at points. We intend a sequel to this article of an historical and philosophical nature. With that in mind, we have sought to make Dedekind’s text accessible to as wide an audience as possible. Thus we include a fair amount of background and exposition.",
"title": ""
},
{
"docid": "8b0a09cbac4b1cbf027579ece3dea9ef",
"text": "Knowing the sequence specificities of DNA- and RNA-binding proteins is essential for developing models of the regulatory processes in biological systems and for identifying causal disease variants. Here we show that sequence specificities can be ascertained from experimental data with 'deep learning' techniques, which offer a scalable, flexible and unified computational approach for pattern discovery. Using a diverse array of experimental data and evaluation metrics, we find that deep learning outperforms other state-of-the-art methods, even when training on in vitro data and testing on in vivo data. We call this approach DeepBind and have built a stand-alone software tool that is fully automatic and handles millions of sequences per experiment. Specificities determined by DeepBind are readily visualized as a weighted ensemble of position weight matrices or as a 'mutation map' that indicates how variations affect binding within a specific sequence.",
"title": ""
},
{
"docid": "b38939ec3c6f8e10553f934ceab401ff",
"text": "According to recent work in the new field of lexical pragmatics, the meanings of words are frequently pragmatically adjusted and fine-tuned in context, so that their contribution to the proposition expressed is different from their lexically encoded sense. Well-known examples include lexical narrowing (e.g. ‘drink’ used to mean ALCOHOLIC DRINK), approximation (or loosening) (e.g. ‘flat’ used to mean RELATIVELY FLAT) and metaphorical extension (e.g. ‘bulldozer’ used to mean FORCEFUL PERSON). These three phenomena are often studied in isolation from each other and given quite distinct kinds of explanation. In this chapter, we will propose a more unified account. We will try to show that narrowing, loosening and metaphorical extension are simply different outcomes of a single interpretive process which creates an ad hoc concept, or occasion-specific sense, based on interaction among encoded concepts, contextual information and pragmatic expectations or principles. We will outline an inferential account of the lexical adjustment process using the framework of relevance theory, and compare it with some alternative accounts. * This work is part of an AHRC-funded project ‘A Unified Theory of Lexical Pragmatics’ (AR16356). We are grateful to our research assistants, Patricia Kolaiti, Tim Wharton and, in particular, Rosa Vega Moreno, whose PhD work on metaphor we draw on in this paper, and to Vladimir Žegarac, François Recanati, Nausicaa Pouscoulous, Paula Rubio Fernandez and Hanna Stoever, for helpful discussions. We would also like to thank Dan Sperber for sharing with us many valuable insights on metaphor and on lexical pragmatics more generally.",
"title": ""
}
] | scidocsrr |
964c0ea2173dcaec29ace43eb8aa1198 | Software Feature Request Detection in Issue Tracking Systems | [
{
"docid": "415abb81c1126b8636c67d83394028a0",
"text": "App stores allow users to submit feedback for downloaded apps in form of star ratings and text reviews. Recent studies analyzed this feedback and found that it includes information useful for app developers, such as user requirements, ideas for improvements, user sentiments about specific features, and descriptions of experiences with these features. However, for many apps, the amount of reviews is too large to be processed manually and their quality varies largely. The star ratings are given to the whole app and developers do not have a mean to analyze the feedback for the single features. In this paper we propose an automated approach that helps developers filter, aggregate, and analyze user reviews. We use natural language processing techniques to identify fine-grained app features in the reviews. We then extract the user sentiments about the identified features and give them a general score across all reviews. Finally, we use topic modeling techniques to group fine-grained features into more meaningful high-level features. We evaluated our approach with 7 apps from the Apple App Store and Google Play Store and compared its results with a manually, peer-conducted analysis of the reviews. On average, our approach has a precision of 0.59 and a recall of 0.51. The extracted features were coherent and relevant to requirements evolution tasks. Our approach can help app developers to systematically analyze user opinions about single features and filter irrelevant reviews.",
"title": ""
},
{
"docid": "b53bd3f4a0d8933d9af0f5651a445800",
"text": "Requirements for implemented system can be extracted and reused for a production of a new similar system. Extraction of common and variable features from requirements leverages the benefits of the software product lines engineering (SPLE). Although various approaches have been proposed in feature extractions from natural language (NL) requirements, no related literature review has been published to date for this topic. This paper provides a systematic literature review (SLR) of the state-of-the-art approaches in feature extractions from NL requirements for reuse in SPLE. We have included 13 studies in our synthesis of evidence and the results showed that hybrid natural language processing approaches were found to be in common for overall feature extraction process. A mixture of automated and semi-automated feature clustering approaches from data mining and information retrieval were also used to group common features, with only some approaches coming with support tools. However, most of the support tools proposed in the selected studies were not made available publicly and thus making it hard for practitioners’ adoption. As for the evaluation, this SLR reveals that not all studies employed software metrics as ways to validate experiments and case studies. Finally, the quality assessment conducted confirms that practitioners’ guidelines were absent in the selected studies. © 2015 Elsevier Inc. All rights reserved. c t t t r c S o r ( l w t r t",
"title": ""
},
{
"docid": "3ee8ad2c9e07c33781fc53ac2e11cd6e",
"text": "Tapping into the \"folk knowledge\" needed to advance machine learning applications.",
"title": ""
}
] | [
{
"docid": "bf524461eb7eec362103452ed7c7f552",
"text": "Over many years Jacques Mehler has provided us all with a wealth of surprising and complex results on both nature and nurture in language acquisition. He has shown that there are powerful and enduring effects of early (and even prenatal) experience on infant language perception, and also considerable prior knowledge that infants bring to the language acquisition task. He has shown strong age effects on second-language acquisition and its neural organization, and has also shown that profi ciency predicts cerebral organization for the second language. In his honor, we focus here on one of the problems he has addressed-the no tion of a critical period for language acquisition-and attempt to sort out the current state of the evidence. In recent years there has been much discussion about whether there is a critical, or sensitive, period for language acquisition. Two issues are implicit in this discussion: First, what would constitute evidence for a critical period, particularly in humans, where the time scale for develop ment is greater than that in the well-studied nonhuman cases, and where proficient behavioral outcomes might be achieved by more than one route? Second, what is the import of establishing, or failing to establish, such a critical period? What does this mean for our understanding of the computational and neural mechanisms underLying language acquisition? In this chapter we address these issues explicitly, by briefly reviewing the available evidence on a critical period for human language acquisi tion, and then by asking whether the evidence meets the expected criteria for critical or sensitive periods seen in other well-studied domains in hu man and nonhuman development. We conclude by stating what we think 482 Neuport, Bave/ier & Neville the outcome of this issue means (and does not mean) for our understand ing of language acquisition. What Is a Critical or Sensitive Period? Before beginning, we should state briefly what we (and others) mean by a critical or sensitive period. A critical or sensitive period for learning is shown when there is a relationship between the age (more technically, the developmental state of the organism) at which some crucial experience is presented to the organism and the amount of learning which results. ill most domains with critical or sensitive periods, the privileged time for learning occurs during early development, but this is not necessarily the case (ef. bonding in sheep, which occurs immediately surrounding partu rition). The important feature is …",
"title": ""
},
{
"docid": "270f1ea2c5626545c64f61a105670535",
"text": "An antipodal Vivaldi antenna gives good performance over a wide bandwidth, but the cross-polarization level is unfortunately high due to the slot flares on different layers. As a simple technique to reduce the cross-polarization level in the array, the antipodal antenna and its mirror image are placed alternately in the H-plane. The cross-polarization level is reduced more than 20 dB at broadside.",
"title": ""
},
{
"docid": "537cf2257d1ca9ef49f023dbdc109e0b",
"text": "0950-7051/$ see front matter 2010 Elsevier B.V. A doi:10.1016/j.knosys.2010.07.006 * Corresponding author. Tel.: +886 3 5712121x573 E-mail addresses: bill.net.tw@yahoo.com.tw (Y.-S (L.-I. Tong). The autoregressive integrated moving average (ARIMA), which is a conventional statistical method, is employed in many fields to construct models for forecasting time series. Although ARIMA can be adopted to obtain a highly accurate linear forecasting model, it cannot accurately forecast nonlinear time series. Artificial neural network (ANN) can be utilized to construct more accurate forecasting model than ARIMA for nonlinear time series, but explaining the meaning of the hidden layers of ANN is difficult and, moreover, it does not yield a mathematical equation. This study proposes a hybrid forecasting model for nonlinear time series by combining ARIMA with genetic programming (GP) to improve upon both the ANN and the ARIMA forecasting models. Finally, some real data sets are adopted to demonstrate the effectiveness of the proposed forecasting model. 2010 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "e3a17d35652c865509ad70d813d4d780",
"text": "Stochastic gradient descent (SGD) is a simple and popular method to solve stochastic optimization problems which arise in machine learning. For strongly convex problems, its convergence rate was known to be O(log(T )/T ), by running SGD for T iterations and returning the average point. However, recent results showed that using a different algorithm, one can get an optimal O(1/T ) rate. This might lead one to believe that standard SGD is suboptimal, and maybe should even be replaced as a method of choice. In this paper, we investigate the optimality of SGD in a stochastic setting. We show that for smooth problems, the algorithm attains the optimal O(1/T ) rate. However, for non-smooth problems, the convergence rate with averaging might really be Ω(log(T )/T ), and this is not just an artifact of the analysis. On the flip side, we show that a simple modification of the averaging step suffices to recover the O(1/T ) rate, and no other change of the algorithm is necessary. We also present experimental results which support our findings, and point out open problems.",
"title": ""
},
{
"docid": "7b6b2a376cae230c888c494f4668bdb0",
"text": "Behavioral studies suggest that children under age 10 process faces using a piecemeal strategy based on individual distinctive facial features, whereas older children use a configural strategy based on the spatial relations among the face's features. The purpose of this study was to determine whether activation of the fusiform gyrus, which is involved in face processing in adults, is greater during face processing in older children (1214 years) than in younger children (8 10 years). Functional MRI scans were obtained while children viewed faces and houses. A developmental change was observed: Older children, but not younger children, showed significantly more activation in bilateral fusiform gyri for faces than for houses. Activation in the fusiform gyrus correlated significantly with age and with a behavioral measure of configural face processing. Regions believed to be involved in processing basic facial features were activated in both younger and older children. Some evidence was also observed for greater activation for houses versus faces for the older children than for the younger children, suggesting that processing of these two stimulus types becomes more differentiated as children age. The current results provide biological insight into changes in visual processing of faces that occur with normal development.",
"title": ""
},
{
"docid": "a122e4c4e59f39fddd18953ab71aaabd",
"text": "A wearable low-power hybrid vision-inertial tracker has been demonstrated based on a flexible sensor fusion core architecture, which allows easy reconfiguration by plugging-in different kinds of sensors. A particular prototype implementation consists of one inertial measurement unit and one outward-looking wide-angle Smart Camera, with a built-in DSP to run all required image-processing tasks. The Smart Camera operates on newly designed 2-D bar-coded fiducials printed on a standard black-and-white printer. The fiducial design allows having thousands of different codes, thus enabling uninterrupted tracking throughout a large building or even a campus at very reasonable cost. The system operates in various real-world lighting conditions without any user intervention due to homomorphic image processing algorithms for extracting fiducials in the presence of very non-uniform lighting .",
"title": ""
},
{
"docid": "2c63dcef21762f875082d5471d5bf53c",
"text": "Recent approaches for high accuracy detection and tracking of object categories in video consist of complex multistage solutions that become more cumbersome each year. In this paper we propose a ConvNet architecture that jointly performs detection and tracking, solving the task in a simple and effective way. Our contributions are threefold: (i) we set up a ConvNet architecture for simultaneous detection and tracking, using a multi-task objective for frame-based object detection and across-frame track regression; (ii) we introduce correlation features that represent object co-occurrences across time to aid the ConvNet during tracking; and (iii) we link the frame level detections based on our across-frame tracklets to produce high accuracy detections at the video level. Our ConvNet architecture for spatiotemporal object detection is evaluated on the large-scale ImageNet VID dataset where it achieves state-of-the-art results. Our approach provides better single model performance than the winning method of the last ImageNet challenge while being conceptually much simpler. Finally, we show that by increasing the temporal stride we can dramatically increase the tracker speed.",
"title": ""
},
{
"docid": "97a8afb9273ceb3d441815e324f00234",
"text": "BACKGROUND\nThe PRISMA Statement is a reporting guideline designed to improve transparency of systematic reviews (SRs) and meta-analyses. Seven extensions to the PRISMA Statement have been published to address the reporting of different types or aspects of SRs, and another eight are in development. We performed a scoping review to map the research that has been conducted to evaluate the uptake and impact of the PRISMA Statement and extensions. We also synthesised studies evaluating how well SRs published after the PRISMA Statement was disseminated adhere to its recommendations.\n\n\nMETHODS\nWe searched for meta-research studies indexed in MEDLINE® from inception to 31 July 2017, which investigated some component of the PRISMA Statement or extensions (e.g. SR adherence to PRISMA, journal endorsement of PRISMA). One author screened all records and classified the types of evidence available in the studies. We pooled data on SR adherence to individual PRISMA items across all SRs in the included studies and across SRs published after 2009 (the year PRISMA was disseminated).\n\n\nRESULTS\nWe included 100 meta-research studies. The most common type of evidence available was data on SR adherence to the PRISMA Statement, which has been evaluated in 57 studies that have assessed 6487 SRs. The pooled results of these studies suggest that reporting of many items in the PRISMA Statement is suboptimal, even in the 2382 SRs published after 2009 (where nine items were adhered to by fewer than 67% of SRs). Few meta-research studies have evaluated the adherence of SRs to the PRISMA extensions or strategies to increase adherence to the PRISMA Statement and extensions.\n\n\nCONCLUSIONS\nMany studies have evaluated how well SRs adhere to the PRISMA Statement, and the pooled result of these suggest that reporting of many items is suboptimal. An update of the PRISMA Statement, along with a toolkit of strategies to help journals endorse and implement the updated guideline, may improve the transparency of SRs.",
"title": ""
},
{
"docid": "919ef49d1bbd4d76fc7c3ca01969c811",
"text": "While most research papers on computer architectures include some performance measurements, these performance numbers tend to be distrusted. Up to the point that, after so many research articles on data cache architectures, for instance, few researchers have a clear view of what are the best data cache mechanisms. To illustrate the usefulness of a fair quantitative comparison, we have picked a target architecture component for which lots of optimizations have been proposed (data caches), and we have implemented most of the performance-oriented hardware data cache optimizations published in top conferences in the past 4 years. Beyond the comparison of data cache ideas, our goals are twofold: (1) to clearly and quantitatively evaluate the effect of methodology shortcomings, such as model precision, benchmark selection, trace selection..., on assessing and comparing research ideas, and to outline how strong is the methodology effect in many cases, (2) to outline that the lack of interoperable simulators and not disclosing simulators at publication time make it difficult if not impossible to fairly assess the benefit of research ideas. This study is part of a broader effort, called MicroLib, an open library of modular simulators aimed at promoting the disclosure and sharing of simulator models.",
"title": ""
},
{
"docid": "e8abf8e4cd087cf3b77ae6a024e95971",
"text": "Cloud computing has been emerged in the last decade to enable utility-based computing resource management without purchasing hardware equipment. Cloud providers run multiple data centers in various locations to manage and provision the Cloud resources to their customers. More recently, the introduction of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) opens more opportunities in Clouds which enables dynamic and autonomic configuration and provisioning of the resources in Cloud data centers. This paper proposes architectural framework and principles for Programmable Network Clouds hosting SDNs and NFVs for geographically distributed MultiCloud computing environments. Cost and SLA-aware resource provisioning and scheduling that minimizes the operating cost without violating the negotiated SLAs are investigated and discussed in regards of techniques for autonomic and timely VNF composition, deployment and management across multiple Clouds. We also discuss open challenges and directions for creating auto-scaling solutions for performance optimization of VNFs using analytics and monitoring techniques, algorithms for SDN controller for scalable traffic and deployment management. The simulation platform and the proof-of-concept prototype are presented with initial evaluation results.",
"title": ""
},
{
"docid": "d10c1397e6c41bc4f35f88a7af08b97f",
"text": "The advent of the Linked Open Data (LOD) initiative gave birth to a variety of open knowledge bases freely accessible on the Web. They provide a valuable source of information that can improve conventional recommender systems, if properly exploited. In this paper we present SPrank, a novel hybrid recommendation algorithm able to compute top-N item recommendations from implicit feedback exploiting the information available in the so called Web of Data. We leverage DBpedia, a well-known knowledge base in the LOD compass, to extract semantic path-based features and to eventually compute recommendations using a learning to rank algorithm. Experiments with datasets on two different domains show that the proposed approach outperforms in terms of prediction accuracy several state-of-the-art top-N recommendation algorithms for implicit feedback in situations affected by different degrees of data sparsity.",
"title": ""
},
{
"docid": "2f9efc20fb961bc42f20211a6c958832",
"text": "We introduce PixelPlayer, a system that, by leveraging large amounts of unlabeled videos, learns to locate image regions which produce sounds and separate the input sounds into a set of components that represents the sound from each pixel. Our approach capitalizes on the natural synchronization of the visual and audio modalities to learn models that jointly parse sounds and images, without requiring additional manual supervision. Experimental results on a newly collected MUSIC dataset show that our proposed Mix-and-Separate framework outperforms several baselines on source separation. Qualitative results suggest our model learns to ground sounds in vision, enabling applications such as independently adjusting the volume of sound sources.",
"title": ""
},
{
"docid": "4dc302fc2001dda1d24d830bb43f9cfa",
"text": "Discussions of qualitative research interviews have centered on promoting an ideal interactional style and articulating the researcher behaviors by which this might be realized. Although examining what researchers do in an interview continues to be valuable, this focus obscures the reflexive engagement of all participants in the exchange and the potential for a variety of possible styles of interacting. The author presents her analyses of participants’ accounts of past research interviews and explores the implications of this for researchers’ orientation to qualitative research inter-",
"title": ""
},
{
"docid": "0a5ae1eb45404d6a42678e955c23116c",
"text": "This study assessed the validity of the Balance Scale by examining: how Scale scores related to clinical judgements and self-perceptions of balance, laboratory measures of postural sway and external criteria reflecting balancing ability; if scores could predict falls in the elderly; and how they related to motor and functional performance in stroke patients. Elderly residents (N = 113) were assessed for functional performance and balance regularly over a nine-month period. Occurrence of falls was monitored for a year. Acute stroke patients (N = 70) were periodically rated for functional independence, motor performance and balance for over three months. Thirty-one elderly subjects were assessed by clinical and laboratory indicators reflecting balancing ability. The Scale correlated moderately with caregiver ratings, self-ratings and laboratory measures of sway. Differences in mean Scale scores were consistent with the use of mobility aids by elderly residents and differentiated stroke patients by location of follow-up. Balance scores predicted the occurrence of multiple falls among elderly residents and were strongly correlated with functional and motor performance in stroke patients.",
"title": ""
},
{
"docid": "ea01ef46670d4bb8244df0d6ab08a3d5",
"text": "In this paper, statics model of an underactuated wire-driven flexible robotic arm is introduced. The robotic arm is composed of a serpentine backbone and a set of controlling wires. It has decoupled bending rigidity and axial rigidity, which enables the robot large axial payload capacity. Statics model of the robotic arm is developed using the Newton-Euler method. Combined with the kinematics model, the robotic arm deformation as well as the wire motion needed to control the robotic arm can be obtained. The model is validated by experiments. Results show that, the proposed model can well predict the robotic arm bending curve. Also, the bending curve is not affected by the wire pre-tension. This enables the wire-driven robotic arm with potential applications in minimally invasive surgical operations.",
"title": ""
},
{
"docid": "114381e33d6c08724057e3116952dafc",
"text": "We present the first prototype of the SUMMA Platform: an integrated platform for multilingual media monitoring. The platform contains a rich suite of low-level and high-level natural language processing technologies: automatic speech recognition of broadcast media, machine translation, automated tagging and classification of named entities, semantic parsing to detect relationships between entities, and automatic construction / augmentation of factual knowledge bases. Implemented on the Docker platform, it can easily be deployed, customised, and scaled to large volumes of incoming media streams.",
"title": ""
},
{
"docid": "f1132d786a6384e3c1a6db776922ee69",
"text": "The analysis of forensic investigation results has generally been identified as the most complex phase of a digital forensic investigation. This phase becomes more complicated and time consuming as the storage capacity of digital devices is increasing, while at the same time the prices of those devices are decreasing. Although there are some tools and techniques that assist the investigator in the analysis of digital evidence, they do not adequately address some of the serious challenges, particularly with the time and effort required to conduct such tasks. In this paper, we consider the use of semantic web technologies and in particular the ontologies, to assist the investigator in analyzing digital evidence. A novel ontology-based framework is proposed for forensic analysis tools, which we believe has the potential to influence the development of such tools. The framework utilizes a set of ontologies to model the environment under investigation. The evidence extracted from the environment is initially annotated using the Resource Description Framework (RDF). The evidence is then merged from various sources to identify new and implicit information with the help of inference engines and classification mechanisms. In addition, we present the ongoing development of a forensic analysis tool to analyze content retrieved from Android smart phones. For this purpose, several ontologies have been created to model some concepts of the smart phone environment.",
"title": ""
},
{
"docid": "bf6a69245dcb757cd79663c8803dc645",
"text": "Despite its substantial coverage, NomBank does not account for all withinsentence arguments and ignores extrasentential arguments altogether. These arguments, which we call implicit, are important to semantic processing, and their recovery could potentially benefit many NLP applications. We present a study of implicit arguments for a select group of frequent nominal predicates. We show that implicit arguments are pervasive for these predicates, adding 65% to the coverage of NomBank. We demonstrate the feasibility of recovering implicit arguments with a supervised classification model. Our results and analyses provide a baseline for future work on this emerging task.",
"title": ""
},
{
"docid": "488fa6801070af3056912d9296cc2151",
"text": "Current evaluation metrics to question answering based machine reading comprehension (MRC) systems generally focus on the lexical overlap between candidate and reference answers, such as ROUGE and BLEU. However, bias may appear when these metrics are used for specific question types, especially questions inquiring yes-no opinions and entity lists. In this paper, we make adaptations on the metrics to better correlate n-gram overlap with the human judgment for answers to these two question types. Statistical analysis proves the effectiveness of our approach. Our adaptations may provide positive guidance for the development of realscene MRC systems.",
"title": ""
},
{
"docid": "688848d25ef154a797f85e03987b795f",
"text": "In this paper, we propose an omnidirectional mobile mechanism with surface contact. This mechanism is expected to perform on rough terrain and weak ground at disaster sites. In the discussion on the drive mechanism, we explain how a two axes orthogonal drive transmission system is important and we propose a principle drive mechanism for omnidirectional motion. In addition, we demonstrated that the proposed drive mechanism has potential for omnidirectional movement on rough ground by conducting experiments with prototypes.",
"title": ""
}
] | scidocsrr |
b8c7d9dec0050780b33e890928422ab4 | One-Shot Learning for Semantic Segmentation | [
{
"docid": "5cf8448044a6e274e289afaec7bd648c",
"text": "Given a set of images which share an object from the same semantic category, we would like to co-segment the shared object. We define 'good' co-segments to be ones which can be easily composed (like a puzzle) from large pieces of other co-segments, yet are difficult to compose from remaining image parts. These pieces must not only match well but also be statistically significant (hard to compose at random). This gives rise to co-segmentation of objects in very challenging scenarios with large variations in appearance, shape and large amounts of clutter. We further show how multiple images can collaborate and \"score\" each others' co-segments to improve the overall fidelity and accuracy of the co-segmentation. Our co-segmentation can be applied both to large image collections, as well as to very few images (where there is too little data for unsupervised learning). At the extreme, it can be applied even to a single image, to extract its co-occurring objects. Our approach obtains state-of-the-art results on benchmark datasets. We further show very encouraging co-segmentation results on the challenging PASCAL-VOC dataset.",
"title": ""
},
{
"docid": "418a5ef9f06f8ba38e63536671d605c1",
"text": "Learning visual models of object categories notoriously requires hundreds or thousands of training examples. We show that it is possible to learn much information about a category from just one, or a handful, of images. The key insight is that, rather than learning from scratch, one can take advantage of knowledge coming from previously learned categories, no matter how different these categories might be. We explore a Bayesian implementation of this idea. Object categories are represented by probabilistic models. Prior knowledge is represented as a probability density function on the parameters of these models. The posterior model for an object category is obtained by updating the prior in the light of one or more observations. We test a simple implementation of our algorithm on a database of 101 diverse object categories. We compare category models learned by an implementation of our Bayesian approach to models learned from by maximum likelihood (ML) and maximum a posteriori (MAP) methods. We find that on a database of more than 100 categories, the Bayesian approach produces informative models when the number of training examples is too small for other methods to operate successfully.",
"title": ""
},
{
"docid": "0c12fd61acd9e02be85b97de0cc79801",
"text": "As deep nets are increasingly used in applications suited for mobile devices, a fundamental dilemma becomes apparent: the trend in deep learning is to grow models to absorb everincreasing data set sizes; however mobile devices are designed with very little memory and cannot store such large models. We present a novel network architecture, HashedNets, that exploits inherent redundancy in neural networks to achieve drastic reductions in model sizes. HashedNets uses a low-cost hash function to randomly group connection weights into hash buckets, and all connections within the same hash bucket share a single parameter value. These parameters are tuned to adjust to the HashedNets weight sharing architecture with standard backprop during training. Our hashing procedure introduces no additional memory overhead, and we demonstrate on several benchmark data sets that HashedNets shrink the storage requirements of neural networks substantially while mostly preserving generalization performance.",
"title": ""
}
] | [
{
"docid": "38d43c15d2bcce3a7d371550a5e2d6a6",
"text": "Within the framework of pac-learning, we explore the learnability of concepts from samples using the paradigm of sample compression schemes. A sample compression scheme of size k for a concept class C $$\\subseteq $$ 2 X consists of a compression function and a reconstruction function. The compression function receives a finite sample set consistent with some concept in C and chooses a subset of k examples as the compression set. The reconstruction function forms a hypothesis on X from a compression set of k examples. For any sample set of a concept in C the compression set produced by the compression function must lead to a hypothesis consistent with the whole original sample set when it is fed to the reconstruction function. We demonstrate that the existence of a sample compression scheme of fixed-size for a class C is sufficient to ensure that the class C is pac-learnable. Previous work has shown that a class is pac-learnable if and only if the Vapnik-Chervonenkis (VC) dimension of the class is finite. In the second half of this paper we explore the relationship between sample compression schemes and the VC dimension. We define maximum and maximal classes of VC dimension d. For every maximum class of VC dimension d, there is a sample compression scheme of size d, and for sufficiently-large maximum classes there is no sample compression scheme of size less than d. We discuss briefly classes of VC dimension d that are maximal but not maximum. It is an open question whether every class of VC dimension d has a sample compression scheme of size O(d).",
"title": ""
},
{
"docid": "9076428e840f37860a395b46445c22c8",
"text": "Embedded First-In First-Out (FIFO) memories are increasingly used in many IC designs. We have created a new full-custom embedded ripple-through FIFO module with asynchronous read and write clocks. The implementation is based on a micropipeline architecture and is at least a factor two smaller than SRAM-based and standard-cell-based counterparts. This paper gives an overview of the most important design features of the new FIFO module and describes its test and design-for-test approach.",
"title": ""
},
{
"docid": "3ac1ceb1656f4ede34e417d17df41b9e",
"text": "We study the problem of link prediction in coupled networks, where we have the structure information of one (source) network and the interactions between this network and another (target) network. The goal is to predict the missing links in the target network. The problem is extremely challenging as we do not have any information of the target network. Moreover, the source and target networks are usually heterogeneous and have different types of nodes and links. How to utilize the structure information in the source network for predicting links in the target network? How to leverage the heterogeneous interactions between the two networks for the prediction task?\n We propose a unified framework, CoupledLP, to solve the problem. Given two coupled networks, we first leverage atomic propagation rules to automatically construct implicit links in the target network for addressing the challenge of target network incompleteness, and then propose a coupled factor graph model to incorporate the meta-paths extracted from the coupled part of the two networks for transferring heterogeneous knowledge. We evaluate the proposed framework on two different genres of datasets: disease-gene (DG) and mobile social networks. In the DG networks, we aim to use the disease network to predict the associations between genes. In the mobile networks, we aim to use the mobile communication network of one mobile operator to infer the network structure of its competitors. On both datasets, the proposed CoupledLP framework outperforms several alternative methods. The proposed problem of coupled link prediction and the corresponding framework demonstrate both the scientific and business applications in biology and social networks.",
"title": ""
},
{
"docid": "2768cae9d76cd04eb7b4c82fceed470c",
"text": "In this paper we present a method for synthesizing English handwritten textlines from ASCII transcriptions. The method is based on templates of characters and the Delta LogNormal model of handwriting generation. To generate a textline, first a static image of the textline is built by concatenating perturbed versions of the character templates. Then strokes and corresponding virtual targets are extracted and randomly perturbed, and finally the textline is drawn using overlapping strokes and delta-lognormal velocity profiles in accordance with the Delta LogNormal theory. The generated textlines are used as training data for a hidden Markov model based off-line handwritten textline recognizer. First results show that adding such generated textlines to the natural training set may be beneficial.",
"title": ""
},
{
"docid": "f5a55d7fc3a80382d10e1002b046d87e",
"text": "In recent years, with the increasing number of vehicles and insufficient parking spaces, the urban traffic congestion has become a great challenge that cannot be neglected. In order to mitigate problems such as high power consumption of sensor node and high deployment costs of wireless network, a smart parking system is proposed in this paper. In the proposed system, the data of the sensor node is transmitted by Narrowband Internet of Things (NB-IoT) module, which is a new cellular technology introduced for Low-Power Wide-Area (LPWA) applications. Basic information management, charge management, sensor node surveillance, task management and business intelligence modules are implemented on the cloud server. With integrated third-party payment platform and parking guide service, the mobile application developed for drivers is easy and convenient to use. Currently, the proposed system has been deployed in two cities to improve the utilization of existing parking facilities effectively.",
"title": ""
},
{
"docid": "5a456d19b617b2a1d521424b8f98ad91",
"text": "Abstract: Dynamic programming (DP) is a very general optimization technique, which can be applied to numerous decision problems that typically require a sequence of decisions to be made. The solver software DP2PN2Solver presented in this paper is a general, flexible, and expandable software tool that solves DP problems. It consists of modules on two levels. A level one module takes the specification of a discrete DP problem instance as input and produces an intermediate Petri net (PN) representation called Bellman net (Lew, 2002; Lew, Mauch, 2003, 2004) as output — a middle layer, which concisely captures all the essential elements of a DP problem in a standardized and mathematically precise fashion. The optimal solution for the problem instance is computed by an “executable” code (e.g. Java, Spreadsheet, etc.) derived by a level two module from the Bellman net representation. DP2PN2Solver’s unique potential lies in its Bellman net representation. In theory, a PN’s intrinsic concurrency allows to distribute the computational load encountered when solving a single DP problem instance to several computational units.",
"title": ""
},
{
"docid": "92c6e4ec2497c467eaa31546e2e2be0e",
"text": "The subjective sense of future time plays an essential role in human motivation. Gradually, time left becomes a better predictor than chronological age for a range of cognitive, emotional, and motivational variables. Socioemotional selectivity theory maintains that constraints on time horizons shift motivational priorities in such a way that the regulation of emotional states becomes more important than other types of goals. This motivational shift occurs with age but also appears in other contexts (for example, geographical relocations, illnesses, and war) that limit subjective future time.",
"title": ""
},
{
"docid": "24a6ad4d167290bec62a044580635aa0",
"text": "We introduce HyperLex—a data set and evaluation resource that quantifies the extent of the semantic category membership, that is, type-of relation, also known as hyponymy–hypernymy or lexical entailment (LE) relation between 2,616 concept pairs. Cognitive psychology research has established that typicality and category/class membership are computed in human semantic memory as a gradual rather than binary relation. Nevertheless, most NLP research and existing large-scale inventories of concept category membership (WordNet, DBPedia, etc.) treat category membership and LE as binary. To address this, we asked hundreds of native English speakers to indicate typicality and strength of category membership between a diverse range of concept pairs on a crowdsourcing platform. Our results confirm that category membership and LE are indeed more gradual than binary. We then compare these human judgments with the predictions of automatic systems, which reveals a huge gap between human performance and state-of-the-art LE, distributional and representation learning models, and substantial differences between the models themselves. We discuss a pathway for improving semantic models to overcome this discrepancy, and indicate future application areas for improved graded LE systems.",
"title": ""
},
{
"docid": "61ed9242764dad47daf7b7fc47865c88",
"text": "Haar-Cascade classifier method has been applied to detect the presence of a human on the thermal image. The evaluation was done on the performance of detection, represented by its precision and recall values. The thermal camera images were varied to obtain comprehensive results, which covered the distance of the object from the camera, the angle of the camera to the object, the number of objects, and the environmental conditions during image acquisition. The results showed that the greater the camera-object distance, the precision and recall of human detection results declined. Human objects would also be hard to detect if his/her pose was not facing frontally. The method was able to detect more than one human in the image with positions of in front of each other, side by side, or overlapped to one another. However, if there was any other object in the image that had characteristics similar to a human, the object would also be detected as a human being, resulting in a false detection. These other objects could be an infrared shadow formed from the reflection on glass or painted walls.",
"title": ""
},
{
"docid": "57c7b5048517c81aa70eaa0e75f0e4ad",
"text": "We present a case study of a difficult real-world pattern recognition problem: predicting hard drive failure using attributes monitored internally by individual drives. We compare the performance of support vector machines (SVMs), unsupervised clustering, and non-parametric statistical tests (rank-sum and reverse arrangements). Somewhat surprisingly, the rank-sum method outperformed the other methods, including SVMs. We also show the utility of using non-parametric tests for feature set selection. Keywords— failure prediction, hard drive reliability, ranksum, reverse arrangements, support vector machines,",
"title": ""
},
{
"docid": "ee4c34abeca80512467efb2ab2b46355",
"text": "Neural Networks have been utilized to solve various tasks such as image recognition, text classification, and machine translation and have achieved exceptional results in many of these tasks. However, understanding the inner workings of neural networks and explaining why a certain output is produced are no trivial tasks. Especially when dealing with text classification problems, an approach to explain network decisions may greatly increase the acceptance of neural network supported tools. In this paper, we present an approach to visualize reasons why a classification outcome is produced by convolutional neural networks by tracing back decisions made by the network. The approach is applied to various text classification problems, including our own requirements engineering related classification problem. We argue that by providing these explanations in neural network supported tools, users will use such tools with more confidence and also may allow the tool to do certain tasks automatically.",
"title": ""
},
{
"docid": "2ae680a349a66b3b96a7a8642993d3ac",
"text": "In this paper we propose an integration design of both a near field communication (NFC) and a smartphone to achieve a door lock control system. This design consists of a built-in NFC capabilities of a smartphone combined with a dedicated application deemed to be a key to open the door by means of the logical link control protocol (LLCP) exchange together with a time stamp to match the user's own set of password information to verify who is a permissions user or not. When verified the specific door which is secured by this door lock control system immediately opens.",
"title": ""
},
{
"docid": "a8d616897b7cbb1182d5f6e8cf4318a9",
"text": "User behaviour targeting is essential in online advertising. Compared with sponsored search keyword targeting and contextual advertising page content targeting, user behaviour targeting builds users’ interest profiles via tracking their online behaviour and then delivers the relevant ads according to each user’s interest, which leads to higher targeting accuracy and thus more improved advertising performance. The current user profiling methods include building keywords and topic tags or mapping users onto a hierarchical taxonomy. However, to our knowledge, there is no previous work that explicitly investigates the user online visits similarity and incorporates such similarity into their ad response prediction. In this work, we propose a general framework which learns the user profiles based on their online browsing behaviour, and transfers the learned knowledge onto prediction of their ad response. Technically, we propose a transfer learning model based on the probabilistic latent factor graphic models, where the users’ ad response profiles are generated from their online browsing profiles. The large-scale experiments based on real-world data demonstrate significant improvement of our solution over some strong baselines.",
"title": ""
},
{
"docid": "d972e23eb49c15488d2159a9137efb07",
"text": "One of the main challenges of the solid-state transformer (SST) lies in the implementation of the dc–dc stage. In this paper, a quadruple-active-bridge (QAB) dc–dc converter is investigated to be used as a basic module of a modular three-stage SST. Besides the feature of high power density and soft-switching operation (also found in others converters), the QAB converter provides a solution with reduced number of high-frequency transformers, since more bridges are connected to the same multiwinding transformer. To ensure soft switching for the entire operation range of the QAB converter, the triangular current-mode modulation strategy, previously adopted for the dual-active-bridge converter, is extended to the QAB converter. The theoretical analysis is developed considering balanced (equal power processed by the medium-voltage (MV) cells) and unbalanced (unequal power processed by the MV cells) conditions. In order to validate the theoretical analysis developed in the paper, a 2-kW prototype is built and experimented.",
"title": ""
},
{
"docid": "8d5cefc81014ee47002f668618829235",
"text": "Particle swarm optimization (PSO) is an alternative population-based evolutionary computation technique. It has been shown to be capable of optimizing hard mathematical problems in continuous or binary space. We present here a parallel version of the particle swarm optimization (PPSO) algorithm together with three communication strategies which can be used according to the independence of the data. The first strategy is designed for solution parameters that are independent or are only loosely correlated, such as the Rosenbrock and Rastrigrin functions. The second communication strategy can be applied to parameters that are more strongly correlated such as the Griewank function. In cases where the properties of the parameters are unknown, a third hybrid communication strategy can be used. Experimental results demonstrate the usefulness of the proposed PPSO algorithm.",
"title": ""
},
{
"docid": "8f3c861c91d0284a891d3531e69014fc",
"text": "Automatic deception detection is an important task that has gained momentum in computational linguistics due to its potential applications. In this paper, we propose a simple yet tough to beat multi-modal neural model for deception detection. By combining features from different modalities such as video, audio, and text along with Micro-Expression features, we show that detecting deception in real life videos can be more accurate. Experimental results on a dataset of real-life deception videos show that our model outperforms existing techniques for deception detection with an accuracy of 96.14% and ROC-AUC of 0.9799.",
"title": ""
},
{
"docid": "32744d62b45f742cdab55ab462670a39",
"text": "The kinematics of manipulators is a central problem in the automatic control of robot manipulators. Theoretical background for the analysis of the 5 Dof Lynx-6 educational Robot Arm kinematics is presented in this paper. The kinematics problem is defined as the transformation from the Cartesian space to the joint space and vice versa. The Denavit-Harbenterg (D-H) model of representation is used to model robot links and joints in this study. Both forward and inverse kinematics solutions for this educational manipulator are presented, An effective method is suggested to decrease multiple solutions in inverse kinematics. A visual software package, named MSG, is also developed for testing Motional Characteristics of the Lynx-6 Robot arm. The kinematics solutions of the software package were found to be identical with the robot arm’s physical motional behaviors. Keywords—Lynx 6, robot arm, forward kinematics, inverse kinematics, software, DH parameters, 5 DOF ,SSC-32 , simulator.",
"title": ""
},
{
"docid": "efb48301bb60825ea957ef92d947f9fd",
"text": "Multiple Sclerosis (MS) is an autoimmune disease that leads to lesions in the central nervous system. Magnetic resonance (MR) images provide sufficient imaging contrast to visualize and detect lesions, particularly those in the white matter. Quantitative measures based on various features of lesions have been shown to be useful in clinical trials for evaluating therapies. Therefore robust and accurate segmentation of white matter lesions from MR images can provide important information about the disease status and progression. In this paper, we propose a fully convolutional neural network (CNN) based method to segment white matter lesions from multi-contrast MR images. The proposed CNN based method contains two convolutional pathways. The first pathway consists of multiple parallel convolutional filter banks catering to multiple MR modalities. In the second pathway, the outputs of the first one are concatenated and another set of convolutional filters are applied. The output of this last pathway produces a membership function for lesions that may be thresholded to obtain a binary segmentation. The proposed method is evaluated on a dataset of 100 MS patients, as well as the ISBI 2015 challenge data consisting of 14 patients. The comparison is performed against four publicly available MS lesion segmentation methods. Significant improvement in segmentation quality over the competing methods is demonstrated on various metrics, such as Dice and false positive ratio. While evaluating on the ISBI 2015 challenge data, our method produces a score of 90.48, where a score of 90 is considered to be comparable to a human rater.",
"title": ""
},
{
"docid": "8c6c0a1bd17cf5cf0b84693fdfc776d9",
"text": "This paper deals with the unification of local and non-local signal processing on graphs within a single convolutional neural network (CNN) framework. Building upon recent works on graph CNNs, we propose to use convolutional layers that take as inputs two variables, a signal and a graph, allowing the network to adapt to changes in the graph structure. This also allows us to learn through training the optimal mixing of locality and non-locality, in cases where the graph is built on the input signal itself. We demonstrate the versatility and the effectiveness of our framework on several types of signals (greyscale and color images, color palettes and speech signals) and on several applications (style transfer, color transfer, and denoising).",
"title": ""
},
{
"docid": "feb565b4decfdb3d627ab62b7cfcae8f",
"text": "Though enterprise resource planning (ERP) has gained some prominence in the information systems (IS) literature over the past few years and is a signi®cant phenomenon in practice, through (a) historical analysis, (b) meta-analysis of representative IS literature, and (c) a survey of academic experts, we reveal dissenting views on the phenomenon. Given this diversity of perspectives, it is unlikely that at this stage a broadly agreed de®nition of ERP can be achieved. We thus seek to increase awareness of the issues and stimulate further discussion, with the ultimate aim being to: (1) aid communication amongst researchers and between researchers and practitioners; (2) inform development of teaching materials on ERP and related concepts in university curricula and in commercial education and training; and (3) aid communication amongst clients, consultants and vendors. Increased transparency of the ERP-concept within IS may also bene®t other aligned ®elds of knowledge.",
"title": ""
}
] | scidocsrr |
e2acab0b5a67c2b65198d6c2461e33c6 | Identification and Detection of Phishing Emails Using Natural Language Processing Techniques | [
{
"docid": "5cb8c778f0672d88241cc22da9347415",
"text": "Phishing websites, fraudulent sites that impersonate a trusted third party to gain access to private data, continue to cost Internet users over a billion dollars each year. In this paper, we describe the design and performance characteristics of a scalable machine learning classifier we developed to detect phishing websites. We use this classifier to maintain Google’s phishing blacklist automatically. Our classifier analyzes millions of pages a day, examining the URL and the contents of a page to determine whether or not a page is phishing. Unlike previous work in this field, we train the classifier on a noisy dataset consisting of millions of samples from previously collected live classification data. Despite the noise in the training data, our classifier learns a robust model for identifying phishing pages which correctly classifies more than 90% of phishing pages several weeks after training concludes.",
"title": ""
},
{
"docid": "00410fcb0faa85d5423ccf0a7cc2f727",
"text": "Phishing is form of identity theft that combines social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. Often a phisher tries to lure her victim into clicking a URL pointing to a rogue page. In this paper, we focus on studying the structure of URLs employed in various phishing attacks. We find that it is often possible to tell whether or not a URL belongs to a phishing attack without requiring any knowledge of the corresponding page data. We describe several features that can be used to distinguish a phishing URL from a benign one. These features are used to model a logistic regression filter that is efficient and has a high accuracy. We use this filter to perform thorough measurements on several million URLs and quantify the prevalence of phishing on the Internet today",
"title": ""
}
] | [
{
"docid": "ce5c5d0d0cb988c96f0363cfeb9610d4",
"text": "Due to deep automation, the configuration of many Cloud infrastructures is static and homogeneous, which, while easing administration, significantly decreases a potential attacker's uncertainty on a deployed Cloud-based service and hence increases the chance of the service being compromised. Moving-target defense (MTD) is a promising solution to the configuration staticity and homogeneity problem. This paper presents our findings on whether and to what extent MTD is effective in protecting a Cloud-based service with heterogeneous and dynamic attack surfaces - these attributes, which match the reality of current Cloud infrastructures, have not been investigated together in previous works on MTD in general network settings. We 1) formulate a Cloud-based service security model that incorporates Cloud-specific features such as VM migration/snapshotting and the diversity/compatibility of migration, 2) consider the accumulative effect of the attacker's intelligence on the target service's attack surface, 3) model the heterogeneity and dynamics of the service's attack surfaces, as defined by the (dynamic) probability of the service being compromised, as an S-shaped generalized logistic function, and 4) propose a probabilistic MTD service deployment strategy that exploits the dynamics and heterogeneity of attack surfaces for protecting the service against attackers. Through simulation, we identify the conditions and extent of the proposed MTD strategy's effectiveness in protecting Cloud-based services. Namely, 1) MTD is more effective when the service deployment is dense in the replacement pool and/or when the attack is strong, and 2) attack-surface heterogeneity-and-dynamics awareness helps in improving MTD's effectiveness.",
"title": ""
},
{
"docid": "6432df2102cc9140f9a586abd5d44a90",
"text": "BACKGROUND\nLimited information is available from randomized clinical trials comparing the longevity of amalgam and resin-based compomer/composite restorations. The authors compared replacement rates of these types of restorations in posterior teeth during the five-year follow-up of the New England Children's Amalgam Trial.\n\n\nMETHODS\nThe authors randomized children aged 6 to 10 years who had two or more posterior occlusal carious lesions into groups that received amalgam (n=267) or compomer (primary teeth)/composite (permanent teeth) (n=267) restorations and followed them up semiannually. They compared the longevity of restorations placed on all posterior surfaces using random effects survival analysis.\n\n\nRESULTS\nThe average+/-standard deviation follow-up was 2.8+/-1.4 years for primary tooth restorations and 3.4+/-1.9 years for permanent tooth restorations. In primary teeth, the replacement rate was 5.8 percent of compomers versus 4.0 percent of amalgams (P=.10), with 3.0 percent versus 0.5 percent (P=.002), respectively, due to recurrent caries. In permanent teeth, the replacement rate was 14.9 percent of composites versus 10.8 percent of amalgams (P=.45), and the repair rate was 2.8 percent of composites versus 0.4 percent of amalgams (P=.02).\n\n\nCONCLUSION\nAlthough the overall difference in longevity was not statistically significant, compomer was replaced significantly more frequently owing to recurrent caries, and composite restorations required seven times as many repairs as did amalgam restorations.\n\n\nCLINICAL IMPLICATIONS\nCompomer/composite restorations on posterior tooth surfaces in children may require replacement or repair at higher rates than amalgam restorations, even within five years of placement.",
"title": ""
},
{
"docid": "919ce1951d219970a05086a531b9d796",
"text": "Anti-neutrophil cytoplasmic autoantibodies (ANCA) and anti-glomerular basement membrane (GBM) necrotizing and crescentic glomerulonephritis are aggressive and destructive glomerular diseases that are associated with and probably caused by circulating ANCA and anti-GBM antibodies. These necrotizing lesions are manifested by acute nephritis and deteriorating kidney function often accompanied by distinctive clinical features of systemic disease. Prompt diagnosis requires clinical acumen that allows for the prompt institution of therapy aimed at removing circulating autoantibodies and quelling the inflammatory process. Continuing exploration of the etiology and pathogenesis of these aggressive inflammatory diseases have gradually uncovered new paradigms for the cause of and more specific therapy for these particular glomerular disorders and for autoimmune glomerular diseases in general.",
"title": ""
},
{
"docid": "5c50099c8a4e638736f430e3b5622b1d",
"text": "BACKGROUND\nAccording to the existential philosophers, meaning, purpose and choice are necessary for quality of life. Qualitative researchers exploring the perspectives of people who have experienced health crises have also identified the need for meaning, purpose and choice following life disruptions. Although espousing the importance of meaning in occupation, occupational therapy theory has been primarily preoccupied with purposeful occupations and thus appears inadequate to address issues of meaning within people's lives.\n\n\nPURPOSE\nThis paper proposes that the fundamental orientation of occupational therapy should be the contributions that occupation makes to meaning in people's lives, furthering the suggestion that occupation might be viewed as comprising dimensions of meaning: doing, being, belonging and becoming. Drawing upon perspectives and research from philosophers, social scientists and occupational therapists, this paper will argue for a renewed understanding of occupation in terms of dimensions of meaning rather than as divisible activities of self-care, productivity and leisure.\n\n\nPRACTICE IMPLICATIONS\nFocusing on meaningful, rather than purposeful occupations more closely aligns the profession with its espoused aspiration to enable the enhancement of quality of life.",
"title": ""
},
{
"docid": "2494840a6f833bd5b20b9b1fadcfc2f8",
"text": "Tracing neurons in large-scale microscopy data is crucial to establishing a wiring diagram of the brain, which is needed to understand how neural circuits in the brain process information and generate behavior. Automatic techniques often fail for large and complex datasets, and connectomics researchers may spend weeks or months manually tracing neurons using 2D image stacks. We present a design study of a new virtual reality (VR) system, developed in collaboration with trained neuroanatomists, to trace neurons in microscope scans of the visual cortex of primates. We hypothesize that using consumer-grade VR technology to interact with neurons directly in 3D will help neuroscientists better resolve complex cases and enable them to trace neurons faster and with less physical and mental strain. We discuss both the design process and technical challenges in developing an interactive system to navigate and manipulate terabyte-sized image volumes in VR. Using a number of different datasets, we demonstrate that, compared to widely used commercial software, consumer-grade VR presents a promising alternative for scientists.",
"title": ""
},
{
"docid": "3ed8fc0084bd836a3f4034a5099b374a",
"text": "A model hypothesizing differential relationships among predictor variables and individual commitment to the organization and work team was tested. Data from 485 members of sewing teams supported the existence of differential relationships between predictors and organizational and team commitment. In particular, intersender conflict and satisfaction with coworkers were more strongly related to team commitment than to organizational commitment. Resource-related conflict and satisfaction with supervision were more strongly related to organizational commitment than to team commitment. Perceived task interdependence was strongly related to both commitment foci. Contrary to prediction, the relationships between perceived task interdependence and the 2 commitment foci were not significantly different. Relationships with antecedent variables help explain how differential levels of commitment to the 2 foci may be formed. Indirect effects of exogenous variables are reported.",
"title": ""
},
{
"docid": "91cf217b2c5fa968bc4e893366ec53e1",
"text": "Importance\nPostpartum hypertension complicates approximately 2% of pregnancies and, similar to antepartum severe hypertension, can have devastating consequences including maternal death.\n\n\nObjective\nThis review aims to increase the knowledge and skills of women's health care providers in understanding, diagnosing, and managing hypertension in the postpartum period.\n\n\nResults\nHypertension complicating pregnancy, including postpartum, is defined as systolic blood pressure 140 mm Hg or greater and/or diastolic blood pressure 90 mm Hg or greater on 2 or more occasions at least 4 hours apart. Severe hypertension is defined as systolic blood pressure 160 mm Hg or greater and/or diastolic blood pressure 110 mm Hg or greater on 2 or more occasions repeated at a short interval (minutes). Workup for secondary causes of hypertension should be pursued, especially in patients with severe or resistant hypertension, hypokalemia, abnormal creatinine, or a strong family history of renal disease. Because severe hypertension is known to cause maternal stroke, women with severe hypertension sustained over 15 minutes during pregnancy or in the postpartum period should be treated with fast-acting antihypertension medication. Labetalol, hydralazine, and nifedipine are all effective for acute management, although nifedipine may work the fastest. For persistent postpartum hypertension, a long-acting antihypertensive agent should be started. Labetalol and nifedipine are also both effective, but labetalol may achieve control at a lower dose with fewer adverse effects.\n\n\nConclusions and Relevance\nProviders must be aware of the risks associated with postpartum hypertension and educate women about the symptoms of postpartum preeclampsia. Severe acute hypertension should be treated in a timely fashion to avoid morbidity and mortality. Women with persistent postpartum hypertension should be administered a long-acting antihypertensive agent.\n\n\nTarget Audience\nObstetricians and gynecologists, family physicians.\n\n\nLearning Objectives\nAfter completing this activity, the learner should be better able to assist patients and providers in identifying postpartum hypertension; provide a framework for the evaluation of new-onset postpartum hypertension; and provide instructions for the management of acute severe and persistent postpartum hypertension.",
"title": ""
},
{
"docid": "54d54094acea1900e183144d32b1910f",
"text": "A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. Most of this work focuses on how to share social networks owned by organizations without revealing the identities or the sensitive relationships of the users involved. Not much attention has been given to the privacy risk of users posed by their daily information-sharing activities.\n In this article, we approach the privacy issues raised in online social networks from the individual users’ viewpoint: we propose a framework to compute the privacy score of a user. This score indicates the user’s potential risk caused by his or her participation in the network. Our definition of privacy score satisfies the following intuitive properties: the more sensitive information a user discloses, the higher his or her privacy risk. Also, the more visible the disclosed information becomes in the network, the higher the privacy risk. We develop mathematical models to estimate both sensitivity and visibility of the information. We apply our methods to synthetic and real-world data and demonstrate their efficacy and practical utility.",
"title": ""
},
{
"docid": "9556a7f345a31989bff1ee85fc31664a",
"text": "The neural basis of variation in human intelligence is not well delineated. Numerous studies relating measures of brain size such as brain weight, head circumference, CT or MRI brain volume to different intelligence test measures, with variously defined samples of subjects have yielded inconsistent findings with correlations from approximately 0 to 0.6, with most correlations approximately 0.3 or 0.4. The study of intelligence in relation to postmortem cerebral volume is not available to date. We report the results of such a study on 100 cases (58 women and 42 men) having prospectively obtained Full Scale Wechsler Adult Intelligence Scale scores. Ability correlated with cerebral volume, but the relationship depended on the realm of intelligence studied, as well as the sex and hemispheric functional lateralization of the subject. General verbal ability was positively correlated with cerebral volume and each hemisphere's volume in women and in right-handed men accounting for 36% of the variation in verbal intelligence. There was no evidence of such a relationship in non-right-handed men, indicating that at least for verbal intelligence, functional asymmetry may be a relevant factor in structure-function relationships in men, but not in women. In women, general visuospatial ability was also positively correlated with cerebral volume, but less strongly, accounting for approximately 10% of the variance. In men, there was a non-significant trend of a negative correlation between visuospatial ability and cerebral volume, suggesting that the neural substrate of visuospatial ability may differ between the sexes. Analyses of additional research subjects used as test cases provided support for our regression models. In men, visuospatial ability and cerebral volume were strongly linked via the factor of chronological age, suggesting that the well-documented decline in visuospatial intelligence with age is related, at least in right-handed men, to the decrease in cerebral volume with age. We found that cerebral volume decreased only minimally with age in women. This leaves unknown the neural substrate underlying the visuospatial decline with age in women. Body height was found to account for 1-4% of the variation in cerebral volume within each sex, leaving the basis of the well-documented sex difference in cerebral volume unaccounted for. With finer testing instruments of specific cognitive abilities and measures of their associated brain regions, it is likely that stronger structure-function relationships will be observed. Our results point to the need for responsibility in the consideration of the possible use of brain images as intelligence tests.",
"title": ""
},
{
"docid": "410a173b55faaad5a7ab01cf6e4d4b69",
"text": "BACKGROUND\nCommunication skills training (CST) based on the Japanese SHARE model of family-centered truth telling in Asian countries has been adopted in Taiwan. However, its effectiveness in Taiwan has only been preliminarily verified. This study aimed to test the effect of SHARE model-centered CST on Taiwanese healthcare providers' truth-telling preference, to determine the effect size, and to compare the effect of 1-day and 2-day CST programs on participants' truth-telling preference.\n\n\nMETHOD\nFor this one-group, pretest-posttest study, 10 CST programs were conducted from August 2010 to November 2011 under certified facilitators and with standard patients. Participants (257 healthcare personnel from northern, central, southern, and eastern Taiwan) chose the 1-day (n = 94) or 2-day (n = 163) CST program as convenient. Participants' self-reported truth-telling preference was measured before and immediately after CST programs, with CST program assessment afterward.\n\n\nRESULTS\nThe CST programs significantly improved healthcare personnel's truth-telling preference (mean pretest and posttest scores ± standard deviation (SD): 263.8 ± 27.0 vs. 281.8 ± 22.9, p < 0.001). The CST programs effected a significant, large (d = 0.91) improvement in overall truth-telling preference and significantly improved method of disclosure, emotional support, and additional information (p < 0.001). Participation in 1-day or 2-day CST programs did not significantly affect participants' truth-telling preference (p > 0.05) except for the setting subscale. Most participants were satisfied with the CST programs (93.8%) and were willing to recommend them to colleagues (98.5%).\n\n\nCONCLUSIONS\nThe SHARE model-centered CST programs significantly improved Taiwanese healthcare personnel's truth-telling preference. Future studies should objectively assess participants' truth-telling preference, for example, by cancer patients, their families, and other medical team personnel and at longer times after CST programs.",
"title": ""
},
{
"docid": "ef7e973a5c6f9e722917a283a1f0fe52",
"text": "We live in a digital society that provides a range of opportunities for virtual interaction. Consequently, emojis have become popular for clarifying online communication. This presents an exciting opportunity for psychologists, as these prolific online behaviours can be used to help reveal something unique about contemporary human behaviour.",
"title": ""
},
{
"docid": "9b0ffe566f7887c53e272d897e46100d",
"text": "3D registration or matching is a crucial step in 3D model reconstruction. Registration applications span along a variety of research fields, including computational geometry, computer vision, and geometric modeling. This variety of applications produces many diverse approaches to the problem but at the same time yields divergent notations and a lack of standardized algorithms and guidelines to classify existing methods. In this article, we review the state of the art of the 3D rigid registration topic (focused on Coarse Matching) and offer qualitative comparison between the most relevant approaches. Furthermore, we propose a pipeline to classify the existing methods and define a standard formal notation, offering a global point of view of the literature.\n Our discussion, based on the results presented in the analyzed papers, shows how, although certain aspects of the registration process still need to be tested further in real application situations, the registration pipeline as a whole has progressed steadily. As a result of this progress in all registration aspects, it is now possible to put together algorithms that are able to tackle new and challenging problems with unprecedented data sizes and meeting strict precision criteria.",
"title": ""
},
{
"docid": "f8c4fd23f163c0a604569b5ecf4bdefd",
"text": "The goal of interactive machine learning is to help scientists and engineers exploit more specialized data from within their deployed environment in less time, with greater accuracy and fewer costs. A basic introduction to the main components is provided here, untangling the many ideas that must be combined to produce practical interactive learning systems. This article also describes recent developments in machine learning that have significantly advanced the theoretical and practical foundations for the next generation of interactive tools.",
"title": ""
},
{
"docid": "2b8cf99331158bd7aea2958b1b64f741",
"text": "Purpose – The purpose of this paper is to understand blog users’ negative emotional norm compliance decision-making in crises (blog users’-NNDC). Design/methodology/approach – A belief– desire–intention (BDI) model to evaluate the blog users’-NNDC (the BDI-NNDC model) was developed. This model was based on three social characteristics: self-interests, expectations and emotions. An experimental study was conducted to evaluate the efficiency of the BDI-NNDC model by using data retrieved from a popular Chinese social network called “Sina Weibo” about three major crises. Findings – The BDI-NNDC model strongly predicted the Blog users’-NNDC. The predictions were as follows: a self-interested blog user posted content that was targeting his own interests; a blogger with high expectations wrote and commented emotionally negative blogs on the condition that the numbers of negative posts increased, while he ignored the norm when there was relatively less negative emotional news; and an emotional blog user obeyed the norm based on the emotional intentions of the blogosphere in most of the cases. Research limitations/implications – The BDI-NNDC model can explain the diffusion of negative emotions by blog users during crises, and this paper shows a way to bridge the social norm modelling and the research of blog users’ activity and behaviour characteristics in the context of “real life” crises. However, the criterion for differentiating blog users according to social characteristics needs to be further revised, as the generalizability of the results is limited by the number of cases selected in this study. Practical implications – The current method could be applied to predict emotional trends of blog users who have different social characteristics and it could support government agencies to build strategic responses to crises. The authors thank Mr Jon Walker and Ms Celia Zazo Seco in this work for their dedication and time. This paper is supported by the Key project of National Social Science Foundation under contract No. 13&ZD174; National Natural Science Foundation of China under contract No. 71273132, 71303111, 71471089, 71403121, 71503124 and 71503126; National Social Science Foundation under contract No. 15BTQ063; “Fundamental Research Funds for the Central Universities”, No: 30920140111006; Jiangsu “Qinlan” project (2016); Priority Academic Program Development of Jiangsu Higher Education Institutions; and Hubei Collaborative Innovation Center for Early Warning and Emergency Response Research project under contract JD20150401. The current issue and full text archive of this journal is available on Emerald Insight at: www.emeraldinsight.com/0264-0473.htm",
"title": ""
},
{
"docid": "3ddcf5f0e4697a0d43eff2cca77a1ab7",
"text": "Lymph nodes are assessed routinely in clinical practice and their size is followed throughout radiation or chemotherapy to monitor the effectiveness of cancer treatment. This paper presents a robust learning-based method for automatic detection and segmentation of solid lymph nodes from CT data, with the following contributions. First, it presents a learning based approach to solid lymph node detection that relies on marginal space learning to achieve great speedup with virtually no loss in accuracy. Second, it presents a computationally efficient segmentation method for solid lymph nodes (LN). Third, it introduces two new sets of features that are effective for LN detection, one that self-aligns to high gradients and another set obtained from the segmentation result. The method is evaluated for axillary LN detection on 131 volumes containing 371 LN, yielding a 83.0% detection rate with 1.0 false positive per volume. It is further evaluated for pelvic and abdominal LN detection on 54 volumes containing 569 LN, yielding a 80.0% detection rate with 3.2 false positives per volume. The running time is 5-20 s per volume for axillary areas and 15-40 s for pelvic. An added benefit of the method is the capability to detect and segment conglomerated lymph nodes.",
"title": ""
},
{
"docid": "4ce67aeca9e6b31c5021712f148108e2",
"text": "Self-endorsing—the portrayal of potential consumers using products—is a novel advertising strategy made possible by the development of virtual environments. Three experiments compared self-endorsing to endorsing by an unfamiliar other. In Experiment 1, self-endorsing in online advertisements led to higher brand attitude and purchase intention than other-endorsing. Moreover, photographs were a more effective persuasion channel than text. In Experiment 2, participants wore a brand of clothing in a high-immersive virtual environment and preferred the brand worn by their virtual self to the brand worn by others. Experiment 3 demonstrated that an additional mechanism behind self-endorsing was the interactivity of the virtual representation. Evidence for self-referencing as a mediator is presented. 94 The Journal of Advertising context, consumers can experience presence while interacting with three-dimensional products on Web sites (Biocca et al. 2001; Edwards and Gangadharbatla 2001; Li, Daugherty, and Biocca 2001). When users feel a heightened sense of presence and perceive the virtual experience to be real, they are more easily persuaded by the advertisement (Kim and Biocca 1997). The differing degree, or the objectively measurable property of presence, is called immersion. Immersion is the extent to which media are capable of delivering a vivid illusion of reality using rich layers of sensory input (Slater and Wilbur 1997). Therefore, different levels of immersion (objective unit) lead to different experiences of presence (subjective unit), and both concepts are closely related to interactivity. Web sites are considered to be low-immersive virtual environments because of limited interactive capacity and lack of richness in sensory input, which decreases the sense of presence, whereas virtual reality is considered a high-immersive virtual environment because of its ability to reproduce perceptual richness, which heightens the sense of feeling that the virtual experience is real. Another differentiating aspect of virtual environments is that they offer plasticity of the appearance and behavior of virtual self-representations. It is well known that virtual selves may or may not be true replications of physical appearances (Farid 2009; Yee and Bailenson 2006), but users can also be faced with situations in which they are not controlling the behaviors of their own virtual representations (Fox and Bailenson 2009). In other words, a user can see himor herself using (and perhaps enjoying) a product he or she has never physically used. Based on these unique features of virtual platforms, the current study aims to explore the effect of viewing a virtual representation that may or may not look like the self, endorsing a brand by use. We also manipulate the interactivity of endorsers within virtual environments to provide evidence for the mechanism behind self-endorsing. THE SELF-ENDORSED ADVERTISEMENT Recent studies have confirmed that positive connections between the self and brands can be created by subtle manipulations, such as mimicry of the self ’s nonverbal behaviors (Tanner et al. 2008). The slightest affiliation between the self and the other can lead to positive brand evaluations. In a study by Ferraro, Bettman, and Chartrand (2009), an unfamiliar ingroup or out-group member was portrayed in a photograph with a water bottle bearing a brand name. The simple detail of the person wearing a baseball cap with the same school logo (i.e., in-group affiliation) triggered participants to choose the brand associated with the in-group member. Thus, the self–brand relationship significantly influences brand attitude, but self-endorsing has not received scientific attention to date, arguably because it was not easy to implement before the onset of virtual environments. Prior research has studied the effectiveness of different types of endorsers and their influence on the persuasiveness of advertisements (Friedman and Friedman 1979; Stafford, Stafford, and Day 2002), but the self was not considered in these investigations as a possible source of endorsement. However, there is the possibility that the currently sporadic use of self-endorsing (e.g., www.myvirtualmodel.com) will increase dramatically. For instance, personalized recommendations are being sent to consumers based on online “footsteps” of prior purchases (Tam and Ho 2006). Furthermore, Google has spearheaded keyword search advertising, which displays text advertisements in real-time based on search words ( Jansen, Hudson, and Hunter 2008), and Yahoo has begun to display video and image advertisements based on search words (Clifford 2009). Considering the availability of personal images on the Web due to the widespread employment of social networking sites, the idea of self-endorsing may spread quickly. An advertiser could replace the endorser shown in the image advertisement called by search words with the user to create a self-endorsed advertisement. Thus, the timely investigation of the influence of self-endorsing on users, as well as its mechanism, is imperative. Based on positivity biases related to the self (Baumeister 1998; Chambers and Windschitl 2004), self-endorsing may be a powerful persuasion tool. However, there may be instances when using the self in an advertisement may not be effective, such as when the virtual representation does not look like the consumer and the consumer fails to identify with the representation. Self-endorsed advertisements may also lose persuasiveness when movements of the representation are not synched with the actions of the consumer. Another type of endorser that researchers are increasingly focusing on is the typical user endorser. Typical endorsers have an advantage in that they appeal to the similarity of product usage with the average user. For instance, highly attractive models are not always effective compared with normally attractive models, even for beauty-enhancing products (i.e., acne treatment), when users perceive that the highly attractive models do not need those products (Bower and Landreth 2001). Moreover, with the advancement of the Internet, typical endorsers are becoming more influential via online testimonials (Lee, Park, and Han 2006; Wang 2005). In the current studies, we compared the influence of typical endorsers (i.e., other-endorsing) and self-endorsers on brand attitude and purchase intentions. In addition to investigating the effects of self-endorsing, this work extends results of earlier studies on the effectiveness of different types of endorsers and makes important theoretical contributions by studying self-referencing as an underlying mechanism of self-endorsing.",
"title": ""
},
{
"docid": "cc8b0cd938bc6315864925a7a057e211",
"text": "Despite the continuous growth in the number of smartphones around the globe, Short Message Service (SMS) still remains as one of the most popular, cheap and accessible ways of exchanging text messages using mobile phones. Nevertheless, the lack of security in SMS prevents its wide usage in sensitive contexts such as banking and health-related applications. Aiming to tackle this issue, this paper presents SMSCrypto, a framework for securing SMS-based communications in mobile phones. SMSCrypto encloses a tailored selection of lightweight cryptographic algorithms and protocols, providing encryption, authentication and signature services. The proposed framework is implemented both in Java (target at JVM-enabled platforms) and in C (for constrained SIM Card processors) languages, thus being suitable",
"title": ""
},
{
"docid": "fa9571673fe848d1d119e2d49f21d28d",
"text": "Convolutional Neural Networks (CNNs) trained on large scale RGB databases have become the secret sauce in the majority of recent approaches for object categorization from RGB-D data. Thanks to colorization techniques, these methods exploit the filters learned from 2D images to extract meaningful representations in 2.5D. Still, the perceptual signature of these two kind of images is very different, with the first usually strongly characterized by textures, and the second mostly by silhouettes of objects. Ideally, one would like to have two CNNs, one for RGB and one for depth, each trained on a suitable data collection, able to capture the perceptual properties of each channel for the task at hand. This has not been possible so far, due to the lack of a suitable depth database. This paper addresses this issue, proposing to opt for synthetically generated images rather than collecting by hand a 2.5D large scale database. While being clearly a proxy for real data, synthetic images allow to trade quality for quantity, making it possible to generate a virtually infinite amount of data. We show that the filters learned from such data collection, using the very same architecture typically used on visual data, learns very different filters, resulting in depth features (a) able to better characterize the different facets of depth images, and (b) complementary with respect to those derived from CNNs pre-trained on 2D datasets. Experiments on two publicly available databases show the power of our approach.",
"title": ""
},
{
"docid": "33285ad9f7bc6e33b48e3f1e27a1ccc9",
"text": "Information visualization is a very important tool in BigData analytics. BigData, structured and unstructured data which contains images, videos, texts, audio and other forms of data, collected from multiple datasets, is too big, too complex and moves too fast to analyse using traditional methods. This has given rise to two issues; 1) how to reduce multidimensional data without the loss of any data patterns for multiple datasets, 2) how to visualize BigData patterns for analysis. In this paper, we have classified the BigData attributes into `5Ws' data dimensions, and then established a `5Ws' density approach that represents the characteristics of data flow patterns. We use parallel coordinates to display the `5Ws' sending and receiving densities which provide more analytic features for BigData analysis. The experiment shows that this new model with parallel coordinate visualization can be efficiently used for BigData analysis and visualization.",
"title": ""
},
{
"docid": "a75919f4a4abcc0796ae6ba269cb91c1",
"text": "Interacting systems are prevalent in nature, from dynamical systems in physics to complex societal dynamics. The interplay of components can give rise to complex behavior, which can often be explained using a simple model of the system’s constituent parts. In this work, we introduce the neural relational inference (NRI) model: an unsupervised model that learns to infer interactions while simultaneously learning the dynamics purely from observational data. Our model takes the form of a variational auto-encoder, in which the latent code represents the underlying interaction graph and the reconstruction is based on graph neural networks. In experiments on simulated physical systems, we show that our NRI model can accurately recover ground-truth interactions in an unsupervised manner. We further demonstrate that we can find an interpretable structure and predict complex dynamics in real motion capture and sports tracking data.",
"title": ""
}
] | scidocsrr |
824b814ece88880dba8bd820914a552e | Reinforced Mnemonic Reader for Machine Reading Comprehension | [
{
"docid": "22accfa74592e8424bdfe74224365425",
"text": "In the SQuaD reading comprehension task systems are given a paragraph from Wikipedia and have to answer a question about it. The answer is guaranteed to be contained within the paragraph. There are 107,785 such paragraph-question-answer tuples in the dataset. Human performance on this task achieves 91.2% accuracy (F1), and the current state-of-the-art system obtains a respectably close 84.7%. Not so fast though! If we adversarially add a single sentence to those paragraphs, in such a way that the added sentences do not contradict the correct answer, nor do they confuse humans, the accuracy of the published models studied plummets from an average of 75% to just 36%.",
"title": ""
},
{
"docid": "7ec6540b44b23a0380dcb848239ccac4",
"text": "There is plenty of theoretical and empirical evidence that depth of neural networks is a crucial ingredient for their success. However, network training becomes more difficult with increasing depth and training of very deep networks remains an open problem. In this extended abstract, we introduce a new architecture designed to ease gradient-based training of very deep networks. We refer to networks with this architecture as highway networks, since they allow unimpeded information flow across several layers on information highways. The architecture is characterized by the use of gating units which learn to regulate the flow of information through a network. Highway networks with hundreds of layers can be trained directly using stochastic gradient descent and with a variety of activation functions, opening up the possibility of studying extremely deep and efficient architectures. Note: A full paper extending this study is available at http://arxiv.org/abs/1507.06228, with additional references, experiments and analysis.",
"title": ""
},
{
"docid": "db3523bc1e3616b9fe262e5f6cab7ad8",
"text": "Traditional models for question answering optimize using cross entropy loss, which encourages exact answers at the cost of penalizing nearby or overlapping answers that are sometimes equally accurate. We propose a mixed objective that combines cross entropy loss with self-critical policy learning. The objective uses rewards derived from word overlap to solve the misalignment between evaluation metric and optimization objective. In addition to the mixed objective, we improve dynamic coattention networks (DCN) with a deep residual coattention encoder that is inspired by recent work in deep self-attention and residual networks. Our proposals improve model performance across question types and input lengths, especially for long questions that requires the ability to capture long-term dependencies. On the Stanford Question Answering Dataset, our model achieves state-of-the-art results with 75.1% exact match accuracy and 83.1% F1, while the ensemble obtains 78.9% exact match accuracy and 86.0% F1.",
"title": ""
},
{
"docid": "d37f648a06d6418a0e816ce000056136",
"text": "Recently it has been shown that policy-gradient methods for reinforcement learning can be utilized to train deep end-to-end systems directly on non-differentiable metrics for the task at hand. In this paper we consider the problem of optimizing image captioning systems using reinforcement learning, and show that by carefully optimizing our systems using the test metrics of the MSCOCO task, significant gains in performance can be realized. Our systems are built using a new optimization approach that we call self-critical sequence training (SCST). SCST is a form of the popular REINFORCE algorithm that, rather than estimating a baseline to normalize the rewards and reduce variance, utilizes the output of its own test-time inference algorithm to normalize the rewards it experiences. Using this approach, estimating the reward signal (as actor-critic methods must do) and estimating normalization (as REINFORCE algorithms typically do) is avoided, while at the same time harmonizing the model with respect to its test-time inference procedure. Empirically we find that directly optimizing the CIDEr metric with SCST and greedy decoding at test-time is highly effective. Our results on the MSCOCO evaluation sever establish a new state-of-the-art on the task, improving the best result in terms of CIDEr from 104.9 to 114.7.",
"title": ""
},
{
"docid": "dbbd98ed1a7ee32ab9626a923925c45d",
"text": "In this paper, we present the gated selfmatching networks for reading comprehension style question answering, which aims to answer questions from a given passage. We first match the question and passage with gated attention-based recurrent networks to obtain the question-aware passage representation. Then we propose a self-matching attention mechanism to refine the representation by matching the passage against itself, which effectively encodes information from the whole passage. We finally employ the pointer networks to locate the positions of answers from the passages. We conduct extensive experiments on the SQuAD dataset. The single model achieves 71.3% on the evaluation metrics of exact match on the hidden test set, while the ensemble model further boosts the results to 75.9%. At the time of submission of the paper, our model holds the first place on the SQuAD leaderboard for both single and ensemble model.",
"title": ""
}
] | [
{
"docid": "f86e3894a6c61c3734e1aabda3500ef0",
"text": "We perform sensitivity analyses on a mathematical model of malaria transmission to determine the relative importance of model parameters to disease transmission and prevalence. We compile two sets of baseline parameter values: one for areas of high transmission and one for low transmission. We compute sensitivity indices of the reproductive number (which measures initial disease transmission) and the endemic equilibrium point (which measures disease prevalence) to the parameters at the baseline values. We find that in areas of low transmission, the reproductive number and the equilibrium proportion of infectious humans are most sensitive to the mosquito biting rate. In areas of high transmission, the reproductive number is again most sensitive to the mosquito biting rate, but the equilibrium proportion of infectious humans is most sensitive to the human recovery rate. This suggests strategies that target the mosquito biting rate (such as the use of insecticide-treated bed nets and indoor residual spraying) and those that target the human recovery rate (such as the prompt diagnosis and treatment of infectious individuals) can be successful in controlling malaria.",
"title": ""
},
{
"docid": "fb4837a619a6b9e49ca2de944ec2314e",
"text": "Inverse reinforcement learning addresses the general problem of recovering a reward function from samples of a policy provided by an expert/demonstrator. In this paper, we introduce active learning for inverse reinforcement learning. We propose an algorithm that allows the agent to query the demonstrator for samples at specific states, instead of relying only on samples provided at “arbitrary” states. The purpose of our algorithm is to estimate the reward function with similar accuracy as other methods from the literature while reducing the amount of policy samples required from the expert. We also discuss the use of our algorithm in higher dimensional problems, using both Monte Carlo and gradient methods. We present illustrative results of our algorithm in several simulated examples of different complexities.",
"title": ""
},
{
"docid": "b64bc3ef968ae965e414468759f7943c",
"text": "Pulse width modulation (PWM) techniques can be classified into continuous pulse width modulation (CPWM) and discontinuous pulse width modulation (DPWM) types. The switching loss of power devices in DPWM converters is lower than that in CPWM converters. Lower loss could reduce the junction temperature fluctuation in converters of wind turbine generator system (WTGS) and may result in longer power devices lifetime. However, employing DPWM scheme under all WTGS operation conditions will lead to power quality concern. To solve this problem, a new hybrid modulation scheme which combines the CPWM and DPWM methods for WTGS converters is presented in this paper. In the presented hybrid modulation method, two modulation schemes are switched back and forth according to the wind speed in the wind farm site. The performance of the presented modulation scheme is verified and compared with that of other PWM schemes through a case study of 1.2 MW WTGS in long-term mission profiles. The results show that the lifetime of power devices with the presented hybrid approach is longer than that with the CPWM, and is shorter than that with the DPWMs. Moreover, the power quality of the power converters with the hybrid modulation scheme can be guaranteed in all operation conditions, which may not be achieved with DPWMs.",
"title": ""
},
{
"docid": "3744510fa3cec75c1ccb5abbdb9d71ed",
"text": "49 Abstract— Typically, computer viruses and other malware are detected by searching for a string of bits found in the virus or malware. Such a string can be viewed as a \" fingerprint \" of the virus identified as the signature of the virus. The technique of detecting viruses using signatures is known as signature based detection. Today, virus writers often camouflage their viruses by using code obfuscation techniques in an effort to defeat signature-based detection schemes. So-called metamorphic viruses transform their code as they propagate, thus evading detection by static signature-based virus scanners, while keeping their functionality but differing in internal structure. Many dynamic analysis based detection have been proposed to detect metamorphic viruses but dynamic analysis technique have limitations like difficult to learn normal behavior, high run time overhead and high false positive rate compare to static detection technique. A similarity measure method has been successfully applied in the field of document classification problem. We want to apply similarity measures methods on static feature, API calls of executable to classify it as malware or benign. In this paper we present limitations of signature based detection for detecting metamorphic viruses. We focus on statically analyzing an executable to extract API calls and count the frequency this API calls to generate the feature set. These feature set is used to classify unknown executable as malware or benign by applying various similarity function. I. INTRODUCTION In today's age, where a majority of the transactions involving sensitive information access happen on computers and over the internet, it is absolutely imperative to treat information security as a concern of paramount importance. Computer viruses and other malware have been in existence from the very early days of the personal computer and continue to pose a threat to home and enterprise users alike. A computer virus by definition is \" A program that recursively and explicitly copies a possibly evolved version of itself \" [1]. A virus copies itself to a host file or system area. Once it gets control, it multiplies itself to form newer generations. A virus may carry out damaging activities on the host machine such as corrupting or erasing files, overwriting the whole hard disk, or crashing the computer. These viruses remain harmless but",
"title": ""
},
{
"docid": "401b2494b8b032751c219726671cb48e",
"text": "Current state-of-the-art approaches to skeleton-based action recognition are mostly based on recurrent neural networks (RNN). In this paper, we propose a novel convolutional neural networks (CNN) based framework for both action classification and detection. Raw skeleton coordinates as well as skeleton motion are fed directly into CNN for label prediction. A novel skeleton transformer module is designed to rearrange and select important skeleton joints automatically. With a simple 7-layer network, we obtain 89.3% accuracy on validation set of the NTU RGB+D dataset. For action detection in untrimmed videos, we develop a window proposal network to extract temporal segment proposals, which are further classified within the same network. On the recent PKU-MMD dataset, we achieve 93.7% mAP, surpassing the baseline by a large margin.",
"title": ""
},
{
"docid": "e7155ddcd4b47466b97fd2967501ccd3",
"text": "We demonstrate a use of deep neural networks (DNN) for OSNR monitoring with minimum prior knowledge. By using 5-layers DNN trained with 400,000 samples, the DNN successfully estimates OSNR in a 16-GBd DP-QPSK system.",
"title": ""
},
{
"docid": "3d5ec0e5ab00e06af556d3e82582783b",
"text": "Microfluidics-based biochips are soon expected to revolutionize clinical diagnosis, deoxyribonucleic acid (DNA) sequencing, and other laboratory procedures involving molecular biology. In contrast to continuous-flow systems that rely on permanently etched microchannels, micropumps, and microvalves, digital microfluidics offers a scalable system architecture and dynamic reconfigurability; groups of unit cells in a microfluidics array can be reconfigured to change their functionality during the concurrent execution of a set of bioassays. As more bioassays are executed concurrently on a biochip, system integration and design complexity are expected to increase dramatically. This paper presents an overview of an integrated system-level design methodology that attempts to address key issues in the synthesis, testing and reconfiguration of digital microfluidics-based biochips. Different actuation mechanisms for microfluidics-based biochips, and associated design-automation trends and challenges are also discussed. The proposed top-down design-automation approach is expected to relieve biochip users from the burden of manual optimization of bioassays, time-consuming hardware design, and costly testing and maintenance procedures, and it will facilitate the integration of fluidic components with a microelectronic component in next-generation systems-on-chips (SOCs).",
"title": ""
},
{
"docid": "9e9dd203746a1bd4024632abeb80fb0a",
"text": "Translating data from linked data sources to the vocabulary that is expected by a linked data application requires a large number of mappings and can require a lot of structural transformations as well as complex property value transformations. The R2R mapping language is a language based on SPARQL for publishing expressive mappings on the web. However, the specification of R2R mappings is not an easy task. This paper therefore proposes the use of mapping patterns to semi-automatically generate R2R mappings between RDF vocabularies. In this paper, we first specify a mapping language with a high level of abstraction to transform data from a source ontology to a target ontology vocabulary. Second, we introduce the proposed mapping patterns. Finally, we present a method to semi-automatically generate R2R mappings using the mapping",
"title": ""
},
{
"docid": "4d12a4269e4969148f6d5331f5d8afdd",
"text": "Money laundering has become of increasing concern to law makers in recent years, principally because of its associations with terrorism. Recent legislative changes in the United Kingdom mean that auditors risk becoming state law enforcement agents in the private sector. We examine this legislation from the perspective of the changing nature of the relationship between auditors and the state, and the surveillant assemblage within which this is located. Auditors are statutorily obliged to file Suspicious Activity Reports (SARs) into an online database, ELMER, but without much guidance regarding how suspicion is determined. Criminal rather than civil or regulatory sanctions apply to auditors’ instances of non-compliance. This paper evaluates the surveillance implications of the legislation for auditors through lenses developed in the accounting and sociological literature by Brivot andGendron, Neu andHeincke, Deleuze and Guattari, and Haggerty and Ericson. It finds that auditors are generating information flows which are subsequently reassembled into discrete and virtual ‘data doubles’ to be captured and utilised by authorised third parties for unknown purposes. The paper proposes that the surveillant assemblage has extended into the space of the auditor-client relationship, but this extension remains inhibited as a result of auditors’ relatively weak level of engagement in providing SARs, thereby pointing to a degree of resistance in professional service firms regarding the deployment of regulation that compromises the foundations of this",
"title": ""
},
{
"docid": "dbe9214608442659b9a3e1b8b3946c30",
"text": "This study aimed to explore pre-hospital delay and its associated factors in first-ever stroke registered in communities from three cities in China. The rates of delay greater than or equal to 2 hours were calculated and factors associated with delays were determined by non-conditional binary logistic regression, after adjusting for different explanatory factors. Among the 403 cases of stroke with an accurate documented time of prehospital delay, the median time (interquartile range) was 4.00 (1.50-14.00) hours. Among the 544 cases of stroke with an estimated time range of prehospital delay, 24.8% of patients were transferred to the emergency department or hospital within 2 hours, only 16.9% of patients with stroke were aware that the initial symptom represented a stroke, only 18.8% used the emergency medical service and one-third of the stroke cases were not identified by ambulance doctors. In the multivariate analyses, 8 variables or sub-variables were identified. In conclusion, prehospital delay of stroke was common in communities. Thus, intervention measures in communities should focus on education about the early identification of stroke and appropriate emergency medical service (EMS) use, as well as the development of organized stroke care.",
"title": ""
},
{
"docid": "6eb2c0e22ecc0816cb5f83292902d799",
"text": "In this paper, we demonstrate that Android malware can bypass all automated analysis systems, including AV solutions, mobile sandboxes, and the Google Bouncer. We propose a tool called Sand-Finger for the fingerprinting of Android-based analysis systems. By analyzing the fingerprints of ten unique analysis environments from different vendors, we were able to find characteristics in which all tested environments differ from actual hardware. Depending on the availability of an analysis system, malware can either behave benignly or load malicious code at runtime. We classify this group of malware as Divide-and-Conquer attacks that are efficiently obfuscated by a combination of fingerprinting and dynamic code loading. In this group, we aggregate attacks that work against dynamic as well as static analysis. To demonstrate our approach, we create proof-of-concept malware that surpasses up-to-date malware scanners for Android. We also prove that known malware samples can enter the Google Play Store by modifying them only slightly. Due to Android's lack of an API for malware scanning at runtime, it is impossible for AV solutions to secure Android devices against these attacks.",
"title": ""
},
{
"docid": "46658067ffc4fd2ecdc32fbaaa606170",
"text": "Adolescent resilience research differs from risk research by focusing on the assets and resources that enable some adolescents to overcome the negative effects of risk exposure. We discuss three models of resilience-the compensatory, protective, and challenge models-and describe how resilience differs from related concepts. We describe issues and limitations related to resilience and provide an overview of recent resilience research related to adolescent substance use, violent behavior, and sexual risk behavior. We then discuss implications that resilience research has for intervention and describe some resilience-based interventions.",
"title": ""
},
{
"docid": "6a76f00b62951358a1449814556251b3",
"text": "Neural networks are known to be vulnerable to adversarial examples, inputs that have been intentionally perturbed to remain visually similar to the source input, but cause a misclassification. Until now, black-box attacks against neural networks have relied on transferability of adversarial examples. White-box attacks are used to generate adversarial examples on a substitute model and then transferred to the black-box target model. In this paper, we introduce a direct attack against black-box neural networks, that uses another attacker neural network to learn to craft adversarial examples. We show that our attack is capable of crafting adversarial examples that are indistinguishable from the source input and are misclassified with overwhelming probability reducing accuracy of the black-box neural network from 99.4% to 0.77% on the MNIST dataset, and from 91.4% to 6.8% on the CIFAR-10 dataset. Our attack can adapt and reduce the effectiveness of proposed defenses against adversarial examples, requires very little training data, and produces adversarial examples that can transfer to different machine learning models such as Random Forest, SVM, and K-Nearest Neighbor. To demonstrate the practicality of our attack, we launch a live attack against a target black-box model hosted online by Amazon: the crafted adversarial examples reduce its accuracy from 91.8% to 61.3%. Additionally, we show attacks proposed in the literature have unique, identifiable distributions. We use this information to train a classifier that is robust against such attacks.",
"title": ""
},
{
"docid": "f89ade123c62e21f511884f14effc75b",
"text": "If you were a military general on the march, you'd want your troops to have plenty of maps--detailed information about the mission they were on, the roads they would travel, the campaigns they would undertake, and the weapons at their disposal. The same holds true in business: a workforce needs clear and detailed information to execute a business strategy successfully. Until now, there haven't been many tools that can communicate both an organization's strategy and the processes and systems needed to implement that strategy. But authors Robert Kaplan and David Norton, cocreators of the balanced scorecard, have adapted that seminal tool to create strategy maps. Strategy maps let an organization describe and illustrate--in clear and general language--its objectives, initiatives, targets markets, performance measures, and the links between all the pieces of its strategy. Employees get a visual representation of how their jobs are tied to the company's overall goals, while managers get a clearer understanding of their strategies and a means to detect and correct any flaws in those plans. Using Mobil North American Marketing and Refining Company as an example, Kaplan and Norton walk through the creation of a strategy map and its four distinct regions--financial, customer, internal process, and learning and growth--which correspond to the four perspectives of the balanced scorecard. The authors show step by step how the Mobil division used the map to transform itself from a centrally controlled manufacturer of commodity products to a decentralized, customer-driven organization.",
"title": ""
},
{
"docid": "013564193e7ed9591106d81af5f501fe",
"text": "As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detection sensors can barely keep up with bandwidths of a few hundred Mbps. Analysis tools that can deal with higher throughput are unable to maintain state between different steps of an attack or they are limited to the analysis of packet headers. We propose a partitioning approach to network security analysis that supports in-depth, stateful intrusion detection on high-speed links. The approach is centered around a slicing mechanism that divides the overall network traffic into subsets of manageable size. The traffic partitioning is done so that a single slice contains all the evidence necessary to detect a specific attack, making sensorto-sensor interactions unnecessary. This paper describes the approach and presents a first experimental evaluation of its effectiveness.",
"title": ""
},
{
"docid": "10b6750b3f7a589463122b55b5776a7a",
"text": "This article reviews research and interventions that have grown up around a model of psychological well-being generated more than two decades ago to address neglected aspects of positive functioning such as purposeful engagement in life, realization of personal talents and capacities, and enlightened self-knowledge. The conceptual origins of this formulation are revisited and scientific products emerging from 6 thematic areas are examined: (1) how well-being changes across adult development and later life; (2) what are the personality correlates of well-being; (3) how well-being is linked with experiences in family life; (4) how well-being relates to work and other community activities; (5) what are the connections between well-being and health, including biological risk factors, and (6) via clinical and intervention studies, how psychological well-being can be promoted for ever-greater segments of society. Together, these topics illustrate flourishing interest across diverse scientific disciplines in understanding adults as striving, meaning-making, proactive organisms who are actively negotiating the challenges of life. A take-home message is that increasing evidence supports the health protective features of psychological well-being in reducing risk for disease and promoting length of life. A recurrent and increasingly important theme is resilience - the capacity to maintain or regain well-being in the face of adversity. Implications for future research and practice are considered.",
"title": ""
},
{
"docid": "c31ffcb1514f437313c2f3f0abaf3a88",
"text": "Identifying temporal relations between events is an essential step towards natural language understanding. However, the temporal relation between two events in a story depends on, and is often dictated by, relations among other events. Consequently, effectively identifying temporal relations between events is a challenging problem even for human annotators. This paper suggests that it is important to take these dependencies into account while learning to identify these relations and proposes a structured learning approach to address this challenge. As a byproduct, this provides a new perspective on handling missing relations, a known issue that hurts existing methods. As we show, the proposed approach results in significant improvements on the two commonly used data sets for this problem.",
"title": ""
},
{
"docid": "79a9208d16541c7ed4fbc9996a82ef6a",
"text": "Query processing in data integration occurs over network-bound, autonomous data sources. This requires extensions to traditional optimization and execution techniques for three reasons: there is an absence of quality statistics about the data, data transfer rates are unpredictable and bursty, and slow or unavailable data sources can often be replaced by overlapping or mirrored sources. This paper presents the Tukwila data integration system, designed to support adaptivity at its core using a two-pronged approach. Interleaved planning and execution with partial optimization allows Tukwila to quickly recover from decisions based on inaccurate estimates. During execution, Tukwila uses adaptive query operators such as the double pipelined hash join, which produces answers quickly, and the dynamic collector, which robustly and efficiently computes unions across overlapping data sources. We demonstrate that the Tukwila architecture extends previous innovations in adaptive execution (such as query scrambling, mid-execution re-optimization, and choose nodes), and we present experimental evidence that our techniques result in behavior desirable for a data integration system.",
"title": ""
},
{
"docid": "07c5026c6311f6a9b19bf49c887b93af",
"text": "Contracts are legally binding descriptions of business service engagements. In particular, we consider business events as elements of a service engagement. Business events such as purchase, delivery, bill payment, and bank interest accrual not only correspond to essential processes but are also inherently temporally constrained. Identifying and understanding the events and their temporal relationships can help a business partner determine what to deliver and what to expect from others as it participates in the service engagement specified by a contract. However, contracts are expressed in unstructured text and their insights are buried therein. Our contributions are threefold. We develop a novel approach employing a hybrid of surface patterns, parsing, and classification to extract 1) business events and 2) their temporal constraints from contract text. We use topic modeling to 3) automatically organize the event terms into clusters. An evaluation on a real-life contract dataset demonstrates the viability and promise of our hybrid approach, yielding an F-measure of 0.89 in event extraction and 0.90 in temporal constraints extraction. The topic model yields event term clusters with an average match of 85 percent between two independent human annotations and an expert-assigned set of class labels for the clusters.",
"title": ""
},
{
"docid": "20094cba8f53666910854a8ccc1f9523",
"text": "This article presents a vision-based method for mobile robot localization in partially known environments. Simple, unobtrusive artificial landmarks are used as external localization aids. The landmarks are labelled with unique code patterns, what enables unambiguous global localization. The analysis is presented which enables prediction of the uncertainty of the position and orientation of the robot relative to the landmark. Experimental evidence is provided, demonstrating that the proposed method can be reliably used over a wide range of relative positions between the camera and the landmark. Copyright c © 2003 IFAC",
"title": ""
}
] | scidocsrr |
1bf21d6db5865db497850fe615b3d462 | Deadline Based Resource Provisioningand Scheduling Algorithm for Scientific Workflows on Clouds | [
{
"docid": "4936a07e1b6a42fde7a8fdf1b420776c",
"text": "One of many advantages of the cloud is the elasticity, the ability to dynamically acquire or release computing resources in response to demand. However, this elasticity is only meaningful to the cloud users when the acquired Virtual Machines (VMs) can be provisioned in time and be ready to use within the user expectation. The long unexpected VM startup time could result in resource under-provisioning, which will inevitably hurt the application performance. A better understanding of the VM startup time is therefore needed to help cloud users to plan ahead and make in-time resource provisioning decisions. In this paper, we study the startup time of cloud VMs across three real-world cloud providers -- Amazon EC2, Windows Azure and Rackspace. We analyze the relationship between the VM startup time and different factors, such as time of the day, OS image size, instance type, data center location and the number of instances acquired at the same time. We also study the VM startup time of spot instances in EC2, which show a longer waiting time and greater variance compared to on-demand instances.",
"title": ""
},
{
"docid": "27a4b74d3c47fc25a8564cd824aa9e66",
"text": "Grid computing is increasingly considered as a promising next-generation computational platform that supports wide-area parallel and distributed computing. In grid environments, applications are always regarded as workflows. The problem of scheduling workflows in terms of certain quality of service (QoS) requirements is challenging and it significantly influences the performance of grids. By now, there have been some algorithms for grid workflow scheduling, but most of them can only tackle the problems with a single QoS parameter or with small-scale workflows. In this frame, this paper aims at proposing an ant colony optimization (ACO) algorithm to schedule large-scale workflows with various QoS parameters. This algorithm enables users to specify their QoS preferences as well as define the minimum QoS thresholds for a certain application. The objective of this algorithm is to find a solution that meets all QoS constraints and optimizes the user-preferred QoS parameter. Based on the characteristics of workflow scheduling, we design seven new heuristics for the ACO approach and propose an adaptive scheme that allows artificial ants to select heuristics based on pheromone values. Experiments are done in ten workflow applications with at most 120 tasks, and the results demonstrate the effectiveness of the proposed algorithm.",
"title": ""
},
{
"docid": "795e9da03d2b2d6e66cf887977fb24e9",
"text": "Researchers working on the planning, scheduling, and execution of scientific workflows need access to a wide variety of scientific workflows to evaluate the performance of their implementations. This paper provides a characterization of workflows from six diverse scientific applications, including astronomy, bioinformatics, earthquake science, and gravitational-wave physics. The characterization is based on novel workflow profiling tools that provide detailed information about the various computational tasks that are present in the workflow. This information includes I/O, memory and computational characteristics. Although the workflows are diverse, there is evidence that each workflow has a job type that consumes the most amount of runtime. The study also uncovered inefficiency in a workflow component implementation, where the component was re-reading the same data multiple times. © 2012 Elsevier B.V. All rights reserved.",
"title": ""
}
] | [
{
"docid": "a993a7a5aa45fb50e19326ec4c98472d",
"text": "Innumerable terror and suspicious messages are sent through Instant Messengers (IM) and Social Networking Sites (SNS) which are untraced, leading to hindrance for network communications and cyber security. We propose a Framework that discover and predict such messages that are sent using IM or SNS like Facebook, Twitter, LinkedIn, and others. Further, these instant messages are put under surveillance that identifies the type of suspected cyber threat activity by culprit along with their personnel details. Framework is developed using Ontology based Information Extraction technique (OBIE), Association rule mining (ARM) a data mining technique with set of pre-defined Knowledge-based rules (logical), for decision making process that are learned from domain experts and past learning experiences of suspicious dataset like GTD (Global Terrorist Database). The experimental results obtained will aid to take prompt decision for eradicating cyber crimes.",
"title": ""
},
{
"docid": "70830fc4130b4c3281f596e8d7d2529e",
"text": "In 1948 Shannon developed fundamental limits on the efficiency of communication over noisy channels. The coding theorem asserts that there are block codes with code rates arbitrarily close to channel capacity and probabilities of error arbitrarily close to zero. Fifty years later, codes for the Gaussian channel have been discovered that come close to these fundamental limits. There is now a substantial algebraic theory of error-correcting codes with as many connections to mathematics as to engineering practice, and the last 20 years have seen the construction of algebraic-geometry codes that can be encoded and decoded in polynomial time, and that beat the Gilbert–Varshamov bound. Given the size of coding theory as a subject, this review is of necessity a personal perspective, and the focus is reliable communication, and not source coding or cryptography. The emphasis is on connecting coding theories for Hamming and Euclidean space and on future challenges, specifically in data networking, wireless communication, and quantum information theory.",
"title": ""
},
{
"docid": "31fc886990140919aabce17aa7774910",
"text": "Today, at the low end of the communication protocols we find the inter-integrated circuit (I2C) and the serial peripheral interface (SPI) protocols. Both protocols are well suited for communications between integrated circuits for slow communication with on-board peripherals. The two protocols coexist in modern digital electronics systems, and they probably will continue to compete in the future, as both I2C and SPI are actually quite complementary for this kind of communication.",
"title": ""
},
{
"docid": "a67574d560911af698b7dddac4e8dd8a",
"text": "Ciliates are an ancient and diverse group of microbial eukaryotes that have emerged as powerful models for RNA-mediated epigenetic inheritance. They possess extensive sets of both tiny and long noncoding RNAs that, together with a suite of proteins that includes transposases, orchestrate a broad cascade of genome rearrangements during somatic nuclear development. This Review emphasizes three important themes: the remarkable role of RNA in shaping genome structure, recent discoveries that unify many deeply diverged ciliate genetic systems, and a surprising evolutionary \"sign change\" in the role of small RNAs between major species groups.",
"title": ""
},
{
"docid": "41481b2f081831d28ead1b685465d535",
"text": "Triticum aestivum (Wheat grass juice) has high concentrations of chlorophyll, amino acids, minerals, vitamins, and enzymes. Fresh juice has been shown to possess anti-cancer activity, anti-ulcer activity, anti-inflammatory, antioxidant activity, anti-arthritic activity, and blood building activity in Thalassemia. It has been argued that wheat grass helps blood flow, digestion, and general detoxification of the body due to the presence of biologically active compounds and minerals in it and due to its antioxidant potential which is derived from its high content of bioflavonoids such as apigenin, quercitin, luteoline. Furthermore, indole compounds, amely choline, which known for antioxidants and also possess chelating property for iron overload disorders. The presence of 70% chlorophyll, which is almost chemically identical to haemoglobin. The only difference is that the central element in chlorophyll is magnesium and in hemoglobin it is iron. In wheat grass makes it more useful in various clinical conditions involving hemoglobin deficiency and other chronic disorders ultimately considered as green blood.",
"title": ""
},
{
"docid": "4053bbaf8f9113bef2eb3b15e34a209a",
"text": "With the recent availability of commodity Virtual Reality (VR) products, immersive video content is receiving a significant interest. However, producing high-quality VR content often requires upgrading the entire production pipeline, which is costly and time-consuming. In this work, we propose using video feeds from regular broadcasting cameras to generate immersive content. We utilize the motion of the main camera to generate a wide-angle panorama. Using various techniques, we remove the parallax and align all video feeds. We then overlay parts from each video feed on the main panorama using Poisson blending. We examined our technique on various sports including basketball, ice hockey and volleyball. Subjective studies show that most participants rated their immersive experience when viewing our generated content between Good to Excellent. In addition, most participants rated their sense of presence to be similar to ground-truth content captured using a GoPro Omni 360 camera rig.",
"title": ""
},
{
"docid": "5bd7df3bfcb5b99f8bcb4a9900af980e",
"text": "A learning model predictive controller for iterative tasks is presented. The controller is reference-free and is able to improve its performance by learning from previous iterations. A safe set and a terminal cost function are used in order to guarantee recursive feasibility and nondecreasing performance at each iteration. This paper presents the control design approach, and shows how to recursively construct terminal set and terminal cost from state and input trajectories of previous iterations. Simulation results show the effectiveness of the proposed control logic.",
"title": ""
},
{
"docid": "6e690c5aa54b28ba23d9ac63db4cc73a",
"text": "The Topic Detection and Tracking (TDT) evaluation program has included a \"cluster detection\" task since its inception in 1996. Systems were required to process a stream of broadcast news stories and partition them into non-overlapping clusters. A system's effectiveness was measured by comparing the generated clusters to \"truth\" clusters created by human annotators. Starting in 2003, TDT is moving to a more realistic model that permits overlapping clusters (stories may be on more than one topic) and encourages the creation of a hierarchy to structure the relationships between clusters (topics). We explore a range of possible evaluation models for this modified TDT clustering task to understand the best approach for mapping between the human-generated \"truth\" clusters and a much richer hierarchical structure. We demonstrate that some obvious evaluation techniques fail for degenerate cases. For a few others we attempt to develop an intuitive sense of what the evaluation numbers mean. We settle on some approaches that incorporate a strong balance between cluster errors (misses and false alarms) and the distance it takes to travel between stories within the hierarchy.",
"title": ""
},
{
"docid": "87748bcc07ab498218233645bdd4dd0c",
"text": "This paper proposes a method of recognizing and classifying the basic activities such as forward and backward motions by applying a deep learning framework on passive radio frequency (RF) signals. The echoes from the moving body possess unique pattern which can be used to recognize and classify the activity. A passive RF sensing test- bed is set up with two channels where the first one is the reference channel providing the un- altered echoes of the transmitter signals and the other one is the surveillance channel providing the echoes of the transmitter signals reflecting from the moving body in the area of interest. The echoes of the transmitter signals are eliminated from the surveillance signals by performing adaptive filtering. The resultant time series signal is classified into different motions as predicted by proposed novel method of convolutional neural network (CNN). Extensive amount of training data has been collected to train the model, which serves as a reference benchmark for the later studies in this field.",
"title": ""
},
{
"docid": "79685eeb67edbb3fbb6e6340fac420c3",
"text": "Fatma Özcan IBM Almaden Research Center San Jose, CA fozcan@us.ibm.com Nesime Tatbul Intel Labs and MIT Cambridge, MA tatbul@csail.mit.edu Daniel J. Abadi Yale University New Haven, CT dna@cs.yale.edu Marcel Kornacker Cloudera San Francisco, CA marcel@cloudera.com C Mohan IBM Almaden Research Center San Jose, CA cmohan@us.ibm.com Karthik Ramasamy Twitter, Inc. San Francisco, CA karthik@twitter.com Janet Wiener Facebook, Inc. Menlo Park, CA jlw@fb.com",
"title": ""
},
{
"docid": "4e23abcd1746d23c54e36c51e0a59208",
"text": "Recognizing actions is one of the important challenges in computer vision with respect to video data, with applications to surveillance, diagnostics of mental disorders, and video retrieval. Compared to other data modalities such as documents and images, processing video data demands orders of magnitude higher computational and storage resources. One way to alleviate this difficulty is to focus the computations to informative (salient) regions of the video. In this paper, we propose a novel global spatio-temporal selfsimilarity measure to score saliency using the ideas of dictionary learning and sparse coding. In contrast to existing methods that use local spatio-temporal feature detectors along with descriptors (such as HOG, HOG3D, HOF, etc.), dictionary learning helps consider the saliency in a global setting (on the entire video) in a computationally efficient way. We consider only a small percentage of the most salient (least self-similar) regions found using our algorithm, over which spatio-temporal descriptors such as HOG and region covariance descriptors are computed. The ensemble of such block descriptors in a bag-of-features framework provides a holistic description of the motion sequence which can be used in a classification setting. Experiments on several benchmark datasets in video based action classification demonstrate that our approach performs competitively to the state of the art.",
"title": ""
},
{
"docid": "51b8fe57500d1d74834d1f9faa315790",
"text": "Simulations of smoke are pervasive in the production of visual effects for commercials, movies and games: from cigarette smoke and subtle dust to large-scale clouds of soot and vapor emanating from fires and explosions. In this talk we present a new Eulerian method that targets the simulation of such phenomena on a structured spatially adaptive voxel grid --- thereby achieving an improvement in memory usage and computational performance over regular dense and sparse grids at uniform resolution. Contrary to e.g. Setaluri et al. [2014], we use velocities collocated at voxel corners which allows sharper interpolation for spatially adaptive simulations, is faster for sampling, and promotes ease-of-use in an open procedural environment where technical artists often construct small computational graphs that apply forces, dissipation etc. to the velocities. The collocated method requires special treatment when projecting out the divergent velocity modes to prevent non-physical high frequency oscillations (not addressed by Ferstl et al. [2014]). To this end we explored discretization and filtering methods from computational physics, combining them with a matrix-free adaptive multigrid scheme based on MLAT and FAS [Trottenberg and Schuller 2001]. Finally we contribute a new volumetric quadrature approach to temporally smooth emission which outperforms e.g. Gaussian quadrature at large time steps. We have implemented our method in the cross-platform Autodesk Bifrost procedural environment which facilitates customization by the individual technical artist, and our implementation is in production use at several major studios. We refer the reader to the accompanying video for examples that illustrate our novel workflows for spatially adaptive simulations and the benefits of our approach. We note that several methods for adaptive fluid simulation have been proposed in recent years, e.g. [Ferstl et al. 2014; Setaluri et al. 2014], and we have drawn a lot of inspiration from these. However, to the best of our knowledge we are the first in computer graphics to propose a collocated velocity, spatially adaptive and matrix-free smoke simulation method that explicitly mitigates non-physical divergent modes.",
"title": ""
},
{
"docid": "0ec8872c972335c11a63380fe1f1c51f",
"text": "MOTIVATION\nMany complex disease syndromes such as asthma consist of a large number of highly related, rather than independent, clinical phenotypes, raising a new technical challenge in identifying genetic variations associated simultaneously with correlated traits. Although a causal genetic variation may influence a group of highly correlated traits jointly, most of the previous association analyses considered each phenotype separately, or combined results from a set of single-phenotype analyses.\n\n\nRESULTS\nWe propose a new statistical framework called graph-guided fused lasso to address this issue in a principled way. Our approach represents the dependency structure among the quantitative traits explicitly as a network, and leverages this trait network to encode structured regularizations in a multivariate regression model over the genotypes and traits, so that the genetic markers that jointly influence subgroups of highly correlated traits can be detected with high sensitivity and specificity. While most of the traditional methods examined each phenotype independently, our approach analyzes all of the traits jointly in a single statistical method to discover the genetic markers that perturb a subset of correlated traits jointly rather than a single trait. Using simulated datasets based on the HapMap consortium data and an asthma dataset, we compare the performance of our method with the single-marker analysis, and other sparse regression methods that do not use any structural information in the traits. Our results show that there is a significant advantage in detecting the true causal single nucleotide polymorphisms when we incorporate the correlation pattern in traits using our proposed methods.\n\n\nAVAILABILITY\nSoftware for GFlasso is available at http://www.sailing.cs.cmu.edu/gflasso.html.",
"title": ""
},
{
"docid": "dd2322ad8956e3a8cc490e6b6e6bc2c8",
"text": "Wireless networking has witnessed an explosion of interest from consumers in recent years for its applications in mobile and personal communications. As wireless networks become an integral component of the modern communication infrastructure, energy efficiency will be an important design consideration due to the limited battery life of mobile terminals. Power conservation techniques are commonly used in the hardware design of such systems. Since the network interface is a significant consumer of power, considerable research has been devoted to low-power design of the entire network protocol stack of wireless networks in an effort to enhance energy efficiency. This paper presents a comprehensive summary of recent work addressing energy efficient and low-power design within all layers of the wireless network protocol stack.",
"title": ""
},
{
"docid": "6c6e4e776a3860d1df1ccd7af7f587d5",
"text": "We introduce new families of Integral Probability Metrics (IPM) for training Generative Adversarial Networks (GAN). Our IPMs are based on matching statistics of distributions embedded in a finite dimensional feature space. Mean and covariance feature matching IPMs allow for stable training of GANs, which we will call McGan. McGan minimizes a meaningful loss between distributions.",
"title": ""
},
{
"docid": "011a9ac960aecc4a91968198ac6ded97",
"text": "INTRODUCTION\nPsychological empowerment is really important and has remarkable effect on different organizational variables such as job satisfaction, organizational commitment, productivity, etc. So the aim of this study was to investigate the relationship between psychological empowerment and productivity of Librarians in Isfahan Medical University.\n\n\nMETHODS\nThis was correlational research. Data were collected through two questionnaires. Psychological empowerment questionnaire and the manpower productivity questionnaire of Gold. Smith Hersey which their content validity was confirmed by experts and their reliability was obtained by using Cronbach's Alpha coefficient, 0.89 and 0.9 respectively. Due to limited statistical population, did not used sampling and review was taken via census. So 76 number of librarians were evaluated. Information were reported on both descriptive and inferential statistics (correlation coefficient tests Pearson, Spearman, T-test, ANOVA), and analyzed by using the SPSS19 software.\n\n\nFINDINGS\nIn our study, the trust between partners and efficacy with productivity had the highest correlation. Also there was a direct relationship between psychological empowerment and the productivity of labor (r =0.204). In other words, with rising of mean score of psychological empowerment, the mean score of efficiency increase too.\n\n\nCONCLUSIONS\nThe results showed that if development programs of librarian's psychological empowerment increase in order to their productivity, librarians carry out their duties with better sense. Also with using the capabilities of librarians, the development of creativity with happen and organizational productivity will increase.",
"title": ""
},
{
"docid": "a3dc04fe9478f881608289ae13e979cb",
"text": "Background: The white matter of the cerebellum has a population of GFAP+ cells with neurogenic potential restricted to early postnatal development (P2-P12), these astrocytes are the precursors of stellate cells and basket cells in the molecular layer. On the other hand, GABA is known to serve as a feedback regulator of neural production and migration through tonic activation of GABA-A receptors. Aim: To investigate the functional expression of GABA-A receptors in the cerebellar white matter astrocytes at P7-9 and P18-20. Methods: Immunofluorescence for α1, α2, β1 subunits & GAD67 enzyme in GFAP-EGFP mice (n=10 P8; n= 8 P18). Calcium Imaging: horizontal acute slices were incubated with Fluo4 AM in order to measure the effect of GABA-A or GATs antagonist bicuculline or nipecotic acid on spontaneous calcium oscillations, as well as on GABA application evoked responses. Results: Our results showed that α1 (3.18%), α2 (10.4%) and β1 (not detected) subunits were not predominantly expressed in astrocytes of white matter at P8. However, GAD67 co-localized with 54% of GFAP+ cells, suggesting that a fraction of astrocytes could synthesize GABA. Moreover, calcium imaging experiments showed that white matter cells responded to GABA. This response was antagonized by bicuculline suggesting functional expression of GABA-A receptors. Conclusions: Together these results suggest that GABA is synthesized by half astrocytes in white matter at P8 and that GABA could be released locally to activate GABA-A receptors that are also expressed in cells of the white matter of the cerebellum, during early postnatal development. (D) Acknowledgements: We thank the technical support of E. N. Hernández-Ríos, A, Castilla, L. Casanova, A. E. Espino & M. García-Servín. F.E. Labrada-Moncada is a CONACyT (640190) scholarship holder. This work was supported by PAPIIT-UNAM grants (IN201913 e IN201915) to A. Martínez-Torres and D. Reyes-Haro. 48. PROLACTIN PROTECTS AGAINST JOINT INFLAMMATION AND BONE LOSS IN ARTHRITIS Ledesma-Colunga MG, Adán N, Ortiz G, Solis-Gutierrez M, López-Barrera F, Martínez de la Escalera G, y Clapp C. Departamento de Neurobiología Celular y Molecular, Instituto de Neurobiología, UNAM Campus Juriquilla, Querétaro, México. Prolactin (PRL) reduces joint inflammation, pannus formation, and bone destruction in rats with polyarticular adjuvant-induced arthritis (AIA). Here, we investigate the mechanism of PRL protection against bone loss in AIA and in monoarticular AIA (MAIA). Joint inflammation and osteoclastogenesis were evaluated in rats with AIA treated with PRL (via osmotic minipumps) and in mice with MAIA that were null (Prlr-/-) or not (Prlr+/+) for the PRL receptor. To help define target cells, synovial fibroblasts isolated from healthy Prlr+/+ mice were treated or not with T-cell-derived cytokines (Cyt: TNFa, IL-1b, and IFNg) with or without PRL. In AIA, PRL treatment reduced joint swelling, lowered joint histochemical accumulation of the osteoclast marker, tartrateresistant acid phosphatase (TRAP), and decreased joint mRNA levels of osteoclasts-associated genes (Trap, Cathepsin K, Mmp9, Rank) and of cytokines with osteoclastogenic activity (Tnfa, Il-1b, Il-6, Rankl). Prlr-/mice with MAIA showed enhanced joint swelling, increased TRAP activity, and elevated expression of Trap, Rankl, and Rank. The expression of the long PRL receptor form increased in arthritic joints, and in joints and cultured synovial fibroblasts treated with Cyt. PRL induced the phosphorylation/activation of Jornadas Académicas, 2016 Martes 27 de Septiembre, Cartel 35 al 67 signal transducer and activator of transcription-3 (STAT3) and inhibited the Cyt-induced expression of Il-1b, Il-6, and Rankl in synovial cultures. The STAT3 inhibitor S31-201 blocked inhibition of Rankl by PRL. PRL protects against bone loss in inflammatory arthritis by inhibiting cytokine-induced activation of RANKL in joints and synoviocytes via its canonical STAT3 signaling pathway. Hyperprolactinemia-inducing drugs are promising therapeutics for preventing bone loss in rheumatoid arthritis. We thank Gabriel Nava, Daniel Mondragón, Antonio Prado, Martín García, and Alejandra Castilla for technical assistance. Research Support: UNAM-PAPIIT Grant IN201315. M.G.L.C is a doctoral student from Programa de Doctorado en Ciencias Biomédicas, Universidad Nacional Autónoma de México (UNAM) receiving fellowship 245828 from CONACYT. (D) 49. ADC MEASUREMENT IN LATERALY MEDULLARY INFARCTION (WALLENBERG SYNDROME) León-Castro LR1, Fourzán-Martínez M1, Rivas-Sánchez LA1, García-Zamudio E1, Nigoche J2, Ortíz-Retana J1, Barragán-Campos HM1. 1.Magnetic Resonance Unit, Institute of Neurobiology, Campus Juriquilla, National Autonomous University of México. Querétaro, Qro., 2.Department of Radiology. Naval Highly Specialized General Hospital, México City, México. BACKGROUND: The stroke of the vertebrobasilar system (VBS) represents 20% of ischemic vascular events. When the territory of the posterior inferior cerebellar artery (PICA) is affected, lateral medullary infarction (LMI) occurs, typically called Wallenberg syndrome; it accounts for 2-7% of strokes of VBS. Given the diversity of symptoms that causes, it is a difficult disease to diagnose. The reference exam to evaluate cerebral blood flow is digital subtraction angiography (DSA); however, it is an invasive method. Magnetic resonance imaging (MRI) is a noninvasive study and the sequence of diffusion (DWI) can detect early ischemic changes, after 20 minutes of ischemia onset, it also allows to locate and determine the extent of the affected parenchyma. Measurement of the apparent diffusion coefficient (ADC) is a semiquantitative parameter that confirms or rule out the presence of infarction, although the diffusion sequence (DWI) has restriction signal. OBJECTIVE: To measure the ADC values in patients with LMI and compare their values with the contralateral healthy tissue. MATERIALS AND METHODS: The database of Unit Magnetic Resonance Unit of studies carried out from January 2010 to July 2016 was revised to include cases diagnosed by MRI with LMI. The images were acquired in two resonators of 3.0 T (Phillips Achieva TX and General Electric Discovery 750 MR). DWI sequence with b value of 1000 was used to look after LMI, then ADC value measurement of the infarcted area and the contralateral area was performed in the same patient. Two groups were identified: a) infarction and b) healthy tissue. Eleven patients, 5 female (45.5%) and 6 males (54.5%), were included. A descriptive statistic was performed and infarction and healthy tissue were analyzed with U-Mann-Whitney test. RESULTS: In the restriction areas observed in DWI, ADC values were measured; the infarction tissue has a median of 0.54X10-3 mm2/s, interquartile range 0.41-1.0X10-3 mm2/seg; the healthy tissue has a median of 0.24X103 mm2/seg, interquartile range 0.19-0.56X10-3 mm2/seg. The U-Mann-Whitney test has a statistical significance of p<0.05. CONCLUSION: ADC measurement allows to confirm or rule out LMI in patients with the clinical suspicion of Wallenberg syndrome. It also serves to eliminate other diseases that showed restriction in DWI; for example, neoplasm, pontine myelinolysis, acute disseminated encephalomyelitis, multiple sclerosis and diffuse axonal injury. (L) Jornadas Académicas, 2016 Martes 27 de Septiembre, Cartel 35 al 67 50. ENDOVASCULAR CAROTID STENTING IN A PATIENT WITH PREVIOUS STROKE, ISCHEMIC HEART DISEASE, AND SEVERE AORTIC VALVE STENOSIS Lona-Pérez OA1, Balderrama-Bañares J2, Martínez-Reséndiz JA3, Yáñez-LedesmaM4, Jiménez-Zarazúa O5, Vargas-Jiménez MA6, Galeana-Juárez C6, Asensio-Lafuente E7, Barinagarrementeria-Aldatz F8, Barragán Campos H.M9,10. 1.2nd year student of the Faculty of Medicine at the University Autonomous of Querétaro, Qro., 2. Endovascular Neurological Therapy Department, Neurology and Neurosurgery National Institute “Dr. Manuel Velasco Suarez”, México City, México., 3. Department of Anesthesiology, Querétaro General Hospital, SESEQ, Querétaro, Qro., 4. Department of Anesthesiology, León Angeles Hospital, Gto., 5. Internal Medicine Department, León General Hospital, Gto., 6. Coordination of Clinical Rotation, Faculty of Medicine at the University Autonomous of Querétaro, Qro., 7. Cardiology-Electrophysiology , Hospital H+, Querétaro, Qro., 8. Neurologist, Permanent Member of National Academy of Medicine of Mexico, Hospital H+, Querétaro, Qro., 9. Magnetic Resonance Unit, Institute of Neurobiology, Campus Juriquilla, National Autonomous University of México, Querétaro, Qro., 10. Radiology Department. Querétaro General Hospital, SESEQ, Querétaro, Qro OBJECTIVE: We present a case report of a 74-year-old feminine patient who suffered from right superior gyrus stroke, ischemic heart disease, and severe valve aortic stenosis, in whom it was needed to identify which problem had to be treated first. Family antecedent of breast, pancreas, and prostate cancer in first order relatives; smoking 5 packages/year during >20 years, occasional alcoholism, right inguinal hernioplasty, hypertension and dyslipidemia of 3 years of evolution, under treatment. She presented angor pectoris at rest, lasted 3 minute long and has spontaneous recovery, 7 days later she had brain stroke at superior right frontal gyrus, developed hemiparesis with left crural predominance. MATERIALS & METHODS: Anamnesis, complete physical examination, laboratory, as well as heart and brain imaging were performed. Severe aortic valvular stenosis diagnosed by echocardiogram with 0.6 cm2 valvular area, average gradient of 38 mmHg and maximum of 66 mmHg; light mitral stenosis with valvular area of 1.8 cm2, without left atrium dilatation, maximum gradient of 8 mmHg; PSAP 30 mmHg, US Carotid Doppler showed atherosclerotic plaques in the proximal posterior wall of the bulb right internal carotid artery (RICA) that determinates a maximum stenosis of 70%. Aggressive management with antihypertensive (Met",
"title": ""
},
{
"docid": "948295ca3a97f7449548e58e02dbdd62",
"text": "Neural computations are often compared to instrument-measured distance or duration, and such relationships are interpreted by a human observer. However, neural circuits do not depend on human-made instruments but perform computations relative to an internally defined rate-of-change. While neuronal correlations with external measures, such as distance or duration, can be observed in spike rates or other measures of neuronal activity, what matters for the brain is how such activity patterns are utilized by downstream neural observers. We suggest that hippocampal operations can be described by the sequential activity of neuronal assemblies and their internally defined rate of change without resorting to the concept of space or time.",
"title": ""
},
{
"docid": "2ac2e639e9999f7c6e5be97632d7e126",
"text": "BACKGROUND\nThe relationship of health risk behavior and disease in adulthood to the breadth of exposure to childhood emotional, physical, or sexual abuse, and household dysfunction during childhood has not previously been described.\n\n\nMETHODS\nA questionnaire about adverse childhood experiences was mailed to 13,494 adults who had completed a standardized medical evaluation at a large HMO; 9,508 (70.5%) responded. Seven categories of adverse childhood experiences were studied: psychological, physical, or sexual abuse; violence against mother; or living with household members who were substance abusers, mentally ill or suicidal, or ever imprisoned. The number of categories of these adverse childhood experiences was then compared to measures of adult risk behavior, health status, and disease. Logistic regression was used to adjust for effects of demographic factors on the association between the cumulative number of categories of childhood exposures (range: 0-7) and risk factors for the leading causes of death in adult life.\n\n\nRESULTS\nMore than half of respondents reported at least one, and one-fourth reported > or = 2 categories of childhood exposures. We found a graded relationship between the number of categories of childhood exposure and each of the adult health risk behaviors and diseases that were studied (P < .001). Persons who had experienced four or more categories of childhood exposure, compared to those who had experienced none, had 4- to 12-fold increased health risks for alcoholism, drug abuse, depression, and suicide attempt; a 2- to 4-fold increase in smoking, poor self-rated health, > or = 50 sexual intercourse partners, and sexually transmitted disease; and 1.4- to 1.6-fold increase in physical inactivity and severe obesity. The number of categories of adverse childhood exposures showed a graded relationship to the presence of adult diseases including ischemic heart disease, cancer, chronic lung disease, skeletal fractures, and liver disease. The seven categories of adverse childhood experiences were strongly interrelated and persons with multiple categories of childhood exposure were likely to have multiple health risk factors later in life.\n\n\nCONCLUSIONS\nWe found a strong graded relationship between the breadth of exposure to abuse or household dysfunction during childhood and multiple risk factors for several of the leading causes of death in adults.",
"title": ""
},
{
"docid": "f66854fd8e3f29ae8de75fc83d6e41f5",
"text": "This paper presents a general statistical methodology for the analysis of multivariate categorical data arising from observer reliability studies. The procedure essentially involves the construction of functions of the observed proportions which are directed at the extent to which the observers agree among themselves and the construction of test statistics for hypotheses involving these functions. Tests for interobserver bias are presented in terms of first-order marginal homogeneity and measures of interobserver agreement are developed as generalized kappa-type statistics. These procedures are illustrated with a clinical diagnosis example from the epidemiological literature.",
"title": ""
}
] | scidocsrr |
14d7a9fee13fc480e342a9a54ff08cc0 | Accurately detecting trolls in Slashdot Zoo via decluttering | [
{
"docid": "a178871cd82edaa05a0b0befacb7fc38",
"text": "The main applications and challenges of one of the hottest research areas in computer science.",
"title": ""
},
{
"docid": "8a8b33eabebb6d53d74ae97f8081bf7b",
"text": "Social networks are inevitable part of modern life. A class of social networks is those with both positive (friendship or trust) and negative (enmity or distrust) links. Ranking nodes in signed networks remains a hot topic in computer science. In this manuscript, we review different ranking algorithms to rank the nodes in signed networks, and apply them to the sign prediction problem. Ranking scores are used to obtain reputation and optimism, which are used as features in the sign prediction problem. Reputation of a node shows patterns of voting towards the node and its optimism demonstrates how optimistic a node thinks about others. To assess the performance of different ranking algorithms, we apply them on three signed networks including Epinions, Slashdot and Wikipedia. In this paper, we introduce three novel ranking algorithms for signed networks and compare their ability in predicting signs of edges with already existing ones. We use logistic regression as the predictor and the reputation and optimism values for the trustee and trustor as features (that are obtained based on different ranking algorithms). We find that ranking algorithms resulting in correlated ranking scores, leads to almost the same prediction accuracy. Furthermore, our analysis identifies a number of ranking algorithms that result in higher prediction accuracy compared to others.",
"title": ""
},
{
"docid": "34c343413fc748c1fc5e07fb40e3e97d",
"text": "We study online social networks in which relationships can be either positive (indicating relations such as friendship) or negative (indicating relations such as opposition or antagonism). Such a mix of positive and negative links arise in a variety of online settings; we study datasets from Epinions, Slashdot and Wikipedia. We find that the signs of links in the underlying social networks can be predicted with high accuracy, using models that generalize across this diverse range of sites. These models provide insight into some of the fundamental principles that drive the formation of signed links in networks, shedding light on theories of balance and status from social psychology; they also suggest social computing applications by which the attitude of one user toward another can be estimated from evidence provided by their relationships with other members of the surrounding social network.",
"title": ""
}
] | [
{
"docid": "ec5e3b472973e3f77812976b1dd300a5",
"text": "In this thesis we investigate different methods of automating behavioral analysis in animal videos using shapeand motion-based models, with a focus on classifying large datasets of rodent footage. In order to leverage the recent advances in deep learning techniques a massive number of training samples is required, which has lead to the development of a data transfer pipeline to gather footage from multiple video sources and a custom-built web-based video annotation tool to create annotation datasets. Finally we develop and compare new deep convolutional and recurrent-convolutional neural network architectures that outperform existing systems.",
"title": ""
},
{
"docid": "e89a1c0fb1b0736b238373f2fbca91a0",
"text": "In this paper, we provide a comprehensive study of elliptic curve cryptography (ECC) for wireless sensor networks (WSN) security provisioning, mainly for key management and authentication modules. On the other hand, we present and evaluate a side-channel attacks (SCAs) experimental bench solution for energy evaluation, especially simple power analysis (SPA) attacks experimental bench to measure dynamic power consumption of ECC operations. The goal is the best use of the already installed SCAs experimental bench by performing the robustness test of ECC devices against SPA as well as the estimate of its energy and dynamic power consumption. Both operations are tested: point multiplication over Koblitz curves and doubling points over binary curves, with respectively affine and projective coordinates. The experimental results and its comparison with simulation ones are presented. They can lead to accurate power evaluation with the maximum reached error less than 30%.",
"title": ""
},
{
"docid": "cfc0caeb9c00b375d930cde8f5eed66e",
"text": "Usability is an important and determinant factor in human-computer systems acceptance. Usability issues are still identified late in the software development process, during testing and deployment. One of the reasons these issues arise late in the process is that current requirements engineering practice does not incorporate usability perspectives effectively into software requirements specifications. The main strength of usability-focused software requirements is the clear visibility of usability aspects for both developers and testers. The explicit expression of these aspects of human-computer systems can be built for optimal usability and also evaluated effectively to uncover usability issues. This paper presents a design science-oriented research design to test the proposition that incorporating user modelling and usability modelling in software requirements specifications improves design. The proposal and the research design are expected to make a contribution to knowledge by theory testing and to practice with effective techniques to produce usable human computer systems.",
"title": ""
},
{
"docid": "5c74d0cfcbeaebc29cdb58a30436556a",
"text": "Modular decomposition is an effective means to achieve a complex system, but that of current part-component-based does not meet the needs of the positive development of the production. Design Structure Matrix (DSM) can simultaneously reflect the sequence, iteration, and feedback information, and express the parallel, sequential, and coupled relationship between DSM elements. This article, a modular decomposition method, named Design Structure Matrix Clustering modularize method, is proposed, concerned procedures are define, based on sorting calculate and clustering analysis of DSM, according to the rules of rows exchanges and columns exchange with the same serial number. The purpose and effectiveness of DSM clustering modularize method are confirmed through case study of assembly and calibration system for the large equipment.",
"title": ""
},
{
"docid": "c63465c12bbf8474293c839f9ad73307",
"text": "Maintaining the balance or stability of legged robots in natural terrains is a challenging problem. Besides the inherent unstable characteristics of legged robots, the sources of instability are the irregularities of the ground surface and also the external pushes. In this paper, a push recovery framework for restoring the robot balance against external unknown disturbances will be demonstrated. It is assumed that the magnitude of exerted pushes is not large enough to use a reactive stepping strategy. In the comparison with previous methods, which a simplified model such as point mass model is used as the model of the robot for studying the push recovery problem, the whole body dynamic model will be utilized in present work. This enhances the capability of the robot to exploit all of the DOFs to recover its balance. To do so, an explicit dynamic model of a quadruped robot will be derived. The balance controller is based on the computation of the appropriate acceleration of the main body. It is calculated to return the robot to its desired position after the perturbation. This acceleration should be chosen under the stability and friction conditions. To calculate main body acceleration, an optimization problem is defined so that the stability, friction condition considered as its constraints. The simulation results show the effectiveness of the proposed algorithm. The robot can restore its balance against the large disturbance solely through the adjustment of the position and orientation of main body.",
"title": ""
},
{
"docid": "dc2d2fe3c6dcbe57b257218029091d8c",
"text": "One motivation in the study of development is the discovery of mechanisms that may guide evolutionary change. Here we report how development governs relative size and number of cheek teeth, or molars, in the mouse. We constructed an inhibitory cascade model by experimentally uncovering the activator–inhibitor logic of sequential tooth development. The inhibitory cascade acts as a ratchet that determines molar size differences along the jaw, one effect being that the second molar always makes up one-third of total molar area. By using a macroevolutionary test, we demonstrate the success of the model in predicting dentition patterns found among murine rodent species with various diets, thereby providing an example of ecologically driven evolution along a developmentally favoured trajectory. In general, our work demonstrates how to construct and test developmental rules with evolutionary predictability in natural systems.",
"title": ""
},
{
"docid": "a83905ec368b96d1845f78f69e09edaa",
"text": "Fermented beverages hold a long tradition and contribution to the nutrition of many societies and cultures worldwide. Traditional fermentation has been empirically developed in ancient times as a process of raw food preservation and at the same time production of new foods with different sensorial characteristics, such as texture, flavour and aroma, as well as nutritional value. Low-alcoholic fermented beverages (LAFB) and non-alcoholic fermented beverages (NAFB) represent a subgroup of fermented beverages that have received rather little attention by consumers and scientists alike, especially with regard to their types and traditional uses in European societies. A literature review was undertaken and research articles, review papers and textbooks were searched in order to retrieve data regarding the dietary role, nutrient composition, health benefits and other relevant aspects of diverse ethnic LAFB and NAFB consumed by European populations. A variety of traditional LAFB and NAFB consumed in European regions, such as kefir, kvass, kombucha and hardaliye, are presented. Milk-based LAFB and NAFB are also available on the market, often characterised as 'functional' foods on the basis of their probiotic culture content. Future research should focus on elucidating the dietary role and nutritional value of traditional and 'functional' LAFB and NAFB, their potential health benefits and consumption trends in European countries. Such data will allow for LAFB and NAFB to be included in national food composition tables.",
"title": ""
},
{
"docid": "7c2960e9fd059e57b5a0172e1d458250",
"text": "The main goal of this research is to discover the structure of home appliances usage patterns, hence providing more intelligence in smart metering systems by taking into account the usage of selected home appliances and the time of their usage. In particular, we present and apply a set of unsupervised machine learning techniques to reveal specific usage patterns observed at an individual household. The work delivers the solutions applicable in smart metering systems that might: (1) contribute to higher energy awareness; (2) support accurate usage forecasting; and (3) provide the input for demand response systems in homes with timely energy saving recommendations for users. The results provided in this paper show that determining household characteristics from smart meter data is feasible and allows for quickly grasping general trends in data.",
"title": ""
},
{
"docid": "3bc7adca896ab0c18fd8ec9b8c5b3911",
"text": "Traditional algorithms to design hand-crafted features for action recognition have been a hot research area in last decade. Compared to RGB video, depth sequence is more insensitive to lighting changes and more discriminative due to its capability to catch geometric information of object. Unlike many existing methods for action recognition which depend on well-designed features, this paper studies deep learning-based action recognition using depth sequences and the corresponding skeleton joint information. Firstly, we construct a 3Dbased Deep Convolutional Neural Network (3DCNN) to directly learn spatiotemporal features from raw depth sequences, then compute a joint based feature vector named JointVector for each sequence by taking into account the simple position and angle information between skeleton joints. Finally, support vector machine (SVM) classification results from 3DCNN learned features and JointVector are fused to take action recognition. Experimental results demonstrate that our method can learn feature representation which is time-invariant and viewpoint-invariant from depth sequences. The proposed method achieves comparable results to the state-of-the-art methods on the UTKinect-Action3D dataset and achieves superior performance in comparison to baseline methods on the MSR-Action3D dataset. We further investigate the generalization of the trained model by transferring the learned features from one dataset (MSREmail addresses: liuzhi@cqut.edu.cn (Zhi Liu), czhang10@ccny.cuny.edu (Chenyang Zhang), ytian@ccny.cuny.edu (Yingli Tian) Preprint submitted to Image and Vision Computing April 11, 2016 Action3D) to another dataset (UTKinect-Action3D) without retraining and obtain very promising classification accuracy.",
"title": ""
},
{
"docid": "6696d9092ff2fd93619d7eee6487f867",
"text": "We propose an accelerated stochastic block coordinate descent algorithm for nonconvex optimization under sparsity constraint in the high dimensional regime. The core of our algorithm is leveraging both stochastic partial gradient and full partial gradient restricted to each coordinate block to accelerate the convergence. We prove that the algorithm converges to the unknown true parameter at a linear rate, up to the statistical error of the underlying model. Experiments on both synthetic and real datasets backup our theory.",
"title": ""
},
{
"docid": "355591ece281540fb696c1eff3df5698",
"text": "Online health communities are a valuable source of information for patients and physicians. However, such user-generated resources are often plagued by inaccuracies and misinformation. In this work we propose a method for automatically establishing the credibility of user-generated medical statements and the trustworthiness of their authors by exploiting linguistic cues and distant supervision from expert sources. To this end we introduce a probabilistic graphical model that jointly learns user trustworthiness, statement credibility, and language objectivity.\n We apply this methodology to the task of extracting rare or unknown side-effects of medical drugs --- this being one of the problems where large scale non-expert data has the potential to complement expert medical knowledge. We show that our method can reliably extract side-effects and filter out false statements, while identifying trustworthy users that are likely to contribute valuable medical information.",
"title": ""
},
{
"docid": "55eec4fc4a211cee6b735d1884310cc0",
"text": "Understanding driving behaviors is essential for improving safety and mobility of our transportation systems. Data is usually collected via simulator-based studies or naturalistic driving studies. Those techniques allow for understanding relations between demographics, road conditions and safety. On the other hand, they are very costly and time consuming. Thanks to the ubiquity of smartphones, we have an opportunity to substantially complement more traditional data collection techniques with data extracted from phone sensors, such as GPS, accelerometer gyroscope and camera. We developed statistical models that provided insight into driver behavior in the San Francisco metro area based on tens of thousands of driver logs. We used novel data sources to support our work. We used cell phone sensor data drawn from five hundred drivers in San Francisco to understand the speed of traffic across the city as well as the maneuvers of drivers in different areas. Specifically, we clustered drivers based on their driving behavior. We looked at driver norms by street and flagged driving behaviors that deviated from the norm.",
"title": ""
},
{
"docid": "bb19e6b00fca27c455316f09a626407c",
"text": "On the basis of the most recent epidemiologic research, Autism Spectrum Disorder (ASD) affects approximately 1% to 2% of all children. (1)(2) On the basis of some research evidence and consensus, the Modified Checklist for Autism in Toddlers isa helpful tool to screen for autism in children between ages 16 and 30 months. (11) The Diagnostic Statistical Manual of Mental Disorders, Fourth Edition, changes to a 2-symptom category from a 3-symptom category in the Diagnostic Statistical Manual of Mental Disorders, Fifth Edition(DSM-5): deficits in social communication and social interaction are combined with repetitive and restrictive behaviors, and more criteria are required per category. The DSM-5 subsumes all the previous diagnoses of autism (classic autism, Asperger syndrome, and pervasive developmental disorder not otherwise specified) into just ASDs. On the basis of moderate to strong evidence, the use of applied behavioral analysis and intensive behavioral programs has a beneficial effect on language and the core deficits of children with autism. (16) Currently, minimal or no evidence is available to endorse most complementary and alternative medicine therapies used by parents, such as dietary changes (gluten free), vitamins, chelation, and hyperbaric oxygen. (16) On the basis of consensus and some studies, pediatric clinicians should improve their capacity to provide children with ASD a medical home that is accessible and provides family-centered, continuous, comprehensive and coordinated, compassionate, and culturally sensitive care. (20)",
"title": ""
},
{
"docid": "1f5557e647613f9b04a8fa3bdeb989df",
"text": "This research examined how individuals’ gendered avatar might alter their use of gender-based language (i.e., references to emotion, apologies, and tentative language) in text-based computer-mediated communication. Specifically, the experiment tested if men and women would linguistically assimilate a virtual gender identity intimated by randomly assigned gendered avatars (either matched or mismatched to their true gender). Results supported the notion that gender-matched avatars increase the likelihood of gender-typical language use, whereas gender-mismatched avatars promoted countertypical language, especially among women. The gender of a partner’s avatar, however, did not influence participants’ language. Results generally comport with self-categorization theory’s gender salience explanation of gender-based language use.",
"title": ""
},
{
"docid": "2f7862142f2c948db2be11bdaf8abc0b",
"text": "Interoperability is the capability of multiple parties and systems to collaborate and exchange information and matter to obtain their objectives. Interoperability challenges call for a model-based systems engineering approach. This paper describes a conceptual modeling framework for model-based interoperability engineering (MoBIE) for systems of systems, which integrates multilayered interoperability specification, modeling, architecting, design, and testing. Treating interoperability infrastructure as a system in its own right, MoBIE facilitates interoperability among agents, processes, systems, services, and interfaces. MoBIE is founded on ISO 19450 standard—object-process methodology, a holistic paradigm for modeling and architecting complex, dynamic, and multidisciplinary systems—and allows for synergistic integration of the interoperability model with system-centric models. We also discuss the implementation of MoBIE with the unified modeling language. We discuss the importance of interoperability in the civil aviation domain, and apply MoBIE to analyze the passenger departure process in an airport terminal as a case-in-point. The resulting model enables architectural and operational decision making and analysis at the system-of-systems level and adds significant value at the interoperability engineering program level.",
"title": ""
},
{
"docid": "7995a7f1e2b2182e6a092a095443e825",
"text": "Model-free reinforcement learning (RL) requires a large number of trials to learn a good policy, especially in environments with sparse rewards. We explore a method to improve the sample efficiency when we have access to demonstrations. Our approach, Backplay, uses a single demonstration to construct a curriculum for a given task. Rather than starting each training episode in the environment’s fixed initial state, we start the agent near the end of the demonstration and move the starting point backwards during the course of training until we reach the initial state. Our contributions are that we analytically characterize the types of environments where Backplay can improve training speed, demonstrate the effectiveness of Backplay both in large grid worlds and a complex four player zero-sum game (Pommerman), and show that Backplay compares favorably to other competitive methods known to improve sample efficiency. This includes reward shaping, behavioral cloning, and reverse curriculum generation.",
"title": ""
},
{
"docid": "348008a31aed772af9be03884fe6dbdc",
"text": "Human-Computer Speech is gaining momentum as a technique of computer interaction. There has been a recent upsurge in speech based search engines and assistants such as Siri, Google Chrome and Cortana. Natural Language Processing (NLP) techniques such as NLTK for Python can be applied to analyse speech, and intelligent responses can be found by designing an engine to provide appropriate human like responses. This type of programme is called a Chatbot, which is the focus of this study. This paper presents a survey on the techniques used to design Chatbots and a comparison is made between different design techniques from nine carefully selected papers according to the main methods adopted. These papers are representative of the significant improvements in Chatbots in the last decade. The paper discusses the similarities and differences in the techniques and examines in particular the Loebner prizewinning Chatbots. Keywords—AIML; Chatbot; Loebner Prize; NLP; NLTK; SQL; Turing Test",
"title": ""
},
{
"docid": "50875a63d0f3e1796148d809b5673081",
"text": "Coreference resolution seeks to find the mentions in text that refer to the same real-world entity. This task has been well-studied in NLP, but until recent years, empirical results have been disappointing. Recent research has greatly improved the state-of-the-art. In this review, we focus on five papers that represent the current state-ofthe-art and discuss how they relate to each other and how these advances will influence future work in this area.",
"title": ""
},
{
"docid": "851a966bbfee843e5ae1eaf21482ef87",
"text": "The Pittsburgh Sleep Quality Index (PSQI) is a widely used measure of sleep quality in adolescents, but information regarding its psychometric strengths and weaknesses in this population is limited. In particular, questions remain regarding whether it measures one or two sleep quality domains. The aims of the present study were to (a) adapt the PSQI for use in adolescents and young adults, and (b) evaluate the psychometric properties of the adapted measure in this population. The PSQI was slightly modified to make it more appropriate for use in youth populations and was translated into Spanish for administration to the sample population available to the study investigators. It was then administered with validity criterion measures to a community-based sample of Spanish adolescents and young adults (AYA) between 14 and 24 years old (N = 216). The results indicated that the questionnaire (AYA-PSQI-S) assesses a single factor. The total score evidenced good convergent and divergent validity and moderate reliability (Cronbach's alpha = .72). The AYA-PSQI-S demonstrates adequate psychometric properties for use in clinical trials involving adolescents and young adults. Additional research to further evaluate the reliability and validity of the measure for use in clinical settings is warranted.",
"title": ""
}
] | scidocsrr |
b4edd2559182bec8f3343903e5fd9a2b | Output Reachable Set Estimation and Verification for Multilayer Neural Networks | [
{
"docid": "4849bd4a5466b6a5837faabf5e16ab5e",
"text": "In this paper we evaluate state-of-the-art SMT solvers on encodings of verification problems involving Multi-Layer Perceptrons (MLPs), a widely used type of neural network. Verification is a key technology to foster adoption of MLPs in safety-related applications, where stringent requirements about performance and robustness must be ensured and demonstrated. In previous contributions, we have shown that safety problems for MLPs can be attacked by solving Boolean combinations of linear arithmetic constraints. However, the generated encodings are hard for current state-of-the-art SMT solvers, limiting our ability to verify MLPs in practice. The experimental results herewith presented are meant to provide the community with a precise picture of current achievements and standing open challenges in this intriguing application domain.",
"title": ""
}
] | [
{
"docid": "cabdfcf94607adef9b07799aab463d64",
"text": "Monitoring the health of the elderly living independently in their own homes is a key issue in building sustainable healthcare models which support a country's ageing population. Existing approaches have typically proposed remotely monitoring the behaviour of a household's occupants through the use of additional sensors. However the costs and privacy concerns of such sensors have significantly limited their potential for widespread adoption. In contrast, in this paper we propose an approach which detects Activities of Daily Living, which we use as a proxy for the health of the household residents. Our approach detects appliance usage from existing smart meter data, from which the unique daily routines of the household occupants are learned automatically via a log Gaussian Cox process. We evaluate our approach using two real-world data sets, and show it is able to detect over 80% of kettle uses while generating less than 10% false positives. Furthermore, our approach allows earlier interventions in households with a consistent routine and fewer false alarms in the remaining households, relative to a fixed-time intervention benchmark.",
"title": ""
},
{
"docid": "a3774a953758e650077ac2a33613ff58",
"text": "We propose a deep convolutional neural network (CNN) method for natural image matting. Our method takes multiple initial alpha mattes of the previous methods and normalized RGB color images as inputs, and directly learns an end-to-end mapping between the inputs and reconstructed alpha mattes. Among the various existing methods, we focus on using two simple methods as initial alpha mattes: the closed-form matting and KNN matting. They are complementary to each other in terms of local and nonlocal principles. A major benefit of our method is that it can “recognize” different local image structures and then combine the results of local (closed-form matting) and nonlocal (KNN matting) mattings effectively to achieve higher quality alpha mattes than both of the inputs. Furthermore, we verify extendability of the proposed network to different combinations of initial alpha mattes from more advanced techniques such as KL divergence matting and information-flow matting. On the top of deep CNN matting, we build an RGB guided JPEG artifacts removal network to handle JPEG block artifacts in alpha matting. Extensive experiments demonstrate that our proposed deep CNN matting produces visually and quantitatively high-quality alpha mattes. We perform deeper experiments including studies to evaluate the importance of balancing training data and to measure the effects of initial alpha mattes and also consider results from variant versions of the proposed network to analyze our proposed DCNN matting. In addition, our method achieved high ranking in the public alpha matting evaluation dataset in terms of the sum of absolute differences, mean squared errors, and gradient errors. Also, our RGB guided JPEG artifacts removal network restores the damaged alpha mattes from compressed images in JPEG format.",
"title": ""
},
{
"docid": "670b58d379b7df273309e55cf8e25db4",
"text": "In this paper, we introduce a new large-scale dataset of ships, called SeaShips, which is designed for training and evaluating ship object detection algorithms. The dataset currently consists of 31 455 images and covers six common ship types (ore carrier, bulk cargo carrier, general cargo ship, container ship, fishing boat, and passenger ship). All of the images are from about 10 080 real-world video segments, which are acquired by the monitoring cameras in a deployed coastline video surveillance system. They are carefully selected to mostly cover all possible imaging variations, for example, different scales, hull parts, illumination, viewpoints, backgrounds, and occlusions. All images are annotated with ship-type labels and high-precision bounding boxes. Based on the SeaShips dataset, we present the performance of three detectors as a baseline to do the following: 1) elementarily summarize the difficulties of the dataset for ship detection; 2) show detection results for researchers using the dataset; and 3) make a comparison to identify the strengths and weaknesses of the baseline algorithms. In practice, the SeaShips dataset would hopefully advance research and applications on ship detection.",
"title": ""
},
{
"docid": "46e7713a462f3d9bc896447c47cc4e5f",
"text": "The balanced scorecard (BSC) has developed as a very useful managerial tool from the mid1990s, and has met with general (and often enthusiastic) acceptance in both business and academic circles. In the knowledge-networked innovation economy of the early 21 century, which is increasingly characterized by globally integrated supply and demand chains, outsourcing of traditional business competencies (even innovation itself), and an emphasis on intellectual capital in contrast to physical capital, the BSC is now showing serious deficiencies. The tyranny of the BSC as a measurement ‘straightjacket’ is beginning to jeopardize the survival of firms, and hinders much-needed business ecosystem innovation, thereby negatively affecting customer value rejuvenation, shareholders’ benefits, and other stakeholders’ as well as societal benefits in general. This article traces the rationale, features, development and application of the BSC in the past ten years, and then provides a critical review of its key problematic effects on firms and their stakeholders in today’s changing business environment. Five major problem areas are identified and discussed, with selected business examples. An alternative to the BSC is proposed and motivated, involving drastic change in both the underlying assumptions of the BSC and moving from a systematic, single enterprise focus to a systemic, dynamic framework – a systemic management system, including a systemic scorecard.",
"title": ""
},
{
"docid": "8933d7d0f57a532ef27b9dbbb3727a88",
"text": "All people can not do as they plan, it happens because of their habits. Therefore, habits and moods may affect their productivity. Hence, the habits and moods are the important parts of person's life. Such habits may be analyzed with various machine learning techniques as available nowadays. Now the question of analyzing the Habits and moods of a person with a goal of increasing one's productivity comes to mind. This paper discusses one such technique called HDML (Habit Detection with Machine Learning). HDML model analyses the mood which helps us to deal with a bad mood or a state of unproductivity, through suggestions about such activities that alleviate our mood. The overall accuracy of the model is about 87.5 %.",
"title": ""
},
{
"docid": "b230400ee47b40751623561e11b1944c",
"text": "Many mHealth apps have been developed to assist people in self-care management. Most of them aim to engage users and provide motivation to increase adherence. Gamification has been introduced to identify the left and right brain drives in order to engage users and motivate them. We are using Octalysis framework to map how top rated stress management apps address the right brain drives. 12 stress management mHealth are classified based on this framework. In this paper, we explore how Gamification has been used in mHealth apps, the intrinsic motivation using self-determination theory, methodology, and findings. In the discussion, we identify design principles that will better suited to enhance intrinsic motivation for people who seek self-stress management.",
"title": ""
},
{
"docid": "430a4f02f2236dcf947a58c8bc70af99",
"text": "A system for online recognition of handwritten Tamil characters is presented. A handwritten character is constructed by executing a sequence of strokes. A structure- or shape-based representation of a stroke is used in which a stroke is represented as a string of shape features. Using this string representation, an unknown stroke is identified by comparing it with a database of strokes using a flexible string matching procedure. A full character is recognized by identifying all the component strokes. Character termination, is determined using a finite state automaton. Development of similar systems for other Indian scripts is outlined.",
"title": ""
},
{
"docid": "8cd8577a70729d03c1561df6a1fcbdbb",
"text": "Quantum computing is a new computational paradigm created by reformulating information and computation in a quantum mechanical framework [30, 27]. Since the laws of physics appear to be quantum mechanical, this is the most relevant framework to consider when considering the fundamental limitations of information processing. Furthermore, in recent decades we have seen a major shift from just observing quantum phenomena to actually controlling quantum mechanical systems. We have seen the communication of quantum information over long distances, the “teleportation” of quantum information, and the encoding and manipulation of quantum information in many different physical media. We still appear to be a long way from the implementation of a large-scale quantum computer, however it is a serious goal of many of the world’s leading physicists, and progress continues at a fast pace. In parallel with the broad and aggressive program to control quantum mechanical systems with increased precision, and to control and interact a larger number of subsystems, researchers have also been aggressively pushing the boundaries of what useful tasks one could perform with quantum mechanical devices. These in-",
"title": ""
},
{
"docid": "e3a571f98248af33fc700c6eefaf9641",
"text": "Two studies examined associations between social networking and depressive symptoms among youth. In Study 1, 384 participants (68% female; mean age = 20.22 years, SD = 2.90) were surveyed. In Study 2, 334 participants (62% female; M age = 19.44 years, SD = 2.05) were surveyed initially and 3 weeks later. Results indicated that depressive symptoms were associated with quality of social networking interactions, not quantity. There was some evidence that depressive rumination moderated associations, and both depressive rumination and corumination were associated with aspects of social networking usage and quality. Implications for understanding circumstances that increase social networking, as well as resulting negative interactions and negative affect are discussed.",
"title": ""
},
{
"docid": "3c29a0579a2f7d4f010b9b2f2df16e2c",
"text": "In recent years research on human activity recognition using wearable sensors has enabled to achieve impressive results on real-world data. However, the most successful activity recognition algorithms require substantial amounts of labeled training data. The generation of this data is not only tedious and error prone but also limits the applicability and scalability of today's approaches. This paper explores and systematically analyzes two different techniques to significantly reduce the required amount of labeled training data. The first technique is based on semi-supervised learning and uses self-training and co-training. The second technique is inspired by active learning. In this approach the system actively asks which data the user should label. With both techniques, the required amount of training data can be reduced significantly while obtaining similar and sometimes even better performance than standard supervised techniques. The experiments are conducted using one of the largest and richest currently available datasets.",
"title": ""
},
{
"docid": "3489e9d639223116cb4681959928a198",
"text": "The prevailing concept in modern cognitive neuroscience is that cognitive functions are performed predominantly at the network level, whereas the role of individual neurons is unlikely to extend beyond forming the simple basic elements of these networks. Within this conceptual framework, individuals of outstanding cognitive abilities appear as a result of a favorable configuration of the microarchitecture of the cognitive-implicated networks, whose final formation in ontogenesis may occur in a relatively random way. Here I suggest an alternative concept, which is based on neurological data and on data from human behavioral genetics. I hypothesize that cognitive functions are performed mainly at the intracellular, probably at the molecular level. Central to this hypothesis is the idea that the neurons forming the networks involved in cognitive processes are complex elements whose functions are not limited to generating electrical potentials and releasing neurotransmitters. According to this hypothesis, individuals of outstanding abilities are so due to a ‘lucky’ combination of specific genes that determine the intrinsic properties of neurons involved in cognitive functions of the brain.",
"title": ""
},
{
"docid": "581df8e68fdd475d1f0fab64335aa412",
"text": "In this paper, a method for Li-ion battery state of charge (SOC) estimation using particle filter (PF) is proposed. The equivalent circuit model for Li-ion battery is established based on the available battery block in MATLAB/Simulink. To improve the model's accuracy, the circuit parameters are represented by functions of SOC. Then, the PF algorithm is utilized to do SOC estimation for the battery model. From simulation it reveals that PF provides accurate SOC estimation. It is demonstrated that the proposed method is effective on Li-ion battery SOC estimation.",
"title": ""
},
{
"docid": "8027856b5e9fd0112a6b9950b2901ba5",
"text": "In order to make the Web services, Web applications in Java more powerful, flexible and user friendly, building unified Web applications is very significant. By introducing a new style-Representational State Transfer, this paper studied the goals and design principles of REST, the idea of REST and RESTful Web service design principles, RESTful style Web service, RESTful Web service frameworks in Java and the ways to develop RESTful Web service. The RESTful Web Service frameworks in Java can effectively simplify the Web development in many aspects.",
"title": ""
},
{
"docid": "470d2c319aaff0e9afcbd6deab56dca8",
"text": "BACKGROUND\nMotivation and job satisfaction have been identified as key factors for health worker retention and turnover in low- and middle-income countries. District health managers in decentralized health systems usually have a broadened 'decision space' that enables them to positively influence health worker motivation and job satisfaction, which in turn impacts on retention and performance at district-level. The study explored the effects of motivation and job satisfaction on turnover intention and how motivation and satisfaction can be improved by district health managers in order to increase retention of health workers.\n\n\nMETHODS\nWe conducted a cross-sectional survey in three districts of the Eastern Region in Ghana and interviewed 256 health workers from several staff categories (doctors, nursing professionals, allied health workers and pharmacists) on their intentions to leave their current health facilities as well as their perceptions on various aspects of motivation and job satisfaction. The effects of motivation and job satisfaction on turnover intention were explored through logistic regression analysis.\n\n\nRESULTS\nOverall, 69% of the respondents reported to have turnover intentions. Motivation (OR = 0.74, 95% CI: 0.60 to 0.92) and job satisfaction (OR = 0.74, 95% CI: 0.57 to 0.96) were significantly associated with turnover intention and higher levels of both reduced the risk of health workers having this intention. The dimensions of motivation and job satisfaction significantly associated with turnover intention included career development (OR = 0.56, 95% CI: 0.36 to 0.86), workload (OR = 0.58, 95% CI: 0.34 to 0.99), management (OR = 0.51. 95% CI: 0.30 to 0.84), organizational commitment (OR = 0.36, 95% CI: 0.19 to 0.66), and burnout (OR = 0.59, 95% CI: 0.39 to 0.91).\n\n\nCONCLUSIONS\nOur findings indicate that effective human resource management practices at district level influence health worker motivation and job satisfaction, thereby reducing the likelihood for turnover. Therefore, it is worth strengthening human resource management skills at district level and supporting district health managers to implement retention strategies.",
"title": ""
},
{
"docid": "e03d8f990cfcb07d8088681c3811b542",
"text": "The environments in which we live and the tasks we must perform to survive and reproduce have shaped the design of our perceptual systems through evolution and experience. Therefore, direct measurement of the statistical regularities in natural environments (scenes) has great potential value for advancing our understanding of visual perception. This review begins with a general discussion of the natural scene statistics approach, of the different kinds of statistics that can be measured, and of some existing measurement techniques. This is followed by a summary of the natural scene statistics measured over the past 20 years. Finally, there is a summary of the hypotheses, models, and experiments that have emerged from the analysis of natural scene statistics.",
"title": ""
},
{
"docid": "8ea44a793f57f036db0142cf51b12928",
"text": "This paper presents a comparative study of various classification methods in the application of automatic brain tumor segmentation. The data used in the study are 3D MRI volumes from MICCAI2016 brain tumor segmentation (BRATS) benchmark. 30 volumes are chosen randomly as a training set and 57 volumes are randomly chosen as a test set. The volumes are preprocessed and a feature vector is retrieved from each volume's four modalities (T1, T1 contrast-enhanced, T2 and Fluid-attenuated inversion recovery). The popular Dice score is used as an accuracy measure to record each classifier recognition results. All classifiers are implemented in the popular machine learning suit of algorithms, WEKA.",
"title": ""
},
{
"docid": "fc2046c92508cb0d6fe2b60c0eb8d2be",
"text": "Voting is an inherent process in a democratic society. Other methods for expressing the society participants’ will for example caucuses in US party elections or Landsgemeine in Switzerland can be inconvenient for the citizens and logistically difficult to organize. Furthermore, beyond inconvenience, there may be legitimate reasons for not being able to take part in the voting process, e.g. being deployed overseas in military or being on some other official assignment. Even more, filling in paper ballots and counting them is error-prone and time-consuming process. A well-known controversy took place during US presidental election in 2000 [Florida recount 2000], when a partial recount of the votes could have changed the outcome of the elections. As the recount was cancelled by the court, the actual result was not never known. Decline in elections’ participation rate has been observed in many old democracies [Summers 2016] and it should be the decision-makers goal to bring the electorate back to the polling booths. One way to do that would be to use internet voting. In this method, the ballots are cast using a personal computer or a smart phone and it sent over the internet to the election committee. However, there have been several critics against the internet voting methods [Springall et al. 2014]. In this report we consider, how to make internet voting protocols more secure by using blockchain.",
"title": ""
},
{
"docid": "24bb26da0ce658ff075fc89b73cad5af",
"text": "Recent trends in robot learning are to use trajectory-based optimal control techniques and reinforcement learning to scale complex robotic systems. On the one hand, increased computational power and multiprocessing, and on the other hand, probabilistic reinforcement learning methods and function approximation, have contributed to a steadily increasing interest in robot learning. Imitation learning has helped significantly to start learning with reasonable initial behavior. However, many applications are still restricted to rather lowdimensional domains and toy applications. Future work will have to demonstrate the continual and autonomous learning abilities, which were alluded to in the introduction.",
"title": ""
},
{
"docid": "0b777fa9b40050559826ec01285ea2ec",
"text": "Honeyd (N. Provos, 2004) is a popular tool developed by Niels Provos that offers a simple way to emulate services offered by several machines on a single PC. It is a so called low interaction honeypot. Responses to incoming requests are generated thanks to ad hoc scripts that need to be written by hand. As a result, few scripts exist, especially for services handling proprietary protocols. In this paper, we propose a method to alleviate these problems by automatically generating new scripts. We explain the method and describe its limitations. We analyze the quality of the generated scripts thanks to two different methods. On the one hand, we have launched known attacks against a machine running our scripts; on the other hand, we have deployed that machine on the Internet, next to a high interaction honeypot during two months. For those attackers that have targeted both machines, we can verify if our scripts have, or not, been able to fool them. We also discuss the various tuning parameters of the algorithm that can be set to either increase the quality of the script or, at the contrary, to reduce its complexity",
"title": ""
},
{
"docid": "30155768fd0b1b0950510487840defba",
"text": "Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures. In this setting, a tenant temporarily uses a piece of virtually dedicated software, platform, or infrastructure. To fully benefit from the cloud, tenants are seeking to build controlled and secure collaboration with each other. In this paper, we propose a Multi-Tenant Role-Based Access Control (MT-RBAC) model family which aims to provide fine-grained authorization in collaborative cloud environments by building trust relations among tenants. With an established trust relation in MT-RBAC, the trustee can precisely authorize cross-tenant accesses to the truster's resources consistent with constraints over the trust relation and other components designated by the truster. The users in the trustee may restrictively inherit permissions from the truster so that multi-tenant collaboration is securely enabled. Using SUN's XACML library, we prototype MT-RBAC models on a novel Authorization as a Service (AaaS) platform with the Joyent commercial cloud system. The performance and scalability metrics are evaluated with respect to an open source cloud storage system. The results show that our prototype incurs only 0.016 second authorization delay for end users on average and is scalable in cloud environments.",
"title": ""
}
] | scidocsrr |
bf7cb5713c1bc22b3c7b27902d580a24 | Why Users Disintermediate Peer-to-Peer Marketplaces | [
{
"docid": "00b98536f0ecd554442a67fb31f77f4c",
"text": "We use a large, nationally-representative sample of working-age adults to demonstrate that personality (as measured by the Big Five) is stable over a four-year period. Average personality changes are small and do not vary substantially across age groups. Intra-individual personality change is generally unrelated to experiencing adverse life events and is unlikely to be economically meaningful. Like other non-cognitive traits, personality can be modeled as a stable input into many economic decisions. JEL classi cation: J3, C18.",
"title": ""
},
{
"docid": "a8ca6ef7b99cca60f5011b91d09e1b06",
"text": "When virtual teams need to establish trust at a distance, it is advantageous for them to use rich media to communicate. We studied the emergence of trust in a social dilemma game in four different communication situations: face-to-face, video, audio, and text chat. All three of the richer conditions were significant improvements over text chat. Video and audio conferencing groups were nearly as good as face-to-face, but both did show some evidence of what we term delayed trust (slower progress toward full cooperation) and fragile trust (vulnerability to opportunistic behavior)",
"title": ""
},
{
"docid": "76034cd981a64059f749338a2107e446",
"text": "We examine how financial assurance structures and the clearly defined financial transaction at the core of monetized network hospitality reduce uncertainty for Airbnb hosts and guests. We apply the principles of social exchange and intrinsic and extrinsic motivation to a qualitative study of Airbnb hosts to 1) describe activities that are facilitated by the peer-to-peer exchange platform and 2) how the assurance of the initial financial exchange facilitates additional social exchanges between hosts and guests. The study illustrates that the financial benefits of hosting do not necessarily crowd out intrinsic motivations for hosting but instead strengthen them and even act as a gateway to further social exchange and interpersonal interaction. We describe the assurance structures in networked peer-to-peer exchange, and explain how such assurances can reconcile contention between extrinsic and intrinsic motivations. We conclude with implications for design and future research.",
"title": ""
}
] | [
{
"docid": "12680d4fcf57a8a18d9c2e2b1107bf2d",
"text": "Recent advances in computer and technology resulted into ever increasing set of documents. The need is to classify the set of documents according to the type. Laying related documents together is expedient for decision making. Researchers who perform interdisciplinary research acquire repositories on different topics. Classifying the repositories according to the topic is a real need to analyze the research papers. Experiments are tried on different real and artificial datasets such as NEWS 20, Reuters, emails, research papers on different topics. Term Frequency-Inverse Document Frequency algorithm is used along with fuzzy K-means and hierarchical algorithm. Initially experiment is being carried out on small dataset and performed cluster analysis. The best algorithm is applied on the extended dataset. Along with different clusters of the related documents the resulted silhouette coefficient, entropy and F-measure trend are presented to show algorithm behavior for each data set.",
"title": ""
},
{
"docid": "d31ba2b9ca7f5a33619fef33ade3b75a",
"text": "We present ARPKI, a public-key infrastructure that ensures that certificate-related operations, such as certificate issuance, update, revocation, and validation, are transparent and accountable. ARPKI is the first such infrastructure that systematically takes into account requirements identified by previous research. Moreover, ARPKI is co-designed with a formal model, and we verify its core security property using the Tamarin prover. We present a proof-of-concept implementation providing all features required for deployment. ARPKI efficiently handles the certification process with low overhead and without incurring additional latency to TLS.\n ARPKI offers extremely strong security guarantees, where compromising n-1 trusted signing and verifying entities is insufficient to launch an impersonation attack. Moreover, it deters misbehavior as all its operations are publicly visible.",
"title": ""
},
{
"docid": "8b205549e43d355174e8d8fce645ca99",
"text": "In recent era, the weighted matrix rank minimization is used to reduce image noise, promisingly. However, low-rank weighted conditions may cause oversmoothing or oversharpening of the denoised image. This demands a clever engineering algorithm. Particularly, to remove heavy noise in image is always a challenging task, specially, when there is need to preserve the fine edge structures. To attain a reliable estimate of heavy noise image, a norm weighted fusion estimators method is proposed in wavelet domain. This holds the significant geometric structure of the given noisy image during the denoising process. Proposed method is applied on standard benchmark images, and simulation results outperform the most popular rivals of noise reduction approaches, such as BM3D, EPLL, LSSC, NCSR, SAIST, and WNNM in terms of the quality measurement metric PSNR (dB) and structural analysis SSIM indices.",
"title": ""
},
{
"docid": "7f575dd097ac747eddd2d7d0dc1055d5",
"text": "It has been widely believed that biometric template aging does not occur for iris biometrics. We compare the match score distribution for short time-lapse iris image pairs, with a mean of approximately one month between the enrollment image and the verification image, to the match score distributions for image pairs with one, two and three years of time lapse. We find clear and consistent evidence of a template aging effect that is noticeable at one year and that increases with increasing time lapse. For a state-of-the-art iris matcher, and three years of time lapse, at a decision threshold corresponding to a one in two million false match rate, we observe an 153% increase in the false non-match rate, with a bootstrap estimated 95% confidence interval of 85% to 307%.",
"title": ""
},
{
"docid": "2a1c5ba1c1057364420fd220995a74ff",
"text": "A multicell rectifier (MC) structure with N + 2 redundancy is presented. The topology is based on power cells implemented with the integrated gate commuted thyristors (IGCTs) to challenge the SCR standard industry solution for the past 35 years. This rectifier is a reliable, compact, efficient, nonpolluting alternative and cost-effective solution for electrolytic applications. Its structure, based on power cells, enables load shedding to ensure power delivery even in the event of power cell failures. It injects quasi-sinusoidal input currents and provides unity power factor without the use of passive or active filters. A complete evaluation based on IEEE standards 493-1997 and IEEE C57.18.10 for average downtime, failures rates, and efficiency is included. For comparison purposes, results are shown against conventional systems known for their high efficiency and reliability.",
"title": ""
},
{
"docid": "36da2b6102762c80b3ae8068d764e220",
"text": "Video games have become an essential part of the way people play and learn. While an increasing number of people are using games to learn in informal environments, their acceptance in the classroom as an instructional activity has been mixed. Successes in informal learning have caused supporters to falsely believe that implementing them into the classroom would be a relatively easy transition and have the potential to revolutionise the entire educational system. In spite of all the hype, many are puzzled as to why more teachers have not yet incorporated them into their teaching. The literature is littered with reports that point to a variety of reasons. One of the reasons, we believe, is that very little has been done to convince teachers that the effort to change their curriculum to integrate video games and other forms of technology is worthy of the effort. Not until policy makers realise the importance of professional British Journal of Educational Technology (2009) doi:10.1111/j.1467-8535.2009.01007.x © 2009 The Authors. Journal compilation © 2009 Becta. Published by Blackwell Publishing, 9600 Garsington Road, Oxford OX4 2DQ, UK and 350 Main Street, Malden, MA 02148, USA. development and training as an important use of funds will positive changes in thinking and perceptions come about, which will allow these various forms of technology to reach their potential. The authors have hypothesised that the major impediments to useful technology integration include the general lack of institutional infrastructure, poor teacher training, and overly-complicated technologies. Overcoming these obstacles requires both a top-down and a bottom-up approach. This paper presents the results of a pilot study with a group of preservice teachers to determine whether our hypotheses regarding potential negativity surrounding video games was valid and whether a wider scale study is warranted. The results of this study are discussed along with suggestions for further research and potential changes in teacher training programmes. Introduction Over the past 40 years, video games have become an increasingly popular way to play and learn. Those who play regularly often note that the major attraction is their ability to become quickly engaged and immersed in gameplay (Lenhart & Kayne, 2008). Many have taken notice of video games’ apparent effectiveness in teaching social interaction and critical thinking in informal learning environments. Beliefs about the effectiveness of video games in informal learning situations have been hyped to the extent that they are often described as the ‘holy grail’ that will revolutionise our entire educational system (Gee, 2003; Kirkley & Kirkley, 2004; Prensky, 2001; Sawyer, 2002). In spite of all the hype and promotion, many educators express puzzlement and disappointment that only a modest number of teachers have incorporated video games into their teaching (Egenfeldt-Nielsen, 2004; Pivec & Pivec, 2008). These results seem to mirror those reported on a general lack of successful integration on the part of teachers and educators of new technologies and media in general. The reasons reported in that research point to a varied and complex issue that involves dispelling preconceived notions, prejudices, and concerns (Kati, 2008; Kim & Baylor, 2008). It is our position that very little has been done to date to overcome these objections. We agree with Magliaro and Ezeife (2007) who posited that teachers can and do greatly influence the successes or failures of classroom interventions. Expenditures on media and technology alone do not guarantee their successful or productive use in the classroom. Policy makers need to realise that professional development and training is the most significant use of funds that will positively affect teaching styles and that will allow technology to reach its potential to change education. But as Cuban, Kirkpatrick and Peck (2001) noted, the practices of policy makers and administrators to increase the effective use of technologies in the classroom more often than not conflict with implementation. In their qualitative study of two Silicon Valley high schools, the authors found that despite ready access to computer technologies, 2 British Journal of Educational Technology © 2009 The Authors. Journal compilation © 2009 Becta. only a handful of teachers actually changed their teaching practices (ie, moved from teacher-centered to student-centered pedagogies). Furthermore, the authors identified several barriers to technological innovation in the classroom, including most notably: a lack of preparation time, poor technical support, outdated technologies, and the inability to sustain interest in the particular lessons and a lack of opportunities for collaboration due to the rigid structure and short time periods allocated to instruction. The authors concluded by suggesting that the path for integrating technology would eventually flourish, but that it initially would be riddled with problems caused by impediments placed upon its success by a lack of institutional infrastructure, poor training, and overly-complicated technologies. We agree with those who suggest that any proposed classroom intervention correlates directly to the expectations and perceived value/benefit on the part of the integrating teachers, who largely control what and how their students learn (Hanusheck, Kain & Rivkin, 1998). Faced with these significant obstacles, it should not be surprising that video games, like other technologies, have been less than successful in transforming the classroom. We further suggest that overcoming these obstacles requires both a top-down and a bottom-up approach. Policy makers carry the burden of correcting the infrastructural issues both for practical reasons as well as for creating optimism on the part of teachers to believe that their administrators actually support their decisions. On the other hand, anyone associated with educational systems for any length of time will agree that a top-down only approach is destined for failure. The successful adoption of any new classroom intervention is based, in larger part, on teachers’ investing in the belief that the experience is worth the effort. If a teacher sees little or no value in an intervention, or is unfamiliar with its use, then the chances that it will be properly implemented are minimised. In other words, a teacher’s adoption of any instructional strategy is directly correlated with his or her views, ideas, and expectations about what is possible, feasible, and useful. In their studies into the game playing habits of various college students, Shaffer, Squire and Gee (2005) alluded to the fact that of those that they interviewed, future teachers indicated that they did not play video games as often as those enrolled in other majors. Our review of these comments generated several additional research questions that we believe deserve further investigation. We began to hypothesise that if it were true that teachers, as a group, do not in fact play video games on a regular basis, it should not be surprising that they would have difficulty integrating games into their curriculum. They would not have sufficient basis to integrate the rules of gameplay with their instructional strategies, nor would they be able to make proper assessments as to which games might be the most effective. We understand that one does not have to actually like something or be good at something to appreciate its value. For example, one does not necessarily have to be a fan of rap music or have a knack for performing it to understand that it could be a useful teaching tool. But, on the other hand, we wondered whether the attitudes towards video games on the part of teachers were not merely neutral, but in fact actually negative, which would further undermine any attempts at successfully introducing games into their classrooms. Expectancy-value 3 © 2009 The Authors. Journal compilation © 2009 Becta. This paper presents the results of a pilot study we conducted that utilised a group of preservice teachers to determine whether our hypothesis regarding potential negativity surrounding video games was valid and whether a wider scale study is warranted. In this examination, we utilised a preference survey to ask participants to reveal their impressions and expectancies about video games in general, their playing habits, and their personal assessments as to the potential role games might play in their future teaching strategies. We believe that the results we found are useful in determining ramifications for some potential changes in teacher preparation and professional development programmes. They provide more background on the kinds of learning that can take place, as described by Prensky (2001), Gee (2003) and others, they consider how to evaluate supposed educational games that exist in the market, and they suggest successful integration strategies. Just as no one can assume that digital kids already have expertise in participatory learning simply because they are exposed to these experiences in their informal, outside of school activities, those responsible for teacher training cannot assume that just because up-and-coming teachers have been brought up in the digital age, they are automatically familiar with, disposed to using, and have positive ideas about how games can be integrated into their curriculum. As a case in point, we found that there exists a significant disconnect between teachers and their students regarding the value of gameplay, and whether one can efficiently and effectively learn from games. In this study, we also attempted to determine if there might be an interaction effect based on the type of console being used. We wanted to confirm Pearson and Bailey’s (2008) assertions that the Nintendo Wii (Nintendo Company, Ltd. 11-1 KamitobaHokodate-cho, Minami-ku, Kyoto 601-8501, Japan) consoles would not only promote improvements in physical move",
"title": ""
},
{
"docid": "dedc509f31c9b7e6c4409d655a158721",
"text": "Envelope tracking (ET) is by now a well-established technique that improves the efficiency of microwave power amplifiers (PAs) compared to what can be obtained with conventional class-AB or class-B operation for amplifying signals with a time-varying envelope, such as most of those used in present wireless communication systems. ET is poised to be deployed extensively in coming generations of amplifiers for cellular handsets because it can reduce power dissipation for signals using the long-term evolution (LTE) standard required for fourthgeneration (4G) wireless systems, which feature high peak-to-average power ratios (PAPRs). The ET technique continues to be actively developed for higher carrier frequencies and broader bandwidths. This article reviews the concepts and history of ET, discusses several applications currently on the drawing board, presents challenges for future development, and highlights some directions for improving the technique.",
"title": ""
},
{
"docid": "c5bc0cd14aa51c24a00107422fc8ca10",
"text": "This paper proposes a new high-voltage Pulse Generator (PG), fed from low voltage dc supply Vs. This input supply voltage is utilized to charge two arms of N series-connected modular multilevel converter sub-module capacitors sequentially through a resistive-inductive branch, such that each arm is charged to NVS. With a step-up nano-crystalline transformer of n turns ratio, the proposed PG is able to generate bipolar rectangular pulses of peak ±nNVs, at high repetition rates. However, equal voltage-second area of consecutive pulse pair polarities should be assured to avoid transformer saturation. Not only symmetrical pulses can be generated, but also asymmetrical pulses with equal voltage-second areas are possible. The proposed topology is tested via simulations and a scaled-down experimentation, which establish the viability of the topology for water treatment applications.",
"title": ""
},
{
"docid": "c5ae1d66d31128691e7e7d8e2ccd2ba8",
"text": "The scope of this paper is two-fold: firstly it proposes the application of a 1-2-3 Zones approach to Internet of Things (IoT)-related Digital Forensics (DF) investigations. Secondly, it introduces a Next-Best-Thing Triage (NBT) Model for use in conjunction with the 1-2-3 Zones approach where necessary and vice versa. These two `approaches' are essential for the DF process from an IoT perspective: the atypical nature of IoT sources of evidence (i.e. Objects of Forensic Interest - OOFI), the pervasiveness of the IoT environment and its other unique attributes - and the combination of these attributes - dictate the necessity for a systematic DF approach to incidents. The two approaches proposed are designed to serve as a beacon to incident responders, increasing the efficiency and effectiveness of their IoT-related investigations by maximizing the use of the available time and ensuring relevant evidence identification and acquisition. The approaches can also be applied in conjunction with existing, recognised DF models, methodologies and frameworks.",
"title": ""
},
{
"docid": "4f3936b753abd2265d867c0937aec24c",
"text": "A weighted constraint satisfaction problem (WCSP) is a constraint satisfaction problem in which preferences among solutions can be expressed. Bucket elimination is a complete technique commonly used to solve this kind of constraint satisfaction problem. When the memory required to apply bucket elimination is too high, a heuristic method based on it (denominated mini-buckets) can be used to calculate bounds for the optimal solution. Nevertheless, the curse of dimensionality makes these techniques impractical on large scale problems. In response to this situation, we present a memetic algorithm for WCSPs in which bucket elimination is used as a mechanism for recombining solutions, providing the best possible child from the parental set. Subsequently, a multi-level model in which this exact/metaheuristic hybrid is further hybridized with branch-and-bound techniques and mini-buckets is studied. As a case study, we have applied these algorithms to the resolution of the maximum density still life problem, a hard constraint optimization problem based on Conway’s game of life. The resulting algorithm consistently finds optimal patterns for up to date solved instances in less time than current approaches. Moreover, it is shown that this proposal provides new best known solutions for very large instances.",
"title": ""
},
{
"docid": "7159d958139d684e4a74abe252788a40",
"text": "Exploration in environments with sparse rewards has been a persistent problem in reinforcement learning (RL). Many tasks are natural to specify with a sparse reward, and manually shaping a reward function can result in suboptimal performance. However, finding a non-zero reward is exponentially more difficult with increasing task horizon or action dimensionality. This puts many real-world tasks out of practical reach of RL methods. In this work, we use demonstrations to overcome the exploration problem and successfully learn to perform long-horizon, multi-step robotics tasks with continuous control such as stacking blocks with a robot arm. Our method, which builds on top of Deep Deterministic Policy Gradients and Hindsight Experience Replay, provides an order of magnitude of speedup over RL on simulated robotics tasks. It is simple to implement and makes only the additional assumption that we can collect a small set of demonstrations. Furthermore, our method is able to solve tasks not solvable by either RL or behavior cloning alone, and often ends up outperforming the demonstrator policy.",
"title": ""
},
{
"docid": "7618fa5b704c892b6b122f3602893d75",
"text": "At the dawn of the second automotive century it is apparent that the competitive realm of the automotive industry is shifting away from traditional classifications based on firms’ production systems or geographical homes. Companies across the regional and volume spectrum have adopted a portfolio of manufacturing concepts derived from both mass and lean production paradigms, and the recent wave of consolidation means that regional comparisons can no longer be made without considering the complexities induced by the diverse ownership structure and plethora of international collaborations. In this chapter we review these dynamics and propose a double helix model illustrating how the basis of competition has shifted from cost-leadership during the heyday of Ford’s original mass production, to variety and choice following Sloan’s portfolio strategy, to diversification through leadership in design, technology or manufacturing excellence, as in the case of Toyota, and to mass customisation, which marks the current competitive frontier. We will explore how the production paradigms that have determined much of the competition in the first automotive century have evolved, what trends shape the industry today, and what it will take to succeed in the automotive industry of the future. 1 This chapter provides a summary of research conducted as part of the ILIPT Integrated Project and the MIT International Motor Vehicle Program (IMVP), and expands on earlier works, including the book The second century: reconnecting customer and value chain through build-toorder (Holweg and Pil 2004) and the paper Beyond mass and lean production: on the dynamics of competition in the automotive industry (Économies et Sociétés: Série K: Économie de l’Enterprise, 2005, 15:245–270).",
"title": ""
},
{
"docid": "411f47c2edaaf3696d44521d4a97eb28",
"text": "An energy-efficient 3 Gb/s current-mode interface scheme is proposed for on-chip global interconnects and silicon interposer channels. The transceiver core consists of an open-drain transmitter with one-tap pre-emphasis and a current sense amplifier load as the receiver. The current sense amplifier load is formed by stacking a PMOS diode stage and a cross-coupled NMOS stage, providing an optimum current-mode receiver without any bias current. The proposed scheme is verified with two cases of transceivers implemented in 65 nm CMOS. A 10 mm point-to-point data-only channel shows an energy efficiency of 9.5 fJ/b/mm, and a 20 mm four-drop source-synchronous link achieves 29.4 fJ/b/mm including clock and data channels.",
"title": ""
},
{
"docid": "227d8ad4000e6e1d9fd1aa6bff8ed64c",
"text": "Recently, speed sensorless control of Induction Motor (IM) drives received great attention to avoid the different problems associated with direct speed sensors. Among different rotor speed estimation techniques, Model Reference Adaptive System (MRAS) schemes are the most common strategies employed due to their relative simplicity and low computational effort. In this paper a novel adaptation mechanism is proposed which replaces normally used conventional Proportional-Integral (PI) controller in MRAS adaptation mechanism by a Fractional Order PI (FOPI) controller. The performance of two adaptation mechanism controllers has been verified through simulation results using MATLAB/SIMULINK software. It is seen that the performance of the induction motor has improved when FOPI controller is used in place of classical PI controller.",
"title": ""
},
{
"docid": "8f65f1971405e0c225e3625bb682a2d4",
"text": "We address the problem of 3D shape completion from sparse and noisy point clouds, a fundamental problem in computer vision and robotics. Recent approaches are either data-driven or learning-based: Data-driven approaches rely on a shape model whose parameters are optimized to fit the observations; Learning-based approaches, in contrast, avoid the expensive optimization step by learning to directly predict complete shapes from incomplete observations in a fully-supervised setting. However, full supervision is often not available in practice. In this work, we propose a weakly-supervised learning-based approach to 3D shape completion which neither requires slow optimization nor direct supervision. While we also learn a shape prior on synthetic data, we amortize, i.e., learn, maximum likelihood fitting using deep neural networks resulting in efficient shape completion without sacrificing accuracy. On synthetic benchmarks based on ShapeNet (Chang et al. Shapenet: an information-rich 3d model repository, 2015. arXiv:1512.03012) and ModelNet (Wu et al., in: Proceedings of IEEE conference on computer vision and pattern recognition (CVPR), 2015) as well as on real robotics data from KITTI (Geiger et al., in: Proceedings of IEEE conference on computer vision and pattern recognition (CVPR), 2012) and Kinect (Yang et al., 3d object dense reconstruction from a single depth view, 2018. arXiv:1802.00411), we demonstrate that the proposed amortized maximum likelihood approach is able to compete with the fully supervised baseline of Dai et al. (in: Proceedings of IEEE conference on computer vision and pattern recognition (CVPR), 2017) and outperforms the data-driven approach of Engelmann et al. (in: Proceedings of the German conference on pattern recognition (GCPR), 2016), while requiring less supervision and being significantly faster.",
"title": ""
},
{
"docid": "4bce887df71f59085938c8030e7b0c1c",
"text": "Context plays an important role in human language understanding, thus it may also be useful for machines learning vector representations of language. In this paper, we explore an asymmetric encoder-decoder structure for unsupervised context-based sentence representation learning. We carefully designed experiments to show that neither an autoregressive decoder nor an RNN decoder is required. After that, we designed a model which still keeps an RNN as the encoder, while using a non-autoregressive convolutional decoder. We further combine a suite of effective designs to significantly improve model efficiency while also achieving better performance. Our model is trained on two different large unlabelled corpora, and in both cases the transferability is evaluated on a set of downstream NLP tasks. We empirically show that our model is simple and fast while producing rich sentence representations that excel in downstream tasks.",
"title": ""
},
{
"docid": "370d8cccec6964954154e796f0e558c8",
"text": "We present optical imaging-based methods to measure vital physiological signals, including breathing frequency (BF), exhalation flow rate, heart rate (HR), and pulse transit time (PTT). The breathing pattern tracking was based on the detection of body movement associated with breathing using a differential signal processing approach. A motion-tracking algorithm was implemented to correct random body movements that were unrelated to breathing. The heartbeat pattern was obtained from the color change in selected region of interest (ROI) near the subject's mouth, and the PTT was determined by analyzing pulse patterns at different body parts of the subject. The measured BF, exhaled volume flow rate and HR are consistent with those measured simultaneously with reference technologies (r = 0.98, p <; 0.001 for HR; r = 0.93, p <; 0.001 for breathing rate), and the measured PTT difference (30-40 ms between mouth and palm) is comparable to the results obtained with other techniques in the literature. The imaging-based methods are suitable for tracking vital physiological parameters under free-living condition and this is the first demonstration of using noncontact method to obtain PTT difference and exhalation flow rate.",
"title": ""
},
{
"docid": "7bd0d55e08ff4d94c021dd53142ef5aa",
"text": "From smart homes that prepare coffee when we wake, to phones that know not to interrupt us during important conversations, our collective visions of HCI imagine a future in which computers understand a broad range of human behaviors. Today our systems fall short of these visions, however, because this range of behaviors is too large for designers or programmers to capture manually. In this paper, we instead demonstrate it is possible to mine a broad knowledge base of human behavior by analyzing more than one billion words of modern fiction. Our resulting knowledge base, Augur, trains vector models that can predict many thousands of user activities from surrounding objects in modern contexts: for example, whether a user may be eating food, meeting with a friend, or taking a selfie. Augur uses these predictions to identify actions that people commonly take on objects in the world and estimate a user's future activities given their current situation. We demonstrate Augur-powered, activity-based systems such as a phone that silences itself when the odds of you answering it are low, and a dynamic music player that adjusts to your present activity. A field deployment of an Augur-powered wearable camera resulted in 96% recall and 71% precision on its unsupervised predictions of common daily activities. A second evaluation where human judges rated the system's predictions over a broad set of input images found that 94% were rated sensible.",
"title": ""
},
{
"docid": "57889499aaa45b38754d9d6cebff96b8",
"text": "ion speeds up the DTW algorithm by operating on a reduced representation of the data. These algorithms include IDDTW [3], PDTW [13], and COW [2] . The left side of Figure 5 shows a full-resolution cost matrix for which a minimum-distance warp path must be found. Rather than running DTW on the full resolution (1/1) cost matrix, the time series are reduced in size to make the number of cells in the cost matrix more manageable. A warp path is found for the lowerresolution time series and is mapped back to full resolution. The resulting speedup depends on how much abstraction is used. Obviously, the calculated warp path becomes increasingly inaccurate as the level of abstraction increases. Projecting the low resolution warp path to the full resolution usually creates a warp path that is far from optimal. This is because even IF an optimal warp path passes through the low-resolution cell, projecting the warp path to the higher resolution ignores local variations in the warp path that can be very significant. Indexing [9][14] uses lower-bounding functions to prune the number of times DTW is run for similarity search [17]. Indexing speeds up applications in which DTW is used, but it does not make up the actual DTW calculation any more efficient. Our FastDTW algorithm uses ideas from both the constraints and abstraction approaches. Using a combination of both overcomes many limitations of using either method individually, and yields an accurate algorithm that is O(N) in both time and space complexity. Our multi-level approach is superficially similar to IDDTW [3] because they both evaluate several different resolutions. However, IDDTW simply executes PDTW [13] at increasingly higher resolutions until a desired “accuracy” is achieved. IDDTW does not project low resolution solutions to higher resolutions. In Section 4, we will demonstrate that these methods are more inaccurate than our method given the same amount of execution time. Projecting warp paths to higher resolutions is also done in the construction of “Match Webs” [15]. However, their approach is still O(N) due to the simultaneous search for many warp paths (they call them “chains”). A multi-resolution approach in their application also could not continue down to the low resolutions without severely reducing the number of “chains” that could be found. Some recent research [18] asserts that there is no need to speed up the original DTW algorithm. However, this is only true under the following (common) conditions: 1) Tight Constraints A relatively strict near-linear warp path is allowable. 2) Short Time Series All time series are short enough for the DTW algorithm to execute quickly. (~3,000 points if a warp path is needed, or ~100,000 if no warp path is needed and the user has a lot of patience).",
"title": ""
},
{
"docid": "97ac64bb4d06216253eacb17abfcb103",
"text": "UIMA Ruta is a rule-based system designed for information extraction tasks, but it is also applicable for many natural language processing use cases. This demonstration gives an overview of the UIMA Ruta Workbench, which provides a development environment and tooling for the rule language. It was developed to ease every step in engineering rule-based applications. In addition to the full-featured rule editor, the user is supported by explanation of the rule execution, introspection in results, automatic validation and rule induction. Furthermore, the demonstration covers the usage and combination of arbitrary components for natural language processing.",
"title": ""
}
] | scidocsrr |
0c9fef946ee7f60dcb132b0b5be3b15a | On How to Design Dataflow FPGA-Based Accelerators for Convolutional Neural Networks | [
{
"docid": "3655319a1d2ff7f4bc43235ba02566bd",
"text": "In high-performance systems, stencil computations play a crucial role as they appear in a variety of different fields of application, ranging from partial differential equation solving, to computer simulation of particles’ interaction, to image processing and computer vision. The computationally intensive nature of those algorithms created the need for solutions to efficiently implement them in order to save both execution time and energy. This, in combination with their regular structure, has justified their widespread study and the proposal of largely different approaches to their optimization.\n However, most of these works are focused on aggressive compile time optimization, cache locality optimization, and parallelism extraction for the multicore/multiprocessor domain, while fewer works are focused on the exploitation of custom architectures to further exploit the regular structure of Iterative Stencil Loops (ISLs), specifically with the goal of improving power efficiency.\n This work introduces a methodology to systematically design power-efficient hardware accelerators for the optimal execution of ISL algorithms on Field-programmable Gate Arrays (FPGAs). As part of the methodology, we introduce the notion of Streaming Stencil Time-step (SST), a streaming-based architecture capable of achieving both low resource usage and efficient data reuse thanks to an optimal data buffering strategy, and we introduce a technique called SSTs queuing that is capable of delivering a pseudolinear execution time speedup with constant bandwidth.\n The methodology has been validated on significant benchmarks on a Virtex-7 FPGA using the Xilinx Vivado suite. Results demonstrate how the efficient usage of the on-chip memory resources realized by an SST allows one to treat problem sizes whose implementation would otherwise not be possible via direct synthesis of the original, unmanipulated code via High-Level Synthesis (HLS). We also show how the SSTs queuing effectively ensures a pseudolinear throughput speedup while consuming constant off-chip bandwidth.",
"title": ""
},
{
"docid": "5c8c391a10f32069849d743abc5e8210",
"text": "We present a massively parallel coprocessor for accelerating Convolutional Neural Networks (CNNs), a class of important machine learning algorithms. The coprocessor functional units, consisting of parallel 2D convolution primitives and programmable units performing sub-sampling and non-linear functions specific to CNNs, implement a “meta-operator” to which a CNN may be compiled to. The coprocessor is serviced by distributed off-chip memory banks with large data bandwidth. As a key feature, we use low precision data and further increase the effective memory bandwidth by packing multiple words in every memory operation, and leverage the algorithm’s simple data access patterns to use off-chip memory as a scratchpad for intermediate data, critical for CNNs. A CNN is mapped to the coprocessor hardware primitives with instructions to transfer data between the memory and coprocessor. We have implemented a prototype of the CNN coprocessor on an off-the-shelf PCI FPGA card with a single Xilinx Virtex5 LX330T FPGA and 4 DDR2 memory banks totaling 1GB. The coprocessor prototype can process at the rate of 3.4 billion multiply accumulates per second (GMACs) for CNN forward propagation, a speed that is 31x faster than a software implementation on a 2.2 GHz AMD Opteron processor. For a complete face recognition application with the CNN on the coprocessor and the rest of the image processing tasks on the host, the prototype is 6-10x faster, depending on the host-coprocessor bandwidth.",
"title": ""
}
] | [
{
"docid": "2578d87c9d30187566a46586acaa6d09",
"text": "Abstract Virtual reality (VR)-based therapy has emerged as a potentially useful means to treat post-traumatic stress disorder (PTSD), but randomized studies have been lacking for Service Members from Iraq or Afghanistan. This study documents a small, randomized, controlled trial of VR-graded exposure therapy (VR-GET) versus treatment as usual (TAU) for PTSD in Active Duty military personnel with combat-related PTSD. Success was gauged according to whether treatment resulted in a 30 percent or greater improvement in the PTSD symptom severity as assessed by the Clinician Administered PTSD Scale (CAPS) after 10 weeks of treatment. Seven of 10 participants improved by 30 percent or greater while in VR-GET, whereas only 1 of the 9 returning participants in TAU showed similar improvement. This is a clinically and statistically significant result (χ(2) = 6.74, p < 0.01, relative risk 3.2). Participants in VR-GET improved an average of 35 points on the CAPS, whereas those in TAU averaged a 9-point improvement (p < 0.05). The results are limited by small size, lack of blinding, a single therapist, and comparison to a relatively uncontrolled usual care condition, but did show VR-GET to be a safe and effective treatment for combat-related PTSD.",
"title": ""
},
{
"docid": "cf1e0d6a07674aa0b4c078550b252104",
"text": "Industry-practiced agile methods must become an integral part of a software engineering curriculum. It is essential that graduates of such programs seeking careers in industry understand and have positive attitudes toward agile principles. With this knowledge they can participate in agile teams and apply these methods with minimal additional training. However, learning these methods takes experience and practice, both of which are difficult to achieve in a direct manner within the constraints of an academic program. This paper presents a novel, immersive boot camp approach to learning agile software engineering concepts with LEGO® bricks as the medium. Students construct a physical product while inductively learning the basic principles of agile methods. The LEGO®-based approach allows for multiple iterations in an active learning environment. In each iteration, students inductively learn agile concepts through their experiences and mistakes. Subsequent iterations then ground these concepts, visibly leading to an effective process. We assessed this approach using a combination of quantitative and qualitative methods. Our assessment shows that the students demonstrated positive attitudes toward the boot-camp approach compared to lecture-based instruction. However, the agile boot camp did not have an effect on the students' recall on class tests when compared to their recall of concepts taught in lecture-based instruction.",
"title": ""
},
{
"docid": "f6a4150a95acce7ef28ec2739a87c00e",
"text": "There is an exciting natural match between Social Network Analysis (SNA) and the growth of social interaction through digital platforms and technologies, from online communities to corporate information systems. This convergence offers a combination of exciting domains, interesting research questions, appropriate analysis techniques and the availability of copious data. Agarwal et al. (2008) put it thus, \"Most transactions and conversations in these online groups leave a digital trace ... this research data makes visible social processes that are much more difficult to study in conventional organizational settings.\" The availability of such data, together with exciting domains and an appropriate analysis technique, form a golden opportunity for research, perhaps even a “21 Century Science” (Watts, 2007).",
"title": ""
},
{
"docid": "a537edc6579892249d157e2dc2f31077",
"text": "An efficient decoupling feeding network is proposed in this letter. It is composed of two directional couplers and two sections of transmission line for connection use. By connecting the two couplers, an indirect coupling with controlled magnitude and phase is introduced, which can be used to cancel out the direct coupling caused by space waves and surface waves between array elements. To demonstrate the method, a two-element microstrip antenna array with the proposed network has been designed, fabricated and measured. Both simulated and measured results have simultaneously proved that the proposed method presents excellent decoupling performance. The measured mutual coupling can be reduced to below -58 dB at center frequency. Meanwhile it has little influence on return loss and radiation patterns. The decoupling mechanism is simple and straightforward which can be easily applied in phased array antennas and MIMO systems.",
"title": ""
},
{
"docid": "a96d6649a2274a919fbeb5b2221d69c6",
"text": "In this paper, a novel center frequency and bandwidth tunable, cross-coupled waveguide resonator filter is presented. The coupling between adjacent resonators can be adjusted using non-resonating coupling resonators. The negative sign for the cross coupling, which is required to generate transmission zeros, is enforced by choosing an appropriate resonant frequency for the cross-coupling resonator. The coupling iris design itself is identical regardless of the sign of the coupling. The design equations for the novel coupling elements are given in this paper. A four pole filter breadboard with two transmission zeros (elliptic filter function) has been built up and measured at various bandwidth and center frequency settings. It operates at Ka-band frequencies and can be tuned to bandwidths from 36 to 72 MHz in the frequency range 19.7-20.2 GHz.",
"title": ""
},
{
"docid": "235e192cc8d0e7e020d5bde490ead034",
"text": "We propose a simple and general variant of the standard reparameterized gradient estimator for the variational evidence lower bound. Specifically, we remove a part of the total derivative with respect to the variational parameters that corresponds to the score function. Removing this term produces an unbiased gradient estimator whose variance approaches zero as the approximate posterior approaches the exact posterior. We analyze the behavior of this gradient estimator theoretically and empirically, and generalize it to more complex variational distributions such as mixtures and importance-weighted posteriors.",
"title": ""
},
{
"docid": "021c28607fc49aa9ec258a3cc2b1bf85",
"text": "Lymphatic vasculature is increasingly recognized as an important factor both in the regulation of normal tissue homeostasis and immune response and in many diseases, such as inflammation, cancer, obesity, and hypertension. In the last few years, in addition to the central role of vascular endothelial growth factor (VEGF)-C/VEGF receptor-3 signaling in lymphangiogenesis, significant new insights were obtained about Notch, transforming growth factor β/bone morphogenetic protein, Ras, mitogen-activated protein kinase, phosphatidylinositol 3 kinase, and Ca(2+)/calcineurin signaling pathways in the control of growth and remodeling of lymphatic vessels. An emerging picture of lymphangiogenic signaling is complex and in many ways distinct from the regulation of angiogenesis. This complexity provides new challenges, but also new opportunities for selective therapeutic targeting of lymphatic vasculature.",
"title": ""
},
{
"docid": "6478097f207482543c0db12b518be82b",
"text": "What is a good test case? One that reveals potential defects with good cost-effectiveness. We provide a generic model of faults and failures, formalize it, and present its various methodological usages for test case generation.",
"title": ""
},
{
"docid": "1242b663aa025f7041d4dda527f9de56",
"text": "Automatic forecasting of time series data is a challenging problem in many industries. Current forecast models adopted by businesses do not provide adequate means for including data representing external factors that may have a significant impact on the time series, such as weather, national events, local events, social media trends, promotions, etc. This paper introduces a novel neural network attention mechanism that naturally incorporates data from multiple external sources without the feature engineering needed to get other techniques to work. We demonstrate empirically that the proposed model achieves superior performance for predicting the demand of 20 commodities across 107 stores of one of America’s largest retailers when compared to other baseline models, including neural networks, linear models, certain kernel methods, Bayesian regression, and decision trees. Our method ultimately accounts for a 23.9% relative improvement as a result of the incorporation of external data sources, and provides an unprecedented level of descriptive ability for a neural network forecasting model.",
"title": ""
},
{
"docid": "0b48472cd68c53c48b7c895b0b8fd8af",
"text": "We study the problem of finding sentences that explain the relationship between a named entity and an ad-hoc query, which we refer to as entity support sentences. This is an important sub-problem of entity ranking which, to the best of our knowledge, has not been addressed before. In this paper we give the first formalization of the problem, how it can be evaluated, and present a full evaluation dataset. We propose several methods to rank these sentences, namely retrieval-based, entity-ranking based and position-based. We found that traditional bag-of-words models perform relatively well when there is a match between an entity and a query in a given sentence, but they fail to find a support sentence for a substantial portion of entities. This can be improved by incorporating small windows of context sentences and ranking them appropriately.",
"title": ""
},
{
"docid": "6db790d4d765b682fab6270c5930bead",
"text": "Geophysical applications of radar interferometry to measure changes in the Earth's surface have exploded in the early 1990s. This new geodetic technique calculates the interference pattern caused by the difference in phase between two images acquired by a spaceborne synthetic aperture radar at two distinct times. The resulting interferogram is a contour map of the change in distance between the ground and the radar instrument. These maps provide an unsurpassed spatial sampling density (---100 pixels km-2), a competitive precision (---1 cm), and a useful observation cadence (1 pass month-•). They record movements in the crust, perturbations in the atmosphere, dielectric modifications in the soil, and relief in the topography. They are also sensitive to technical effects, such as relative variations in the radar's trajectory or variations in its frequency standard. We describe how all these phenomena contribute to an interferogram. Then a practical summary explains the techniques for calculating and manipulating interferograms from various radar instruments, including the four satellites currently in orbit: ERS-1, ERS-2, JERS-1, and RADARSAT. The next chapter suggests some guidelines for interpreting an interferogram as a geophysical measurement: respecting the limits of the technique, assessing its uncertainty, recognizing artifacts, and discriminating different types of signal. We then review the geophysical applications published to date, most of which study deformation related to earthquakes, volcanoes, and glaciers using ERS-1 data. We also show examples of monitoring natural hazards and environmental alterations related to landslides, subsidence, and agriculture. In addition, we consider subtler geophysical signals such as postseismic relaxation, tidal loading of coastal areas, and interseismic strain accumulation. We conclude with our perspectives on the future of radar interferometry. The objective of the review is for the reader to develop the physical understanding necessary to calculate an interferogram and the geophysical intuition necessary to interpret it.",
"title": ""
},
{
"docid": "722e8a04db2e6fa48623a68ccf93d2af",
"text": "This study exhibits the application of the concept of matrices, probability and optimization in making an electronic Tic-Tac-Toe game using logic gates and exhibiting the concept of Boolean algebra. For a finite number of moves in every single game of Tic-Tac-Toe, the moves are recorded in a 3×3 matrix and the subsequent solution, or a winning combination, is presented from the data obtained by playing the electronic game. The solution is also displayed electronically using an LED. The circuit has been designed in a way to apply Boolean logic to analyze player's moves and thus, give a corresponding output from the electronic game and use it in matrices. The electronic Tic-Tac-Toe game is played randomly between 20 pairs of players. The impact of different opening moves is observed. Also, effect of different strategies, aggressive or defensive, on the outcome of the game is explored. The concept of Boolean algebra, logic gates, matrices and probability is applied in this game to make the foundation of the logic for this game. The most productive position for placing an `X' or `O' is found out using probabilities. Also the most effective blocking move is found out through which a player placing `O' can block `X' from winning. The skills help in understanding what strategy can be implemented to be on the winning side. The study is developed with an attempt to realistically model a tic-tac-toe game, and help in reflecting major tendencies. This knowledge helps in understanding what strategy to implement to be on the winning side.",
"title": ""
},
{
"docid": "dee37431ec24aae3fd8c9e43a4f9f93e",
"text": "We present a new feature representation method for scene text recognition problem, particularly focusing on improving scene character recognition. Many existing methods rely on Histogram of Oriented Gradient (HOG) or part-based models, which do not span the feature space well for characters in natural scene images, especially given large variation in fonts with cluttered backgrounds. In this work, we propose a discriminative feature pooling method that automatically learns the most informative sub-regions of each scene character within a multi-class classification framework, whereas each sub-region seamlessly integrates a set of low-level image features through integral images. The proposed feature representation is compact, computationally efficient, and able to effectively model distinctive spatial structures of each individual character class. Extensive experiments conducted on challenging datasets (Chars74K, ICDAR'03, ICDAR'11, SVT) show that our method significantly outperforms existing methods on scene character classification and scene text recognition tasks.",
"title": ""
},
{
"docid": "8321eecac6f8deb25ffd6c1b506c8ee3",
"text": "Propelled by a fast evolving landscape of techniques and datasets, data science is growing rapidly. Against this background, topological data analysis (TDA) has carved itself a niche for the analysis of datasets that present complex interactions and rich structures. Its distinctive feature, topology, allows TDA to detect, quantify and compare the mesoscopic structures of data, while also providing a language able to encode interactions beyond networks. Here we briefly present the TDA paradigm and some applications, in order to highlight its relevance to the data science community.",
"title": ""
},
{
"docid": "ab989f39a5dd2ba3c98c0ffddd5c85cb",
"text": "This paper proposes a revision of the multichannel concept as it has been applied in previous studies on multichannel commerce. Digitalization and technological innovations have blurred the line between physical and electronic channels. A structured literature review on multichannel consumer and firm behaviour is conducted to reveal the established view on multichannel phenomena. By providing empirical evidence on market offerings and consumer perceptions, we expose a significant mismatch between the dominant conceptualization of multichannel commerce applied in research and today’s market realities. This tension highlights the necessity for a changed view on multichannel commerce to study and understand phenomena in converging sales channels. Therefore, an extended conceptualization of multichannel commerce, named the multichannel continuum, is proposed. This is the first study that considers the broad complexity of integrated multichannel decisions. It aims at contributing to the literature on information systems and channel choice by developing a reference frame for studies on how technological advancements that allow the integration of different channels shape consumer and firm decision making in multichannel commerce. Accordingly, a brief research agenda contrasts established findings with unanswered questions, challenges and opportunities that arise in this more complex multichannel market environment.",
"title": ""
},
{
"docid": "4e8131e177330af2fb8999c799508b58",
"text": "Unmanned aerial vehicles (UAVs) such as multi-copters are expected to be used for inspection of aged infrastructure or for searching damaged buildings in the event of a disaster. However, in a confined space in such environments, UAVs suffer a high risk of falling as a result of contact with an obstacle. To ensure an aerial inspection in the confined space, we have proposed a UAV with a passive rotating spherical shell (PRSS UAV); The UAV and the spherical shell are connected by a 3DOF gimbal mechanism to allow them to rotate in all directions independently, so that the UAV can maintain its flight stability during a collision with an obstacle because only the shell is disturbed and rotated. To apply the PRSS UAV into real-world missions, we have to carefully choose many design parameters such as weight, structure, diameter, strength of the spherical shell, axis configuration of the gimbal, and model of the UAV. In this paper, we propose a design strategy for applying the concept of the PRSS mechanism, focusing on disaster response and infrastructure inspection. We also demonstrate the validity of this approach by the successful result of quantitative experiments and practical field tests.",
"title": ""
},
{
"docid": "8bcc51e311ab55fab6a4f60e6271716b",
"text": "An approach for the semi-automated recovery of traceability links between software documentation and source code is presented. The methodology is based on the application of information retrieval techniques to extract and analyze the semantic information from the source code and associated documentation. A semi-automatic process is defined based on the proposed methodology. The paper advocates the use of latent semantic indexing (LSI) as the supporting information retrieval technique. Two case studies using existing software are presented comparing this approach with others. The case studies show positive results for the proposed approach, especially considering the flexibility of the methods used.",
"title": ""
},
{
"docid": "d4f575851c5912cdac01efac514e1d56",
"text": "On line analytical processing (OLAP) is an essential element of decision-support systems. OLAP tools provide insights and understanding needed for improved decision making. However, the answers to OLAP queries can be biased and lead to perplexing and incorrect insights. In this paper, we propose, a system to detect, explain, and to resolve bias in decision-support queries. We give a simple definition of a biased query, which performs a set of independence tests on the data to detect bias. We propose a novel technique that gives explanations for bias, thus assisting an analyst in understanding what goes on. Additionally, we develop an automated method for rewriting a biased query into an unbiased query, which shows what the analyst intended to examine. In a thorough evaluation on several real datasets we show both the quality and the performance of our techniques, including the completely automatic discovery of the revolutionary insights from a famous 1973 discrimination case.",
"title": ""
},
{
"docid": "d8fc5a8bc075343b2e70a9b441ecf6e5",
"text": "With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app’s virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage.",
"title": ""
},
{
"docid": "c35db6f50a6ca89d45172faf0332946a",
"text": "Mobile commerce had been expected to become a major force of e-commerce in the 21st century. However, the rhetoric has far exceeded the reality so far. While academics and practitioners have presented many views about the lack of rapid growth of mobile commerce, we submit that the anticipated mobile commerce take-off hinges on the emergence of a few killer apps. After reviewing the recent history of technologies that have dramatically changed our way of life and work, we propose a set of criteria for identifying and evaluating killer apps. From this vantage point, we argue that mobile payment and banking are the most likely candidates for the killer apps that could bring the expectation of a world of ubiquitous mobile commerce to fruition. Challenges and opportunities associated with this argument are discussed.",
"title": ""
}
] | scidocsrr |
1cdba41323a51af6418bf6930a0ea71b | Integrated magnetic design of small planar transformers for LLC resonant converters | [
{
"docid": "bd2707625e9077837f26b53d9f9c4382",
"text": "Planar transformer parasitics are difficult to model due to the complex winding geometry and their nonlinear and multivariate nature. This paper provides parametric models for planar transformer parasitics based on finite element simulations of a variety of winding design parameters using the Design of Experiments (DoE) methodology. A rotatable Central Composite Design (CCD) is employed based on a full 24 factorial design to obtain equations for the leakage inductance, inter and intra-winding capacitances, resistance, output current, and output voltage. Using only 25 runs, the final results can be used to replace time-intensive finite element simulations for a wide range of planar transformer winding design options. Validation simulations were performed to confirm the accuracy of the model. Results are presented using a planar E18/4/10 core set and can be extended to a variety of core shapes and sizes.",
"title": ""
}
] | [
{
"docid": "247a6f200670e43980ac7762e52c86eb",
"text": "We propose a novel mechanism for Turing pattern formation that provides a possible explanation for the regular spacing of synaptic puncta along the ventral cord of C. elegans during development. The model consists of two interacting chemical species, where one is passively diffusing and the other is actively trafficked by molecular motors. We identify the former as the kinase CaMKII and the latter as the glutamate receptor GLR-1. We focus on a one-dimensional model in which the motor-driven chemical switches between forward and backward moving states with identical speeds. We use linear stability analysis to derive conditions on the associated nonlinear interaction functions for which a Turing instability can occur. We find that the dimensionless quantity γ = αd/v has to be sufficiently small for patterns to emerge, where α is the switching rate between motor states, v is the motor speed, and d is the passive diffusion coefficient. One consequence is that patterns emerge outside the parameter regime of fast switching where the model effectively reduces to a twocomponent reaction-diffusion system. Numerical simulations of the model using experimentally based parameter values generates patterns with a wavelength consistent with the synaptic spacing found in C. elegans. Finally, in the case of biased transport, we show that the system supports spatially periodic patterns in the presence of boundary forcing, analogous to flow distributed structures in reaction-diffusion-advection systems. Such forcing could represent the insertion of new motor-bound GLR-1 from the soma of ventral cord neurons.",
"title": ""
},
{
"docid": "171f84938f8788e293d763fccc8b3c27",
"text": "Google ads, black names and white names, racial discrimination, and click advertising",
"title": ""
},
{
"docid": "6a8ac2a2786371dcb043d92fa522b726",
"text": "We propose a modular reinforcement learning algorithm which decomposes a Markov decision process into independent modules. Each module is trained using Sarsa(λ). We introduce three algorithms for forming global policy from modules policies, and demonstrate our results using a 2D grid world.",
"title": ""
},
{
"docid": "fc77be5db198932d6cb34e334a4cdb4b",
"text": "This thesis investigates how data mining algorithms can be used to predict Bodily Injury Liability Insurance claim payments based on the characteristics of the insured customer’s vehicle. The algorithms are tested on real data provided by the organizer of the competition. The data present a number of challenges such as high dimensionality, heterogeneity and missing variables. The problem is addressed using a combination of regression, dimensionality reduction, and classification techniques. Questa tesi si propone di esaminare come alcune tecniche di data mining possano essere usate per predirre l’ammontare dei danni che un’ assicurazione dovrebbe risarcire alle persone lesionate a partire dalle caratteristiche del veicolo del cliente assicurato. I dati utilizzati sono reali e la loro analisi presenta diversi ostacoli dati dalle loro grandi dimensioni, dalla loro eterogeneitá e da alcune variabili mancanti. ll problema é stato affrontato utilizzando una combinazione di tecniche di regressione, di riduzione di dimensionalitá e di classificazione.",
"title": ""
},
{
"docid": "605c6b431b336ebe2ed07e7fcf529121",
"text": "Standard approaches to probabilistic reasoning require that one possesses an explicit model of the distribution in question. But, the empirical learning of models of probability distributions from partial observations is a problem for which efficient algorithms are generally not known. In this work we consider the use of bounded-degree fragments of the “sum-of-squares” logic as a probability logic. Prior work has shown that we can decide refutability for such fragments in polynomial-time. We propose to use such fragments to decide queries about whether a given probability distribution satisfies a given system of constraints and bounds on expected values. We show that in answering such queries, such constraints and bounds can be implicitly learned from partial observations in polynomial-time as well. It is known that this logic is capable of deriving many bounds that are useful in probabilistic analysis. We show here that it furthermore captures key polynomial-time fragments of resolution. Thus, these fragments are also quite expressive.",
"title": ""
},
{
"docid": "6e1e3209c127eca9c2e3de76d745d215",
"text": "Recently, in 2014, He and Wang proposed a robust and efficient multi-server authentication scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this paper, we first analyze He-Wang's scheme and show that their scheme is vulnerable to a known session-specific temporary information attack and impersonation attack. In addition, we show that their scheme does not provide strong user's anonymity. Furthermore, He-Wang's scheme cannot provide the user revocation facility when the smart card is lost/stolen or user's authentication parameter is revealed. Apart from these, He-Wang's scheme has some design flaws, such as wrong password login and its consequences, and wrong password update during password change phase. We then propose a new secure multi-server authentication protocol using biometric-based smart card and ECC with more security functionalities. Using the Burrows-Abadi-Needham logic, we show that our scheme provides secure authentication. In addition, we simulate our scheme for the formal security verification using the widely accepted and used automated validation of Internet security protocols and applications tool, and show that our scheme is secure against passive and active attacks. Our scheme provides high security along with low communication cost, computational cost, and variety of security features. As a result, our scheme is very suitable for battery-limited mobile devices as compared with He-Wang's scheme.",
"title": ""
},
{
"docid": "a138a545a3de355757928b58ba430f5d",
"text": "Learning analytics is a research topic that is gaining increasing popularity in recent time. It analyzes the learning data available in order to make aware or improvise the process itself and/or the outcome such as student performance. In this survey paper, we look at the recent research work that has been conducted around learning analytics, framework and integrated models, and application of various models and data mining techniques to identify students at risk and to predict student performance. Keywords— Learning Analytics, Student Performance, Student Retention, Academic analytics, Course success.",
"title": ""
},
{
"docid": "82df50c6c1c51b00d00d505dce80b7ab",
"text": "This volume brings together a collection of extended versions of selected papers from two workshops on ontology learning, knowledge acquisition and related topics that were organized in the context of the European Conference on Artificial Intelligence (ECAI) 2004 and the International Conference on Knowledge Engineering and Management (EKAW) 2004. The volume presents current research in ontology learning, addressing three perspectives: methodologies that have been proposed to automatically extract information from texts and to give a structured organization to such knowledge, including approaches based on machine learning techniques; evaluation methods for ontology learning, aiming at defining procedures and metrics for a quantitative evaluation of the ontology learning task; and finally application scenarios that make ontology learning a challenging area in the context of real applications such as bio-informatics. According to the three perspectives mentioned above, the book is divided into three sections, each including a selection of papers addressing respectively the methods, the applications and the evaluation of ontology learning approaches. However, all selected papers pay considerably attention to the evaluation perspective, as this was a central topic of the ECAI 2004 workshop out of which most of the papers in this volume originate.",
"title": ""
},
{
"docid": "8238edb8ec7b9b1dd076c61c619b5da3",
"text": "Two complexity parameters of EEG, i.e. approximate entropy (ApEn) and Kolmogorov complexity (Kc) are utilized to characterize the complexity and irregularity of EEG data under the different mental fatigue states. Then the kernel principal component analysis (KPCA) and Hidden Markov Model (HMM) are combined to differentiate two mental fatigue states. The KPCA algorithm is employed to extract nonlinear features from the complexity parameters of EEG and improve the generalization performance of HMM. The investigation suggests that ApEn and Kc can effectively describe the dynamic complexity of EEG, which is strongly correlated with mental fatigue. Both complexity parameters are significantly decreased (P < 0.005) as the mental fatigue level increases. These complexity parameters may be used as the indices of the mental fatigue level. Moreover, the joint KPCA–HMM method can effectively reduce the dimensionality of the feature vectors, accelerate the classification speed and achieve higher classification accuracy (84%) of mental fatigue. Hence KPCA–HMM could be a promising model for the estimation of mental fatigue. Crown Copyright 2010 Published by Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "0084faef0e08c4025ccb3f8fd50892f1",
"text": "Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver. Security of confidential information has always been a major issue from the past times to the present time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone other than the receiver. Therefore from time to time researchers have developed many techniques to fulfill secure transfer of data and steganography is one of them. In this paper we have proposed a new technique of image steganography i.e. Hash-LSB with RSA algorithm for providing more security to data as well as our data hiding method. The proposed technique uses a hash function to generate a pattern for hiding data bits into LSB of RGB pixel values of the cover image. This technique makes sure that the message has been encrypted before hiding it into a cover image. If in any case the cipher text got revealed from the cover image, the intermediate person other than receiver can't access the message as it is in encrypted form.",
"title": ""
},
{
"docid": "698cc50558811c7af44d40ba7dbdfe6f",
"text": "We show that the demand for news varies with the perceived affinity of the news organization to the consumer’s political preferences. In an experimental setting, conservatives and Republicans preferred to read news reports attributed to Fox News and to avoid news from CNN and NPR. Democrats and liberals exhibited exactly the opposite syndrome—dividing their attention equally between CNN and NPR, but avoiding Fox News. This pattern of selective exposure based on partisan affinity held not only for news coverage of controversial issues but also for relatively ‘‘soft’’ subjects such as crime and travel. The tendency to select news based on anticipated agreement was also strengthened among more politically engaged partisans. Overall, these results suggest that the further proliferation of new media and enhanced media choices may contribute to the further polarization of the news audience.",
"title": ""
},
{
"docid": "9187120909f27d1378f78659a6d57096",
"text": "Let us now come to our first attempts to define fractals in an intrinsic way and to deal with infinities and with their non-differentiability. We first consider the case of fractal curves drawn in a plane. The von Koch construction may be generalized in the complex plane by first giving ourselves a base (or “generator”) F1 made of p segments of length 1/q. The coordinates of the p points Pj of F1 are given, either in Cartesian or in polar coordinates (see Figs. 3.5 and 3.6) by:",
"title": ""
},
{
"docid": "6889f45db249d7054550ecb8df5ee822",
"text": "In this work a dynamic model of a planetary gear transmission is developed to study the sensitivity of the natural frequencies and vibration modes to system parameters in perturbed situation. Parameters under consideration include component masses ,moment of inertia , mesh and support stiff nesses .The model admits three planar degree of freedom for planets ,sun, ring, and carrier. Vibration modes are classified into translational, rotational and planet modes .Well-defined modal properties of tuned (cyclically symmetric) planetary gears for linear ,time-invariant case are used to calculate eigensensitivities and express them in simple formulae .These formulae provide efficient mean to determine the sensitivity to stiffness ,mass and inertia parameters in perturbed situation.",
"title": ""
},
{
"docid": "9c47b068f7645dc5464328e80be24019",
"text": "In this paper we propose a highly effective and scalable framework for recognizing logos in images. At the core of our approach lays a method for encoding and indexing the relative spatial layout of local features detected in the logo images. Based on the analysis of the local features and the composition of basic spatial structures, such as edges and triangles, we can derive a quantized representation of the regions in the logos and minimize the false positive detections. Furthermore, we propose a cascaded index for scalable multi-class recognition of logos.\n For the evaluation of our system, we have constructed and released a logo recognition benchmark which consists of manually labeled logo images, complemented with non-logo images, all posted on Flickr. The dataset consists of a training, validation, and test set with 32 logo-classes. We thoroughly evaluate our system with this benchmark and show that our approach effectively recognizes different logo classes with high precision.",
"title": ""
},
{
"docid": "693417e5608cf092842ab34ee8cce8d9",
"text": "Software as a Service has become a dominant IT news topic over the last few years. Especially in these current recession times, adopting SaaS solutions is increasingly becoming the more favorable alternative for customers rather than investing on brand new on-premise software or outsourcing. This fact has inevitably stimulated the birth of numerous SaaS vendors. Unfortunately, many small-to-medium vendors have emerged only to disappear again from the market. A lack of maturity in their pricing strategy often becomes part of the reason. This paper presents the ’Pricing Strategy Guideline Framework (PSGF)’ that assists SaaS vendors with a guideline to ensure that all the fundamental pricing elements are included in their pricing strategy. The PSGF describes five different layers that need to be taken to price a software: value creation, price structure, price and value communication, price policy, and price level. The PSGF can be of particularly great use for the startup vendors that tend to have less experience in pricing their SaaS solutions. Up until now, there have been no SaaS pricing frameworks available in the SaaS research area, such as the PSGF developed in this research. The PSGF is evaluated in a case study at a Dutch SaaS vendor in the Finance sector.",
"title": ""
},
{
"docid": "a771a452cb8869acc5c826ffed21d629",
"text": "Copyright © 2008 Massachusetts Medical Society. A 23-year-old woman presents with palpitations. Over the past 6 months, she has reported loose stools, a 10-lb (4.5-kg) weight loss despite a good appetite and food intake, and increased irritability. She appears to be anxious and has a pulse of 119 beats per minute and a blood pressure of 137/80 mm Hg. Her thyroid gland is diffusely and symmetrically enlarged to twice the normal size, and it is firm and nontender; a thyroid bruit is audible. She has an eyelid lag, but no proptosis or periorbital edema. The serum thyrotropin level is 0.02 μU per milliliter (normal range, 0.35 to 4.50) and the level of free thyroxine is 4.10 ng per deciliter (normal range, 0.89 to 1.76). How should she be further evaluated and treated?",
"title": ""
},
{
"docid": "b2a43491283732082c65f88c9b03016f",
"text": "BACKGROUND\nExpressing breast milk has become increasingly prevalent, particularly in some developed countries. Concurrently, breast pumps have evolved to be more sophisticated and aesthetically appealing, adapted for domestic use, and have become more readily available. In the past, expressed breast milk feeding was predominantly for those infants who were premature, small or unwell; however it has become increasingly common for healthy term infants. The aim of this paper is to systematically explore the literature related to breast milk expressing by women who have healthy term infants, including the prevalence of breast milk expressing, reported reasons for, methods of, and outcomes related to, expressing.\n\n\nMETHODS\nDatabases (Medline, CINAHL, JSTOR, ProQuest Central, PsycINFO, PubMed and the Cochrane library) were searched using the keywords milk expression, breast milk expression, breast milk pumping, prevalence, outcomes, statistics and data, with no limit on year of publication. Reference lists of identified papers were also examined. A hand-search was conducted at the Australian Breastfeeding Association Lactation Resource Centre. Only English language papers were included. All papers about expressing breast milk for healthy term infants were considered for inclusion, with a focus on the prevalence, methods, reasons for and outcomes of breast milk expression.\n\n\nRESULTS\nA total of twenty two papers were relevant to breast milk expression, but only seven papers reported the prevalence and/or outcomes of expressing amongst mothers of well term infants; all of the identified papers were published between 1999 and 2012. Many were descriptive rather than analytical and some were commentaries which included calls for more research, more dialogue and clearer definitions of breastfeeding. While some studies found an association between expressing and the success and duration of breastfeeding, others found the opposite. In some cases these inconsistencies were compounded by imprecise definitions of breastfeeding and breast milk feeding.\n\n\nCONCLUSIONS\nThere is limited evidence about the prevalence and outcomes of expressing breast milk amongst mothers of healthy term infants. The practice of expressing breast milk has increased along with the commercial availability of a range of infant feeding equipment. The reasons for expressing have become more complex while the outcomes, when they have been examined, are contradictory.",
"title": ""
},
{
"docid": "6b82421dc4b949134cf7ff52c64ed960",
"text": "The rise in popularity of mobile devices has led to a parallel growth in the size of the app store market, intriguing several research studies and commercial platforms on mining app stores. App store reviews are used to analyze different aspects of app development and evolution. However, app users’ feedback does not only exist on the app store. In fact, despite the large quantity of posts that are made daily on social media, the importance and value that these discussions provide remain mostly unused in the context of mobile app development. In this paper, we study how Twitter can provide complementary information to support mobile app development. By analyzing a total of 30,793 apps over a period of six weeks, we found strong correlations between the number of reviews and tweets for most apps. Moreover, through applying machine learning classifiers, topic modeling and subsequent crowd-sourcing, we successfully mined 22.4% additional feature requests and 12.89% additional bug reports from Twitter. We also found that 52.1% of all feature requests and bug reports were discussed on both tweets and reviews. In addition to finding common and unique information from Twitter and the app store, sentiment and content analysis were also performed for 70 randomly selected apps. From this, we found that tweets provided more critical and objective views on apps than reviews from the app store. These results show that app store review mining is indeed not enough; other information sources ultimately provide added value and information for app developers.",
"title": ""
},
{
"docid": "77cfb72acbc2f077c3d9b909b0a79e76",
"text": "In this paper, we analyze two general-purpose encoding types, trees and graphs systematically, focusing on trends over increasingly complex problems. Tree and graph encodings are similar in application but offer distinct advantages and disadvantages in genetic programming. We describe two implementations and discuss their evolvability. We then compare performance using symbolic regression on hundreds of random nonlinear target functions of both 1-dimensional and 8-dimensional cases. Results show the graph encoding has less bias for bloating solutions but is slower to converge and deleterious crossovers are more frequent. The graph encoding however is found to have computational benefits, suggesting it to be an advantageous trade-off between regression performance and computational effort.",
"title": ""
},
{
"docid": "9d461f1dbe42e2030efb3eb91603331f",
"text": "We developed a cross-lingual, question-answering (CLQA) system for Hindi and English. It accepts questions in English, finds candidate answers in Hindi newspapers, and translates the answer candidates into English along with the context surrounding each answer. The system was developed as part of the surprise language exercise (SLE) within the TIDES program.",
"title": ""
}
] | scidocsrr |
0e9e8885831e8c9480b191b80fb5a502 | Image Denoising by Sparse 3-D Transform-Domain Collaborative Filtering | [
{
"docid": "7db9cf29dd676fa3df5a2e0e95842b6e",
"text": "We present a novel approach to still image denoising based on e ective filtering in 3D transform domain by combining sliding-window transform processing with block-matching. We process blocks within the image in a sliding manner and utilize the block-matching concept by searching for blocks which are similar to the currently processed one. The matched blocks are stacked together to form a 3D array and due to the similarity between them, the data in the array exhibit high level of correlation. We exploit this correlation by applying a 3D decorrelating unitary transform and e ectively attenuate the noise by shrinkage of the transform coe cients. The subsequent inverse 3D transform yields estimates of all matched blocks. After repeating this procedure for all image blocks in sliding manner, the final estimate is computed as weighed average of all overlapping blockestimates. A fast and e cient algorithm implementing the proposed approach is developed. The experimental results show that the proposed method delivers state-of-art denoising performance, both in terms of objective criteria and visual quality.",
"title": ""
}
] | [
{
"docid": "42fb8651df19c1295cedd3d426089802",
"text": "Recent research has shown that mindfulness-based cognitive therapy (MBCT) could be a useful alternative approach to the treatment of health anxiety and deserves further investigation. In this paper, we outline the rationale for using MBCT in the treatment of this condition, namely its hypothesised impact on the underlying mechanisms which maintain health anxiety, such as rumination and avoidance, hypervigilance to body sensations and misinterpretation of such sensations. We also describe some of the adaptations which were made to the MBCT protocol for recurrent depression in this trial and discuss the rationale for these adaptations. We use a case example from the trial to illustrate how MBCT was implemented and outline the experience of one of the participants who took part in an 8-week MBCT course. Finally, we detail some of the more general experiences of participants and discuss the advantages and possible limitations of this approach for this population, as well as considering what might be useful avenues to explore in future research.",
"title": ""
},
{
"docid": "7a1f625799740f4f6a9f162fd200648d",
"text": "We present the first work on antecedent selection for bridging resolution without restrictions on anaphor or relation types. Our model integrates global constraints on top of a rich local feature set in the framework of Markov logic networks. The global model improves over the local one and both strongly outperform a reimplementation of prior work.",
"title": ""
},
{
"docid": "4f8842e5539058a9d69865a1834cd5b2",
"text": "In the past, running an IT organization as a support function—a function separate and distinct from the business—was a common practice. Now, most IT infrastructure investments and new IT applications span business lines and functions. Some organizations even integrate partners and customers into their internal processes. Therefore, CEOs and CIOs increasingly feel the need for a tighter relationship between IT and the business. But how should they deal with this strategic challenge? The key questions are: • Is there a framework to guide business and technology management leaders in their efforts to change information technology’s role within the organization and to close the gap between IT and the business that IT is supposed to support and drive? • What are the responsibilities at the board and management levels? • Is this a governance issue?",
"title": ""
},
{
"docid": "cf4566189096b667a448801334bc806a",
"text": "Vedic Mathematics is the ancient methodology of Indian mathematics which has a unique computational technique for calculations based on 16 Sutras (Formulae). Novel Binary divider architecture for high speed VLSI application using such ancient methodology is presented in this paper. Propagation delay and dynamic power consumption of a divider circuitry were minimized significantly by removing unnecessary recursion through Vedic division methodology. The functionality of these circuits was checked and performance parameters like propagation delay and dynamic power consumption were calculated by Xilinx ISE using 9Onm CMOS technology. The propagation delay of the resulting 8-bit binary dividend by an 4-bit divisor circuitry was only ~19.9ns and consumed ~34mW power for a LUT Utilization of 23/1536. By combining Boolean logic with ancient Vedic mathematics, substantial amount of iteration were eliminated that resulted in ~46% reduction in delay and ~27% reduction in power compared with the mostly used (Repetitive subtraction method) architecture.",
"title": ""
},
{
"docid": "63163c08e79e3eb35cac5abe21cc6003",
"text": "Neural networks can be compressed to reduce memory and computational requirements, or to increase accuracy by facilitating the use of a larger base architecture. In this paper we focus on pruning individual neurons, which can simultaneously trim model size, FLOPs, and run-time memory. To improve upon the performance of existing compression algorithms we utilize the information bottleneck principle instantiated via a tractable variational bound. Minimization of this information theoretic bound reduces the redundancy between adjacent layers by aggregating useful information into a subset of neurons that can be preserved. In contrast, the activations of disposable neurons are shut off via an attractive form of sparse regularization that emerges naturally from this framework, providing tangible advantages over traditional sparsity penalties without contributing additional tuning parameters to the energy landscape. We demonstrate state-of-theart compression rates across an array of datasets and network architectures.",
"title": ""
},
{
"docid": "df09cf0e7c323b6deda69d64f3af507a",
"text": "We propose a new multistage procedure for a real-time brain-machine/computer interface (BCI). The developed system allows a BCI user to navigate a small car (or any other object) on the computer screen in real time, in any of the four directions, and to stop it if necessary. Extensive experiments with five young healthy subjects confirmed the high performance of the proposed online BCI system. The modular structure, high speed, and the optimal frequency band characteristics of the BCI platform are features which allow an extension to a substantially higher number of commands in the near future.",
"title": ""
},
{
"docid": "bc25cdd67a196b0d4947069d6d3864b3",
"text": "Data integration is a key issue for any integrated set of software tools where each tool has its own data structures (at least on the conceptual level), but where we have many interdependencies between these private data structures. A typical CASE environment, for instance, offers tools for the manipulation of requirements and software design documents and provides more or less sophisticated assistance for keeping these documents in a consistent state. Up to now almost all of these data consistency observing or preserving integration tools are hand-crafted due to the lack of generic implementation frameworks and the absence of adequate specification formalisms. Triple graph grammars, a proper superset of pair grammars, are intended to fill this gap and to support the specification of interdependencies between graph-like data structures on a very high level. Furthermore, they form a solid fundament of a new machinery for the production of batch-oriented as well as incrementally working data integration tools.",
"title": ""
},
{
"docid": "f7c508743dd08264f86c2eb159f735c2",
"text": "Non-negative matrix factorization (NMF) approximates a non-negative matrix X by a product of two non-negative low-rank factor matrices W and H . NMF and its extensions minimize either the Kullback-Leibler divergence or the Euclidean distance between X and WH to model the Poisson noise or the Gaussian noise. In practice, when the noise distribution is heavy tailed, they cannot perform well. This paper presents Manhattan NMF (MahNMF) which minimizes the Manhattan distance between X and WH for modeling the heavy tailed Laplacian noise. Similar to sparse and low-rank matrix decompositions, e.g. robust principal component analysis (RPCA) and GoDec, MahNMF robustly estimates the low-rank part and the sparse part of a non-negative matrix and thus performs effectively when data are contaminated by outliers. We extend MahNMF for various practical applications by developing box-constrained MahNMF, manifold regularized MahNMF, group sparse MahNMF, elastic net inducing MahNMF, and symmetric MahNMF. The major contribution of this paper lies in two fast optimization algorithms for MahNMF and its extensions: the rank-one residual iteration (RRI) method and Nesterov’s smoothing method. In particular, by approximating the residual matrix by the outer product of one row of W and one row ofH in MahNMF, we develop an RRI method to iteratively update each variable of W and H in a closed form solution. Although RRI is efficient for small scale MahNMF and some of its extensions, it is neither scalable to large scale matrices nor flexible enough to optimize all MahNMF extensions. Since the objective functions of MahNMF and its extensions are neither convex nor smooth, we apply Nesterov’s smoothing c ©2012 N. Guan, D. Tao, Z. Luo, and J. Shawe-Taylor. N. Guan, D. Tao, Z. Luo, and J. Shawe-Taylor method to recursively optimize one factor matrix with another matrix fixed. By setting the smoothing parameter inversely proportional to the iteration number, we improve the approximation accuracy iteratively for both MahNMF and its extensions. We conduct experiments on both synthetic and real-world datasets, such as face images, natural scene images, surveillance videos and multi-model datasets, to show the efficiency of the proposed Nesterov’s smoothing method-based algorithm for solving MahNMF and its variants, and the effectiveness of MahNMF and its variants, by comparing them with traditional NMF, RPCA, and GoDec.",
"title": ""
},
{
"docid": "1f45397efcbe3db84f45a1498267593c",
"text": "Multiobjective evolutionary algorithm based on decomposition (MOEA/D) decomposes a multiobjective optimization problem into a set of scalar optimization subproblems and optimizes them in a collaborative manner. Subproblems and solutions are two sets of agents that naturally exist in MOEA/D. The selection of promising solutions for subproblems can be regarded as a matching between subproblems and solutions. Stable matching, proposed in economics, can effectively resolve conflicts of interests among selfish agents in the market. In this paper, we advocate the use of a simple and effective stable matching (STM) model to coordinate the selection process in MOEA/D. In this model, subproblem agents can express their preferences over the solution agents, and vice versa. The stable outcome produced by the STM model matches each subproblem with one single solution, and it tradeoffs convergence and diversity of the evolutionary search. Comprehensive experiments have shown the effectiveness and competitiveness of our MOEA/D algorithm with the STM model. We have also demonstrated that user-preference information can be readily used in our proposed algorithm to find a region that decision makers are interested in.",
"title": ""
},
{
"docid": "3e6c2dd27f6e30b8b04576f616027547",
"text": "In the proposed work, classification of diseased and undiseased arecanut have been determined using texture features of Local Binary Pattern (LBP), Haar Wavelets, GLCM and Gabor. This work has been carried out in two stages. In the first stage, LBP have been applied on each color component of HSI and YCbCr color models and histogram of LBP is generated. The statistical method correlation is used to measure the distance between histogram of training",
"title": ""
},
{
"docid": "823eea7a751e7aac92d3eafae0b7f754",
"text": "Two studies considered the interplay between user-perceived usability (i.e., pragmatic attributes), hedonic attributes (e.g., stimulation, identification), goodness (i.e., satisfaction), and beauty of 4 different MP3-player skins. As long as beauty and goodness stress the subjective valuation of a product, both were related to each other. However, the nature of goodness and beauty was found to differ. Goodness depended on both perceived usability and hedonic attributes. Especially after using the skins, perceived usability became a strong determinant of goodness. In contrast, beauty largely depended on identification; a hedonic attribute group, which captures the product’s ability to communicate important personal values to relevant others. Perceived usability as well as goodness was affected by experience (i.e., actual usability, usability problems), whereas hedonic attributes and beauty remained stable over time. All in all, the nature of beauty is rather self-oriented than goal-oriented, whereas goodness relates to both. HUMAN-COMPUTER INTERACTION, 2004, Volume 19, pp. 319–349 Copyright © 2004, Lawrence Erlbaum Associates, Inc. Marc Hassenzahl is a psychologist with an interest in applying research on social cognition, judgment, and choice to human–computer interaction; he is a researcher and lecturer in the Institute of Psychology, Social Psychology and Decision-Making, of the Darmstadt University of Technology in Germany.",
"title": ""
},
{
"docid": "07651fb0ad3ba0b8ffbb2c00762b591b",
"text": "Childhood peroxisomal disorders and leukodystrophies are devastating diseases characterized by dysfunctional lipid metabolism. Plasmalogens (ether glycerophosphoethanolamine lipids) are decreased in these genetic disorders. The biosynthesis of plasmalogens is initiated in peroxisomes but completed in the endoplasmic reticulum. We therefore undertook a study to evaluate the ability of a 3-substituted, 1-alkyl, 2-acyl glyceryl ether lipid (PPI-1011) to replace plasmalogens in rhizomelic chrondrodysplasia punctata type 1 (RCDP1) and rhizomelic chrondrodysplasia punctata type 2 (RCDP2) lymphocytes which possess peroxisomal mutations culminating in deficient plasmalogen synthesis. We also examined plasmalogen synthesis in Pelizaeus-Merzbacher disease (PMD) lymphocytes which possess a proteolipid protein-1 (PLP1) missense mutation that results in abnormal PLP1 folding and it's accumulation in the endoplasmic reticulum (ER), the cellular site of the last steps in plasmalogen synthesis. In vivo incorporation of plasmalogen precursor into tissue plasmalogens was also evaluated in the Pex7 mouse model of plasmalogen deficiency. In both RCDP1 and RCDP2 lymphocytes, PPI-1011 repleted the target ethanolamine plasmalogen (PlsEtn16:0/22:6) in a concentration dependent manner. In addition, deacylation/reacylation reactions resulted in repletion of PlsEtn 16:0/20:4 in both RCDP1 and RCDP2 lymphocytes, repletion of PlsEtn 16:0/18:1 and PlsEtn 16:0/18:2 in RCDP2 lymphocytes, and partial repletion of PlsEtn 16:0/18:1 and PlsEtn 16:0/18:2 in RCDP1 lymphocytes. In the Pex7 mouse, oral dosing of labeled PPI-1011 demonstrated repletion of tissue levels of the target plasmalogen PlsEtn 16:0/22:6 with phospholipid remodeling also resulting in significant repletion of PlsEtn 16:0/20:4 and PlsEtn 16:0/18:1. Metabolic conversion of PPI-1011 to the target plasmalogen was most active in the liver. Our data demonstrate that PPI-1011 is activated (removal of 3-substitution) and converted to PlsEtn in vitro in both RCDP1 and RCDP2 lymphocytes and in vivo in the Pex7 mouse model of RCPD1 effectively bypassing the peroxisomal dysfunction present in these disorders. While PPI-1011 was shown to replete PlsEtns 16:0/x, ether lipid precursors of PlsEtn 18:0/x and PlsEtn 18:1/x may also be needed to achieve optimal clinical benefits of plasmalogen replacement in these complex patient populations. In contrast, only limited plasmalogen replacement was observed in PMD lymphocytes suggesting that the effects of protein misfolding and accumulation in the ER negatively affect processing of plasmalogen precursors in this cellular compartment.",
"title": ""
},
{
"docid": "3cf81ab6772fdfb6471f6e711d8c5b90",
"text": "Data center networks usually employ the scale-out model to provide high bisection bandwidth for applications. A large amount of data is required to be transferred frequently between servers across multiple paths. However, traditional load balancing algorithms like equal-cost multi-path routing are not suitable for rapidly varying traffic in data center networks. Based on the special data center topologies and traffic characteristics, researchers have recently proposed some novel traffic scheduling mechanisms to balance traffic. In this paper, we present a comprehensive survey of recent solutions for load balancing in data center networks. First, recently proposed data center network topologies and the studies of traffic characteristics are introduced. Second, the definition of the load-balancing problem is described. Third, we analyze the differences between data center load balancing mechanisms and traditional Internet traffic scheduling. Then, we present an in-depth overview of recent data center load balancing mechanisms. Finally, we analyze the performance of these solutions and discuss future research directions.",
"title": ""
},
{
"docid": "a23949a678e49a7e1495d98aae3adef2",
"text": "The continued increase in the usage of Small Scale Digital Devices (SSDDs) to browse the web has made mobile devices a rich potential for digital evidence. Issues may arise when suspects attempt to hide their browsing habits using applications like Orweb - which intends to anonymize network traffic as well as ensure that no browsing history is saved on the device. In this work, the researchers conducted experiments to examine if digital evidence could be reconstructed when the Orweb browser is used as a tool to hide web browsing activates on an Android smartphone. Examinations were performed on both a non-rooted and a rooted Samsung Galaxy S2 smartphone running Android 2.3.3. The results show that without rooting the device, no private web browsing traces through Orweb were found. However, after rooting the device, the researchers were able to locate Orweb browser history, and important corroborative digital evidence was found.",
"title": ""
},
{
"docid": "892bad91cfae82dfe3d06d2f93edfe8b",
"text": "Fine-grained image recognition is a challenging computer vision problem, due to the small inter-class variations caused by highly similar subordinate categories, and the large intra-class variations in poses, scales and rotations. In this paper, we prove that selecting useful deep descriptors contributes well to fine-grained image recognition. Specifically, a novel Mask-CNN model without the fully connected layers is proposed. Based on the part annotations, the proposed model consists of a fully convolutional network to both locate the discriminative parts ( e.g. , head and torso), and more importantly generate weighted object/part masks for selecting useful and meaningful convolutional descriptors. After that, a three-stream Mask-CNN model is built for aggregating the selected objectand part-level descriptors simultaneously. Thanks to discarding the parameter redundant fully connected layers, our Mask-CNN has a small feature dimensionality and efficient inference speed by comparing with other fine-grained approaches. Furthermore, we obtain a new state-of-the-art accuracy on two challenging fine-grained bird species categorization datasets, which validates the effectiveness of both the descriptor selection scheme and the proposed",
"title": ""
},
{
"docid": "ee3d837390e1f53181cfb393a0af3cc6",
"text": "The telecommunications industry is highly competitive, which means that the mobile providers need a business intelligence model that can be used to achieve an optimal level of churners, as well as a minimal level of cost in marketing activities. Machine learning applications can be used to provide guidance on marketing strategies. Furthermore, data mining techniques can be used in the process of customer segmentation. The purpose of this paper is to provide a detailed analysis of the C.5 algorithm, within naive Bayesian modelling for the task of segmenting telecommunication customers behavioural profiling according to their billing and socio-demographic aspects. Results have been experimentally implemented.",
"title": ""
},
{
"docid": "7fd5f3461742db10503dd5e3d79fe3ed",
"text": "There is recent popularity in applying machine learning to medical imaging, notably deep learning, which has achieved state-of-the-art performance in image analysis and processing. The rapid adoption of deep learning may be attributed to the availability of machine learning frameworks and libraries to simplify their use. In this tutorial, we provide a high-level overview of how to build a deep neural network for medical image classification, and provide code that can help those new to the field begin their informatics projects.",
"title": ""
},
{
"docid": "017d78799e6054efb62c7f4cd0660425",
"text": "Moving away from simple foot designs of current quadruped robots towards a more bio-inspired approach, a novel foot design was implemented on the quadruped robot Oncilla. These feet mimic soft paw-pads of dogs and cats with high traction and soft underlying tissue. Consisting of a granular medium enclosed in a flexible membrane, they can be set to different pressure/vacuum conditions. Tests of general properties such as friction force, damping and deformation were completed by proof of concept tests on the robot. These included flat ground locomotion as well as ascending a slope with different inclination. Comparison tests with the previous feet were performed as well, showing that the new feet have a high friction and strong damping properties. Additionally, the speed of flat ground locomotion is comparable to the maximum speed of the robot with the previous feet while retaining the desired trotting gait. These are promising aspects for legged locomotion. The jamming of granular media previously has been used to create a universal gripper which in the future also opens up opportunities to use the feet both in locomotion and simple object manipulation (although the manipulation is not tested here).",
"title": ""
},
{
"docid": "84c2b96916ce68245cf81bdf8f4b435c",
"text": "INTRODUCTION\nComplete and accurate coding of injury causes is essential to the understanding of injury etiology and to the development and evaluation of injury-prevention strategies. While civilian hospitals use ICD-9-CM external cause-of-injury codes, military hospitals use codes derived from the NATO Standardization Agreement (STANAG) 2050.\n\n\nDISCUSSION\nThe STANAG uses two separate variables to code injury cause. The Trauma code uses a single digit with 10 possible values to identify the general class of injury as battle injury, intentionally inflicted nonbattle injury, or unintentional injury. The Injury code is used to identify cause or activity at the time of the injury. For a subset of the Injury codes, the last digit is modified to indicate place of occurrence. This simple system contains fewer than 300 basic codes, including many that are specific to battle- and sports-related injuries not coded well by either the ICD-9-CM or the draft ICD-10-CM. However, while falls, poisonings, and injuries due to machinery and tools are common causes of injury hospitalizations in the military, few STANAG codes correspond to these events. Intentional injuries in general and sexual assaults in particular are also not well represented in the STANAG. Because the STANAG does not map directly to the ICD-9-CM system, quantitative comparisons between military and civilian data are difficult.\n\n\nCONCLUSIONS\nThe ICD-10-CM, which will be implemented in the United States sometime after 2001, expands considerably on its predecessor, ICD-9-CM, and provides more specificity and detail than the STANAG. With slight modification, it might become a suitable replacement for the STANAG.",
"title": ""
},
{
"docid": "0932bc0e6eafeeb8b64d7b41ca820ac8",
"text": "A novel, non-invasive, imaging methodology, based on the photoacoustic effect, is introduced in the context of artwork diagnostics with emphasis on the uncovering of hidden features such as underdrawings or original sketch lines in paintings. Photoacoustic microscopy, a rapidly growing imaging method widely employed in biomedical research, exploits the ultrasonic acoustic waves, generated by light from a pulsed or intensity modulated source interacting with a medium, to map the spatial distribution of absorbing components. Having over three orders of magnitude higher transmission through strongly scattering media, compared to light in the visible and near infrared, the photoacoustic signal offers substantially improved detection sensitivity and achieves excellent optical absorption contrast at high spatial resolution. Photoacoustic images, collected from miniature oil paintings on canvas, illuminated with a nanosecond pulsed Nd:YAG laser at 1064 nm on their reverse side, reveal clearly the presence of pencil sketch lines coated over by several paint layers, exceeding 0.5 mm in thickness. By adjusting the detection bandwidth of the optically induced ultrasonic waves, photoacoustic imaging can be used for looking into a broad variety of artefacts having diverse optical properties and geometrical profiles, such as manuscripts, glass objects, plastic modern art or even stone sculpture.",
"title": ""
}
] | scidocsrr |
15d24196e8dfe7978936a2f376c082ab | A variational-difference numerical method for designing progressive-addition lenses | [
{
"docid": "c31ab5f94e64c849f88465e1be60939a",
"text": "Progressive addition lenses are a relatively new approach t o compensate for defects of the human visual system. While traditional spectacles use rotationally symmetric l enses, progressive lenses require the specification of free form surfaces. This poses difficult problems for the optimal design and its visual evaluation. This paper presents two new techniques for the visualizatio n of ptical systems and the optimization of progressive lenses. Both are based on the same wavefront tracingapproach to accurately evaluate the refraction properties of complex optical systems. We use the results of wavefront tracing for continuously refocusing the eye during rendering. Together with distribution ray tracing, this yields high-quality images that accurately simulate the visual quality of an optical system. The design of progressive lenses is difficult due to t he trade-off between the desired properties of the lens and unavoidable optical errors, such as astigmatism an d distortions. We use wavefront tracing to derive an accurate error functional describing the desired properti s and the optical error across a lens. Minimizing this error yields optimal free-form lens surfaces. While the basic approach is much more general, in this paper, w describe its application to the particular problem of designing and evaluating progressive lenses and demonst rate the benefits of the new approach with several example images.",
"title": ""
}
] | [
{
"docid": "42883fb5e43959150ab6b3e64727b9e1",
"text": "For goal-directed arm movements, the nervous system generates a sequence of motor commands that bring the arm toward the target. Control of the octopus arm is especially complex because the arm can be moved in any direction, with a virtually infinite number of degrees of freedom. Here we show that arm extensions can be evoked mechanically or electrically in arms whose connection with the brain has been severed. These extensions show kinematic features that are almost identical to normal behavior, suggesting that the basic motor program for voluntary movement is embedded within the neural circuitry of the arm itself. Such peripheral motor programs represent considerable simplification in the motor control of this highly redundant appendage.",
"title": ""
},
{
"docid": "d68147bf8637543adf3053689de740c3",
"text": "In this paper, we do a research on the keyword extraction method of news articles. We build a candidate keywords graph model based on the basic idea of TextRank, use Word2Vec to calculate the similarity between words as transition probability of nodes' weight, calculate the word score by iterative method and pick the top N of the candidate keywords as the final results. Experimental results show that the weighted TextRank algorithm with correlation of words can improve performance of keyword extraction generally.",
"title": ""
},
{
"docid": "0adfab662c5179d15f6c231aac094ec8",
"text": "The explosion of the Internet provides a variety possibilities for communication, finding information and many other activities, turning into an essential tool in our modern everyday life. However, its huge expansion globally has created some serious safety issues, which require a special approach. One of these issues and perhaps the most important one concerns the safety of children on the Internet, as they are more exposed to dangers and threats in comparison with adults. In order to design effective measures against these threats and dangers deep understanding of minors' activities on the Internet, along with their motivation, is a first necessary step. It is shown in this report that minors' Internet activity tends heavily, and in an increasing manner, towards Online Social Networks (OSN). Thus, Internet filtering techniques designed and applied so far for child online protection need to be reconsidered and redesigned in a smarter way such as data analytics, advanced content analysis and data mining techniques are incorporated. OSN fake account identification, sexual content detection and flagging of multiple OSN accounts of the same person are examples that require such sophisticated techniques. This study deals with a literature review concerning the Internet activity and motivation of use by minors and presents in a coherent manner the identified risks and threats that children using the web and online social networks are exposed to. It also presents a systematic process for designing and developing modern and state of the art techniques to prevent minors' exposure to those risks and dangers.",
"title": ""
},
{
"docid": "450a0ffcd35400f586e766d68b75cc98",
"text": "While there has been a success in 2D human pose estimation with convolutional neural networks (CNNs), 3D human pose estimation has not been thoroughly studied. In this paper, we tackle the 3D human pose estimation task with end-to-end learning using CNNs. Relative 3D positions between one joint and the other joints are learned via CNNs. The proposed method improves the performance of CNN with two novel ideas. First, we added 2D pose information to estimate a 3D pose from an image by concatenating 2D pose estimation result with the features from an image. Second, we have found that more accurate 3D poses are obtained by combining information on relative positions with respect to multiple joints, instead of just one root joint. Experimental results show that the proposed method achieves comparable performance to the state-of-the-art methods on Human 3.6m dataset.",
"title": ""
},
{
"docid": "3193c9372c9cdc581133976035ba9694",
"text": "Spoken natural language often contains ambiguities that must be addressed by a spoken dialogue system. In this work, we present the internal semantic representation and resolution strategy of a dialogue system designed to understand ambiguous input. These mechanisms are domain independent; almost all task-specific knowledge is represented in parameterizable data structures. The system derives candidate descriptions of what the user said from raw input data, context-tracking and scoring. These candidates are chosen on the basis of a pragmatic analysis of responses elicited by an extensive implicit and explicit confirmation dialogue strategy, combined with specific error correction capabilities available to the user. This new ambiguity resolution strategy greatly improves dialogue interaction, eliminating about half of the errors in dialogues from a travel reservation task.",
"title": ""
},
{
"docid": "1aef9a6523de585a7f71440d71d5bab8",
"text": "BACKGROUND\nDiabetes self-management education is a cornerstone of successful diabetes management. Various methods have been used to reach the increasing numbers of patients with diabetes, including Internet-based education. The purpose of this article is to review various delivery methods of Internet diabetes education that have been evaluated, as well as their effectiveness in improving diabetes-related outcomes.\n\n\nMATERIALS AND METHODS\nLiterature was identified in the Cumulative Index to Nursing and Allied Health Literature (CINAHL), PubMed, Medline, EBSCO, the Cochrane Library, and the Web of Science databases through searches using the following terms: \"type 2 diabetes AND internet/web based AND education\" and \"type 2 diabetes AND diabetes self-management education (DSME) AND web-based/internet OR technology assisted education.\" The search was limited to English language articles published in the last 10 years. The search yielded 111 articles; of these, 14 met criteria for inclusion in this review. Nine studies were randomized controlled trials, and study lengths varied from 2 weeks to 24 months, for a total of 2,802 participants.\n\n\nRESULTS\nDSME delivered via the Internet is effective at improving measures of glycemic control and diabetes knowledge compared with usual care. In addition, results demonstrate that improved eating habits and increased attendance at clinic appointments occur after the online DSME, although engagement and usage of Internet materials waned over time. Interventions that included an element of interaction with healthcare providers were seen as attractive to participants.\n\n\nCONCLUSIONS\nInternet-delivered diabetes education has the added benefit of easier access for many individuals, and patients can self-pace themselves through materials. More research on the cost-benefits of Internet diabetes education and best methods to maintain patient engagement are needed, along with more studies assessing the long-term impact of Internet-delivered DSME.",
"title": ""
},
{
"docid": "ea9f43aaab4383369680c85a040cedcf",
"text": "Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenarios. The Correlated Attack Modeling Language (CAML) uses a modular approach, where a module represents an inference step and modules can be linked together to detect multistep scenarios. CAML is accompanied by a library of predicates, which functions as a vocabulary to describe the properties of system states and events. The concept of attack patterns is introduced to facilitate reuse of generic modules in the attack modeling process. CAML is used in a prototype implementation of a scenario recognition engine that consumes first-level security alerts in real time and produces reports that identify multistep attack scenarios discovered in the alert stream.",
"title": ""
},
{
"docid": "4107fe17e6834f96a954e13cbb920f78",
"text": "Non-orthogonal multiple access (NOMA) can support more users than OMA techniques using the same wireless resources, which is expected to support massive connectivity for Internet of Things in 5G. Furthermore, in order to reduce the transmission latency and signaling overhead, grant-free transmission is highly expected in the uplink NOMA systems, where user activity has to be detected. In this letter, by exploiting the temporal correlation of active user sets, we propose a dynamic compressive sensing (DCS)-based multi-user detection (MUD) to realize both user activity and data detection in several continuous time slots. In particular, as the temporal correlation of the active user sets between adjacent time slots exists, we can use the estimated active user set in the current time slot as the prior information to estimate the active user set in the next time slot. Simulation results show that the proposed DCS-based MUD can achieve much better performance than that of the conventional CS-based MUD in NOMA systems.",
"title": ""
},
{
"docid": "8707d04413b656a965a03ac6ff846037",
"text": "In today's scenario, cyber security is one of the major concerns in network security and malware pose a serious threat to cyber security. The foremost step to guard the cyber system is to have an in-depth knowledge of the existing malware, various types of malware, methods of detecting and bypassing the adverse effects of malware. In this work, machine learning approach to the fore-going static and dynamic analysis techniques is investigated and reported to discuss the most recent trends in cyber security. The study captures a wide variety of samples from various online sources. The peculiar details about the malware such as file details, signatures, and hosts involved, affected files, registry keys, mutexes, section details, imports, strings and results from different antivirus have been deeply analyzed to conclude origin and functionality of malware. This approach contributes to vital cyber situation awareness by combining different malware discovery techniques, for example, static examination, to alter the session of malware triage for cyber defense and decreases the count of false alarms. Current trends in warfare have been determined.",
"title": ""
},
{
"docid": "648637a8acf70ca8266e538801b5f192",
"text": "There has been an impressive gain in individual life expectancy with parallel increases in age-related chronic diseases of the cardiovascular, brain and immune systems. These can cause loss of autonomy, dependence and high social costs for individuals and society. It is now accepted that aging and age-related diseases are in part caused by free radical reactions. The arrest of aging and stimulation of rejuvenation of the human body is also being sought. Over the last 20 years the use of herbs and natural products has gained popularity and these are being consumed backed by epidemiological evidence. One such herb is garlic, which has been used throughout the history of civilization for treating a wide variety of ailments associated with aging. The role of garlic in preventing age-related diseases has been investigated extensively over the last 10-15 years. Garlic has strong antioxidant properties and it has been suggested that garlic can prevent cardiovascular disease, inhibit platelet aggregation, thrombus formation, prevent cancer, diseases associated with cerebral aging, arthritis, cataract formation, and rejuvenate skin, improve blood circulation and energy levels. This review provides an insight in to garlic's antioxidant properties and presents evidence that it may either prevent or delay chronic diseases associated with aging.",
"title": ""
},
{
"docid": "8a36b081bb9dc9b9ed4eb9f6796c7fdb",
"text": "Almost all problems in computer vision are related in one form or an other to the problem of estimating parameters from noisy data. In this tutorial, we present what is probably the most commonly used techniques for parameter es timation. These include linear least-squares (pseudo-inverse and eigen analysis); orthogonal least-squares; gradient-weighted least-squares; bias-corrected renormal ization; Kalman ltering; and robust techniques (clustering, regression diagnostics, M-estimators, least median of squares). Particular attention has been devoted to discussions about the choice of appropriate minimization criteria and the robustness of the di erent techniques. Their application to conic tting is described. Key-words: Parameter estimation, Least-squares, Bias correction, Kalman lter ing, Robust regression Updated on April 15, 1996 To appear in Image and Vision Computing Journal, 1996",
"title": ""
},
{
"docid": "b5c8263dd499088ded04c589b5da1d9f",
"text": "User interfaces and information systems have become increasingly social in recent years, aimed at supporting the decentralized, cooperative production and use of content. A theory that predicts the impact of interface and interaction designs on such factors as participation rates and knowledge discovery is likely to be useful. This paper reviews a variety of observed phenomena in social information foraging and sketches a framework extending Information Foraging Theory towards making predictions about the effects of diversity, interference, and cost-of-effort on performance time, participation rates, and utility of discoveries.",
"title": ""
},
{
"docid": "3323474060ba5f1fbbbdcb152c22a6a9",
"text": "A compact triple-band microstrip slot antenna applied to WLAN/WiMAX applications is proposed in this letter. This antenna has a simpler structure than other antennas designed for realizing triple-band characteristics. It is just composed of a microstrip feed line, a substrate, and a ground plane on which some simple slots are etched. Then, to prove the validation of the design, a prototype is fabricated and measured. The experimental data show that the antenna can provide three impedance bandwidths of 600 MHz centered at 2.7 GHz, 430 MHz centered at 3.5 GHz, and 1300 MHz centered at 5.6 GHz.",
"title": ""
},
{
"docid": "5b1c38fccbd591e6ab00a66ef636eb5d",
"text": "There is a great thrust in industry toward the development of more feasible and viable tools for storing fast-growing volume, velocity, and diversity of data, termed ‘big data’. The structural shift of the storage mechanism from traditional data management systems to NoSQL technology is due to the intention of fulfilling big data storage requirements. However, the available big data storage technologies are inefficient to provide consistent, scalable, and available solutions for continuously growing heterogeneous data. Storage is the preliminary process of big data analytics for real-world applications such as scientific experiments, healthcare, social networks, and e-business. So far, Amazon, Google, and Apache are some of the industry standards in providing big data storage solutions, yet the literature does not report an in-depth survey of storage technologies available for big data, investigating the performance and magnitude gains of these technologies. The primary objective of this paper is to conduct a comprehensive investigation of state-of-the-art storage technologies available for big data. A well-defined taxonomy of big data storage technologies is presented to assist data analysts and researchers in understanding and selecting a storage mechanism that better fits their needs. To evaluate the performance of different storage architectures, we compare and analyze the existing approaches using Brewer’s CAP theorem. The significance and applications of storage technologies and support to other categories are discussed. Several future research challenges are highlighted with the intention to expedite the deployment of a reliable and scalable storage system.",
"title": ""
},
{
"docid": "a49d0dfa008f9f85a2b0bb13b1ffd9da",
"text": "Abduction is inference to the best explanation In the TACITUS project at SRI we have developed an approach to abductive inference called weighted abduction that has resulted in a signi cant simpli cation of how the problem of interpreting texts is conceptualized The interpretation of a text is the minimal explanation of why the text would be true More precisely to interpret a text one must prove the logical form of the text from what is already mutually known allowing for coercions merging redundancies where possible and making assumptions where necessary It is shown how such local pragmatics problems as reference resolution the interpretation of compound nominals the resolution of syntactic ambiguity and metonymy and schema recognition can be solved in this manner Moreover this approach of interpretation as abduction can be combined with the older view of parsing as deduction to produce an elegant and thorough integration of syntax semantics and pragmatics one that spans the range of linguistic phenomena from phonology to discourse structure Finally we discuss means for making the abduction process e cient possibilities for extending the approach to other pragmatics phenomena and the semantics of the weights and costs in the abduction scheme",
"title": ""
},
{
"docid": "3043eb8fbe54b5ce5f2767934a6e689e",
"text": "A 21-year-old man presented with an enlarged giant hemangioma on glans penis which also causes an erectile dysfunction (ED) that partially responded to the intracavernous injection stimulation test. Although the findings in magnetic resonance imaging (MRI) indicated a glandular hemangioma, penile colored Doppler ultrasound revealed an invaded cavernausal hemangioma to the glans. Surgical excision was avoided according to the broad extension of the gland lesion. Holmium laser coagulation was applied to the lesion due to the cosmetically concerns. However, the cosmetic results after holmium laser application was not impressive as expected without an improvement in intracavernous injection stimulation test. In conclusion, holmium laser application should not be used to the hemangiomas of glans penis related to the corpus cavernosum, but further studies are needed to reveal the effects of holmium laser application in small hemangiomas restricted to the glans penis.",
"title": ""
},
{
"docid": "9f2db5cf1ee0cfd0250e68bdbc78b434",
"text": "A novel transverse equivalent network is developed in this letter to efficiently analyze a recently proposed leaky-wave antenna in substrate integrated waveguide (SIW) technology. For this purpose, precise modeling of the SIW posts for any distance between vias is essential to obtain accurate results. A detailed parametric study is performed resulting in leaky-mode dispersion curves as a function of the main geometrical dimensions of the antenna. Finally, design curves that directly provide the requested dimensions to synthesize the desired scanning response and leakage rate are reported and validated with experiments.",
"title": ""
},
{
"docid": "e88cab4c5e93b96fd39d63cd35de00fa",
"text": "Visual recognition algorithms are required today to exhibit adaptive abilities. Given a deep model trained on a specific, given task, it would be highly desirable to be able to adapt incrementally to new tasks, preserving scalability as the number of new tasks increases, while at the same time avoiding catastrophic forgetting issues. Recent work has shown that masking the internal weights of a given original conv-net through learned binary variables is a promising strategy. We build upon this intuition and take into account more elaborated affine transformations of the convolutional weights that include learned binary masks. We show that with our generalization it is possible to achieve significantly higher levels of adaptation to new tasks, enabling the approach to compete with fine tuning strategies by requiring slightly more than 1 bit per network parameter per additional task. Experiments on two popular benchmarks showcase the power of our approach, that achieves the new state of the art on the Visual Decathlon Challenge.",
"title": ""
},
{
"docid": "590d6fd3a0faddba67f48a660c3b6c86",
"text": "A graph G of order n is k-placeable if there exist k edge-disjoint copies of G in the complete graph Kn. Previous work characterized all trees that are k-placeable for k ≤ 3. This work extends those results by giving a complete characterization of all 4-placeable trees.",
"title": ""
},
{
"docid": "18c230517b8825b616907548829e341b",
"text": "The application of small Remotely-Controlled (R/C) aircraft for aerial photography presents many unique advantages over manned aircraft due to their lower acquisition cost, lower maintenance issue, and superior flexibility. The extraction of reliable information from these images could benefit DOT engineers in a variety of research topics including, but not limited to work zone management, traffic congestion, safety, and environmental. During this effort, one of the West Virginia University (WVU) R/C aircraft, named ‘Foamy’, has been instrumented for a proof-of-concept demonstration of aerial data acquisition. Specifically, the aircraft has been outfitted with a GPS receiver, a flight data recorder, a downlink telemetry hardware, a digital still camera, and a shutter-triggering device. During the flight a ground pilot uses one of the R/C channels to remotely trigger the camera. Several hundred high-resolution geo-tagged aerial photographs were collected during 10 flight experiments at two different flight fields. A Matlab based geo-reference software was developed for measuring distances from an aerial image and estimating the geo-location of each ground asset of interest. A comprehensive study of potential Sources of Errors (SOE) has also been performed with the goal of identifying and addressing various factors that might affect the position estimation accuracy. The result of the SOE study concludes that a significant amount of position estimation error was introduced by either mismatching of different measurements or by the quality of the measurements themselves. The first issue is partially addressed through the design of a customized Time-Synchronization Board (TSB) based on a MOD 5213 embedded microprocessor. The TSB actively controls the timing of the image acquisition process, ensuring an accurate matching of the GPS measurement and the image acquisition time. The second issue is solved through the development of a novel GPS/INS (Inertial Navigation System) based on a 9-state Extended Kalman Filter (EKF). The developed sensor fusion algorithm provides a good estimation of aircraft attitude angle without the need for using expensive sensors. Through the help of INS integration, it also provides a very smooth position estimation that eliminates large jumps typically seen in the raw GPS measurements.",
"title": ""
}
] | scidocsrr |
97d20a48abd9ee660da56de311aeb48a | Question Answering on Knowledge Bases and Text using Universal Schema and Memory Networks | [
{
"docid": "98be2f8b10c618f9d2fc8183f289c739",
"text": "We introduce a neural network with a recurrent attention model over a possibly large external memory. The architecture is a form of Memory Network [23] but unlike the model in that work, it is trained end-to-end, and hence requires significantly less supervision during training, making it more generally applicable in realistic settings. It can also be seen as an extension of RNNsearch [2] to the case where multiple computational steps (hops) are performed per output symbol. The flexibility of the model allows us to apply it to tasks as diverse as (synthetic) question answering [22] and to language modeling. For the former our approach is competitive with Memory Networks, but with less supervision. For the latter, on the Penn TreeBank and Text8 datasets our approach demonstrates comparable performance to RNNs and LSTMs. In both cases we show that the key concept of multiple computational hops yields improved results.",
"title": ""
}
] | [
{
"docid": "f5317ef27de34a1f63181c6b2508c07c",
"text": "In this paper, we present the design and implementation of FocusVR, a system for effectively and efficiently reducing the power consumption of Virtual Reality (VR) devices by smartly dimming their displays. These devices are becoming increasingly common with large companies such as Facebook (Oculus Rift), and HTC and Valve (Vive), recently releasing high quality VR devices to the consumer market. However, these devices require increasingly higher screen resolutions and refresh rates to be effective, and this in turn, leads to high display power consumption costs. We show how the use of smart dimming techniques, vignettes and color mapping, can significantly reduce the power consumption of VR displays with minimal impact on usability. In particular, we describe the implementation of FocusVR in both Android and the Unity game engine and then present detailed measurement results across 3 different VR devices -- the Gear VR, the DK2, and the Vive. In addition, we present the results of 3 user studies, with 68 participants in total, that tested the usability of FocusVR. Overall, we show that FocusVR is able to save up to 80% of the display power and up to 50% of the overall system power, with negligible impact to usability.",
"title": ""
},
{
"docid": "a91c43ef77f03672011d0353f00a1c5d",
"text": "Presence, the experience of ‘being there’ in a mediated environment, has become closely associated with VR and other advanced media. Different types of presence are discussed, including physical presence, social presence, and co-presence. Fidelity-based approaches to presence research emphasize the fact that as media become increasingly interactive, perceptually realistic, and immersive, the experience of presence becomes more convincing. In addition, the ecological-cultural approach is described, pointing out the importance of the possibility of action in mediated environments, as well as the role that a common cultural framework plays in engendering a sense of presence. In particular for multi-user or collaborative virtual environments (CVEs), processes of negotiation and community creation need to be supported by the CVE design to enable communication and the creation of a social context within the CVE.",
"title": ""
},
{
"docid": "423cba015a9cfc247943dd7d3c4ea1cf",
"text": "No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or informa tion storage and retrieval) without permission in writing from the publisher. Preface Probability is common sense reduced to calculation Laplace This book is an outgrowth of our involvement in teaching an introductory prob ability course (\"Probabilistic Systems Analysis'�) at the Massachusetts Institute of Technology. The course is attended by a large number of students with diverse back grounds, and a broad range of interests. They span the entire spectrum from freshmen to beginning graduate students, and from the engineering school to the school of management. Accordingly, we have tried to strike a balance between simplicity in exposition and sophistication in analytical reasoning. Our key aim has been to develop the ability to construct and analyze probabilistic models in a manner that combines intuitive understanding and mathematical precision. In this spirit, some of the more mathematically rigorous analysis has been just sketched or intuitively explained in the text. so that complex proofs do not stand in the way of an otherwise simple exposition. At the same time, some of this analysis is developed (at the level of advanced calculus) in theoretical prob lems, that are included at the end of the corresponding chapter. FUrthermore, some of the subtler mathematical issues are hinted at in footnotes addressed to the more attentive reader. The book covers the fundamentals of probability theory (probabilistic mod els, discrete and continuous random variables, multiple random variables, and limit theorems), which are typically part of a first course on the subject. It also contains, in Chapters 4-6 a number of more advanced topics, from which an instructor can choose to match the goals of a particular course. In particular, in Chapter 4, we develop transforms, a more advanced view of conditioning, sums of random variables, least squares estimation, and the bivariate normal distribu-v vi Preface tion. Furthermore, in Chapters 5 and 6, we provide a fairly detailed introduction to Bernoulli, Poisson, and Markov processes. Our M.LT. course covers all seven chapters in a single semester, with the ex ception of the material on the bivariate normal (Section 4.7), and on continuous time Markov chains (Section 6.5). However, in an alternative course, the material on stochastic processes could be omitted, thereby allowing additional emphasis on foundational material, or coverage of other topics of the instructor's choice. Our …",
"title": ""
},
{
"docid": "cddca3a23ea0568988243c8f005e0edc",
"text": "This paper investigates the mechanisms through which organizations develop dynamic capabilities, defined as routinized activities directed to the development and adaptation of operating routines, and reflects upon the role of (1) experience accumulation, (2) knowledge articulation and (3) knowledge codification processes in the evolution of dynamic, as well as operational, routines. The argument is made that dynamic capabilities are shaped by the co-evolution of these learning mechanisms. At any point in time, firms adopt a mix of learning behaviors constituted by a semi-automatic accumulation of experience and by deliberate investments in knowledge articulation and codification activities. The relative effectiveness of these capability-building mechanisms is analyzed here as contingent upon selected features of the task to be learned, such as its frequency, homogeneity and degree of causal ambiguity, and testable hypotheses are derived. Somewhat counterintuitive implications of the analysis include the relatively superior effectiveness of highly deliberate learning processes, such as knowledge codification, at lower levels of frequency and homogeneity of the organizational task, in contrast with common managerial practice.",
"title": ""
},
{
"docid": "f48bcd934ae9e410d6b980e8e868e7f5",
"text": "An experiment was conducted in a Cave-like environment to explore the relationship between physiological responses and breaks in presence and utterances by virtual characters towards the participants. Twenty people explored a virtual environment (VE) that depicted a virtual bar scenario. The experiment was divided into a training and an experimental phase. During the experimental phase breaks in presence (BIPs) in the form of whiteouts of the VE scenario were induced for 2 s at four equally spaced times during the approximately 5 min in the bar scenario. Additionally, five virtual characters addressed remarks to the subjects. Physiological measures including electrocardiagram (ECG) and galvanic skin response (GSR) were recorded throughout the whole experiment. The heart rate, the heart rate variability, and the event-related heart rate changes were calculated from the acquired ECG data. The frequency response of the GSR signal was calculated with a wavelet analysis. The study shows that the heart rate and heart rate variability parameters vary significantly between the training and experimental phase. GSR parameters and event-related heart rate changes show the occurrence of breaks in presence. Event-related heart rate changes also signified the virtual character utterances. There were also differences in response between participants who report more or less socially anxious.",
"title": ""
},
{
"docid": "c3ca9b126dc12065e80faf472fe41375",
"text": "Continued advancements in Si-based technologies - in particular SiGe BiCMOS technologies - have enabled mmWave integrated circuits designed for 77GHz automotive radar systems to reach production-level maturity. This paper will discuss the technology requirements for mmWave automotive radar products, and also present the evolution of the respective key figures of merit. Si-based CMOS challenges and opportunities will also be discussed.",
"title": ""
},
{
"docid": "c9a00df1eea1def318c92450b8d8f3f3",
"text": "Removing pixel-wise heterogeneous motion blur is challenging due to the ill-posed nature of the problem. The predominant solution is to estimate the blur kernel by adding a prior, but extensive literature on the subject indicates the difficulty in identifying a prior which is suitably informative, and general. Rather than imposing a prior based on theory, we propose instead to learn one from the data. Learning a prior over the latent image would require modeling all possible image content. The critical observation underpinning our approach, however, is that learning the motion flow instead allows the model to focus on the cause of the blur, irrespective of the image content. This is a much easier learning task, but it also avoids the iterative process through which latent image priors are typically applied. Our approach directly estimates the motion flow from the blurred image through a fully-convolutional deep neural network (FCN) and recovers the unblurred image from the estimated motion flow. Our FCN is the first universal end-to-end mapping from the blurred image to the dense motion flow. To train the FCN, we simulate motion flows to generate synthetic blurred-image-motion-flow pairs thus avoiding the need for human labeling. Extensive experiments on challenging realistic blurred images demonstrate that the proposed method outperforms the state-of-the-art.",
"title": ""
},
{
"docid": "d84b91baa39a01ce84235793b089206d",
"text": "A comprehensive chip-package-system (CPS) electrostatic discharge (ESD) simulation methodology is developed for addressing IEC61000-4-2 testing conditions. An innovative chip ESD compact model is proposed, combined with full-wave models of the ESD gun, ESD protection devices, PCB wires/vias and connectors for CPS analysis. Two examples of CPS ESD application are illustrated demonstrating good correlation with measurement.",
"title": ""
},
{
"docid": "3f65fe6ad25d589b586095df09b954cd",
"text": "BACKGROUND\nTofacitinib is an oral Janus kinase inhibitor that is under investigation for the treatment of psoriatic arthritis. We evaluated tofacitinib in patients with active psoriatic arthritis who previously had an inadequate response to conventional synthetic disease-modifying antirheumatic drugs (DMARDs).\n\n\nMETHODS\nIn this 12-month, double-blind, active-controlled and placebo-controlled, phase 3 trial, we randomly assigned patients in a 2:2:2:1:1 ratio to receive one of the following regimens: tofacitinib at a 5-mg dose taken orally twice daily (107 patients), tofacitinib at a 10-mg dose taken orally twice daily (104), adalimumab at a 40-mg dose administered subcutaneously once every 2 weeks (106), placebo with a blinded switch to the 5-mg tofacitinib dose at 3 months (52), or placebo with a blinded switch to the 10-mg tofacitinib dose at 3 months (53). Placebo groups were pooled for analyses up to month 3. Primary end points were the proportion of patients who had an American College of Rheumatology 20 (ACR20) response (≥20% improvement from baseline in the number of tender and swollen joints and at least three of five other important domains) at month 3 and the change from baseline in the Health Assessment Questionnaire-Disability Index (HAQ-DI) score (scores range from 0 to 3, with higher scores indicating greater disability) at month 3.\n\n\nRESULTS\nACR20 response rates at month 3 were 50% in the 5-mg tofacitinib group and 61% in the 10-mg tofacitinib group, as compared with 33% in the placebo group (P=0.01 for the comparison of the 5-mg dose with placebo; P<0.001 for the comparison of the 10-mg dose with placebo); the rate was 52% in the adalimumab group. The mean change in the HAQ-DI score was -0.35 in the 5-mg tofacitinib group and -0.40 in the 10-mg tofacitinib group, as compared with -0.18 in the placebo group (P=0.006 for the comparison of the 5-mg dose with placebo; P<0.001 for the comparison of the 10-mg dose with placebo); the score change was -0.38 in the adalimumab group. The rate of adverse events through month 12 was 66% in the 5-mg tofacitinib group, 71% in the 10-mg tofacitinib group, 72% in the adalimumab group, 69% in the placebo group that switched to the 5-mg tofacitinib dose, and 64% in the placebo group that switched to the 10-mg tofacitinib dose. There were four cases of cancer, three serious infections, and four cases of herpes zoster in patients who received tofacitinib during the trial.\n\n\nCONCLUSIONS\nThe efficacy of tofacitinib was superior to that of placebo at month 3 in patients with psoriatic arthritis who had previously had an inadequate response to conventional synthetic DMARDs. Adverse events were more frequent with tofacitinib than with placebo. (Funded by Pfizer; OPAL Broaden ClinicalTrials.gov number, NCT01877668 .).",
"title": ""
},
{
"docid": "2bc30693be1c5855a9410fb453128054",
"text": "Person re-identification is to match pedestrian images from disjoint camera views detected by pedestrian detectors. Challenges are presented in the form of complex variations of lightings, poses, viewpoints, blurring effects, image resolutions, camera settings, occlusions and background clutter across camera views. In addition, misalignment introduced by the pedestrian detector will affect most existing person re-identification methods that use manually cropped pedestrian images and assume perfect detection. In this paper, we propose a novel filter pairing neural network (FPNN) to jointly handle misalignment, photometric and geometric transforms, occlusions and background clutter. All the key components are jointly optimized to maximize the strength of each component when cooperating with others. In contrast to existing works that use handcrafted features, our method automatically learns features optimal for the re-identification task from data. The learned filter pairs encode photometric transforms. Its deep architecture makes it possible to model a mixture of complex photometric and geometric transforms. We build the largest benchmark re-id dataset with 13, 164 images of 1, 360 pedestrians. Unlike existing datasets, which only provide manually cropped pedestrian images, our dataset provides automatically detected bounding boxes for evaluation close to practical applications. Our neural network significantly outperforms state-of-the-art methods on this dataset.",
"title": ""
},
{
"docid": "d633f883c3dd61c22796a5774a56375c",
"text": "Neural networks are the topic of this paper. Neural networks are very powerful as nonlinear signal processors, but obtained results are often far from satisfactory. The purpose of this article is to evaluate the reasons for these frustrations and show how to make these neural networks successful. The following are the main challenges of neural network applications: (1) Which neural network architectures should be used? (2) How large should a neural network be? (3) Which learning algorithms are most suitable? The multilayer perceptron (MLP) architecture is unfortunately the preferred neural network topology of most researchers. It is the oldest neural network architecture, and it is compatible with all training softwares. However, the MLP topology is less powerful than other topologies such as bridged multilayer perceptron (BMLP), where connections across layers are allowed. The error-back propagation (EBP) algorithm is the most popular learning algorithm, but it is very slow and seldom gives adequate results. The EBP training process requires 100-1,000 times more iterations than the more advanced algorithms such as Levenberg-Marquardt (LM) or neuron by neuron (NBN) algorithms. What is most important is that the EBP algorithm is not only slow but often it is not able to find solutions for close-to-optimum neural networks. The paper describes and compares several learning algorithms.",
"title": ""
},
{
"docid": "96ced9c1228655c28f72bb5e5311397f",
"text": "Music perception is highly intertwined with both emotions and context. Not surprisingly, many of the users’ information seeking actions aim at retrieving music songs based on these perceptual dimensions – moods and themes, expressing how people feel about music or which situations they associate it with. In order to successfully support music retrieval along these dimensions, powerful methods are needed. Still, most existing approaches aiming at inferring some of the songs’ latent characteristics focus on identifying musical genres. In this paper we aim at bridging this gap between users’ information needs and indexed music features by developing algorithms for classifying music songs by moods and themes. We extend existing approaches by also considering the songs’ thematic dimensions and by using social data from the Last.fm music portal, as support for the classification tasks. Our methods exploit both audio features and collaborative user annotations, fusing them to improve overall performance. Evaluation performed against the AllMusic.com ground truth shows that both kinds of information are complementary and should be merged for enhanced classification accuracy.",
"title": ""
},
{
"docid": "63ed0570e0bb6abcb9fffa0d2cc8f6f6",
"text": "Bugs in multi-threaded programs often arise due to data races. Numerous static and dynamic program analysis techniques have been proposed to detect data races. We propose a novel randomized dynamic analysis technique that utilizes potential data race information obtained from an existing analysis tool to separate real races from false races without any need for manual inspection. Specifically, we use potential data race information obtained from an existing dynamic analysis technique to control a random scheduler of threads so that real race conditions get created with very high probability and those races get resolved randomly at runtime. Our approach has several advantages over existing dynamic analysis tools. First, we can create a real race condition and resolve the race randomly to see if an error can occur due to the race. Second, we can replay a race revealing execution efficiently by simply using the same seed for random number generation--we do not need to record the execution. Third, our approach has very low overhead compared to other precise dynamic race detection techniques because we only track all synchronization operations and a single pair of memory access statements that are reported to be in a potential race by an existing analysis. We have implemented the technique in a prototype tool for Java and have experimented on a number of large multi-threaded Java programs. We report a number of previously known and unknown bugs and real races in these Java programs.",
"title": ""
},
{
"docid": "b689c0dd51f621af8c8620d952e206b4",
"text": "FinFET transistors have great advantages over traditional planar MOSFET transistors in high performance and low power applications. Major foundries are adopting the Fin-FET technology for CMOS semiconductor device fabrication in the 16 nm technology node and beyond. Edge device degradation is among the major challenges for the FinFET process. To avoid such degradation, dummy gates are needed on device edges, and the dummy gates have to be tied to power rails in order not to introduce unconnected parasitic transistors. This requires that each dummy gate must abut at least one source node after standard cell placement. If the drain nodes at two adjacent cell boundaries abut each other, additional source nodes must be inserted in between for dummy gate power tying, which costs more placement area. Usually there is some flexibility during detailed placement to horizontally flip the cells or switch the positions of adjacent cells, which has little impact on the global placement objectives, such as timing conditions and net congestion. This paper proposes a detailed placement optimization strategy for the standard cell based designs. By flipping a subset of cells in a standard cell row and switching pairs of adjacent cells, the number of drain to drain abutments between adjacent cell boundaries can be optimally minimized, which saves additional source node insertion and reduces the length of the standard cell row. In addition, the proposed graph model can be easily modified to consider more complicated design rules. The experimental results show that the optimization of 100k cells is completed within 0.1 second, verifying the efficiency of the proposed algorithm.",
"title": ""
},
{
"docid": "80f9ecd1945cbdc93ecdb28afd44d8e3",
"text": "This paper addresses the problem of pixel-level segmentation and classification of scene images with an entirely learning-based approach using Long Short Term Memory (LSTM) recurrent neural networks, which are commonly used for sequence classification. We investigate two-dimensional (2D) LSTM networks for natural scene images taking into account the complex spatial dependencies of labels. Prior methods generally have required separate classification and image segmentation stages and/or pre- and post-processing. In our approach, classification, segmentation, and context integration are all carried out by 2D LSTM networks, allowing texture and spatial model parameters to be learned within a single model. The networks efficiently capture local and global contextual information over raw RGB values and adapt well for complex scene images. Our approach, which has a much lower computational complexity than prior methods, achieved state-of-the-art performance over the Stanford Background and the SIFT Flow datasets. In fact, if no pre- or post-processing is applied, LSTM networks outperform other state-of-the-art approaches. Hence, only with a single-core Central Processing Unit (CPU), the running time of our approach is equivalent or better than the compared state-of-the-art approaches which use a Graphics Processing Unit (GPU). Finally, our networks' ability to visualize feature maps from each layer supports the hypothesis that LSTM networks are overall suited for image processing tasks.",
"title": ""
},
{
"docid": "2c40abd8bd489c1cd3d4c80efdfbaf10",
"text": "In the recent past, the computer vision community has developed centralized benchmarks for the performance evaluation of a variety of tasks, including generic object and pedestrian detection, 3D reconstruction, optical flow, single-object short-term tracking, and stereo estimation. Despite potential pitfalls of such benchmarks, they have proved to be extremely helpful to advance the state of the art in the respective area. Interestingly, there has been rather limited work on the standardization of quantitative benchmarks for multiple target tracking. One of the few exceptions is the well-known PETS dataset [20], targeted primarily at surveillance applications. Despite being widely used, it is often applied inconsistently, for example involving using different subsets of the available data, different ways of training the models, or differing evaluation scripts. This paper describes our work toward a novel multiple object tracking benchmark aimed to address such issues. We discuss the challenges of creating such a framework, collecting existing and new data, gathering state-of-the-art methods to be tested on the datasets, and finally creating a unified evaluation system. With MOTChallenge we aim to pave the way toward a unified evaluation framework for a more meaningful quantification of multi-target tracking.",
"title": ""
},
{
"docid": "685faa54046bcd70e21a7003cb1182e2",
"text": "We analyze to what extent the random SAT and Max-SAT problems differ in their properties. Our findings suggest that for random k-CNF with ratio in a certain range, Max-SAT can be solved by any SAT algorithm with subexponential slowdown, while for formulae with ratios greater than some constant, algorithms under the random walk framework require substantially different heuristics. In light of these results, we propose a novel probabilistic approach for random Max-SAT called ProMS. Experimental results illustrate that ProMS outperforms many state-of-the-art local search solvers on random Max-SAT benchmarks.",
"title": ""
},
{
"docid": "f829097794802117bf37ea8ce891611a",
"text": "Manually crafted combinatorial features have been the \"secret sauce\" behind many successful models. For web-scale applications, however, the variety and volume of features make these manually crafted features expensive to create, maintain, and deploy. This paper proposes the Deep Crossing model which is a deep neural network that automatically combines features to produce superior models. The input of Deep Crossing is a set of individual features that can be either dense or sparse. The important crossing features are discovered implicitly by the networks, which are comprised of an embedding and stacking layer, as well as a cascade of Residual Units. Deep Crossing is implemented with a modeling tool called the Computational Network Tool Kit (CNTK), powered by a multi-GPU platform. It was able to build, from scratch, two web-scale models for a major paid search engine, and achieve superior results with only a sub-set of the features used in the production models. This demonstrates the potential of using Deep Crossing as a general modeling paradigm to improve existing products, as well as to speed up the development of new models with a fraction of the investment in feature engineering and acquisition of deep domain knowledge.",
"title": ""
},
{
"docid": "db2e7cc9ea3d58e0c625684248e2ef80",
"text": "PURPOSE\nTo review applications of Ajzen's theory of planned behavior in the domain of health and to verify the efficiency of the theory to explain and predict health-related behaviors.\n\n\nMETHODS\nMost material has been drawn from Current Contents (Social and Behavioral Sciences and Clinical Medicine) from 1985 to date, together with all peer-reviewed articles cited in the publications thus identified.\n\n\nFINDINGS\nThe results indicated that the theory performs very well for the explanation of intention; an averaged R2 of .41 was observed. Attitude toward the action and perceived behavioral control were most often the significant variables responsible for this explained variation in intention. The prediction of behavior yielded an averaged R2 of .34. Intention remained the most important predictor, but in half of the studies reviewed perceived behavioral control significantly added to the prediction.\n\n\nCONCLUSIONS\nThe efficiency of the model seems to be quite good for explaining intention, perceived behavioral control being as important as attitude across health-related behavior categories. The efficiency of the theory, however, varies between health-related behavior categories.",
"title": ""
}
] | scidocsrr |
dd11c94df91e2ee7de70f1a5eb43b719 | CRITICAL SUCCESS FACTORS (CSFS) OF ENTERPRISE RESOURCE PLANNING (ERP) SYSTEM IMPLEMENTATION IN HIGHER EDUCATION INSTITUTIONS (HEIS): CONCEPTS AND LITERATURE REVIEW | [
{
"docid": "1746b22d663eb477fb429783ce89f07e",
"text": "Enterprise resource planning (ERP) system has been one of the most popular business management systems, providing benefits of real-time capabilities and seamless communication for business in large organizations. However, not all ERP implementations have been successful. Since ERP implementation affects entire organizations such as process, people, and culture, there are a number of challenges that companies may encounter in implementing ERP systems. Recently, some universities have begun replacing their legacy systems with ERP systems to improve management and administration. This thesis focuses on challenges of ERP implementation between corporate and university environment. I review previous studies that determine Critical Successful Factors (CSFs) and risk factors to implement ERP in both environments. Particularly, case studies in this thesis emphasize the organizational dynamics involved in ERP implementation by using CSFs and three phases of framework by Miles and Huberman (1994): antecedent condition, implementation process, and outcomes. This study uses findings from the case studies to assess ERP readiness and CSFs' fulfillment. The results from this study contribute to contextual understanding of distinctive challenges in ERP implementation between corporate and university environment. Thesis Supervisor: Professor Stuart Madnick Title: John Norris Maguire Professor of Information Technologies, MIT Sloan School of Management and Professor of Engineering Systems, School of Engineering",
"title": ""
}
] | [
{
"docid": "58c0456c8ae9045898aca67de9954659",
"text": "Channel sensing and spectrum allocation has long been of interest as a prospective addition to cognitive radios for wireless communications systems occupying license-free bands. Conventional approaches to cyclic spectral analysis have been proposed as a method for classifying signals for applications where the carrier frequency and bandwidths are unknown, but is, however, computationally complex and requires a significant amount of observation time for adequate performance. Neural networks have been used for signal classification, but only for situations where the baseband signal is present. By combining these techniques a more efficient and reliable classifier can be developed where a significant amount of processing is performed offline, thus reducing online computation. In this paper we take a renewed look at signal classification using spectral coherence and neural networks, the performance of which is characterized by Monte Carlo simulations",
"title": ""
},
{
"docid": "c3a7d3fa13bed857795c4cce2e992b87",
"text": "Healthcare consumers, researchers, patients and policy makers increasingly use systematic reviews (SRs) to aid their decision-making process. However, the conduct of SRs can be a time-consuming and resource-intensive task. Often, clinical practice guideline developers or other decision-makers need to make informed decisions in a timely fashion (e.g. outbreaks of infection, hospital-based health technology assessments). Possible approaches to address the issue of timeliness in the production of SRs are to (a) implement process parallelisation, (b) adapt and apply innovative technologies, and/or (c) modify SR processes (e.g. study eligibility criteria, search sources, data extraction or quality assessment). Highly parallelised systematic reviewing requires substantial resources to support a team of experienced information specialists, reviewers and methodologists working alongside with clinical content experts to minimise the time for completing individual review steps while maximising the parallel progression of multiple steps. Effective coordination and management within the team and across external stakeholders are essential elements of this process. Emerging innovative technologies have a great potential for reducing workload and improving efficiency of SR production. The most promising areas of application would be to allow automation of specific SR tasks, in particular if these tasks are time consuming and resource intensive (e.g. language translation, study selection, data extraction). Modification of SR processes involves restricting, truncating and/or bypassing one or more SR steps, which may risk introducing bias to the review findings. Although the growing experiences in producing various types of rapid reviews (RR) and the accumulation of empirical studies exploring potential bias associated with specific SR tasks have contributed to the methodological development for expediting SR production, there is still a dearth of research examining the actual impact of methodological modifications and comparing the findings between RRs and SRs. This evidence would help to inform as to which SR tasks can be accelerated or truncated and to what degree, while maintaining the validity of review findings. Timely delivered SRs can be of value in informing healthcare decisions and recommendations, especially when there is practical urgency and there is no other relevant synthesised evidence.",
"title": ""
},
{
"docid": "dbc253488a9f5d272e75b38dc98ea101",
"text": "A new form of a hybrid design of a microstrip-fed parasitic coupled ring fractal monopole antenna with semiellipse ground plane is proposed for modern mobile devices having a wireless local area network (WLAN) module along with a Worldwide Interoperability for Microwave Access (WiMAX) function. In comparison to the previous monopole structures, the miniaturized antenna dimension is only about 25 × 25 × 1 mm3 , which is 15 times smaller than the previous proposed design. By only increasing the fractal iterations, very good impedance characteristics are obtained. Throughout this letter, the improvement process of the impedance and radiation properties is completely presented and discussed.",
"title": ""
},
{
"docid": "2bf928d7701602a9827ffcf9e4ac984e",
"text": "Recommender systems are helpful tools which provide an adaptive Web environment for Web users. Recently, a number of Web page recommender systems have been developed to extract the user behavior from the user’s navigational path and predict the next request as he/she visits Web pages. Web Usage Mining (WUM) is a kind of data mining method that can be used to discover this behavior of user and his/her access patterns from Web log data. This paper first presents an overview of the used concepts and techniques of WUM to design Web recommender systems. Then it is shown that how WUM can be applied to Web server logs for discovering access patterns. Afterward, we analyze some of the problems and challenges in deploying recommender systems. Finally, we propose the solutions which address these problems.",
"title": ""
},
{
"docid": "2d146e411e1a1068f6e907709d542a4f",
"text": "Plug-in vehicles can behave either as loads or as a distributed energy and power resource in a concept known as vehicle-to-grid (V2G) connection. This paper reviews the current status and implementation impact of V2G/grid-to-vehicle (G2V) technologies on distributed systems, requirements, benefits, challenges, and strategies for V2G interfaces of both individual vehicles and fleets. The V2G concept can improve the performance of the electricity grid in areas such as efficiency, stability, and reliability. A V2G-capable vehicle offers reactive power support, active power regulation, tracking of variable renewable energy sources, load balancing, and current harmonic filtering. These technologies can enable ancillary services, such as voltage and frequency control and spinning reserve. Costs of V2G include battery degradation, the need for intensive communication between the vehicles and the grid, effects on grid distribution equipment, infrastructure changes, and social, political, cultural, and technical obstacles. Although V2G operation can reduce the lifetime of vehicle batteries, it is projected to become economical for vehicle owners and grid operators. Components and unidirectional/bidirectional power flow technologies of V2G systems, individual and aggregated structures, and charging/recharging frequency and strategies (uncoordinated/coordinated smart) are addressed. Three elements are required for successful V2G operation: power connection to the grid, control and communication between vehicles and the grid operator, and on-board/off-board intelligent metering. Success of the V2G concept depends on standardization of requirements and infrastructure decisions, battery technology, and efficient and smart scheduling of limited fast-charge infrastructure. A charging/discharging infrastructure must be deployed. Economic benefits of V2G technologies depend on vehicle aggregation and charging/recharging frequency and strategies. The benefits will receive increased attention from grid operators and vehicle owners in the future.",
"title": ""
},
{
"docid": "614b45e8802497bdd61df63a9745c115",
"text": "Wireless sensor networks have potential to monitor environments for both military and civil applications. Due to inhospitable conditions these sensors are not always deployed uniformly in the area of interest. Since sensors are generally constrained in on-board energy supply, efficient management of the network is crucial to extend the life of the sensors. Sensors energy cannot support long haul communication to reach a remote command site and thus requires many levels of hops or a gateway to forward the data on behalf of the sensor. In this paper we propose an algorithm to network these sensors in to well define clusters with less-energy-constrained gateway nodes acting as clusterheads, and balance load among these gateways. Simulation results show how our approach can balance the load and improve the lifetime of the system.",
"title": ""
},
{
"docid": "8bfd08fabeba8593b833773d28d78605",
"text": "Like many social variables, gender pervasively influences how people communicate with one another. However, prior computational work has largely focused on linguistic gender difference and communications about gender, rather than communications directed to people of that gender, in part due to lack of data. Here, we fill a critical need by introducing a multi-genre corpus of more than 25M comments from five socially and topically diverse sources tagged for the gender of the addressee. Using these data, we describe pilot studies on how differential responses to gender can be measured and analyzed and present 30k annotations for the sentiment and relevance of these responses, showing that across our datasets responses to women are more likely to be emotive and about the speaker as an individual (rather than about the content being responded to). Our dataset enables studying socially important questions like gender bias, and has potential uses for downstream applications such as dialogue systems, gender detection or obfuscation, and debiasing language generation.",
"title": ""
},
{
"docid": "da4f95cc061e7f2433ffa37a8e34437e",
"text": "Active learning has been proven to be quite effective in reducing the human labeling efforts by actively selecting the most informative examples to label. In this paper, we present a batch-mode active learning method based on logistic regression. Our key motivation is an out-of-sample bound on the estimation error of class distribution in logistic regression conditioned on any fixed training sample. It is different from a typical PACstyle passive learning error bound, that relies on the i.i.d. assumption of example-label pairs. In addition, it does not contain the class labels of the training sample. Therefore, it can be immediately used to design an active learning algorithm by minimizing this bound iteratively. We also discuss the connections between the proposed method and some existing active learning approaches. Experiments on benchmark UCI datasets and text datasets demonstrate that the proposed method outperforms the state-of-the-art active learning methods significantly.",
"title": ""
},
{
"docid": "855b34b0db99446f980ddb9b96e52001",
"text": "based, companies increasingly derive revenue from the creation and sustenance of long-term relationships with their customers. In such an environment, marketing serves the purpose of maximizing customer lifetime value (CLV) and customer equity, which is the sum of the lifetime values of the company’s customers. This article reviews a number of implementable CLV models that are useful for market segmentation and the allocation of marketing resources for acquisition, retention, and crossselling. The authors review several empirical insights that were obtained from these models and conclude with an agenda of areas that are in need of further research.",
"title": ""
},
{
"docid": "f21ac64e54b23ab671c5fc038bef4686",
"text": "This paper presents the working methodology and results on Code Mix Entity Extraction in Indian Languages (CMEE-IL) shared the task of FIRE-2016. The aim of the task is to identify various entities such as a person, organization, movie and location names in a given code-mixed tweets. The tweets in code mix are written in English mixed with Hindi or Tamil. In this work, Entity Extraction system is implemented for both Hindi-English and Tamil-English code-mix tweets. The system employs context based character embedding features to train Support Vector Machine (SVM) classifier. The training data was tokenized such that each line containing a single word. These words were further split into characters. Embedding vectors of these characters are appended with the I-O-B tags and used for training the system. During the testing phase, we use context embedding features to predict the entity tags for characters in test data. We observed that the cross-validation accuracy using character embedding gave better results for Hindi-English twitter dataset compare to TamilEnglish twitter dataset. CCS Concepts • Information Retrieval ➝ Retrieval tasks and goals ➝ Information Extraction • Machine Learning ➝ Machine Learning approaches ➝ Kernel Methods ➝ Support Vector Machines",
"title": ""
},
{
"docid": "d66f86ac2b42d13ba2199e41c85d3c93",
"text": "We introduce Fluid Annotation, an intuitive human-machine collaboration interface for annotating the class label and outline of every object and background region in an image. Fluid annotation is based on three principles:(I) Strong Machine-Learning aid. We start from the output of a strong neural network model, which the annotator can edit by correcting the labels of existing regions, adding new regions to cover missing objects, and removing incorrect regions.The edit operations are also assisted by the model.(II) Full image annotation in a single pass. As opposed to performing a series of small annotation tasks in isolation [51,68], we propose a unified interface for full image annotation in a single pass.(III) Empower the annotator.We empower the annotator to choose what to annotate and in which order. This enables concentrating on what the ma-chine does not already know, i.e. putting human effort only on the errors it made. This helps using the annotation budget effectively.\n Through extensive experiments on the COCO+Stuff dataset [11,51], we demonstrate that Fluid Annotation leads to accurate an-notations very efficiently, taking 3x less annotation time than the popular LabelMe interface [70].",
"title": ""
},
{
"docid": "c91057dab0cd143042e180e5e432a4fa",
"text": "The topic of this paper is a Genetic Algorithm solution to the Vehicle Routing Problem with Time Windows, a variant of one of the most common problems in contemporary operations research. The paper will introduce the problem starting with more general Traveling Salesman and Vehicle Routing problems and present some of the prevailing strategies for solving them, focusing on Genetic Algorithms. At the end, it will summarize the Genetic Algorithm solution proposed by K.Q. Zhu which was used in the programming part of the project.",
"title": ""
},
{
"docid": "efeab631d5750bad4138c69b7f866194",
"text": "In the practice of Digital Marketing (DM), Web Analytics (WA) and Key Performance Indicators (KPIs) can and should play an important role in marketing strategy formulation. It is the aim of this article to survey the various DM metrics to determine and address the following question: What are the most relevant metrics and KPIs that companies need to understand and manage in order to increase the effectiveness of their DM strategies? Therefore, to achieve these objectives, a Systematic Literature Review has been carried out based on two main themes (i) Digital Marketing and (ii) Web Analytics. The search terms consulted in the databases have been (i) DM and (ii) WA obtaining a result total of n = 378 investigations. The databases that have been consulted for the extraction of data were Scopus, PubMed, PsyINFO, ScienceDirect and Web of Science. In this study, we define and identify the main KPIs in measuring why, how and for what purpose users interact with web pages and ads. The main contribution of the study is to lay out and clarify quantitative and qualitative KPIs and indicators for DM performance in order to achieve a consensus on the use and measurement of these indicators.",
"title": ""
},
{
"docid": "bf5280b0c76ffe4b02976df1d2c1ec93",
"text": "5G Technology stands for Fifth Generation Mobile technology. From generation 1G to 2.5G and from 3G to 5G this world of telecommunication has seen a number of improvements along with improved performance with every passing day. Fifth generation network provide affordable broadband wireless connectivity (very high speed). The paper throws light on network architecture of fifth generation technology. Currently 5G term is not officially used. In fifth generation researches are being made on development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless World. Fifth generation focus on (Voice over IP) VOIP-enabled devices that user will experience a high level of call volume and data transmission. Wire-less system designers have been facing the continuously increasing demand for high data rates and mobility required by new wireless applications and therefore has started research on fifth generation wireless systems that are expected to be deployed beyond 2020. In this article, we propose a potential cellular architecture that separates indoor and outdoor scenarios, and discuss various promising technologies for 5G wireless communication systems, such as massive MIMO, energy-efficient communications, cognitive radio networks, and visible light communications. The proposed network is enforced by nanotechnology, cloud computing and based on all IP Platform. The main features in 5G mobile network is that user can simultaneously connect to the multiple wireless technologies and can switch between them. This forthcoming mobile technology will support IPv6 and flat IP.",
"title": ""
},
{
"docid": "9970a23aedeb1a613a0909c28c35222e",
"text": "Imaging radars incorporating digital beamforming (DBF) typically require a uniform linear antenna array (ULA). However, using a large number of parallel receivers increases system complexity and cost. A switched antenna array can provide a similar performance at a lower expense. This paper describes an active switched antenna array with 32 integrated planar patch antennas illuminating a cylindrical lens. The array can be operated over a frequency range from 73 GHz–81 GHz. Together with a broadband FMCW frontend (Frequency Modulated Continuous Wave) a DBF radar was implemented. The design of the array is presented together with measurement results.",
"title": ""
},
{
"docid": "41a4e84cf6dfc073c962dd9c6c13d6fe",
"text": "Pteridinone-based Toll-like receptor 7 (TLR7) agonists were identified as potent and selective alternatives to the previously reported adenine-based agonists, leading to the discovery of GS-9620. Analogues were optimized for the immunomodulatory activity and selectivity versus other TLRs, based on differential induction of key cytokines including interferon α (IFN-α) and tumor necrosis factor α (TNF-α). In addition, physicochemical properties were adjusted to achieve desirable in vivo pharmacokinetic and pharmacodynamic properties. GS-9620 is currently in clinical evaluation for the treatment of chronic hepatitis B (HBV) infection.",
"title": ""
},
{
"docid": "8b05f1d48e855580a8b0b91f316e89ab",
"text": "The demand for improved service delivery requires new approaches and attitudes from local government. Implementation of knowledge sharing practices in local government is one of the critical processes that can help to establish learning organisations. The main purpose of this paper is to investigate how knowledge management systems can be used to improve the knowledge sharing culture among local government employees. The study used an inductive research approach which included a thorough literature review and content analysis. The technology-organisation-environment theory was used as the theoretical foundation of the study. Making use of critical success factors, the study advises how existing knowledge sharing practices can be supported and how new initiatives can be developed, making use of a knowledge management system. The study recommends that local government must ensure that knowledge sharing practices and initiatives are fully supported and promoted by top management.",
"title": ""
},
{
"docid": "c9878a454c91fec094fce02e1ac49348",
"text": "Autonomous walking bipedal machines, possibly useful for rehabilitation and entertainment purposes, need a high energy efficiency, offered by the concept of ‘Passive Dynamic Walking’ (exploitation of the natural dynamics of the robot). 2D passive dynamic bipeds have been shown to be inherently stable, but in the third dimension two problematic degrees of freedom are introduced: yaw and roll. We propose a design for a 3D biped with a pelvic body as a passive dynamic compensator, which will compensate for the undesired yaw and roll motion, and allow the rest of the robot to move as if it were a 2D machine. To test our design, we perform numerical simulations on a multibody model of the robot. With limit cycle analysis we calculate the stability of the robot when walking at its natural speed. The simulation shows that the compensator, indeed, effectively compensates for both the yaw and the roll motion, and that the walker is stable.",
"title": ""
},
{
"docid": "6d5429ddf4050724432da73af60274d6",
"text": "We present an Integer Linear Program for exact inference under a maximum coverage model for automatic summarization. We compare our model, which operates at the subsentence or “concept”-level, to a sentencelevel model, previously solved with an ILP. Our model scales more efficiently to larger problems because it does not require a quadratic number of variables to address redundancy in pairs of selected sentences. We also show how to include sentence compression in the ILP formulation, which has the desirable property of performing compression and sentence selection simultaneously. The resulting system performs at least as well as the best systems participating in the recent Text Analysis Conference, as judged by a variety of automatic and manual content-based metrics.",
"title": ""
},
{
"docid": "4143ffda9aefc24130cf14d1a55b7330",
"text": "The abundance of opinions on the web has kindled the study of opinion summarization over the last few years. People have introduced various techniques and paradigms to solving this special task. This survey attempts to systematically investigate the different techniques and approaches used in opinion summarization. We provide a multi-perspective classification of the approaches used and highlight some of the key weaknesses of these approaches. This survey also covers evaluation techniques and data sets used in studying the opinion summarization problem. Finally, we provide insights into some of the challenges that are left to be addressed as this will help set the trend for future research in this area.",
"title": ""
}
] | scidocsrr |
da5f151108f89d465696ddb4ca2055eb | Optimizing SPARQL Query Answering over OWL Ontologies | [
{
"docid": "f0d1b6dbfe6d8c122a59ff0ff92d282b",
"text": "There are many query languages (QLs) that can be used to query RDF and OWL ontologies but neither type is satisfactory for querying OWL-DL ontologies. RDF-based QLs (RDQL, SeRQL, SPARQL) are harder to give a semantics w.r.t. OWL-DL and are more powerful than what OWL-DL reasoners can provide. DL-based QLs (DIG ask queries, nRQL) have clear semantics but are not powerful enough in the general case. In this paper we describe SPARQL-DL, a substantial subset of SPARQL for which we provide a clear OWL-DL based semantics. SPARQL-DL is significantly more expressive than existing DL QLs (by allowing mixed TBox/RBox/ABox queries) and can still be implemented without too much effort on top of existing OWL-DL reasoners. We discuss design decisions and practical issues that arise for defining SPARQL-DL and report about our preliminary prototype implemented on top of OWL-DL reasoner Pellet.",
"title": ""
},
{
"docid": "79cdb154262b6588abec7c374f6a289f",
"text": "We propose a new family of description logics (DLs), called DL-Lite, specifically tailored to capture basic ontology languages, while keeping low complexity of reasoning. Reasoning here means not only computing subsumption between concepts and checking satisfiability of the whole knowledge base, but also answering complex queries (in particular, unions of conjunctive queries) over the instance level (ABox) of the DL knowledge base. We show that, for the DLs of the DL-Lite family, the usual DL reasoning tasks are polynomial in the size of the TBox, and query answering is LogSpace in the size of the ABox (i.e., in data complexity). To the best of our knowledge, this is the first result of polynomial-time data complexity for query answering over DL knowledge bases. Notably our logics allow for a separation between TBox and ABox reasoning during query evaluation: the part of the process requiring TBox reasoning is independent of the ABox, and the part of the process requiring access to the ABox can be carried out by an SQL engine, thus taking advantage of the query optimization strategies provided by current database management systems. Since even slight extensions to the logics of the DL-Lite family make query answering at least NLogSpace in data complexity, thus ruling out the possibility of using on-the-shelf relational technology for query processing, we can conclude that the logics of the DL-Lite family are the maximal DLs supporting efficient query answering over large amounts of instances.",
"title": ""
}
] | [
{
"docid": "4aad195a8dd20cd2531f0429ed6b0966",
"text": "To solve problems associated with conventional 2D fingerprint acquisition processes including skin deformations and print smearing, we developed a noncontact 3D fingerprint scanner employing structured light illumination that, in order to be backwards compatible with existing 2D fingerprint recognition systems, requires a method of unwrapping the 3D scans into 2D equivalent prints. For the latter purpose of virtually flattening a 3D print, this paper introduces a fit-sphere unwrapping algorithm. Taking advantage of detailed 3D information, the proposed method defuses the unwrapping distortion by controlling the distances between neighboring points. Experimental results will demonstrate the high quality and recognition performance of the 3D unwrapped prints versus traditionally collected 2D prints. Furthermore, by classifying the 3D database into high- and low-quality data sets, we demonstrate that the relationship between quality and recognition performance holding for conventional 2D prints is achieved for 3D unwrapped fingerprints.",
"title": ""
},
{
"docid": "f6574fbbdd53b2bc92af485d6c756df0",
"text": "A comparative analysis between Nigerian English (NE) and American English (AE) is presented in this article. The study is aimed at highlighting differences in the speech parameters, and how they influence speech processing and automatic speech recognition (ASR). The UILSpeech corpus of Nigerian-Accented English isolated word recordings, read speech utterances, and video recordings are used as a reference for Nigerian English. The corpus captures the linguistic diversity of Nigeria with data collected from native speakers of Hausa, Igbo, and Yoruba languages. The UILSpeech corpus is intended to provide a unique opportunity for application and expansion of speech processing techniques to a limited resource language dialect. The acoustic-phonetic differences between American English (AE) and Nigerian English (NE) are studied in terms of pronunciation variations, vowel locations in the formant space, mean fundamental frequency, and phone model distances in the acoustic space, as well as through visual speech analysis of the speakers’ articulators. A strong impact of the AE–NE acoustic mismatch on ASR is observed. A combination of model adaptation and extension of the AE lexicon for newly established NE pronunciation variants is shown to substantially improve performance of the AE-trained ASR system in the new NE task. This study is a part of the pioneering efforts towards incorporating speech technology in Nigerian English and is intended to provide a development basis for other low resource language dialects and languages.",
"title": ""
},
{
"docid": "5a03bfd124df29ed5607a13fe546e661",
"text": "Employees and/or functional managers increasingly adopt and use IT systems and services that the IS management of the organization does neither provide nor approve. To effectively counteract such shadow IT in organizations, the understanding of employees’ motivations and drivers is necessary. However, the scant literature on this topic primarily focused on various governance approaches at firm level. With the objective to open the black box of shadow IT usage at the individual unit of analysis, we develop a research model and propose a laboratory experiment to examine users’ justifications for violating implicit and explicit IT usage restrictions based on neutralization theory. To be precise, in this research-in-progress, we posit positive associations between shadow IT usage and human tendencies to downplay such kind of rule-breaking behaviors due to necessity, no injury, and injustice. We expect a lower impact of these neutralization effects in the presence of behavioral IT guidelines that explicitly prohibit users to employ exactly those shadow IT systems.",
"title": ""
},
{
"docid": "a1c1bf43e9f809955b2d85daf39f58de",
"text": "Given an undirected distance graph G=(V, E, d) and a set S, where V is the set of vertices in G, E is the set of edges in G, d is a distance function which maps E into the set of nonnegative numbers and S⊑V is a subset of the vertices of V, the Steiner tree problem is to find a tree of G that spans S with minimal total distance on its edges. In this paper, we analyze a heuristic algorithm for the Steiner tree problem. The heuristic algorithm has a worst case time complexity of O(¦S¦¦V¦ 2) on a random access computer and it guarantees to output a tree that spans S with total distance on its edges no more than 2(1−1/l) times that of the optimal tree, where l is the number of leaves in the optimal tree.",
"title": ""
},
{
"docid": "62769e2979d1a1181ffebedc18f3783a",
"text": "This paper argues that at least one of the following propositions is true: (1) the human species is very likely to go extinct before reaching a “posthuman” stage; (2) any posthuman civilization is extremely unlikely to run a significant number of simulations of their evolutionary history (or variations thereof); (3) we are almost certainly living in a computer simulation. It follows that the transhumanist dogma that there is a significant chance that we will one day become posthumans who run ancestor-simulations is false, unless we are currently living in a simulation. A number of other consequences of this result are also discussed. Preliminaries Substrate-independence is a common assumption in the philosophy of mind. The idea is that mental states can supervene on any of a broad class of physical substrates. Provided a system implements the right sort of computational structures and processes, it can be associated with conscious experiences. It is not an essential property of consciousness that it is implemented on carbon-based biological neural networks inside a cranium; silicon-based processors inside a computer could in principle do the trick as well. Arguments for this thesis have been given in the literature, and although it is not entirely uncontroversial, we shall take it as a given here. The argument we shall present does not, however, depend on any strong version of functionalism or computationalism. For example, we need not assume that the thesis of substrate-independence is necessarily true analytic (either analytically or metaphysically) just that, in fact, a computer running a suitable program would be conscious. Moreover, we need not assume that in order to create a mind on a computer it would be sufficient to program it in such a way that it behaves like a human in all situations (including passing Turing tests etc.). We only need the weaker assumption that it would suffice (for generation of subjective experiences) if the computational processes of a human brain were structurally replicated in suitably fine-grained detail, such as on the level of individual neurons. This highly attenuated version of substrate-independence is widely accepted. At the current stage of technology, we have neither sufficiently powerful hardware nor the requisite software to create conscious minds in computers. But persuasive arguments have been given to the effect that if technological progress continues unabated then these shortcomings will eventually be overcome. Several authors argue that this stage may be only a few decades away (Drexler 1985; Bostrom 1998; Kurzweil 1999; Moravec 1999). Yet for present purposes we need not make any assumptions about the time-scale. The argument we shall present works equally well for those who think that it will take hundreds of thousands of years to reach a “posthuman” stage of civilization, where humankind has acquired most of the technological capabilities that one can currently show to be consistent with physical laws and with material and energy constraints. Such a mature stage of technological development will make it possible to convert planets and other astronomical resources into enormously powerful computers. It is currently hard to be confident in any upper bound on the computing power that may be available to posthuman civilizations. Since we are still lacking a “theory of everything”, we cannot rule out the possibility that novel physical phenomena, not allowed for in current physical theories, may be utilized to transcend those theoretical constraints’ that in our current understanding limit the information processing density that can be attained in a given lump of matter. But we can with much greater confidence establish lower bounds on posthuman computation, by assuming only mechanisms that are already understood. For example, Eric Drexler has outlined a design for a system the size of a sugar cube (excluding cooling and power supply) that would perform 10 instructions per second (Drexler 1992). Another author gives a rough performance estimate of 10 Are You Living In a Computer Simulation? 2 operations per second for a computer with a mass on order of large planet (Bradbury 2000). The amount of computing power needed to emulate a human mind can likewise be roughly estimated. One estimate, based on how computationally expensive it is to replicate the functionality of a piece of nervous tissue that we already understand (contrast enhancement in the retina), yields a figure of ~10 operations per second for the entire human brain (Moravee 1989). An alternative estimate, based the number of synapses in the brain and their firing frequency gives a figure of ~10l6-10l7 operations per second (Bostrom 1998). Conceivably, even more could be required if we want to simulate in detail the internal workings of synapses and dentritic trees. However, it is likely that the human central nervous system has a high degree of redundancy on the mircoscale to compensate for the unreliability and noisiness of its components. One would therefore expect a substantial increase in efficiency when using more reliable and versatile non-biological processors. If the environment is included in the simulation, this will require additional computing power. How much depends on the scope and granularity of the simulation. Simulating the entire universe down to the quantum level is obviously infeasible (unless radically new physics is discovered). But in order to get a realistic simulation of human experience, much less is needed — only whatever is required to ensure that the simulated humans, interacting in normal human ways with their simulated environment, don’t notice any irregularities. The microscopic structure of the inside of the Earth can be safely omitted. Distant astronomical objects can have highly compressed representations indeed: verisimilitude need extend to the narrow band of properties that we can observe from our planet or solar system spacecraft. On the surface of Earth, macroscopic objects in inhabited areas may need to be continuously simulated. Microscopic phenomena could likely be filled in on an ad hoc basis. What you see when you look in an electron microscope needs to look unsuspicious, but you have usually have no way of confirming its coherence with unobserved parts of the microscopic world. Exceptions arise when we set up systems that are designed to harness unobserved microscopic phenomena operating according to known principles to get results that we are able to independently verify. The paradigmatic instance is computers. The simulation may therefore need to include a continuous representation of computers down to the level of individual logic elements. But this is no big problem, since our current computing power is negligible by posthuman standards. In general, the posthuman simulator would have enough computing power to keep track of the detailed belief-states in all human brains at all times, Thus, when it saw that a human was about to make an observation of the microscopic world, it could fill in sufficient detail in the simulation in the appropriate domain on an as-needed basis. Should any error occur, the director could easily edit the states of any brains that have become aware of an anomaly before it spoils the simulation. Alternatively, the director can skip back a few seconds and rerun the simulation in a way that avoids the problem. It thus seems plausible that the main computational cost consists in simulating organic brains down to the neuronal or sub-neuronal level (although as we build more and faster computers, the cost of simulating our machines might eventually come to dominate the cost of simulating nervous systems). While it is not possible to get a very exact estimate of the cost of a realistic simulation of human history, we can use,~1O-10 operations as a rough estimate. As we gain more experience with virtual reality, we will get a better grasp of the computational requirements for making such worlds appear realistic to their visitors. But in any case, even if our estimate is off by several orders of magnitude, this does not matter much for the argument we are pursuing here. We noted that a rough approximation of the computational power of a single planetary-mass computer is 10 operations per second, and that assumes only already known nanotechnological designs, which are probably far from optimal. Such a computer could simulate the entire mental history of humankind (call this an ancestor-simulation) in less than 10 seconds. (A posthuman civilization may eventually build an astronomical number of such computers.) We can conclude that the computing power available to a posthuman civilization is sufficient to run a huge number of ancestor-simulations even it allocates only a minute fraction of its resources to that purpose. We can draw this conclusion even while leaving a substantial margin of error 3 Bostrom (2001): Are You Living In a Computer Simulation? in all our guesstimates. • Posthuman civilizations would have enough computing power to run hugely many ancestorsimulations even while using only a tiny fraction of their resources for that purpose. The Simulation Argument The core of the argument that this paper presents can be expressed roughly as follows: If there were a substantial chance that our civilization will ever get to the posthuman stage and run many ancestorsimulations, then how come you are not living in such a simulation? We shall develop this idea into a rigorous argument. Let us introduce the following notation: DOOM: Humanity goes extinct before reaching the posthuman stage SIM: You are living in a simulation N: Average number of ancestor-simulations run by a posthuman civilization H: Average number of individuals that have lived in a civilization before it reaches a posthuman stage The expected fraction of all observers with human-type experiences that live in simulations is then fsim= [l-P(DOOM)]×N×H ([1-P(DOOM)]×N×H",
"title": ""
},
{
"docid": "6e4d846272030b160b30d56a60eb2cad",
"text": "MapReduce and Spark are two very popular open source cluster computing frameworks for large scale data analytics. These frameworks hide the complexity of task parallelism and fault-tolerance, by exposing a simple programming API to users. In this paper, we evaluate the major architectural components in MapReduce and Spark frameworks including: shuffle, execution model, and caching, by using a set of important analytic workloads. To conduct a detailed analysis, we developed two profiling tools: (1) We correlate the task execution plan with the resource utilization for both MapReduce and Spark, and visually present this correlation; (2) We provide a break-down of the task execution time for in-depth analysis. Through detailed experiments, we quantify the performance differences between MapReduce and Spark. Furthermore, we attribute these performance differences to different components which are architected differently in the two frameworks. We further expose the source of these performance differences by using a set of micro-benchmark experiments. Overall, our experiments show that Spark is about 2.5x, 5x, and 5x faster than MapReduce, for Word Count, k-means, and PageRank, respectively. The main causes of these speedups are the efficiency of the hash-based aggregation component for combine, as well as reduced CPU and disk overheads due to RDD caching in Spark. An exception to this is the Sort workload, for which MapReduce is 2x faster than Spark. We show that MapReduce’s execution model is more efficient for shuffling data than Spark, thus making Sort run faster on MapReduce.",
"title": ""
},
{
"docid": "5e43dd30c8cf58fe1b79686b33a015b9",
"text": "We review Boltzmann machines extended for time-series. These models often have recurrent structure, and back propagration through time (BPTT) is used to learn their parameters. The perstep computational complexity of BPTT in online learning, however, grows linearly with respect to the length of preceding time-series (i.e., learning rule is not local in time), which limits the applicability of BPTT in online learning. We then review dynamic Boltzmann machines (DyBMs), whose learning rule is local in time. DyBM’s learning rule relates to spike-timing dependent plasticity (STDP), which has been postulated and experimentally confirmed for biological neural networks.",
"title": ""
},
{
"docid": "29e030bb4d8547d7615b8e3d17ec843d",
"text": "This Paper examines the enforcement of occupational safety and health (OSH) regulations; it validates the state of enforcement of OSH regulations by extracting the salient issues that influence enforcement of OSH regulations in Nigeria. It’s the duty of the Federal Ministry of Labour and Productivity (Inspectorate Division) to enforce the Factories Act of 1990, while the Labour, Safety, Health and Welfare Bill of 2012 empowers the National Council for Occupational Safety and Health of Nigeria to administer the proceeding regulations on its behalf. Sadly enough, the impact of the enforcement authority is ineffective, as the key stakeholders pay less attention to OSH regulations; thus, rendering the OSH scheme dysfunctional and unenforceable, at the same time impeding OSH development. For optimum OSH in Nigeria, maximum enforcement and compliance with the regulations must be in place. This paper, which is based on conceptual analysis, reviews literature gathered through desk literature search. It identified issues to OSH enforcement such as: political influence, bribery and corruption, insecurity, lack of governmental commitment, inadequate legislation inter alia. While recommending ways to improve the enforcement of OSH regulations, it states that self-regulatory style of enforcing OSH regulations should be adopted by organisations. It also recommends that more OSH inspectors be recruited; local government authorities empowered to facilitate the enforcement of OSH regulations. Moreover, the study encourages organisations to champion OSH enforcement, as it is beneficial to them; it concludes that the burden of OSH improvement in Nigeria is on the government, educational authorities, organisations and trade unions.",
"title": ""
},
{
"docid": "9e576d4ad28efa85bf790f93fb995ae8",
"text": "DSRDs are fast HV opening switching devices. Traditionally, these deep junction devices are fabricated on silicon wafers by deep diffusion. We present DSRD results based on silicon epitaxial layers with as-grown junctions. Static measurements showed a rectifying behavior with leakage currents proportional to device dimension. Pulsed power measurements showed that the switching rate was dependant on the DSRD current density.",
"title": ""
},
{
"docid": "89824afa074c634f72202c647b988d28",
"text": "BACKGROUND AND PURPOSE\nThis case report describes a decision-making process that was used to progress a home-based intervention that coupled treadmill and walker stepping for a preambulatory toddler with spina bifida.\n\n\nCASE DESCRIPTION\nThe toddler in this report had an L4-L5 level lesion, and began this home-based intervention at 18 months of age when she was pulling to stand.\n\n\nINTERVENTION\nThe intervention included parameters for treadmill stepping that prepared this toddler for gait with orthotics and was progressed to overground walking with a walker using a decision-making algorithm based on data obtained from a parent log and coded video.\n\n\nOUTCOMES\nThis toddler progressed from not stepping at the start of the study to ambulating 150 m with a walker at age 23 months, after 18 weeks of this intervention.\n\n\nDISCUSSION AND CONCLUSION\nThe intervention and decision-making process used in this study were family centered and may be applicable to gait intervention with other populations.",
"title": ""
},
{
"docid": "b46b8dd33cf82d82d41f501ea87ebfc1",
"text": "Repetition is a core principle in music. This is especially true for popular songs, generally marked by a noticeable repeating musical structure, over which the singer performs varying lyrics. On this basis, we propose a simple method for separating music and voice, by extraction of the repeating musical structure. First, the period of the repeating structure is found. Then, the spectrogram is segmented at period boundaries and the segments are averaged to create a repeating segment model. Finally, each time-frequency bin in a segment is compared to the model, and the mixture is partitioned using binary time-frequency masking by labeling bins similar to the model as the repeating background. Evaluation on a dataset of 1,000 song clips showed that this method can improve on the performance of an existing music/voice separation method without requiring particular features or complex frameworks.",
"title": ""
},
{
"docid": "f72267cde1287bc3d0a235043c4dc5f5",
"text": "End-to-end congestion control mechanisms have been critical to the robustness and stability of the Internet. Most of today’s Internet traffic is TCP, and we expect this to remain so in the future. Thus, having “TCP-friendly” behavior is crucial for new applications. However, the emergence of non-congestion-controlled realtime applications threatens unfairness to competing TCP traffic and possible congestion collapse. We present an end-to-end TCP-friendly Rate Adaptation Protocol (RAP), which employs an additive-increase, multiplicativedecrease (AIMD) algorithm. It is well suited for unicast playback of realtime streams and other semi-reliable rate-based applications. Its primary goal is to be fair and TCP-friendly while separating network congestion control from application-level reliability. We evaluate RAP through extensive simulation, and conclude that bandwidth is usually evenly shared between TCP and RAP traffic. Unfairness to TCP traffic is directly determined by how TCP diverges from the AIMD algorithm. Basic RAP behaves in a TCPfriendly fashion in a wide range of likely conditions, but we also devised a fine-grain rate adaptation mechanism to extend this range further. Finally, we show that deploying RED queue management can result in an ideal fairness between TCP and RAP traffic.",
"title": ""
},
{
"docid": "587f6e73ca6653860cda66238d2ba146",
"text": "Cable-suspended robots are structurally similar to parallel actuated robots but with the fundamental difference that cables can only pull the end-effector but not push it. From a scientific point of view, this feature makes feedback control of cable-suspended robots more challenging than their counterpart parallel-actuated robots. In the case with redundant cables, feedback control laws can be designed to make all tensions positive while attaining desired control performance. This paper presents approaches to design positive tension controllers for cable suspended robots with redundant cables. Their effectiveness is demonstrated through simulations and experiments on a three degree-of-freedom cable suspended robots.",
"title": ""
},
{
"docid": "ce22073b8dbc3a910fa8811a2a8e5c87",
"text": "Ethernet is going to play a major role in automotive communications, thus representing a significant paradigm shift in automotive networking. Ethernet technology will allow for multiple in-vehicle systems (such as, multimedia/infotainment, camera-based advanced driver assistance and on-board diagnostics) to simultaneously access information over a single unshielded twisted pair cable. The leading technology for automotive applications is the IEEE Audio Video Bridging (AVB), which offers several advantages, such as open specification, multiple sources of electronic components, high bandwidth, the compliance with the challenging EMC/EMI automotive requirements, and significant savings on cabling costs, thickness and weight. This paper surveys the state of the art on Ethernet-based automotive communications and especially on the IEEE AVB, with a particular focus on the way to provide support to the so-called scheduled traffic, that is a class of time-sensitive traffic (e.g., control traffic) that is transmitted according to a time schedule.",
"title": ""
},
{
"docid": "b55a314aea8914db8705cd3974c862bb",
"text": "This study examines the mediating effect of perceived usefulness on the relationship between tax service quality (correctness, response time, system support) and continuance usage intention of e-filing system in Malaysia. A total of 116 data was analysed using Partial Least Squared Method (PLS). The result showed that Perceived Usefulness has a partial mediating effect on the relationship between tax service quality (Correctness, Response Time) with the continuance usage intention and tax service quality (correctness) has significant positive relationship with continuance usage intention. Perceived usefulness was found to be the most important predictor of continuance usage intention.",
"title": ""
},
{
"docid": "ed0465dc58b0f9c62e729fed4054bb58",
"text": "In this study, an instructional design model was employed for restructuring a teacher education course with technology. The model was applied in a science education method course, which was offered in two different but consecutive semesters with a total enrollment of 111 students in the fall semester and 116 students in the spring semester. Using tools, such as multimedia authoring tools in the fall semester and modeling software in the spring semester, teacher educators designed high quality technology-infused lessons for science and, thereafter, modeled them in classroom for preservice teachers. An assessment instrument was constructed to assess preservice teachers technology competency, which was measured in terms of four aspects, namely, (a) selection of appropriate science topics to be taught with technology, (b) use of appropriate technology-supported representations and transformations for science content, (c) use of technology to support teaching strategies, and (d) integration of computer activities with appropriate inquiry-based pedagogy in the science classroom. The results of a MANOVA showed that preservice teachers in the Modeling group outperformed preservice teachers overall performance in the Multimedia group, F = 21.534, p = 0.000. More specifically, the Modeling group outperformed the Multimedia group on only two of the four aspects of technology competency, namely, use of technology to support teaching strategies and integration of computer activities with appropriate pedagogy in the classroom, F = 59.893, p = 0.000, and F = 10.943, p = 0.001 respectively. The results indicate that the task of preparing preservice teachers to become technology competent is difficult and requires many efforts for providing them with ample of 0360-1315/$ see front matter 2004 Elsevier Ltd. All rights reserved. doi:10.1016/j.compedu.2004.06.002 * Tel.: +357 22 753772; fax: +357 22 377950. E-mail address: cangeli@ucy.ac.cy. 384 C. Angeli / Computers & Education 45 (2005) 383–398 opportunities during their education to develop the competencies needed to be able to teach with technology. 2004 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "4aaab0aa476c60b2486fc76d63f7d899",
"text": "When evaluating a potential product purchase, customers may have many questions in mind. They want to get adequate information to determine whether the product of interest is worth their money. In this paper we present a simple deep learning model for answering questions regarding product facts and specifications. Given a question and a product specification, the model outputs a score indicating their relevance. To train and evaluate our proposed model, we collected a dataset of 7,119 questions that are related to 153 different products. Experimental results demonstrate that — despite its simplicity — the performance of our model is shown to be comparable to a more complex state-of-the-art baseline.",
"title": ""
},
{
"docid": "4973ce25e2a638c3923eda62f92d98b2",
"text": "About 20 ethnic groups reside in Mongolia. On the basis of genetic and anthropological studies, it is believed that Mongolians have played a pivotal role in the peopling of Central and East Asia. However, the genetic relationships among these ethnic groups have remained obscure, as have their detailed relationships with adjacent populations. We analyzed 16 binary and 17 STR polymorphisms of human Y chromosome in 669 individuals from nine populations, including four indigenous ethnic groups in Mongolia (Khalkh, Uriankhai, Zakhchin, and Khoton). Among these four Mongolian populations, the Khalkh, Uriankhai, and Zakhchin populations showed relatively close genetic affinities to each other and to Siberian populations, while the Khoton population showed a closer relationship to Central Asian populations than to even the other Mongolian populations. These findings suggest that the major Mongolian ethnic groups have a close genetic affinity to populations in northern East Asia, although the genetic link between Mongolia and Central Asia is not negligible.",
"title": ""
},
{
"docid": "dd43f8b2503012a036968c33724059ed",
"text": "Design of permanent magnet rotor for LSPMSM with inherent starting torque is the prime consideration for the designer. Presence of short circuiting flux for any kind of the PMSM reduces the starting as well as the steady state performances by reducing the air gap flux density. A new Permanent Magnet rotor with high reluctance flux barrier has been proposed in this paper. The model has been developed and simulated using Maxwell 2D. Two dimensional Finite Element analysis was done for magnetostatics and the transient analysis. The experimental prototype has developed, tested and the results thus obtained have been validated with the simulated results.",
"title": ""
}
] | scidocsrr |
a7a0e5af984ac414db1a85f2fe606907 | T-drive: driving directions based on taxi trajectories | [
{
"docid": "cbaf7cd4e17c420b7546d132959b3283",
"text": "User mobility has given rise to a variety of Web applications, in which the global positioning system (GPS) plays many important roles in bridging between these applications and end users. As a kind of human behavior, transportation modes, such as walking and driving, can provide pervasive computing systems with more contextual information and enrich a user's mobility with informative knowledge. In this article, we report on an approach based on supervised learning to automatically infer users' transportation modes, including driving, walking, taking a bus and riding a bike, from raw GPS logs. Our approach consists of three parts: a change point-based segmentation method, an inference model and a graph-based post-processing algorithm. First, we propose a change point-based segmentation method to partition each GPS trajectory into separate segments of different transportation modes. Second, from each segment, we identify a set of sophisticated features, which are not affected by differing traffic conditions (e.g., a person's direction when in a car is constrained more by the road than any change in traffic conditions). Later, these features are fed to a generative inference model to classify the segments of different modes. Third, we conduct graph-based postprocessing to further improve the inference performance. This postprocessing algorithm considers both the commonsense constraints of the real world and typical user behaviors based on locations in a probabilistic manner. The advantages of our method over the related works include three aspects. (1) Our approach can effectively segment trajectories containing multiple transportation modes. (2) Our work mined the location constraints from user-generated GPS logs, while being independent of additional sensor data and map information like road networks and bus stops. (3) The model learned from the dataset of some users can be applied to infer GPS data from others. Using the GPS logs collected by 65 people over a period of 10 months, we evaluated our approach via a set of experiments. As a result, based on the change-point-based segmentation method and Decision Tree-based inference model, we achieved prediction accuracy greater than 71 percent. Further, using the graph-based post-processing algorithm, the performance attained a 4-percent enhancement.",
"title": ""
}
] | [
{
"docid": "66ab561342d6f0c80a0eb8d4c2b19a97",
"text": "Impedance spectroscopy of biological cells has been used to monitor cell status, e.g. cell proliferation, viability, etc. It is also a fundamental method for the study of the electrical properties of cells which has been utilised for cell identification in investigations of cell behaviour in the presence of an applied electric field, e.g. electroporation. There are two standard methods for impedance measurement on cells. The use of microelectrodes for single cell impedance measurement is one method to realise the measurement, but the variations between individual cells introduce significant measurement errors. Another method to measure electrical properties is by the measurement of cell suspensions, i.e. a group of cells within a culture medium or buffer. This paper presents an investigation of the impedance of normal and cancerous breast cells in suspension using the Maxwell-Wagner mixture theory to analyse the results and extract the electrical parameters of a single cell. The results show that normal and different stages of cancer breast cells can be distinguished by the conductivity presented by each cell.",
"title": ""
},
{
"docid": "1d9f683409c3d6f19b9b6738a1a76c4a",
"text": "The empirical fact that classifiers, trained on given data collections, perform poorly when tested on data acquired in different settings is theoretically explained in domain adaptation through a shift among distributions of the source and target domains. Alleviating the domain shift problem, especially in the challenging setting where no labeled data are available for the target domain, is paramount for having visual recognition systems working in the wild. As the problem stems from a shift among distributions, intuitively one should try to align them. In the literature, this has resulted in a stream of works attempting to align the feature representations learned from the source and target domains. Here we take a different route. Rather than introducing regularization terms aiming to promote the alignment of the two representations, we act at the distribution level through the introduction of DomaIn Alignment Layers (DIAL), able to match the observed source and target data distributions to a reference one. Thorough experiments on three different public benchmarks we confirm the power of our approach. ∗This work was partially supported by the ERC grant 637076 RoboExNovo (B.C.), and the CHIST-ERA project ALOOF (B.C, F. M. C.).",
"title": ""
},
{
"docid": "83187228617d62fb37f99cf107c7602a",
"text": "A very important class of spatial queries consists of nearestneighbor (NN) query and its variations. Many studies in the past decade utilize R-trees as their underlying index structures to address NN queries efficiently. The general approach is to use R-tree in two phases. First, R-tree’s hierarchical structure is used to quickly arrive to the neighborhood of the result set. Second, the R-tree nodes intersecting with the local neighborhood (Search Region) of an initial answer are investigated to find all the members of the result set. While R-trees are very efficient for the first phase, they usually result in the unnecessary investigation of many nodes that none or only a small subset of their including points belongs to the actual result set. On the other hand, several recent studies showed that the Voronoi diagrams are extremely efficient in exploring an NN search region, while due to lack of an efficient access method, their arrival to this region is slow. In this paper, we propose a new index structure, termed VoR-Tree that incorporates Voronoi diagrams into R-tree, benefiting from the best of both worlds. The coarse granule rectangle nodes of R-tree enable us to get to the search region in logarithmic time while the fine granule polygons of Voronoi diagram allow us to efficiently tile or cover the region and find the result. Utilizing VoR-Tree, we propose efficient algorithms for various Nearest Neighbor queries, and show that our algorithms have better I/O complexity than their best competitors.",
"title": ""
},
{
"docid": "e86a7a9b16ab38954a4c71d33f717106",
"text": "OBJECTIVE\nTo evaluate the usefulness of septal batten grafts to correct cartilaginous septal deformities in endonasal septoplasty.\n\n\nDESIGN\nRetrospective study.\n\n\nSETTING\nUniversity medical center.\n\n\nPATIENTS\nOf 430 patients who underwent endonasal septoplasties from January 2006 to January 2011, 30 received septal batten grafts and were enrolled in the study. Twenty-eight patients were male and 2 were female.\n\n\nMAIN OUTCOME MEASURES\nThirty consecutive patients received septal batten grafts and were followed up for more than 6 months. Patterns of septal deformity, materials used for batten graft, surgical results, symptom improvement, findings of acoustic rhinometry, and surgical complications were investigated.\n\n\nRESULTS\nAmong the 30 patients, 5 were revision cases. Most of the deformities were characterized as moderate to severe degrees of curved or angulated deviations of the cartilaginous septum. The batten graft was performed with either septal cartilage (n = 21) or bony septum (n = 9). A straight septum was achieved in 90% of all procedures. Subjective symptoms of nasal obstruction were improved in all patients, as evaluated by the Nasal Obstruction Symptom Evaluation scale. Acoustic rhinometry revealed that after surgery the mean minimal cross-sectional area changed from 0.33 cm² to 0.42 cm² (P = .02) and the nasal volume from 4.71 mL to 6.28 mL (P = .02). There were no major complications, eg, septal perforation or saddle nose, and no revision surgery was needed.\n\n\nCONCLUSION\nEndonasal septal batten graft is a safe, useful, and effective technique to straighten moderate to severe septal cartilage deformities that are otherwise not correctable via conventional septoplasty techniques.",
"title": ""
},
{
"docid": "bda1e2a1f27673dceed36adddfdc3e36",
"text": "IEEE 802.11 WLANs are a very important technology to provide high speed wireless Internet access. Especially at airports, university campuses or in city centers, WLAN coverage is becoming ubiquitous leading to a deployment of hundreds or thousands of Access Points (AP). Managing and configuring such large WLAN deployments is a challenge. Current WLAN management protocols such as CAPWAP are hard to extend with new functionality. In this paper, we present CloudMAC, a novel architecture for enterprise or carrier grade WLAN systems. By partially offloading the MAC layer processing to virtual machines provided by cloud services and by integrating our architecture with OpenFlow, a software defined networking approach, we achieve a new level of flexibility and reconfigurability. In Cloud-MAC APs just forward MAC frames between virtual APs and IEEE 802.11 stations. The processing of MAC layer frames as well as the creation of management frames is handled at the virtual APs while the binding between the virtual APs and the physical APs is managed using OpenFlow. The testbed evaluation shows that CloudMAC achieves similar performance as normal WLANs, but allows novel services to be implemented easily in high level programming languages. The paper presents a case study which shows that dynamically switching off APs to save energy can be performed seamlessly with CloudMAC, while a traditional WLAN architecture causes large interruptions for users.",
"title": ""
},
{
"docid": "12e2d86add1918393291ea55f99a44a0",
"text": "Supervised classification algorithms aim at producing a learning model from a labeled training set. Various successful techniques have been proposed to solve the problem in the binary classification case. The multiclass classification case is more delicate, as many of the algorithms were introduced basically to solve binary classification problems. In this short survey we investigate the various techniques for solving the multiclass classification problem.",
"title": ""
},
{
"docid": "b0cba371bb9628ac96a9ae2bb228f5a9",
"text": "Graph-based recommendation approaches can model associations between users and items alongside additional contextual information. Recent studies demonstrated that representing features extracted from social media (SM) auxiliary data, like friendships, jointly with traditional users/items ratings in the graph, contribute to recommendation accuracy. In this work, we take a step further and propose an extended graph representation that includes socio-demographic and personal traits extracted from the content posted by the user on SM. Empirical results demonstrate that processing unstructured textual information collected from Twitter and representing it in structured form in the graph improves recommendation performance, especially in cold start conditions.",
"title": ""
},
{
"docid": "192f8528ca2416f9a49ce152def2fbe6",
"text": "We study the extent to which we can infer users’ geographical locations from social media. Location inference from social media can benet many applications, such as disaster management, targeted advertising, and news content tailoring. In recent years, a number of algorithms have been proposed for identifying user locations on social media platforms such as Twier and Facebook from message contents, friend networks, and interactions between users. In this paper, we propose a novel probabilistic model based on factor graphs for location inference that oers several unique advantages for this task. First, the model generalizes previous methods by incorporating content, network, and deep features learned from social context. e model is also exible enough to support both supervised learning and semi-supervised learning. Second, we explore several learning algorithms for the proposed model, and present a Two-chain Metropolis-Hastings (MH+) algorithm, which improves the inference accuracy. ird, we validate the proposed model on three dierent genres of data – Twier, Weibo, and Facebook – and demonstrate that the proposed model can substantially improve the inference accuracy (+3.3-18.5% by F1-score) over that of several state-of-the-art methods.",
"title": ""
},
{
"docid": "c86c10428bfca028611a5e989ca31d3f",
"text": "In the study, we discussed the ARCH/GARCH family models and enhanced them with artificial neural networks to evaluate the volatility of daily returns for 23.10.1987–22.02.2008 period in Istanbul Stock Exchange. We proposed ANN-APGARCH model to increase the forecasting performance of APGARCH model. The ANN-extended versions of the obtained GARCH models improved forecast results. It is noteworthy that daily returns in the ISE show strong volatility clustering, asymmetry and nonlinearity characteristics. 2008 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "2d67465fbc2799f815237a05905b8d7a",
"text": "This paper presents a novel way to perform multi-modal face recognition. We use Partial Least Squares (PLS) to linearly map images in different modalities to a common linear subspace in which they are highly correlated. PLS has been previously used effectively for feature selection in face recognition. We show both theoretically and experimentally that PLS can be used effectively across modalities. We also formulate a generic intermediate subspace comparison framework for multi-modal recognition. Surprisingly, we achieve high performance using only pixel intensities as features. We experimentally demonstrate the highest published recognition rates on the pose variations in the PIE data set, and also show that PLS can be used to compare sketches to photos, and to compare images taken at different resolutions.",
"title": ""
},
{
"docid": "850f29a1d3c5bc96bb36787aba428331",
"text": "In this paper, we introduce a novel framework for WEakly supervised Learning of Deep cOnvolutional neural Networks (WELDON). Our method is dedicated to automatically selecting relevant image regions from weak annotations, e.g. global image labels, and encompasses the following contributions. Firstly, WELDON leverages recent improvements on the Multiple Instance Learning paradigm, i.e. negative evidence scoring and top instance selection. Secondly, the deep CNN is trained to optimize Average Precision, and fine-tuned on the target dataset with efficient computations due to convolutional feature sharing. A thorough experimental validation shows that WELDON outperforms state-of-the-art results on six different datasets.",
"title": ""
},
{
"docid": "0f72c9034647612097c2096d1f31c980",
"text": "We tackle a fundamental problem to detect and estimate just noticeable blur (JNB) caused by defocus that spans a small number of pixels in images. This type of blur is common during photo taking. Although it is not strong, the slight edge blurriness contains informative clues related to depth. We found existing blur descriptors based on local information cannot distinguish this type of small blur reliably from unblurred structures. We propose a simple yet effective blur feature via sparse representation and image decomposition. It directly establishes correspondence between sparse edge representation and blur strength estimation. Extensive experiments manifest the generality and robustness of this feature.",
"title": ""
},
{
"docid": "160d0ba08cfade25b512c8fd46363451",
"text": "We present structured data fusion (SDF) as a framework for the rapid prototyping of knowledge discovery in one or more possibly incomplete data sets. In SDF, each data set-stored as a dense, sparse, or incomplete tensor-is factorized with a matrix or tensor decomposition. Factorizations can be coupled, or fused, with each other by indicating which factors should be shared between data sets. At the same time, factors may be imposed to have any type of structure that can be constructed as an explicit function of some underlying variables. With the right choice of decomposition type and factor structure, even well-known matrix factorizations such as the eigenvalue decomposition, singular value decomposition and QR factorization can be computed with SDF. A domain specific language (DSL) for SDF is implemented as part of the software package Tensorlab, with which we offer a library of tensor decompositions and factor structures to choose from. The versatility of the SDF framework is demonstrated by means of four diverse applications, which are all solved entirely within Tensorlab's DSL.",
"title": ""
},
{
"docid": "4227d667cac37fe0e2ecf5a8c199d885",
"text": "Plant diseases problem can cause significant reduction in both quality and quantity of agricultural products. Automatic detection of plant leaf diseases is an essential research topic as it may prove benefits in monitoring large fields of crops, and thus automatically detect the symptoms of diseases as soon as they appear on plant leaves. The proposed system is a software solution for automatic detection and computation of plant leaf diseases. The developed processing scheme consists of five main steps, first a color transformation structure for the input RGB image is created, then the noise i.e. unnecessary part is removed using specific threshold value, then the image is segmented with connected component labeling and the useful segments are extracted, finally the ANN classification is computed by giving different features i.e. size, color, proximity and average centroid distance. Experimental results on a database of 4 different diseases confirms the robustness of the proposed approach. KeywordsANN, Color, Plant Leaf Diseases, RGB ————————————————————",
"title": ""
},
{
"docid": "53d1ddf4809ab735aa61f4059a1a38b1",
"text": "In this paper we present a wearable Haptic Feedback Device to convey intuitive motion direction to the user through haptic feedback based on vibrotactile illusions. Vibrotactile illusions occur on the skin when two or more vibrotactile actuators in proximity are actuated in coordinated sequence, causing the user to feel combined sensations, instead of separate ones. By combining these illusions we can produce various sensation patterns that are discernible by the user, thus allowing to convey different information with each pattern. A method to provide information about direction through vibrotactile illusions is introduced on this paper. This method uses a grid of vibrotactile actuators around the arm actuated in coordination. The sensation felt on the skin is consistent with the desired direction of motion, so the desired motion can be intuitively understood. We show that the users can recognize the conveyed direction, and implemented a proof of concept of the proposed method to guide users' elbow flexion/extension motion.",
"title": ""
},
{
"docid": "ec5abeb42b63ed1976cd47d3078c35c9",
"text": "In semistructured data, the information that is normally associated with a schema is contained within the data, which is sometimes called “self-describing”. In some forms of semistructured data there is no separate schema, in others it exists but only places loose constraints on the data. Semistructured data has recently emerged as an important topic of study for a variety of reasons. First, there are data sources such as the Web, which we would like to treat as databases but which cannot be constrained by a schema. Second, it may be desirable to have an extremely flexible format for data exchange between disparate databases. Third, even when dealing with structured data, it may be helpful to view it. as semistructured for the purposes of browsing. This tutorial will cover a number of issues surrounding such data: finding a concise formulation, building a sufficiently expressive language for querying and transformation, and optimizat,ion problems.",
"title": ""
},
{
"docid": "d597b9229a3f9a9c680d25180a4b6308",
"text": "Mental health problems are highly prevalent and increasing in frequency and severity among the college student population. The upsurge in mobile and wearable wireless technologies capable of intense, longitudinal tracking of individuals, provide enormously valuable opportunities in mental health research to examine temporal patterns and dynamic interactions of key variables. In this paper, we present an integrative framework for social anxiety and depression (SAD) monitoring, two of the most common disorders in the college student population. We have developed a smartphone application and the supporting infrastructure to collect both passive sensor data and active event-driven data. This supports intense, longitudinal, dynamic tracking of anxious and depressed college students to evaluate how their emotions and social behaviors change in the college campus environment. The data will provide critical information about how student mental health problems are maintained and, ultimately, how student patterns on campus shift following treatment.",
"title": ""
},
{
"docid": "23832f031f7c700f741843e54ff81b4e",
"text": "Data Mining in medicine is an emerging field of great importance to provide a prognosis and deeper understanding of disease classification, specifically in Mental Health areas. The main objective of this paper is to present a review of the existing research works in the literature, referring to the techniques and algorithms of Data Mining in Mental Health, specifically in the most prevalent diseases such as: Dementia, Alzheimer, Schizophrenia and Depression. Academic databases that were used to perform the searches are Google Scholar, IEEE Xplore, PubMed, Science Direct, Scopus and Web of Science, taking into account as date of publication the last 10 years, from 2008 to the present. Several search criteria were established such as ‘techniques’ AND ‘Data Mining’ AND ‘Mental Health’, ‘algorithms’ AND ‘Data Mining’ AND ‘dementia’ AND ‘schizophrenia’ AND ‘depression’, etc. selecting the papers of greatest interest. A total of 211 articles were found related to techniques and algorithms of Data Mining applied to the main Mental Health diseases. 72 articles have been identified as relevant works of which 32% are Alzheimer’s, 22% dementia, 24% depression, 14% schizophrenia and 8% bipolar disorders. Many of the papers show the prediction of risk factors in these diseases. From the review of the research articles analyzed, it can be said that use of Data Mining techniques applied to diseases such as dementia, schizophrenia, depression, etc. can be of great help to the clinical decision, diagnosis prediction and improve the patient’s quality of life.",
"title": ""
},
{
"docid": "678a4872dfe753bac26bff2b29ac26b0",
"text": "Cyber-physical systems (CPS), such as automotive systems, are starting to include sophisticated machine learning (ML) components. Their correctness, therefore, depends on properties of the inner ML modules. While learning algorithms aim to generalize from examples, they are only as good as the examples provided, and recent efforts have shown that they can produce inconsistent output under small adversarial perturbations. This raises the question: can the output from learning components can lead to a failure of the entire CPS? In this work, we address this question by formulating it as a problem of falsifying signal temporal logic (STL) specifications for CPS with ML components. We propose a compositional falsification framework where a temporal logic falsifier and a machine learning analyzer cooperate with the aim of finding falsifying executions of the considered model. The efficacy of the proposed technique is shown on an automatic emergency braking system model with a perception component based on deep neural networks.",
"title": ""
}
] | scidocsrr |
a7a678d3fe0f92ca84e3bee767c4faf1 | Exploiting approximate computing for deep learning acceleration | [
{
"docid": "09819b576716ae71644b08464d992d03",
"text": "We show empirically that in SGD training of deep neural networks, one can, at no or nearly no loss of accuracy, quantize the gradients aggressively—to but one bit per value—if the quantization error is carried forward across minibatches (error feedback). This size reduction makes it feasible to parallelize SGD through data-parallelism with fast processors like recent GPUs. We implement data-parallel deterministically distributed SGD by combining this finding with AdaGrad, automatic minibatch-size selection, double buffering, and model parallelism. Unexpectedly, quantization benefits AdaGrad, giving a small accuracy gain. For a typical Switchboard DNN with 46M parameters, we reach computation speeds of 27k frames per second (kfps) when using 2880 samples per minibatch, and 51kfps with 16k, on a server with 8 K20X GPUs. This corresponds to speed-ups over a single GPU of 3.6 and 6.3, respectively. 7 training passes over 309h of data complete in under 7h. A 160M-parameter model training processes 3300h of data in under 16h on 20 dual-GPU servers—a 10 times speed-up—albeit at a small accuracy loss.",
"title": ""
},
{
"docid": "b9aa1b23ee957f61337e731611a6301a",
"text": "We propose DoReFa-Net, a method to train convolutional neural networks that have low bitwidth weights and activations using low bitwidth parameter gradients. In particular, during backward pass, parameter gradients are stochastically quantized to low bitwidth numbers before being propagated to convolutional layers. As convolutions during forward/backward passes can now operate on low bitwidth weights and activations/gradients respectively, DoReFa-Net can use bit convolution kernels to accelerate both training and inference. Moreover, as bit convolutions can be efficiently implemented on CPU, FPGA, ASIC and GPU, DoReFatNet opens the way to accelerate training of low bitwidth neural network on these hardware. Our experiments on SVHN and ImageNet datasets prove that DoReFa-Net can achieve comparable prediction accuracy as 32-bit counterparts. For example, a DoReFa-Net derived from AlexNet that has 1-bit weights, 2-bit activations, can be trained from scratch using 4-bit gradients to get 47% top-1 accuracy on ImageNet validation set.1 The DoReFa-Net AlexNet model is released publicly.",
"title": ""
},
{
"docid": "a51b93b417c4d3b69ccdbeed30c7b901",
"text": "Artificial neural networks can be trained with relatively low-precision floating-point and fixed-point arithmetic, using between one and 16 bits. Previous works have focused on relatively wide-but-shallow, feed-forward networks. We introduce a quantization scheme that is compatible with training very deep neural networks. Quantizing the network activations in the middle of each batch-normalization module can greatly reduce the amount of memory and computational power needed, with little loss in accuracy.",
"title": ""
},
{
"docid": "ce37f72aa7b1433cdb18af526c115138",
"text": "Deep learning algorithms achieve high classification accuracy at the expense of significant computation cost. To address this cost, a number of quantization schemes have been proposed but most of these techniques focused on quantizing weights, which are relatively smaller in size compared to activations. This paper proposes a novel quantization scheme for activations during training that enables neural networks to work well with ultra low precision weights and activations without any significant accuracy degradation. This technique, PArameterized Clipping acTivation (PACT), uses an activation clipping parameter α that is optimized during training to find the right quantization scale. PACT allows quantizing activations to arbitrary bit precisions, while achieving much better accuracy relative to published state-of-the-art quantization schemes. We show, for the first time, that both weights and activations can be quantized to 4-bits of precision while still achieving accuracy comparable to full precision networks across a range of popular models and datasets. We also show that exploiting these reduced-precision computational units in hardware can enable a super-linear improvement in inferencing performance due to a significant reduction in the area of accelerator compute engines coupled with the ability to retain the quantized model and activation data in on-chip memories.",
"title": ""
},
{
"docid": "2a9d399edc3c2dcc153d966760f38d80",
"text": "Asynchronous parallel implementations of stochastic gradient (SG) have been broadly used in solving deep neural network and received many successes in practice recently. However, existing theories cannot explain their convergence and speedup properties, mainly due to the nonconvexity of most deep learning formulations and the asynchronous parallel mechanism. To fill the gaps in theory and provide theoretical supports, this paper studies two asynchronous parallel implementations of SG: one is over a computer network and the other is on a shared memory system. We establish an ergodic convergence rate O(1/ √ K) for both algorithms and prove that the linear speedup is achievable if the number of workers is bounded by √ K (K is the total number of iterations). Our results generalize and improve existing analysis for convex minimization.",
"title": ""
}
] | [
{
"docid": "6517a33f324ae00e11b0557f03671dc0",
"text": "Software-as-a-service (SaaS) multi-tenancy in cloud-based applications helps service providers to save cost, improve resource utilization, and reduce service customization and maintenance time. This is achieved by sharing of resources and service instances among multiple “tenants” of the cloud-hosted application. However, supporting multi-tenancy adds more complexity to SaaS applications required capabilities. Security is one of these key requirements that must be addressed when engineering multi-tenant SaaS applications. The sharing of resources among tenants—i.e. multi-tenancy—increases tenants’ concerns about the security of their cloud-hosted assets. Compounding this, existing traditional security engineering approaches do not fit well with the multi-tenancy application model where tenants and their security requirements often emerge after the applications and services were first developed. The resultant applications do not usually support diverse security capabilities based on different tenants’ needs, some of which may change at run-time i.e. after cloud application deployment. We introduce a novel model-driven security engineering approach for multi-tenant, cloud-hosted SaaS applications. Our approach is based on externalizing security from the underlying SaaS application, allowing both application/service and security to evolve at runtime. Multiple security sets can be enforced on the same application instance based on different tenants’ security requirements. We use abstract models to capture service provider and multiple tenants’ security requirements and then generate security integration and configurations at runtime. We use dependency injection and dynamic weaving via Aspect-Oriented Programming (AOP) to integrate security within critical application/service entities at runtime. We explain our approach, architecture and implementation details, discuss a usage example, and present an evaluation of our approach on a set of open source web applications.",
"title": ""
},
{
"docid": "5ac63b0be4561f126c90b65e834e1d14",
"text": "Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem’s Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications’ return pointers. Our implementation called StackGhost under OpenBSD 2.8 acts as a ghost in the machine. StackGhost advances exploit prevention in that it protects every application run on the system without their knowledge nor does it require their source or binary modification. We will document several of the methods devised to preserve the sanctity of the system and will explore the performance ramifications of StackGhost.",
"title": ""
},
{
"docid": "a1fec7f5afafc03588eb4cd4750faec2",
"text": "Objective – This paper attempts to explore the continuance purchase intention among Malaysian consumers on the internet, through the conceptual framework as modified from the Technology Acceptance Model. Methodology/Technique – The research data has been collected through the use of an internet-based survey method, with a convenience sample of 300 Malaysian respondents in June 2014; whereas, data analysis is further conducted using the SPSS software, through the measurements of a simple linear regression test, mediation test and moderation test. Findings – Results show a positive relationship between perceived usefulness and trust; while the continuance intention for online purchase is positively significant to perceived usefulness. The partial mediating role of subjective norm is further identified, between perceived usefulness and continuance intention. It is also understood that both male and female perceive the usefulness of website as an important factor toward their intention to online re-purchase. Novelty – Most of the researches are conducted solely upon the factors or purchase intention, limited studies have been done to investigate the continuance purchase intention among fellow consumers. Type of Paper: Empirical",
"title": ""
},
{
"docid": "eceba8b3bf8cd7e0a4afc6581a6827eb",
"text": "The epidermal growth factor receptor (EGFR) kinase inhibitors gefitinib and erlotinib are effective treatments for lung cancers with EGFR activating mutations, but these tumors invariably develop drug resistance. Here, we describe a gefitinib-sensitive lung cancer cell line that developed resistance to gefitinib as a result of focal amplification of the MET proto-oncogene. inhibition of MET signaling in these cells restored their sensitivity to gefitinib. MET amplification was detected in 4 of 18 (22%) lung cancer specimens that had developed resistance to gefitinib or erlotinib. We find that amplification of MET causes gefitinib resistance by driving ERBB3 (HER3)-dependent activation of PI3K, a pathway thought to be specific to EGFR/ERBB family receptors. Thus, we propose that MET amplification may promote drug resistance in other ERBB-driven cancers as well.",
"title": ""
},
{
"docid": "18acfc082ec5aebbd83c3dc047c76c92",
"text": "Although near-threshold voltage (NTV) operation is an attractive means of achieving high energy efficiency, it can degrade the circuit stability of static random access memory (SRAM) cells. This paper proposes an NTV 7T SRAM cell in a 14 nm FinFET technology to eliminate read disturbance by disconnecting the path from the bit-line to the cross-coupled inverter pair using the transmission gate. In the proposed 7T SRAM cell, the half-select issue is resolved, meaning that no write-back operation is required. A folded-column structure is applied to the proposed 7T SRAM cell to reduce the read access time and energy consumption. To reduce the standby power, the proposed 7T SRAM cell uses only a single bit-line for both read and write operations. To achieve proper “1” writing operation with a single bit-line, a two-phase approach is proposed. Compared to the conventional 8T SRAM cell, the proposed 7T SRAM cell improves the read access time, energy, and standby power by 13%, 42%, and 23%, respectively, with a 3% smaller cell area.",
"title": ""
},
{
"docid": "c3df0da617368c2472c76a6c95366338",
"text": "The infinitary propositional logic of here-and-there is important for the theory of answer set programming in view of its relation to strongly equivalent transformations of logic programs. We know a formal system axiomatizing this logic exists, but a proof in that system may include infinitely many formulas. In this note we describe a relationship between the validity of infinitary formulas in the logic of here-and-there and the provability of formulas in some finite deductive systems. This relationship allows us to use finite proofs to justify the validity of infinitary formulas.",
"title": ""
},
{
"docid": "89a1e532c8efe66a65a60a8635e37593",
"text": "This paper presents an optimization based approach for cooperative multiple UAV attack missions. The objective is to determine the minimum resources required to coordinately attack a target at a given set of directions. We restrict the paths of the munitions to direct Dubins paths to satisfy field of view constraints and to avoid certain undesirable paths. The proposed algorithm derives the feasible positions and headings for each attack angle, and determines intersection regions corresponding to any two attack angles. We pose a set cover problem, the solution of which gives the minimum number of UAVs required to accomplish the mission.",
"title": ""
},
{
"docid": "146bde6ec9d89bdba29a582b2d4371c4",
"text": "This paper demonstrates a 200mA low-dropout regulator (LDO) for portable applications. Buffer impedance attenuation is developed to realize a single-pole loop response through shunt feedback. The LDO is thus unconditionally stable without using an ESR zero and output undershoots and overshoots are minimized during load transients. Implemented in 0.35μm twin-well CMOS, the LDO only dissipates 20μA quiescent current. With a 1μF output capacitor, the maximum transient-output variation is 54mV with full-load step change of 200mA.",
"title": ""
},
{
"docid": "9b96e643f59b53b2a470eae61d9613b6",
"text": "The modeling of style when synthesizing natural human speech from text has been the focus of significant attention. Some state-of-the-art approaches train an encoder-decoder network on paired text and audio samples 〈xtxt, xaud〉 by encouraging its output to reconstruct xaud. The synthesized audio waveform is expected to contain the verbal content of xtxt and the auditory style of xaud. Unfortunately, modeling style in TTS is somewhat under-determined and training models with a reconstruction loss alone is insufficient to disentangle content and style from other factors of variation. In this work, we introduce TTS-GAN, an end-to-end TTS model that offers enhanced content-style disentanglement ability and controllability. We achieve this by combining a pairwise training procedure, an adversarial game, and a collaborative game into one training scheme. The adversarial game concentrates the true data distribution, and the collaborative game minimizes the distance between real samples and generated samples in both the original space and the latent space. As a result, TTS-GAN delivers a highly controllable generator, and a disentangled representation. Benefiting from the separate modeling of style and content, TTS-GAN can generate human fidelity speech that satisfies the desired style conditions. TTS-GAN achieves start-of-the-art results across multiple tasks, including style transfer (content and style swapping), emotion modeling, and identity transfer (fitting a new speaker’s voice).",
"title": ""
},
{
"docid": "c2aa1c74d0569a068b6e381f314aa1ff",
"text": "For the purpose of discovering security flaws in software, many dynamic and static taint analyzing techniques have been proposed. By analyzing information flow at runtime, dynamic taint analysis can precisely find security flaws of software. However, on one hand, it suffers from substantial runtime overhead and is incapable of discovering the potential threats. On the other hand, static taint analysis analyzes program’s code without actually executing it which incurs no runtime overhead, and can cover all the code, but it is often not accurate enough. In addition, since the source code of most software is hard to acquire and intruders simply do not attach target program’s source code in practice, software flaw tracking becomes rather complicated. In order to cope with these issues, this paper proposes HYBit, a novel hybrid framework which integrates dynamic and static taint analysis to diagnose the flaws or vulnerabilities for binary programs. In the framework, the source binary is first analyzed by the dynamic taint analyzer. Then, with the runtime information provided by its dynamic counterpart, the static taint analyzer can process the unexecuted part of the target program easily. Furthermore, a taint behavior filtration mechanism is proposed to optimize the performance of the framework. We evaluate our framework from three perspectives: efficiency, coverage, and effectiveness. The results are encouraging.",
"title": ""
},
{
"docid": "6480f98a792ca9cdb961e85357a73461",
"text": "Since its first use in the steroid field in the late 1950s, the use of fluorine in medicinal chemistry has become commonplace, with the small electronegative fluorine atom being a key part of the medicinal chemist's repertoire of substitutions used to modulate all aspects of molecular properties including potency, physical chemistry and pharmacokinetics. This review will highlight the special nature of fluorine, drawing from a survey of marketed fluorinated pharmaceuticals and the medicinal chemistry literature, to illustrate key concepts exploited by medicinal chemists in their attempts to optimize drug molecules. Some of the potential pitfalls in the use of fluorine will also be highlighted.",
"title": ""
},
{
"docid": "9e95ce11f502478c11df990d3465360f",
"text": "This paper presents a ultra-wideband (UWB) micro-strip structure high-pass filter with multi-stubs. The proposed filter was designed using a combination of 4 short-circuited stubs and an open-circuited stub in the form of micro-strip lines. The short-circuited stubs are to realize a high-pass filter with a bad band rejection. In order to achieve a steep cutoff, a transmission zero can be added thus an open-circuited stub is used. The passband is 5-19 GHz. The insertion loss is greater than -2dB and the return loss is less than -10dB, while the suppression of the modified filter is better than 30 dB below 4.2GHz.",
"title": ""
},
{
"docid": "79c05f9ab98396ae84066e64b08644a0",
"text": "The design of a four-band slot antenna for the global positioning system (GPS), worldwide interoperability for microwave access (WiMAX), and wireless area network (WLAN) is presented. The antenna consists of a rectangular slot with an area of 0.37λg × 0.14λg = 48 × 18 mm2 (where λg is the guide wavelength), a T-shaped feed patch, an inverted T-shaped stub, and two E-shaped stubs to generate four frequency bands. The radiating portion and total size of the antenna are less than those of the tri-band antennas studied in literature. Parametric study on the parameters for setting the four frequency bands is presented and hence the methodology of using the design for other frequency bands is proposed. The multiband slot antenna is studied and designed using computer simulation. For verification of simulation results, the antenna is fabricated and measured. The simulated and measured return losses, radiation patterns, realized peak gains, and efficiencies of the antenna are presented. Measured results show that the antenna can be designed to cover the frequency bands from 1.575 to 1.665 GHz for the GPS system, 2.4-2.545 GHz for the IEEE 802.11b&g WLAN systems, 3.27- 3.97 GHz for the WiMAX system, and 5.17-5.93 GHz for the IEEE 802.11a WLAN system. The effects of the feeding cable used in measurement and of the cover are also investigated.",
"title": ""
},
{
"docid": "c60693035f0f99528a741fe5e3d88219",
"text": "Transmit array design is more challenging for dual-band operation than for single band, due to the independent 360° phase wrapping jumps needed at each band when large electrical length compensation is involved. This happens when aiming at large gains, typically above 25 dBi with beam scanning and $F/D \\le 1$ . No such designs have been reported in the literature. A general method is presented here to reduce the complexity of dual-band transmit array design, valid for arbitrarily large phase error compensation and any band ratio, using a finite number of different unit cells. The procedure is demonstrated for two offset transmit array implementations operating in circular polarization at 20 GHz(Rx) and 30 GHz(Tx) for Ka-band satellite-on-the-move terminals with mechanical beam-steering. An appropriate set of 30 dual-band unit cells is developed with transmission coefficient greater than −0.9 dB. The full-size transmit array is characterized by full-wave simulation enabling elevation beam scanning over 0°–50° with gains reaching 26 dBi at 20 GHz and 29 dBi at 30 GHz. A smaller prototype was fabricated and measured, showing a measured gain of 24 dBi at 20 GHz and 27 dBi at 30 GHz. In both cases, the beam pointing direction is coincident over the two frequency bands, and thus confirming the proposed design procedure.",
"title": ""
},
{
"docid": "a16b9bbb9675a14952527fb4de583d00",
"text": "Adaptations in resistance training are focused on the development and maintenance of the neuromuscular unit needed for force production [97, 136]. The effects of training, when using this system, affect many other physiological systems of the body (e.g., the connective tissue, cardiovascular, and endocrine systems) [16, 18, 37, 77, 83]. Training programs are highly specific to the types of adaptation that occur. Activation of specific patterns of motor units in training dictate what tissue and how other physiological systems will be affected by the exercise training. The time course of the development of the neuromuscular system appears to be dominated in the early phase by neural factors with associated changes in the types of contractile proteins. In the later adaptation phase, muscle protein increases, and the contractile unit begins to contribute the most to the changes in performance capabilities. A host of other factors can affect the adaptations, such as functional capabilities of the individual, age, nutritional status, and behavioral factors (e.g., sleep and health habits). Optimal adaptation appears to be related to the use of specific resistance training programs to meet individual training objectives.",
"title": ""
},
{
"docid": "d082f98c606c927286d991f8e534462c",
"text": "Distributed online data analytics has attracted significant research interest in recent years with the advent of Fog and Cloud computing. The popularity of novel distributed applications such as crowdsourcing and crowdsensing have fostered the need for scalable energy-efficient platforms that can enable distributed data analytics. In this paper, we propose CARDAP, a (C)ontext (A)ware (R)eal-time (D)ata (A)nalytics (P)latform. CARDAP is a generic, flexible and extensible, component-based platform that can be deployed in complex distributed mobile analytics applications e.g. sensing activity of citizens in smart cities. CARDAP incorporates a number of energy efficient data delivery strategies using real-time mobile data stream mining for data reduction and thus less data transmission. Extensive experimental evaluations indicate the CARDAP platform can deliver significant benefits in energy efficiency over naive approaches. Lessons learnt and future work",
"title": ""
},
{
"docid": "2beb54c58abcc3a0abaeda878d5351f2",
"text": "The railway station is the basic unit of transportation networks. It contains cluster of data which should be organized appropriately to effectively extract useful information. Building Information Modeling (BIM) process revolves around a virtual information-rich 3D model. Once a model has been developed in a BIM software such as Revit, third-party add-ins application can be used to further leverage the data. In this paper, authors develop a Revit-based extension tool which enables railway engineer to design and represent the railway station simultaneously. It has three major components: (1) Access database that includes the standard design rules, (2) 3D models of station elements represented separately as Revit families, and (3) C# program code is used for performing the design process. The model has been verified and applied to a real case study of XiaMen station, China. As a result, this model highlights any possible conflicts before the real construction starts. By the enhancement of databases linked to the developed tool, the BIM techniques could be considered as a potential direction for modeling conceptualization of intermediate railway stations.",
"title": ""
},
{
"docid": "aa0335bc5090796453d7efdc247bb477",
"text": "Understanding signature complexity has been shown to be a crucial facet for both forensic and biometric appbcations. The signature complexity can be defined as the difficulty that forgers have when imitating the dynamics (constructional aspects) of other users signatures. Knowledge of complexity along with others facets such stability and signature length can lead to more robust and secure automatic signature verification systems. The work presented in this paper investigates the creation of a novel mathematical model for the automatic assessment of the signature complexity, analysing a wider set of dynamic signature features and also incorporating a new layer of detail, investigating the complexity of individual signature strokes. To demonstrate the effectiveness of the model this work will attempt to reproduce the signature complexity assessment made by experienced FDEs on a dataset of 150 signature samples.",
"title": ""
},
{
"docid": "92dbb257f6d087ce61f5c560c34bf46f",
"text": "This study investigates eCommerce adoption in family run SMEs (small and medium sized enterprises). Specifically, the objectives of the study are twofold: (a) to examine environmental and organisational determinants of eCommerce adoption in the family business context; (b) to explore the moderating effect of business strategic orientation on the relationships between adoption determinants and adoption decision. A quantitative questionnaire survey was executed. The sampling frame was outlined based on the OneSource database and 88 companies were involved. Results of logistic regression analyses proffer support that ‘external pressure’ and ‘perceived benefits’ are predictors of eCommerce adoption. Moreover, the findings indicate that the strategic orientation of family businesses will function as a moderator in the adoption process. 2008 Elsevier B.V. All rights reserved.",
"title": ""
}
] | scidocsrr |
4312aeb29774277790da1908b44a009b | Enterprise Social Media: Definition, History, and Prospects for the Study of Social Technologies in Organizations | [
{
"docid": "8759277ebf191306b3247877e2267173",
"text": "As organizations scale up, their collective knowledge increases, and the potential for serendipitous collaboration between members grows dramatically. However, finding people with the right expertise or interests becomes much more difficult. Semi-structured social media, such as blogs, forums, and bookmarking, present a viable platform for collaboration-if enough people participate, and if shared content is easily findable. Within the trusted confines of an organization, users can trade anonymity for a rich identity that carries information about their role, location, and position in its hierarchy.\n This paper describes WaterCooler, a tool that aggregates shared internal social media and cross-references it with an organization's directory. We deployed WaterCooler in a large global enterprise and present the results of a preliminary user study. Despite the lack of complete social networking affordances, we find that WaterCooler changed users' perceptions of their workplace, made them feel more connected to each other and the company, and redistributed users' attention outside their own business groups.",
"title": ""
}
] | [
{
"docid": "220bf8be47ae728d922150b520175b8a",
"text": "A 29-year-old man, suffering from dry skin, who had a brother with rhinoconjunctivitis, was referred to us by a private dermatologist in January 2016 because of erythematous and scaly lips, which had been almost continuously present for >8 years. The eruption had started at both corners of the mouth, but gradually spread to the entire upper and lower lips. At consultation, we also observed erythema and scales at the philtrum, arranged in two vertical lines divided from each other at the midline",
"title": ""
},
{
"docid": "48c49e1f875978ec4e2c1d4549a98ffd",
"text": "Deep neural networks have been shown to be very powerful modeling tools for many supervised learning tasks involving complex input patterns. However, they can also easily overfit to training set biases and label noises. In addition to various regularizers, example reweighting algorithms are popular solutions to these problems, but they require careful tuning of additional hyperparameters, such as example mining schedules and regularization hyperparameters. In contrast to past reweighting methods, which typically consist of functions of the cost value of each example, in this work we propose a novel meta-learning algorithm that learns to assign weights to training examples based on their gradient directions. To determine the example weights, our method performs a meta gradient descent step on the current mini-batch example weights (which are initialized from zero) to minimize the loss on a clean unbiased validation set. Our proposed method can be easily implemented on any type of deep network, does not require any additional hyperparameter tuning, and achieves impressive performance on class imbalance and corrupted label problems where only a small amount of clean validation data is available.",
"title": ""
},
{
"docid": "1164a33e84a333628ec8fe74aab45f4c",
"text": "Low rank approximation is an important tool in many applications. Given an observed matrix with elements corrupted by Gaussian noise it is possible to find the best approximating matrix of a given rank through singular value decomposition. However, due to the non-convexity of the formulation it is not possible to incorporate any additional knowledge of the sought matrix without resorting to heuristic optimization techniques. In this paper we propose a convex formulation that is more flexible in that it can be combined with any other convex constraints and penalty functions. The formulation uses the so called convex envelope, which is the provably best possible convex relaxation. We show that for a general class of problems the envelope can be efficiently computed and may in some cases even have a closed form expression. We test the algorithm on a number of real and synthetic data sets and show state-of-the-art results.",
"title": ""
},
{
"docid": "f18aefe00103d33ae256a6fd161531ff",
"text": "Conventional database optimizers take full advantage of associativity and commutativity properties of join to implement e cient and powerful optimizations on select/project/join queries. However, only limited optimization is performed on other binary operators. In this paper, we present the theory and algorithms needed to generate alternative evaluation orders for the optimization of queries containing outerjoins. Our results include both a complete set of transformation rules, suitable for new-generation, transformation-based optimizers, and a bottom-up join enumeration algorithm compatible with those used by traditional optimizers.",
"title": ""
},
{
"docid": "26e90d8dca906c2e7dd023441ba4438a",
"text": "In this paper, we show that the handedness of a planar chiral checkerboard-like metasurface can be dynamically switched by modulating the local sheet impedance of the metasurface structure. We propose a metasurface design to realize the handedness switching and theoretically analyze its electromagnetic characteristic based on Babinet’s principle. Numerical simulations of the proposed metasurface are performed to validate the theoretical analysis. It is demonstrated that the polarity of asymmetric transmission for circularly polarized waves, which is determined by the planar chirality of the metasurface, is inverted by switching the sheet impedance at the interconnection points of the checkerboard-like structure. The physical origin of the asymmetric transmission is also discussed in terms of the surface current and charge distributions on the metasurface.",
"title": ""
},
{
"docid": "da28960f4a5daeb80aa5c344db326c8d",
"text": "Adaptive traffic signal control, which adjusts traffic signal timing according to real-time traffic, has been shown to be an effective method to reduce traffic congestion. Available works on adaptive traffic signal control make responsive traffic signal control decisions based on human-crafted features (e.g. vehicle queue length). However, human-crafted features are abstractions of raw traffic data (e.g., position and speed of vehicles), which ignore some useful traffic information and lead to suboptimal traffic signal controls. In this paper, we propose a deep reinforcement learning algorithm that automatically extracts all useful features (machine-crafted features) from raw real-time traffic data and learns the optimal policy for adaptive traffic signal control. To improve algorithm stability, we adopt experience replay and target network mechanisms. Simulation results show that our algorithm reduces vehicle delay by up to 47% and 86% when compared to another two popular traffic signal control algorithms, longest queue first algorithm and fixed time control algorithm, respectively.",
"title": ""
},
{
"docid": "071d7bc76ae1a23c82789d57f5647f40",
"text": "Applied Research Associates and BAE Systems are working together to develop a wearable augmented reality system under the DARPA ULTRA-Vis program † . Our approach to achieve the objectives of ULTRAVis, called iLeader, incorporates a full color 40° field of view (FOV) see-thru holographic waveguide integrated with sensors for full position and head tracking to provide an unobtrusive information system for operational maneuvers. iLeader will enable warfighters to mark-up the 3D battle-space with symbologic identification of graphical control measures, friendly force positions and enemy/target locations. Our augmented reality display provides dynamic real-time painting of symbols on real objects, a pose-sensitive 360 ̊ representation of relevant object positions, and visual feedback for a variety of system activities. The iLeader user interface and situational awareness graphical representations are highly intuitive, nondisruptive, and always tactically relevant. We used best human-factors practices, system engineering expertise, and cognitive task analysis to design effective strategies for presenting real-time situational awareness to the military user without distorting their natural senses and perception. We present requirements identified for presenting information within a see-through display in combat environments, challenges in designing suitable visualization capabilities, and solutions that enable us to bring real-time iconic command and control to the tactical user community.",
"title": ""
},
{
"docid": "2cee5301ded39d4256f04d4440689a9c",
"text": "Job performance refers to how effective employees a r in accomplishing their tasks and responsibilitie s related to direct patient care. Improving the perfo rmance of employees has been a topic of great inter est to practitioners as well as researchers. The aim of th e s udy is to analysis the impacts of job performan ce level on nurses’ performance working in public hospitals. In order to achieve the study objective, a survey conducted. Questionnaires distributed to the public sector hospital’s manager in Saudi Arabia. The fin dings of the study turn out to be true; the study will co ntribute to both theory and practice. Through the p r sent study, the researcher expects the findings to shed light on the research conducted regression to analy sis the impacts of job performance level on nurses’ in publ ic sector hospitals in Saudi Arabia.",
"title": ""
},
{
"docid": "e2ffac5515399469b93ed53e05d92345",
"text": "Network security is a major issue affecting SCADA systems designed and deployed in the last decade. Simulation of network attacks on a SCADA system presents certain challenges, since even a simple SCADA system is composed of models in several domains and simulation environments. Here we demonstrate the use of C2WindTunnel to simulate a plant and its controller, and the Ethernet network that connects them, in different simulation environments. We also simulate DDOS-like attacks on a few of the routers to observe and analyze the effec ts of a network attack on such a system. I. I NTRODUCTION Supervisory Control And Data Acquisition (SCADA) systems are computer-based monitoring tools that are used to manage and control critical infrastructure functions in re al time, like gas utilities, power plants, chemical plants, tr affic control systems, etc. A typical SCADA system consists of a SCADA Master which provides overall monitoring and control for the system, local process controllers called Re mot Terminal Units (RTUs), sensors and actuators and a network which provides the communication between the Master and the RTUs. A. Security of SCADA Systems SCADA systems are designed to have long life spans, usually in decades. The SCADA systems currently installed and used were designed at a time when security issues were not paramount, which is not the case today. Furthermore, SCADA systems are now connected to the Internet for remote monitoring and control making the systems susceptible to network security problems which arise through a connection to a public network. Despite these evident security risks, SCADA systems are cumbersome to upgrade for several reasons. Firstly, adding security features often implies a large downtime, which is not desirable in systems like power plants and traffic contro l. Secondly, SCADA devices with embedded codes would need to be completely replaced to add new security protocols. Lastly, the networks used in a SCADA system are usually customized for that system and cannot be generalized. Security of legacy SCADA systems and design of future systems both thus rely heavily on the assessment and rectification of security vulnerabilities of SCADA implementatio ns in realistic settings. B. Simulation of SCADA Systems In a SCADA system it is essential to model and simulate communication networks in order to study mission critical situations such as network failures or attacks. Even a simpl e SCADA system is composed of several units in various domains like dynamic systems, networks and physical environments, and each of these units can be modeled using a variety of available simulators and/or emulators. An example system could include simulating controller and plant dynamics in Simulink or Matlab, network architecture and behavior in a network simulator like OMNeT++, etc. An adequate simulation of such a system necessitates the use of an underlying software infrastructure that connects and re lates the heterogeneous simulators in a logically and temporally coherent framework.",
"title": ""
},
{
"docid": "5106155fbe257c635fb9621240fd7736",
"text": "AIM\nThe aim of this study was to investigate the prevalence of pain and pain assessment among inpatients in a university hospital.\n\n\nBACKGROUND\nPain management could be considered an indicator of quality of care. Few studies report on prevalence measures including all inpatients.\n\n\nDESIGN\nQuantitative and explorative.\n\n\nMETHOD\nSurvey.\n\n\nRESULTS\nOf the inpatients at the hospital who answered the survey, 494 (65%) reported having experienced pain during the preceding 24 hours. Of the patients who reported having experienced pain during the preceding 24 hours, 81% rated their pain >3 and 42.1% rated their pain >7. Of the patients who reported having experienced pain during the preceding 24 hours, 38.7% had been asked to self-assess their pain using a Numeric Rating Scale (NRS); 29.6% of the patients were completely satisfied, and 11.5% were not at all satisfied with their participation in pain management.\n\n\nCONCLUSIONS\nThe result showed that too many patients are still suffering from pain and that the NRS is not used to the extent it should be. Efforts to overcome under-implementation of pain assessment are required, particularly on wards where pain is not obvious, e.g., wards that do not deal with surgery patients. Work to improve pain management must be carried out through collaboration across professional groups.\n\n\nRELEVANCE TO CLINICAL PRACTICE\nUsing a pain assessment tool such as the NRS could help patients express their pain and improve communication between nurses and patients in relation to pain as well as allow patients to participate in their own care. Carrying out prevalence pain measures similar to those used here could be helpful in performing quality improvement work in the area of pain management.",
"title": ""
},
{
"docid": "4768001167cefad7b277e3b77de648bb",
"text": "MicroRNAs (miRNAs) regulate gene expression at the posttranscriptional level and are therefore important cellular components. As is true for protein-coding genes, the transcription of miRNAs is regulated by transcription factors (TFs), an important class of gene regulators that act at the transcriptional level. The correct regulation of miRNAs by TFs is critical, and increasing evidence indicates that aberrant regulation of miRNAs by TFs can cause phenotypic variations and diseases. Therefore, a TF-miRNA regulation database would be helpful for understanding the mechanisms by which TFs regulate miRNAs and understanding their contribution to diseases. In this study, we manually surveyed approximately 5000 reports in the literature and identified 243 TF-miRNA regulatory relationships, which were supported experimentally from 86 publications. We used these data to build a TF-miRNA regulatory database (TransmiR, http://cmbi.bjmu.edu.cn/transmir), which contains 82 TFs and 100 miRNAs with 243 regulatory pairs between TFs and miRNAs. In addition, we included references to the published literature (PubMed ID) information about the organism in which the relationship was found, whether the TFs and miRNAs are involved with tumors, miRNA function annotation and miRNA-associated disease annotation. TransmiR provides a user-friendly interface by which interested parties can easily retrieve TF-miRNA regulatory pairs by searching for either a miRNA or a TF.",
"title": ""
},
{
"docid": "ba1b3fb5f147b5af173e5f643a2794e0",
"text": "The objective of this study is to examine how personal factors such as lifestyle, personality, and economic situations affect the consumer behavior of Malaysian university students. A quantitative approach was adopted and a self-administered questionnaire was distributed to collect data from university students. Findings illustrate that ‘personality’ influences the consumer behavior among Malaysian university student. This study also noted that the economic situation had a negative relationship with consumer behavior. Findings of this study improve our understanding of consumer behavior of Malaysian University Students. The findings of this study provide valuable insights in identifying and taking steps to improve on the services, ambience, and needs of the student segment of the Malaysian market.",
"title": ""
},
{
"docid": "569fed958b7a471e06ce718102687a1e",
"text": "The introduction of convolutional layers greatly advanced the performance of neural networks on image tasks due to innately capturing a way of encoding and learning translation-invariant operations, matching one of the underlying symmetries of the image domain. In comparison, there are a number of problems in which there are a number of different inputs which are all ’of the same type’ — multiple particles, multiple agents, multiple stock prices, etc. The corresponding symmetry to this is permutation symmetry, in that the algorithm should not depend on the specific ordering of the input data. We discuss a permutation-invariant neural network layer in analogy to convolutional layers, and show the ability of this architecture to learn to predict the motion of a variable number of interacting hard discs in 2D. In the same way that convolutional layers can generalize to different image sizes, the permutation layer we describe generalizes to different numbers of objects.",
"title": ""
},
{
"docid": "9005bd3eaab940344da6158f0eca2d38",
"text": "We present an example-based crowd simulation technique. Most crowd simulation techniques assume that the behavior exhibited by each person in the crowd can be defined by a restricted set of rules. This assumption limits the behavioral complexity of the simulated agents. By learning from real-world examples, our autonomous agents display complex natural behaviors that are often missing in crowd simulations. Examples are created from tracked video segments of real pedestrian crowds. During a simulation, autonomous agents search for examples that closely match the situation that they are facing. Trajectories taken by real people in similar situations, are copied to the simulated agents, resulting in seemingly natural behaviors.",
"title": ""
},
{
"docid": "53ab91cdff51925141c43c4bc1c6aade",
"text": "Floods are the most common natural disasters, and cause significant damage to life, agriculture and economy. Research has moved on from mathematical modeling or physical parameter based flood forecasting schemes, to methodologies focused around algorithmic approaches. The Internet of Things (IoT) is a field of applied electronics and computer science where a system of devices collects data in real time and transfers it through a Wireless Sensor Network (WSN) to the computing device for analysis. IoT generally combines embedded system hardware techniques along with data science or machine learning models. In this work, an IoT and machine learning based embedded system is proposed to predict the probability of floods in a river basin. The model uses a modified mesh network connection over ZigBee for the WSN to collect data, and a GPRS module to send the data over the internet. The data sets are evaluated using an artificial neural network model. The results of the analysis which are also appended show a considerable improvement over the currently existing methods.",
"title": ""
},
{
"docid": "cfcae9b30fda24358e79e4e664ed747d",
"text": "Automated driving is predicted to enhance traffic safety, transport efficiency, and driver comfort. To extend the capability of current advanced driver assistance systems, and eventually realize fully automated driving, the intelligent vehicle system must have the ability to plan different maneuvers while adapting to the surrounding traffic environment. This paper presents an algorithm for longitudinal and lateral trajectory planning for automated driving maneuvers where the vehicle does not have right of way, i.e., yielding maneuvers. Such maneuvers include, e.g., lane change, roundabout entry, and intersection crossing. In the proposed approach, the traffic environment which the vehicle must traverse is incorporated as constraints on its longitudinal and lateral positions. The trajectory planning problem can thereby be formulated as two loosely coupled low-complexity model predictive control problems for longitudinal and lateral motion. Simulation results demonstrate the ability of the proposed trajectory planning algorithm to generate smooth collision-free maneuvers which are appropriate for various traffic situations.",
"title": ""
},
{
"docid": "d8092e95e3275585d06a6efdc02aee31",
"text": "The present study provides a new account of how fluid intelligence influences academic performance. In this account a complex learning component of fluid intelligence tests is proposed to play a major role in predicting academic performance. A sample of 2, 277 secondary school students completed two reasoning tests that were assumed to represent fluid intelligence and standardized math and verbal tests assessing academic performance. The fluid intelligence data were decomposed into a learning component that was associated with the position effect of intelligence items and a constant component that was independent of the position effect. Results showed that the learning component contributed significantly more to the prediction of math and verbal performance than the constant component. The link from the learning component to math performance was especially strong. These results indicated that fluid intelligence, which has so far been considered as homogeneous, could be decomposed in such a way that the resulting components showed different properties and contributed differently to the prediction of academic performance. Furthermore, the results were in line with the expectation that learning was a predictor of performance in school.",
"title": ""
},
{
"docid": "6e5b3746474ec858799b35bc5236c3e0",
"text": "Mobile systems have become widely adopted by users to perform sensitive operations ranging from on-line payments for personal use to remote access to enterprise assets. Thus, attacks on mobile devices can cause significant loss to user's personal data as well as to valuable enterprise assets. In order to mitigate risks arising from attacks, various approaches have been proposed including the use of Trusted Execution Environment (TEE) to isolate and protect the execution of sensitive code from the rest of the system, e.g. applications and other software.However, users remain at risk of exploits via several types of software vulnerabilities - indicating that enterprises have failed to deliver the required protection, despite the use of existing isolation technologies. In this paper, we investigate Samsung KNOX and its usage of TEE as being the current technology providing secure containers. First, we study how KNOX uses TEE and perform analysis on its design consideration from a system vulnerabilities perspective. Second, we analyse and discuss recent attacks on KNOX and how those attacks exploit system vulnerabilities. Finally, we present new shortcomings emerging from our analysis of KNOX architecture. Our research exhibits that system vulnerabilities are the underlying cause of many attacks on systems and it reveals how they affect fundamental design security principles when the full potential of TEE is not exploited.",
"title": ""
},
{
"docid": "082b1c341435ce93cfab869475ed32bd",
"text": "Given a graph where vertices are partitioned into k terminals and non-terminals, the goal is to compress the graph (i.e., reduce the number of non-terminals) using minor operations while preserving terminal distances approximately. The distortion of a compressed graph is the maximum multiplicative blow-up of distances between all pairs of terminals. We study the trade-off between the number of non-terminals and the distortion. This problem generalizes the Steiner Point Removal (SPR) problem, in which all non-terminals must be removed. We introduce a novel black-box reduction to convert any lower bound on distortion for the SPR problem into a super-linear lower bound on the number of non-terminals, with the same distortion, for our problem. This allows us to show that there exist graphs such that every minor with distortion less than 2 / 2.5 / 3 must have Ω(k2) / Ω(k5/4) / Ω(k6/5) non-terminals, plus more trade-offs in between. The black-box reduction has an interesting consequence: if the tight lower bound on distortion for the SPR problem is super-constant, then allowing any O(k) non-terminals will not help improving the lower bound to a constant. We also build on the existing results on spanners, distance oracles and connected 0-extensions to show a number of upper bounds for general graphs, planar graphs, graphs that exclude a fixed minor and bounded treewidth graphs. Among others, we show that any graph admits a minor with O(log k) distortion and O(k2) non-terminals, and any planar graph admits a minor with 1 + ε distortion and Õ((k/ε)2) non-terminals. 1998 ACM Subject Classification G.2.2 Graph Theory",
"title": ""
},
{
"docid": "170873ad959b33eea76e9f542c5dbff6",
"text": "This paper reports on a development framework, two prototypes, and a comparative study in the area of multi-tag Near-Field Communication (NFC) interaction. By combining NFC with static and dynamic displays, such as posters and projections, services are made more visible and allow users to interact with them easily by interacting directly with the display with their phone. In this paper, we explore such interactions, in particular, the combination of the phone display and large NFC displays. We also compare static displays and dynamic displays, and present a list of deciding factors for a particular deployment situation. We discuss one prototype for each display type and developed a corresponding framework which can be used to accelerate the development of such prototypes whilst supporting a high level of versatility. The findings of a controlled comparative study indicate, among other things, that all participants preferred the dynamic display, although the static display has advantages, e.g. with respect to privacy and portability.",
"title": ""
}
] | scidocsrr |
5b6e0cb4306eb0371a9847da2bcd0376 | Magnetic Resonance Contrast Prediction Using Deep Learning | [
{
"docid": "d03abae94005c27aa46c66e1cdc77b23",
"text": "The segmentation of infant brain tissue images into white matter (WM), gray matter (GM), and cerebrospinal fluid (CSF) plays an important role in studying early brain development in health and disease. In the isointense stage (approximately 6-8 months of age), WM and GM exhibit similar levels of intensity in both T1 and T2 MR images, making the tissue segmentation very challenging. Only a small number of existing methods have been designed for tissue segmentation in this isointense stage; however, they only used a single T1 or T2 images, or the combination of T1 and T2 images. In this paper, we propose to use deep convolutional neural networks (CNNs) for segmenting isointense stage brain tissues using multi-modality MR images. CNNs are a type of deep models in which trainable filters and local neighborhood pooling operations are applied alternatingly on the raw input images, resulting in a hierarchy of increasingly complex features. Specifically, we used multi-modality information from T1, T2, and fractional anisotropy (FA) images as inputs and then generated the segmentation maps as outputs. The multiple intermediate layers applied convolution, pooling, normalization, and other operations to capture the highly nonlinear mappings between inputs and outputs. We compared the performance of our approach with that of the commonly used segmentation methods on a set of manually segmented isointense stage brain images. Results showed that our proposed model significantly outperformed prior methods on infant brain tissue segmentation. In addition, our results indicated that integration of multi-modality images led to significant performance improvement.",
"title": ""
},
{
"docid": "70fafdedd05a40db5af1eabdf07d431c",
"text": "Segmentation of the left ventricle (LV) from cardiac magnetic resonance imaging (MRI) datasets is an essential step for calculation of clinical indices such as ventricular volume and ejection fraction. In this work, we employ deep learning algorithms combined with deformable models to develop and evaluate a fully automatic LV segmentation tool from short-axis cardiac MRI datasets. The method employs deep learning algorithms to learn the segmentation task from the ground true data. Convolutional networks are employed to automatically detect the LV chamber in MRI dataset. Stacked autoencoders are used to infer the LV shape. The inferred shape is incorporated into deformable models to improve the accuracy and robustness of the segmentation. We validated our method using 45 cardiac MR datasets from the MICCAI 2009 LV segmentation challenge and showed that it outperforms the state-of-the art methods. Excellent agreement with the ground truth was achieved. Validation metrics, percentage of good contours, Dice metric, average perpendicular distance and conformity, were computed as 96.69%, 0.94, 1.81 mm and 0.86, versus those of 79.2-95.62%, 0.87-0.9, 1.76-2.97 mm and 0.67-0.78, obtained by other methods, respectively.",
"title": ""
},
{
"docid": "be7a33cc59e8fb297c994d046c6874d9",
"text": "Purpose: Compressed sensing MRI (CS-MRI) from single and parallel coils is one of the powerful ways to reduce the scan time of MR imaging with performance guarantee. However, the computational costs are usually expensive. This paper aims to propose a computationally fast and accurate deep learning algorithm for the reconstruction of MR images from highly down-sampled k-space data. Theory: Based on the topological analysis, we show that the data manifold of the aliasing artifact is easier to learn from a uniform subsampling pattern with additional low-frequency k-space data. Thus, we develop deep aliasing artifact learning networks for the magnitude and phase images to estimate and remove the aliasing artifacts from highly accelerated MR acquisition. Methods: The aliasing artifacts are directly estimated from the distorted magnitude and phase images reconstructed from subsampled k-space data so that we can get an aliasing-free images by subtracting the estimated aliasing artifact from corrupted inputs. Moreover, to deal with the globally distributed aliasing artifact, we develop a multi-scale deep neural network with a large receptive field. Results: The experimental results confirm that the proposed deep artifact learning network effectively estimates and removes the aliasing artifacts. Compared to existing CS methods from single and multi-coli data, the proposed network shows minimal errors by removing the coherent aliasing artifacts. Furthermore, the computational time is by order of magnitude faster. Conclusion: As the proposed deep artifact learning network immediately generates accurate reconstruction, it has great potential for clinical applications.",
"title": ""
},
{
"docid": "b4d4a42e261a5272a7865065b74ff91b",
"text": "The acquisition of Magnetic Resonance Imaging (MRI) is inherently slow. Inspired by recent advances in deep learning, we propose a framework for reconstructing MR images from undersampled data using a deep cascade of convolutional neural networks to accelerate the data acquisition process. We show that for Cartesian undersampling of 2D cardiac MR images, the proposed method outperforms the state-of-the-art compressed sensing approaches, such as dictionary learning-based MRI (DLMRI) reconstruction, in terms of reconstruction error, perceptual quality and reconstruction speed for both 3-fold and 6-fold undersampling. Compared to DLMRI, the error produced by the method proposed is approximately twice as small, allowing to preserve anatomical structures more faithfully. Using our method, each image can be reconstructed in 23ms, which is fast enough to enable real-time applications.",
"title": ""
},
{
"docid": "a5b0bf255205527c699c0cf3f7ee5270",
"text": "This paper proposes a deep learning approach for accelerating magnetic resonance imaging (MRI) using a large number of existing high quality MR images as the training datasets. An off-line convolutional neural network is designed and trained to identify the mapping relationship between the MR images obtained from zero-filled and fully-sampled k-space data. The network is not only capable of restoring fine structures and details but is also compatible with online constrained reconstruction methods. Experimental results on real MR data have shown encouraging performance of the proposed method for efficient and accurate imaging.",
"title": ""
}
] | [
{
"docid": "3d5c4772d5d73343cc518d062e90f3db",
"text": "Accurate real-time tracking of influenza outbreaks helps public health officials make timely and meaningful decisions that could save lives. We propose an influenza tracking model, ARGO (AutoRegression with GOogle search data), that uses publicly available online search data. In addition to having a rigorous statistical foundation, ARGO outperforms all previously available Google-search-based tracking models, including the latest version of Google Flu Trends, even though it uses only low-quality search data as input from publicly available Google Trends and Google Correlate websites. ARGO not only incorporates the seasonality in influenza epidemics but also captures changes in people's online search behavior over time. ARGO is also flexible, self-correcting, robust, and scalable, making it a potentially powerful tool that can be used for real-time tracking of other social events at multiple temporal and spatial resolutions.",
"title": ""
},
{
"docid": "30a75bbb74bdc8a5e82ad19de7e1faff",
"text": "Scattering centers of two different vehicles have been evaluated using SAR, and the combination of SAR and DBF. The results show that main scattering centers are located at the wheels, the regions around the license plate, door outer panel, windshield pillar, center pillar, rear pillar, and light units. Furthermore, it has been shown that multipath propagation enables an indirect detection of scattering centers. The analysis shows no significant differences between the scattering center locations at 24 GHz and 77 GHz. However, the increased bandwidth at 77 GHz allows resolving merged scattering centers and improves the contour determination. The comparison between the measurement results of the SAR processing and the mechanical scanning radar confirmed similar main scattering centers. Furthermore, the measurement results show that the contour and orientation of a vehicle can be determined at a distance of 10 m with a bandwidth of 2 GHz and an angular resolution of approximately 2°.",
"title": ""
},
{
"docid": "b139bad3a500fad18c203316fb6fbb55",
"text": "The current environment of web applications demands performance and scalability. Several previous approaches have implemented threading, events, or both, but increasing traffic requires new solutions for improved concurrent service. Node.js is a new web framework that achieves both through server-side JavaScript and eventdriven I/O. Tests will be performed against two comparable frameworks that compare service request times over a number of cores. The results will demonstrate the performance of JavaScript as a server-side language and the efficiency of the non-blocking asynchronous model.",
"title": ""
},
{
"docid": "d36c169c6c28e9e00c00aaee0277cc6e",
"text": "The Internet of Things (IoT) system proposed in this paper is an advanced solution for monitoring the temperature at different points of location in a data centre, making this temperature data visible over internet through cloud based dashboard and sending SMS and email alerts to predefined recipients when temperature rises above the safe operating zone and reaches certain high values. This helps the datacenter management team to take immediate action to rectify this temperature deviation. Also this can be monitored from anywhere anytime over online dashboard by the senior level professionals who are not present in the data centre at any point in time. This Wireless Sensor Network (WSN) based monitoring system consists of temperature sensors, ESP8266 and Wi-Fi router. ESP8266 is a low power, highly integrated Wi-Fi solution from Espress if. The ESP8266 here, in this prototype, connects to ‘Ubidots’ cloud through its API for posting temperature data to the cloud dashboard on real time and the cloud event management system generates alerts whenever the high temperature alert event is fired. Cloud events need to be configured for different alerts beforehand through the user friendly user interface of the platform. It's to be noted that the sensor used here can be leveraged to monitor the relative humidity of the data center environment as well along with the temperature of the data center. But for this prototype solution focus is kept entirely on the temperature monitoring.",
"title": ""
},
{
"docid": "b3a85b88e4a557fcb7f0efb6ba628418",
"text": "We present the bilateral solver, a novel algorithm for edgeaware smoothing that combines the flexibility and speed of simple filtering approaches with the accuracy of domain-specific optimization algorithms. Our technique is capable of matching or improving upon state-of-the-art results on several different computer vision tasks (stereo, depth superresolution, colorization, and semantic segmentation) while being 10-1000× faster than baseline techniques with comparable accuracy, and producing lower-error output than techniques with comparable runtimes. The bilateral solver is fast, robust, straightforward to generalize to new domains, and simple to integrate into deep learning pipelines.",
"title": ""
},
{
"docid": "190cecfd31f1c269ef5a24babaa71371",
"text": "This paper introduces the active learning of Pareto fronts (ALP) algorithm, a novel approach to recover the Pareto front of a multiobjective optimization problem. ALP casts the identification of the Pareto front into a supervised machine learning task. This approach enables an analytical model of the Pareto front to be built. The computational effort in generating the supervised information is reduced by an active learning strategy. In particular, the model is learned from a set of informative training objective vectors. The training objective vectors are approximated Pareto-optimal vectors obtained by solving different scalarized problem instances. The experimental results show that ALP achieves an accurate Pareto front approximation with a lower computational effort than state-of-the-art estimation of distribution algorithms and widely known genetic techniques.",
"title": ""
},
{
"docid": "a8d6a864092b3deb58be27f0f76b02c2",
"text": "High-quality word representations have been very successful in recent years at improving performance across a variety of NLP tasks. These word representations are the mappings of each word in the vocabulary to a real vector in the Euclidean space. Besides high performance on specific tasks, learned word representations have been shown to perform well on establishing linear relationships among words. The recently introduced skipgram model improved performance on unsupervised learning of word embeddings that contains rich syntactic and semantic word relations both in terms of accuracy and speed. Word embeddings that have been used frequently on English language, is not applied to Turkish yet. In this paper, we apply the skip-gram model to a large Turkish text corpus and measured the performance of them quantitatively with the \"question\" sets that we generated. The learned word embeddings and the question sets are publicly available at our website. Keywords—Word embeddings, Natural Language Processing, Deep Learning",
"title": ""
},
{
"docid": "e94cc8dbf257878ea9b78eceb990cb3b",
"text": "The past two decades have seen extensive growth of sexual selection research. Theoretical and empirical work has clarified many components of pre- and postcopulatory sexual selection, such as aggressive competition, mate choice, sperm utilization and sexual conflict. Genetic mechanisms of mate choice evolution have been less amenable to empirical testing, but molecular genetic analyses can now be used for incisive experimentation. Here, we highlight some of the currently debated areas in pre- and postcopulatory sexual selection. We identify where new techniques can help estimate the relative roles of the various selection mechanisms that might work together in the evolution of mating preferences and attractive traits, and in sperm-egg interactions.",
"title": ""
},
{
"docid": "118f6ab5b61a334ff8a23f5c139c110c",
"text": "Many tasks in the biomedical domain require the assignment of one or more predefined labels to input text, where the labels are a part of a hierarchical structure (such as a taxonomy). The conventional approach is to use a one-vs.-rest (OVR) classification setup, where a binary classifier is trained for each label in the taxonomy or ontology where all instances not belonging to the class are considered negative examples. The main drawbacks to this approach are that dependencies between classes are not leveraged in the training and classification process, and the additional computational cost of training parallel classifiers. In this paper, we apply a new method for hierarchical multi-label text classification that initializes a neural network model final hidden layer such that it leverages label co-occurrence relations such as hypernymy. This approach elegantly lends itself to hierarchical classification. We evaluated this approach using two hierarchical multi-label text classification tasks in the biomedical domain using both sentenceand document-level classification. Our evaluation shows promising results for this approach.",
"title": ""
},
{
"docid": "87df8c63588c2e62078be2031a345f01",
"text": "Microblogging platforms, such as Twitter, have already played an important role in recent cultural, social and political events. Discovering latent topics from social streams is therefore important for many downstream applications, such as clustering, classification or recommendation. However, traditional topic models that rely on the bag-of-words assumption are insufficient to uncover the rich semantics and temporal aspects of topics in Twitter. In particular, microblog content is often influenced by external information sources, such as Web documents linked from Twitter posts, and often focuses on specific entities, such as people or organizations. These external sources provide useful semantics to understand microblogs and we generally refer to these semantics as auxiliary semantics. In this article, we address the mentioned issues and propose a unified framework for Multifaceted Topic Modeling from Twitter streams. We first extract social semantics from Twitter by modeling the social chatter associated with hashtags. We further extract terms and named entities from linked Web documents to serve as auxiliary semantics during topic modeling. The Multifaceted Topic Model (MfTM) is then proposed to jointly model latent semantics among the social terms from Twitter, auxiliary terms from the linked Web documents and named entities. Moreover, we capture the temporal characteristics of each topic. An efficient online inference method for MfTM is developed, which enables our model to be applied to large-scale and streaming data. Our experimental evaluation shows the effectiveness and efficiency of our model compared with state-of-the-art baselines. We evaluate each aspect of our framework and show its utility in the context of tweet clustering.",
"title": ""
},
{
"docid": "02f62ec1ea8b7dba6d3a5d4ea08abe2d",
"text": "MicroRNAs (miRNAs) are short, 22–25 nucleotide long transcripts that may suppress entire signaling pathways by interacting with the 3’-untranslated region (3’-UTR) of coding mRNA targets, interrupting translation and inducing degradation of these targets. The long 3’-UTRs of brain transcripts compared to other tissues predict important roles for brain miRNAs. Supporting this notion, we found that brain miRNAs co-evolved with their target transcripts, that non-coding pseudogenes with miRNA recognition elements compete with brain coding mRNAs on their miRNA interactions, and that Single Nucleotide Polymorphisms (SNPs) on such pseudogenes are enriched in mental diseases including autism and schizophrenia, but not Alzheimer’s disease (AD). Focusing on evolutionarily conserved and primate-specifi c miRNA controllers of cholinergic signaling (‘CholinomiRs’), we fi nd modifi ed CholinomiR levels in the brain and/or nucleated blood cells of patients with AD and Parkinson’s disease, with treatment-related diff erences in their levels and prominent impact on the cognitive and anti-infl ammatory consequences of cholinergic signals. Examples include the acetylcholinesterase (AChE)-targeted evolutionarily conserved miR-132, whose levels decline drastically in the AD brain. Furthermore, we found that interruption of AChE mRNA’s interaction with the primatespecifi c CholinomiR-608 in carriers of a SNP in the AChE’s miR-608 binding site induces domino-like eff ects that reduce the levels of many other miR-608 targets. Young, healthy carriers of this SNP express 40% higher brain AChE activity than others, potentially aff ecting the responsiveness to AD’s anti-AChE therapeutics, and show elevated trait anxiety, infl ammation and hypertension. Non-coding regions aff ecting miRNA-target interactions in neurodegenerative brains thus merit special attention.",
"title": ""
},
{
"docid": "3239ff217e0ea4c671239cb9b0f6c863",
"text": "In this letter, we present a passive spine gripper that can hold rough rocky surfaces of boulders on cliff walls, and we discuss its application to a four-limbed robot for free-climbing in extreme terrain. The limbed robot has four degrees of freedom in each limb, where three are to drive joints of the limb and one for releasing the gripper. The fine spine of the proposed gripper also enables it to passively and adaptively latch on to microscopic asperities of the rough surface, and it is thus an efficient mechanism. In this letter, we present the fundamental design and mechanism of the proposed gripper, after which we introduce its static gripping model. We verify the gripping model by the experimental gripping performance of the prototype gripper. We show a lightweight four-limbed robot that is equipped with the grippers mounted on each limb. To evaluate the climbing capabilities of the robot, we use it to perform climbing experiments on a rugged and steep slope. The results show that the prototype can safely climb over such challenging terrain that is similar to a gravity offload system.",
"title": ""
},
{
"docid": "785c45602000f0c38b5db9f97ad147e6",
"text": "This paper proposes a novel assistive system for the visually impaired. The system is composed of a Microsoft Kinect sensor, keypad-type controller, tactile device, laptop computer and so on. The system can recognize three-dimensional objects from depth data generated by the Kinect sensor, and inform visually impaired users not only about the existence of objects, but also about their classes such as chairs and upward stairs. Ordinarily, the system works as a conventional white cane. When a user instructs the system to find the object of a particular class, the system executes the recognition scheme that is designed to find the instructed object. If the object is found in the field of view of the Kinect sensor, the tactile device provides vibration feedback. The recognition schemes are applied to actual scenes. The experimental results indicate that the system is promising as means of helping the visually impaired find the desired objects.",
"title": ""
},
{
"docid": "94bb7d2329cbea921c6f879090ec872d",
"text": "We explore building generative neural network models of popular reinforcement learning environments. Our world model can be trained quickly in an unsupervised manner to learn a compressed spatial and temporal representation of the environment. By using features extracted from the world model as inputs to an agent, we can train a very compact and simple policy that can solve the required task. We can even train our agent entirely inside of its own hallucinated dream generated by its world model, and transfer this policy back into the actual environment. An interactive version of this paper is available at https://worldmodels.github.io",
"title": ""
},
{
"docid": "47eef1318d313e2f89bb700f8cd34472",
"text": "This paper sets out to detect controversial news reports using online discussions as a source of information. We define controversy as a public discussion that divides society and demonstrate that a content and stylometric analysis of these debates yields useful signals for extracting disputed news items. Moreover, we argue that a debate-based approach could produce more generic models, since the discussion architectures we exploit to measure controversy occur on many different platforms.",
"title": ""
},
{
"docid": "d1aa525575e33c587d86e89566c21a49",
"text": "This paper investigates the problem of fault detection for nonlinear discrete-time networked systems under an event-triggered scheme. A polynomial fuzzy fault detection filter is designed to generate a residual signal and detect faults in the system. A novel polynomial event-triggered scheme is proposed to determine the transmission of the signal. A fault detection filter is designed to guarantee that the residual system is asymptotically stable and satisfies the desired performance. Polynomial approximated membership functions obtained by Taylor series are employed for filtering analysis. Furthermore, sufficient conditions are represented in terms of sum of squares (SOSs) and can be solved by SOS tools in MATLAB environment. A numerical example is provided to demonstrate the effectiveness of the proposed results.",
"title": ""
},
{
"docid": "d4dc33b15df0a27259180fef3c28b546",
"text": "Author name ambiguity is one of the problems that decrease the quality and reliability of information retrieved from digital libraries. Existing methods have tried to solve this problem by predefining a feature set based on expert’s knowledge for a specific dataset. In this paper, we propose a new approach which uses deep neural network to learn features automatically for solving author name ambiguity. Additionally, we propose the general system architecture for author name disambiguation on any dataset. We evaluate the proposed method on a dataset containing Vietnamese author names. The results show that this method significantly outperforms other methods that use predefined feature set. The proposed method achieves 99.31% in terms of accuracy. Prediction error rate decreases from 1.83% to 0.69%, i.e., it decreases by 1.14%, or 62.3% relatively compared with other methods that use predefined feature set (Table 3).",
"title": ""
},
{
"docid": "4578a7774d8a34807ddf300b854ebd99",
"text": "OBJECTIVE\nThe aim of this study was to report the frequency of common treatment-emergent adverse events (AEs) from selective serotonin reuptake inhibitors (SSRIs) in children, adolescents, and adults.\n\n\nMETHOD\nAE data were obtained from all published double-blind, placebo-controlled SSRI studies of children and adolescents that separated AE findings by age group. The AE findings were pooled for purposes of age-group comparisons. Double-blind, placebo-controlled SSRI studies of adolescents (n = 2) and of adults identified in systematically identified trials (n = 22) were assessed to compare patterns and rates across the age span. Other reports, primarily from the published SSRI literature, were added to clarify the findings presented.\n\n\nRESULTS\nActivation and vomiting SSRI AEs were 2- to 3-fold more prevalent in children than in adolescents, and their rate was lowest in adults. Somnolence as a SSRI AE was uncommon in children; its rate increased with advancing age. Insomnia and nausea were common SSRI AEs across the age span. Activation AEs were a frequent reason for discontinuation from SSRI clinical trials in preadolescents, whereas somnolence, nausea, and insomnia AEs were the most common reasons for trial discontinuations in adults.\n\n\nCONCLUSIONS\nChildren are particularly vulnerable to specific AEs from certain medications, such as SSRIs. It is likely that the level of children's biological immaturity explains part of this phenomenon.",
"title": ""
},
{
"docid": "b8505166c395750ee47127439a4afa1a",
"text": "Modern replicated data stores aim to provide high availability, by immediately responding to client requests, often by implementing objects that expose concurrency. Such objects, for example, multi-valued registers (MVRs), do not have sequential specifications. This paper explores a recent model for replicated data stores that can be used to precisely specify causal consistency for such objects, and liveness properties like eventual consistency, without revealing details of the underlying implementation. The model is used to prove the following results: An eventually consistent data store implementing MVRs cannot satisfy a consistency model strictly stronger than observable causal consistency (OCC). OCC is a model somewhat stronger than causal consistency, which captures executions in which client observations can use causality to infer concurrency of operations. This result holds under certain assumptions about the data store. Under the same assumptions, an eventually consistent and causally consistent replicated data store must send messages of unbounded size: If s objects are supported by n replicas, then, for every k > 1, there is an execution in which an Ω({n,s} k)-bit message is sent.",
"title": ""
},
{
"docid": "c80f1e893d723b82569d93f78659275a",
"text": "Under the framework of PU(Positive data and Unlabeled data), this paper originally proposes a three-setp algorithm. First, CoTraining is employed for filtering out the likely positive data from the unlabeled dataset U. Second, affinity propagation (AP) approach attempts to pick out the strong positive from likely positive set which is produced in first step. Those data picked out can be supplied to positive dataset P. Finally, a linear One-Class SVM will learn from both the purified U as negative and the expanded P as positive. Because of the algorithm's characteristic of automatic expanding positive dataset, the proposed algorithm especially performs well in situations where given positive dataset P is insufficient. A comprehensive experiment had proved that our algorithm is preferable to the existing ones.",
"title": ""
}
] | scidocsrr |
9434a49768fc7617eb580018d730ac8f | Visualization and GPU-accelerated simulation of medical ultrasound from CT images | [
{
"docid": "2ceca6c4edde5266f2e0139b81642736",
"text": "Medical ultrasound interpretation requires a great deal of experience. Real-time simulation of medical ultrasound provides a cost-effective tool for training and easy access to a variety of cases and exercises. However, fully synthetic and realistic simulation of ultrasound is complex and extremely time-consuming. In this paper, we present a novel method for simulation of ultrasound images from 3D CT scans by breaking down the computations into a preprocessing and a run-time phase. The preprocessing phase produces detailed fixed-view 3D scattering images and the run-time phase generates view-dependent ultrasonic artifacts for a given aperture geometry and position within a volume of interest. We develop a simple acoustic model of the ultrasound for the run-time phase, which produces realistic ultrasound images in real-time when combined with the previously computed scattering image.",
"title": ""
},
{
"docid": "bb98b9a825a4c7d0f3d4b06fafb8ff37",
"text": "The tremendous evolution of programmable graphics hardware has made high-quality real-time volume graphics a reality. In addition to the traditional application of rendering volume data in scientific visualization, the interest in applying these techniques for real-time rendering of atmospheric phenomena and participating media such as fire, smoke, and clouds is growing rapidly. This course covers both applications in scientific visualization, e.g., medical volume data, and real-time rendering, such as advanced effects and illumination in computer games, in detail. Course participants will learn techniques for harnessing the power of consumer graphics hardware and high-level shading languages for real-time rendering of volumetric data and effects. Beginning with basic texture-based approaches including hardware ray casting, the algorithms are improved and expanded incrementally, covering local and global illumination, scattering, pre-integration, implicit surfaces and non-polygonal isosurfaces, transfer function design, volume animation and deformation, dealing with large volumes, high-quality volume clipping, rendering segmented volumes, higher-order filtering, and non-photorealistic volume rendering. Course participants are provided with documented source code covering details usually omitted in publications.",
"title": ""
}
] | [
{
"docid": "d70a74e37f625f542f8b16e3b0b0e647",
"text": "Word segmentation is the first step of any tasks in Vietnamese language processing. This paper reviews state-of-the-art approaches and systems for word segmentation in Vietnamese. To have an overview of all stages from building corpora to developing toolkits, we discuss building the corpus stage, approaches applied to solve the word segmentation and existing toolkits to segment words in Vietnamese sentences. In addition, this study shows clearly the motivations on building corpus and implementing machine learning techniques to improve the accuracy for Vietnamese word segmentation. According to our observation, this study also reports a few of achievements and limitations in existing Vietnamese word segmentation systems.",
"title": ""
},
{
"docid": "de4c44363fd6bb6da7ec0c9efd752213",
"text": "Modeling the structure of coherent texts is a task of great importance in NLP. The task of organizing a given set of sentences into a coherent order has been commonly used to build and evaluate models that understand such structure. In this work we propose an end-to-end neural approach based on the recently proposed set to sequence mapping framework to address the sentence ordering problem. Our model achieves state-of-the-art performance in the order discrimination task on two datasets widely used in the literature. We also consider a new interesting task of ordering abstracts from conference papers and research proposals and demonstrate strong performance against recent methods. Visualizing the sentence representations learned by the model shows that the model has captured high level logical structure in these paragraphs. The model also learns rich semantic sentence representations by learning to order texts, performing comparably to recent unsupervised representation learning methods in the sentence similarity and paraphrase detection tasks.",
"title": ""
},
{
"docid": "e09334a0f7720c52896cdc5a80746d56",
"text": "Recent research has shown a substantial active presence of bots in online social networks (OSNs). In this paper we utilise our past work on studying bots (Stweeler) to comparatively analyse the usage and impact of bots and humans on Twitter, one of the largest OSNs in the world. We collect a large-scale Twitter dataset and define various metrics based on tweet metadata. We divide and filter the dataset in four popularity groups in terms of number of followers. Using a human annotation task we assign ‘bot’ and ‘human’ ground-truth labels to the dataset, and compare the annotations against an online bot detection tool for evaluation. We then ask a series of questions to discern important behavioural bot and human characteristics using metrics within and among four popularity groups. From the comparative analysis we draw important differences as well as surprising similarities between the two entities, thus paving the way for reliable classification of automated political infiltration, advertisement campaigns, and general bot detection.",
"title": ""
},
{
"docid": "f49864c2f892bf4058d953b6439bfdd1",
"text": "Dropout-based regularization methods can be regarded as injecting random noise with pre-defined magnitude to different parts of the neural network during training. It was recently shown that Bayesian dropout procedure not only improves generalization but also leads to extremely sparse neural architectures by automatically setting the individual noise magnitude per weight. However, this sparsity can hardly be used for acceleration since it is unstructured. In the paper, we propose a new Bayesian model that takes into account the computational structure of neural networks and provides structured sparsity, e.g. removes neurons and/or convolutional channels in CNNs. To do this we inject noise to the neurons outputs while keeping the weights unregularized. We establish the probabilistic model with a proper truncated log-uniform prior over the noise and truncated log-normal variational approximation that ensures that the KL-term in the evidence lower bound is computed in closed-form. The model leads to structured sparsity by removing elements with a low SNR from the computation graph and provides significant acceleration on a number of deep neural architectures. The model is easy to implement as it can be formulated as a separate dropout-like layer.",
"title": ""
},
{
"docid": "4acfb49be406de472af9080d3cdc6fa4",
"text": "Evolution provides a creative fount of complex and subtle adaptations that often surprise the scientists who discover them. However, the creativity of evolution is not limited to the natural world: artificial organisms evolving in computational environments have also elicited surprise and wonder from the researchers studying them. The process of evolution is an algorithmic process that transcends the substrate in which it occurs. Indeed, many researchers in the field of digital evolution can provide examples of how their evolving algorithms and organisms have creatively subverted their expectations or intentions, exposed unrecognized bugs in their code, produced unexpectedly adaptations, or engaged in behaviors and outcomes uncannily convergent with ones found in nature. Such stories routinely reveal surprise and creativity by evolution in these digital worlds, but they rarely fit into the standard scientific narrative. Instead they are often treated as mere obstacles to be overcome, rather than results that warrant study in their own right. Bugs are fixed, experiments are refocused, and one-off surprises are collapsed into a single data point. The stories themselves are traded among researchers through oral tradition, but that mode of information transmission is inefficient and prone to error and outright loss. Moreover, the fact that these stories tend to be shared only among practitioners means that many natural scientists do not realize how interesting and lifelike digital organisms are and how natural their evolution can be. To our knowledge, no collection of such anecdotes has been published before. This paper is the crowd-sourced product of researchers in the fields of artificial life and evolutionary computation who have provided first-hand accounts of such cases. It thus serves as a written, fact-checked collection of scientifically important and even entertaining stories. In doing so we also present here substantial evidence that the existence and importance of evolutionary surprises extends beyond the natural world, and may indeed be a universal property of all complex evolving systems.",
"title": ""
},
{
"docid": "cc432f79b99f348863e1371dd1511b77",
"text": "Most evaluation metrics for machine translation (MT) require reference translations for each sentence in order to produce a score reflecting certain aspects of its quality. The de facto metrics, BLEU and NIST, are known to have good correlation with human evaluation at the corpus level, but this is not the case at the segment level. As an attempt to overcome these two limitations, we address the problem of evaluating the quality of MT as a prediction task, where reference-independent features are extracted from the input sentences and their translation, and a quality score is obtained based on models produced from training data. We show that this approach yields better correlation with human evaluation as compared to commonly used metrics, even with models trained on different MT systems, language-pairs and text domains.",
"title": ""
},
{
"docid": "0b6bd019945dcd154300588705d2654e",
"text": "Automobiles are currently equipped with a three-mirror system for rear-view visualization. The two side-view mirrors show close the periphery on the left and right sides of the vehicle, and the center rear-view mirror is typically adjusted to allow the driver to see through the vehicle's rear windshield. This three-mirror system, however, imposes safety concerns in requiring drivers to shift their attention and gaze to look in each mirror to obtain a full visualization of the rear-view surroundings, which takes attention off the scene in front of the vehicle. We present an alternative to the three-mirror rear-view system, which we call Rear-Stitched View Panorama (RSVP). The proposed system uses four rear-facing cameras, strategically placed to overcome the traditional blind spot problem, and stitches the feeds from each camera together to generate a single panoramic view, which can display the entire rear surroundings. We project individually captured frames onto a single virtual view using precomputed system calibration parameters. Then we determine optimal seam lines, along which the images are fused together to form the single RSVP view presented to the driver. Furthermore, we highlight techniques that enable efficient embedded implementation of the system and showcase a real-time system utilizing under 2W of power, making it suitable for in-cabin deployment in vehicles.",
"title": ""
},
{
"docid": "3256b2050c603ca16659384a0e98a22c",
"text": "In this paper, we propose a Hough transform-based method to identify low-contrast defects in unevenly illuminated images, and especially focus on the inspection of mura defects in liquid crystal display (LCD) panels. The proposed method works on 1-D gray-level profiles in the horizontal and vertical directions of the surface image. A point distinctly deviated from the ideal line of a profile can be identified as a defect one. A 1-D gray-level profile in the unevenly illuminated image results in a nonstationary line signal. The most commonly used technique for straight line detection in a noisy image is Hough transform (HT). The standard HT requires a sufficient number of points lie exactly on the same straight line at a given parameter resolution so that the accumulator will show a distinct peak in the parameter space. It fails to detect a line in a nonstationary signal. In the proposed HT scheme, the points that contribute to the vote do not have to lie on a line. Instead, a distance tolerance to the line sought is first given. Any point with the distance to the line falls within the tolerance will be accumulated by taking the distance as the voting weight. A fast search procedure to tighten the possible ranges of line parameters is also proposed for mura detection in LCD images.",
"title": ""
},
{
"docid": "7419fa101c2471e225c976da196ed813",
"text": "A 4×40 Gb/s collaborative digital CDR is implemented in 28nm CMOS. The CDR is capable of recovering a low jitter clock from a partially-equalized or un-equalized eye by using a phase detection scheme that inherently filters out ISI edges. The CDR uses split feedback that simultaneously allows wider bandwidth and lower recovered clock jitter. A shared frequency tracking is also introduced that results in lower periodic jitter. Combining these techniques the CDR recovers a 10GHz clock from an eye containing 0.8UIpp DDJ and still achieves 1-10 MHz of tracking bandwidth while adding <; 300fs of jitter. Per lane CDR occupies only .06 mm2 and consumes 175 mW.",
"title": ""
},
{
"docid": "568fa874b944120be9bdb71bec2f5cec",
"text": "Using a developmental systems perspective, this review focuses on how genetic predispositions interact with aspects of the eating environment to produce phenotypic food preferences. Predispositions include the unlearned, reflexive reactions to basic tastes: the preference for sweet and salty tastes, and the rejection of sour and bitter tastes. Other predispositions are (a) the neophobic reaction to new foods and (b) the ability to learn food preferences based on associations with the contexts and consequences of eating various foods. Whether genetic predispositions are manifested in food preferences that foster healthy diets depends on the eating environment, including food availability and child-feeding practices of the adults. Unfortunately, in the United States today, the ready availability of energy-dense foods, high in sugar, fat, and salt, provides an eating environment that fosters food preferences inconsistent with dietary guidelines, which can promote excess weight gain and obesity.",
"title": ""
},
{
"docid": "7da0a472f0a682618eccbfd4229ca14f",
"text": "A Search Join is a join operation which extends a user-provided table with additional attributes based on a large corpus of heterogeneous data originating from the Web or corporate intranets. Search Joins are useful within a wide range of application scenarios: Imagine you are an analyst having a local table describing companies and you want to extend this table with attributes containing the headquarters, turnover, and revenue of each company. Or imagine you are a film enthusiast and want to extend a table describing films with attributes like director, genre, and release date of each film. This article presents the Mannheim Search Join Engine which automatically performs such table extension operations based on a large corpus of Web data. Given a local table, the Mannheim Search Join Engine searches the corpus for additional data describing the entities contained in the input table. The discovered data is then joined with the local table and is consolidated using schema matching and data fusion techniques. As result, the user is presented with an extended table and given the opportunity to examine the provenance of the added data. We evaluate the Mannheim Search Join Engine using heterogeneous data originating from over one million different websites. The data corpus consists of HTML tables, as well as Linked Data and Microdata annotations which are converted into tabular form. Our experiments show that the Mannheim Search Join Engine achieves a coverage close to 100% and a precision of around 90% for the tasks of extending tables describing cities, companies, countries, drugs, books, films, and songs.",
"title": ""
},
{
"docid": "44016d01934a1433fe9fc28c47b20145",
"text": "Item features play an important role in movie recommender systems, where recommendations can be generated by using explicit or implicit preferences of users on traditional features (attributes) such as tag, genre, and cast. Typically, movie features are human-generated, either editorially (e.g., genre and cast) or by leveraging the wisdom of the crowd (e.g., tag), and as such, they are prone to noise and are expensive to collect. Moreover, these features are often rare or absent for new items, making it difficult or even impossible to provide good quality recommendations. In this paper, we show that user’s preferences on movies can be better described in terms of the Mise-en-Scène features, i.e., the visual aspects of a movie that characterize design, aesthetics and style (e.g., colors, textures). We use both MPEG-7 visual descriptors and Deep Learning hidden layers as example of mise-en-scène features that can visually describe movies. Interestingly, mise-en-scène features can be computed automatically from video files or even from trailers, offering more flexibility in handling new items, avoiding the need for costly and error-prone human-based tagging, and providing good scalability. We have conducted a set of experiments on a large catalogue of 4K movies. Results show that recommendations based on mise-en-scène features consistently provide the best performance with respect to richer sets of more traditional features, such as genre and tag.",
"title": ""
},
{
"docid": "6ab046862d1c5329b0538a85dd0b4ccd",
"text": "In this study, a photosynthesis-fermentation model was proposed to merge the positive aspects of autotrophs and heterotrophs. Microalga Chlorella protothecoides was grown autotrophically for CO(2) fixation and then metabolized heterotrophically for oil accumulation. Compared to typical heterotrophic metabolism, 69% higher lipid yield on glucose was achieved at the fermentation stage in the photosynthesis-fermentation model. An elementary flux mode study suggested that the enzyme Rubisco-catalyzed CO(2) re-fixation, enhancing carbon efficiency from sugar to oil. This result may explain the higher lipid yield. In this new model, 61.5% less CO(2) was released compared with typical heterotrophic metabolism. Immunoblotting and activity assay further showed that Rubisco functioned in sugar-bleaching cells at the fermentation stage. Overall, the photosynthesis-fermentation model with double CO(2) fixation in both photosynthesis and fermentation stages, enhances carbon conversion ratio of sugar to oil and thus provides an efficient approach for the production of algal lipid.",
"title": ""
},
{
"docid": "e6aef17f7efdf1cb497ef89262325162",
"text": "OBJECTIVES\nTo evaluate the erectile function (EF) domain of the International Index of Erectile Function (IIEF) as a diagnostic tool to discriminate between men with and without erectile dysfunction (ED) and to develop a clinically meaningful gradient of severity for ED.\n\n\nMETHODS\nOne thousand one hundred fifty-one men (1035 with and 116 without ED) who reported attempting sexual activity were evaluated using data from four clinical trials of sildenafil citrate (Viagra) and two control samples. The statistical program Classification and Regression Trees was used to determine optimal cutoff scores on the EF domain (range 6 to 30) to distinguish between men with and without ED and to determine levels of ED severity on the EF domain using the IIEF item on sexual intercourse satisfaction.\n\n\nRESULTS\nFor a 0.5 prevalence rate of ED, the optimal cutoff score was 25, with men scoring less than or equal to 25 classified as having ED and those scoring above 25 as not having ED (sensitivity 0.97, specificity 0.88). Sensitivity analyses revealed a robust statistical solution that was well supported with different assumed prevalence rates and several cross-validations. The severity of ED was classified into five categories: no ED (EF score 26 to 30), mild (EF score 22 to 25), mild to moderate (EF score 17 to 21), moderate (EF score 11 to 16), and severe (EF score 6 to 10). Substantial agreement was shown between these predicted and \"true\" classes (weighted kappa 0.80).\n\n\nCONCLUSIONS\nThe EF domain possesses favorable statistical properties as a diagnostic tool, not only in distinguishing between men with and without ED, but also in classifying levels of ED severity. Clinical validation with self-rated assessments of ED severity is warranted.",
"title": ""
},
{
"docid": "be30cf5e84895ff8750c392cd55071e2",
"text": "In the past 50 years, Computational Wind Engineering (CWE) has undergone a successful transition from an emerging field into an increasingly established field in wind engineering research, practice and education. This paper provides a perspective on the past, present and future of CWE. It addresses three key illustrations of the success of CWE: (1) the establishment of CWE as an individual research and application area in wind engineering with its own successful conference series under the umbrella of the International Association of Wind Engineering (IAWE); (2) the increasing range of topics covered in CWE; and (3) the history of overview and review papers in CWE. The paper also outlines some of the earliest achievements in CWE and the resulting development of best practice guidelines. It provides some views on the complementary relationship between reduced-scale wind-tunnel testing and CFD. It re-iterates some important quotes made by CWE and/or CFD researchers in the past, many of which are still equally valid today and which are provided without additional comments, to let the quotes speak for themselves. Next, as application examples to the foregoing sections, the paper provides a more detailed view on CFD simulation of pedestrian-level wind conditions around buildings, CFD simulation of natural ventilation of buildings and CFD simulation of wind-driven rain on building facades. Finally, a non-exhaustive perspective on the future of CWE is provided.",
"title": ""
},
{
"docid": "670ad989fb45d87b898aafe571bac3a9",
"text": "As an emerging technology to support scalable content-based image retrieval (CBIR), hashing has recently received great attention and became a very active research domain. In this study, we propose a novel unsupervised visual hashing approach called semantic-assisted visual hashing (SAVH). Distinguished from semi-supervised and supervised visual hashing, its core idea is to effectively extract the rich semantics latently embedded in auxiliary texts of images to boost the effectiveness of visual hashing without any explicit semantic labels. To achieve the target, a unified unsupervised framework is developed to learn hash codes by simultaneously preserving visual similarities of images, integrating the semantic assistance from auxiliary texts on modeling high-order relationships of inter-images, and characterizing the correlations between images and shared topics. Our performance study on three publicly available image collections: Wiki, MIR Flickr, and NUS-WIDE indicates that SAVH can achieve superior performance over several state-of-the-art techniques.",
"title": ""
},
{
"docid": "f83d941bb22b0f272ae8611f25d617f9",
"text": "This paper introduces CarSpeak, a communication system for autonomous driving. CarSpeak enables a car to query and access sensory information captured by other cars in a manner similar to how it accesses information from its local sensors. CarSpeak adopts a content-centric approach where information objects -- i.e., regions along the road -- are first class citizens. It names and accesses road regions using a multi-resolution system, which allows it to scale the amount of transmitted data with the available bandwidth. CarSpeak also changes the MAC protocol so that, instead of having nodes contend for the medium, contention is between road regions, and the medium share assigned to any region depends on the number of cars interested in that region.\n CarSpeak is implemented in a state-of-the-art autonomous driving system and tested on indoor and outdoor hardware testbeds including an autonomous golf car and 10 iRobot Create robots. In comparison with a baseline that directly uses 802.11, CarSpeak reduces the time for navigating around obstacles by 2.4x, and reduces the probability of a collision due to limited visibility by 14x.",
"title": ""
},
{
"docid": "6fe71d8d45fa940f1a621bfb5b4e14cd",
"text": "We present Attract-Repel, an algorithm for improving the semantic quality of word vectors by injecting constraints extracted from lexical resources. Attract-Repel facilitates the use of constraints from mono- and cross-lingual resources, yielding semantically specialized cross-lingual vector spaces. Our evaluation shows that the method can make use of existing cross-lingual lexicons to construct high-quality vector spaces for a plethora of different languages, facilitating semantic transfer from high- to lower-resource ones. The effectiveness of our approach is demonstrated with state-of-the-art results on semantic similarity datasets in six languages. We next show that Attract-Repel-specialized vectors boost performance in the downstream task of dialogue state tracking (DST) across multiple languages. Finally, we show that cross-lingual vector spaces produced by our algorithm facilitate the training of multilingual DST models, which brings further performance improvements.",
"title": ""
},
{
"docid": "648a5479933eb4703f1d2639e0c3b5c7",
"text": "The Surgery Treatment Modality Committee of the Korean Gynecologic Oncologic Group (KGOG) has determined to develop a surgical manual to facilitate clinical trials and to improve communication between investigators by standardizing and precisely describing operating procedures. The literature on anatomic terminology, identification of surgical components, and surgical techniques were reviewed and discussed in depth to develop a surgical manual for gynecologic oncology. The surgical procedures provided here represent the minimum requirements for participating in a clinical trial. These procedures should be described in the operation record form, and the pathologic findings obtained from the procedures should be recorded in the pathologic report form. Here, we focused on radical hysterectomy and lymphadenectomy, and we developed a KGOG classification for those conditions.",
"title": ""
},
{
"docid": "8aeb80865c29d968bb8ed32e75cfa12f",
"text": "Ant System, the first Ant Colony Optimization algorithm, showed to be a viable method for attacking hard combinatorial optimization problems. Yet, its performance, when compared to more fine-tuned algorithms, was rather poor for large instances of traditional benchmark problems like the Traveling Salesman Problem. To show that Ant Colony Optimization algorithms could be good alternatives to existing algorithms for hard combinatorial optimization problems, recent research in this area has mainly focused on the development of algorithmic variants which achieve better performance than Ant System. In this paper, we present MAX–MIN Ant System ( MMAS), an Ant Colony Optimization algorithm derived from Ant System.MMAS differs from Ant System in several important aspects, whose usefulness we demonstrate by means of an experimental study. Additionally, we relate one of the characteristics specific to MMAS — that of using a greedier search than Ant System — to results from the search space analysis of the combinatorial optimization problems attacked in this paper. Our computational results on the Traveling Salesman Problem and the Quadratic Assignment Problem show that MMAS is currently among the best performing algorithms for these problems. © 2000 Elsevier Science B.V. All rights reserved.",
"title": ""
}
] | scidocsrr |
9519f2e4936beaf1ed2a04eda5c253c7 | Innovation Search Strategy and Predictable Returns : A Bias for Novelty | [
{
"docid": "b72c83f9daa1c46c7455c27f193bd0af",
"text": "This paper shows that over time, expected market illiquidity positively affects ex ante stock excess return, suggesting that expected stock excess return partly represents an illiquidity premium. This complements the cross-sectional positive return–illiquidity relationship. Also, stock returns are negatively related over time to contemporaneous unexpected illiquidity. The illiquidity measure here is the average across stocks of the daily ratio of absolute stock return to dollar volume, which is easily obtained from daily stock data for long time series in most stock markets. Illiquidity affects more strongly small firm stocks, thus explaining time series variations in their premiums over time. r 2002 Elsevier Science B.V. All rights reserved. JEL classificaion: G12",
"title": ""
}
] | [
{
"docid": "10a6ba088f09fc02679532e8155d571c",
"text": "Now a day's internet is the most valuable source of learning, getting ideas, reviews for a product or a service. Everyday millions of reviews are generated in the internet about a product, person or a place. Because of their huge number and size it is very difficult to handle and understand such reviews. Sentiment analysis is such a research area which understands and extracts the opinion from the given review and the analysis process includes natural language processing (NLP), computational linguistics, text analytics and classifying the polarity of the opinion. In the field of sentiment analysis there are many algorithms exist to tackle NLP problems. Each algorithm is used by several applications. In this paper we have shown the taxonomy of various sentiment analysis methods. This paper also shows that Support vector machine (SVM) gives high accuracy compared to Naïve bayes and maximum entropy methods.",
"title": ""
},
{
"docid": "66451aa5a41ec7f9246d749c0983fa60",
"text": "A new method for automatically acquiring case frame patterns from large corpora is proposed. In particular, the problem of generalizing values of a case frame slot for a verb is viewed as that of estimating a conditional probability distribution over a partition of words, and a new generalization method based on the Minimum Description Length (MDL) principle is proposed. In order to assist with efficiency, the proposed method makes use of an existing thesaurus and restricts its attention to those partitions that are present as \"cuts\" in the thesaurus tree, thus reducing the generalization problem to that of estimating a \"tree cut model\" of the thesaurus tree. An efficient algorithm is given, which provably obtains the optimal tree cut model for the given frequency data of a case slot, in the sense of MDL. Case frame patterns obtained by the method were used to resolve PP-attachment ambiguity. Experimental results indicate that the proposed method improves upon or is at least comparable with existing methods.",
"title": ""
},
{
"docid": "c61d8a536241f2cb0bf8adb53131a511",
"text": "A method to design a microstrip-fed antipodal tapered-slot antenna, which has ultrawideband (UWB) performance and miniaturized dimensions, is presented. The proposed method modifies the antenna's structure to establish a direct connection between the microstrip feeder and the radiator. That modification, which removes the need to use any transitions and/or baluns in the feeding structure, is the first step in the proposed miniaturization. In the second step of miniaturization, the radiator and ground plane are corrugated to enable further reduction in the antenna's size without jeopardizing its performance. The simulated and measured results confirm the benefits of the adopted method in reducing the surface area of the antenna, while maintaining the ultrawideband performance.",
"title": ""
},
{
"docid": "1b6ddffacc50ad0f7e07675cfe12c282",
"text": "Realism in computer-generated images requires accurate input models for lighting, textures and BRDFs. One of the best ways of obtaining high-quality data is through measurements of scene attributes from real photographs by inverse rendering. However, inverse rendering methods have been largely limited to settings with highly controlled lighting. One of the reasons for this is the lack of a coherent mathematical framework for inverse rendering under general illumination conditions. Our main contribution is the introduction of a signal-processing framework which describes the reflected light field as a convolution of the lighting and BRDF, and expresses it mathematically as a product of spherical harmonic coefficients of the BRDF and the lighting. Inverse rendering can then be viewed as deconvolution. We apply this theory to a variety of problems in inverse rendering, explaining a number of previous empirical results. We will show why certain problems are ill-posed or numerically ill-conditioned, and why other problems are more amenable to solution. The theory developed here also leads to new practical representations and algorithms. For instance, we present a method to factor the lighting and BRDF from a small number of views, i.e. to estimate both simultaneously when neither is known.",
"title": ""
},
{
"docid": "b5b91947716e3594e3ddbb300ea80d36",
"text": "In this paper, a novel drive method, which is different from the traditional motor drive techniques, for high-speed brushless DC (BLDC) motor is proposed and verified by a series of experiments. It is well known that the BLDC motor can be driven by either pulse-width modulation (PWM) techniques with a constant dc-link voltage or pulse-amplitude modulation (PAM) techniques with an adjustable dc-link voltage. However, to our best knowledge, there is rare study providing a proper drive method for a high-speed BLDC motor with a large power over a wide speed range. Therefore, the detailed theoretical analysis comparison of the PWM control and the PAM control for high-speed BLDC motor is first given. Then, a conclusion that the PAM control is superior to the PWM control at high speed is obtained because of decreasing the commutation delay and high-frequency harmonic wave. Meanwhile, a new high-speed BLDC motor drive method based on the hybrid approach combining PWM and PAM is proposed. Finally, the feasibility and effectiveness of the performance analysis comparison and the new drive method are verified by several experiments.",
"title": ""
},
{
"docid": "fca58dee641af67f9bb62958b5b088f2",
"text": "This work explores the possibility of mixing two different fingerprints, pertaining to two different fingers, at the image level in order to generate a new fingerprint. To mix two fingerprints, each fingerprint pattern is decomposed into two different components, viz., the continuous and spiral components. After prealigning the components of each fingerprint, the continuous component of one fingerprint is combined with the spiral component of the other fingerprint. Experiments on the West Virginia University (WVU) and FVC2002 datasets show that mixing fingerprints has several benefits: (a) it can be used to generate virtual identities from two different fingers; (b) it can be used to obscure the information present in an individual's fingerprint image prior to storing it in a central database; and (c) it can be used to generate a cancelable fingerprint template, i.e., the template can be reset if the mixed fingerprint is compromised.",
"title": ""
},
{
"docid": "d68068c949d6c5b8cf4445007c4d6287",
"text": "This paper furthers the development of methods to distinguish truth from deception in textual data. We use rhetorical structure theory (RST) as the analytic framework to identify systematic differences between deceptive and truthful stories in terms of their coherence and structure. A sample of 36 elicited personal stories, self-ranked as truthful or deceptive, is manually analyzed by assigning RST discourse relations among each story’s constituent parts. A vector space model (VSM) assesses each story’s position in multidimensional RST space with respect to its distance from truthful and deceptive centers as measures of the story’s level of deception and truthfulness. Ten human judges evaluate independently whether each story is deceptive and assign their confidence levels (360 evaluations total), producing measures of the expected human ability to recognize deception. As a robustness check, a test sample of 18 truthful stories (with 180 additional evaluations) is used to determine the reliability of our RST-VSM method in determining deception. The contribution is in demonstration of the discourse structure analysis as a significant method for automated deception detection and an effective complement to lexicosemantic analysis. The potential is in developing novel discourse-based tools to alert information users to potential deception in computermediated texts. Introduction",
"title": ""
},
{
"docid": "29ba9c1cccea263a4db25da4352da754",
"text": "Distance metric learning is a fundamental problem in data mining and knowledge discovery. Many representative data mining algorithms, such as $$k$$ k -nearest neighbor classifier, hierarchical clustering and spectral clustering, heavily rely on the underlying distance metric for correctly measuring relations among input data. In recent years, many studies have demonstrated, either theoretically or empirically, that learning a good distance metric can greatly improve the performance of classification, clustering and retrieval tasks. In this survey, we overview existing distance metric learning approaches according to a common framework. Specifically, depending on the available supervision information during the distance metric learning process, we categorize each distance metric learning algorithm as supervised, unsupervised or semi-supervised. We compare those different types of metric learning methods, point out their strength and limitations. Finally, we summarize open challenges in distance metric learning and propose future directions for distance metric learning.",
"title": ""
},
{
"docid": "0c67afcb351c53c1b9e2b4bcf3b0dc08",
"text": "The Scrum methodology is an agile software development process that works as a project management wrapper around existing engineering practices to iteratively and incrementally develop software. With Scrum, for a developer to receive credit for his or her work, he or she must demonstrate the new functionality provided by a feature at the end of each short iteration during an iteration review session. Such a short-term focus without the checks and balances of sound engineering practices may lead a team to neglect quality. In this paper we present the experiences of three teams at Microsoft using Scrum with an additional nine sound engineering practices. Our results indicate that these teams were able to improve quality, productivity, and estimation accuracy through the combination of Scrum and nine engineering practices.",
"title": ""
},
{
"docid": "1bd058af9437119fc2aee4678c848802",
"text": "In this article we gave an overview of vision-based measurement (VBM), its various components, and uncertainty in the correct IM (instrumentation and measurement) metrological perspective. VBM is a fast rising technology due to the increasing affordability and capability of camera and computing hardware/software. While originally a specialized application, VBM is expected to become more ubiquitous in our everyday lives as apparent from the applications described in this article.",
"title": ""
},
{
"docid": "aca04e624f1c3dcd3f0ab9f9be1ef384",
"text": "In this paper, a novel three-phase parallel grid-connected multilevel inverter topology with a novel switching strategy is proposed. This inverter is intended to feed a microgrid from renewable energy sources (RES) to overcome the problem of the polluted sinusoidal output in classical inverters and to reduce component count, particularly for generating a multilevel waveform with a large number of levels. The proposed power converter consists of <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula> two-level <inline-formula> <tex-math notation=\"LaTeX\">$(n+1)$</tex-math></inline-formula> phase inverters connected in parallel, where <inline-formula><tex-math notation=\"LaTeX\">$n$</tex-math></inline-formula> is the number of RES. The more the number of RES, the more the number of voltage levels, the more faithful is the output sinusoidal waveform. In the proposed topology, both voltage pulse width and height are modulated and precalculated by using a pulse width and height modulation so as to reduce the number of switching states (i.e., switching losses) and the total harmonic distortion. The topology is investigated through simulations and validated experimentally with a laboratory prototype. Compliance with the <inline-formula><tex-math notation=\"LaTeX\">$\\text{IEEE 519-1992}$</tex-math></inline-formula> and <inline-formula><tex-math notation=\"LaTeX\">$\\text{IEC 61000-3-12}$</tex-math></inline-formula> standards is presented and an exhaustive comparison of the proposed topology is made against the classical cascaded H-bridge topology.",
"title": ""
},
{
"docid": "2bed91cd91b2958eb46af613a8cb4978",
"text": "Millions of HTML tables containing structured data can be found on the Web. With their wide coverage, these tables are potentially very useful for filling missing values and extending cross-domain knowledge bases such as DBpedia, YAGO, or the Google Knowledge Graph. As a prerequisite for being able to use table data for knowledge base extension, the HTML tables need to be matched with the knowledge base, meaning that correspondences between table rows/columns and entities/schema elements of the knowledge base need to be found. This paper presents the T2D gold standard for measuring and comparing the performance of HTML table to knowledge base matching systems. T2D consists of 8 700 schema-level and 26 100 entity-level correspondences between the WebDataCommons Web Tables Corpus and the DBpedia knowledge base. In contrast related work on HTML table to knowledge base matching, the Web Tables Corpus (147 million tables), the knowledge base, as well as the gold standard are publicly available. The gold standard is used afterward to evaluate the performance of T2K Match, an iterative matching method which combines schema and instance matching. T2K Match is designed for the use case of matching large quantities of mostly small and narrow HTML tables against large cross-domain knowledge bases. The evaluation using the T2D gold standard shows that T2K Match discovers table-to-class correspondences with a precision of 94%, row-to-entity correspondences with a precision of 90%, and column-to-property correspondences with a precision of 77%.",
"title": ""
},
{
"docid": "ba4f3060a36021ef60f7bc6c9cde9d35",
"text": "Neural Networks (NN) are today increasingly used in Machine Learning where they have become deeper and deeper to accurately model or classify high-level abstractions of data. Their development however also gives rise to important data privacy risks. This observation motives Microsoft researchers to propose a framework, called Cryptonets. The core idea is to combine simplifications of the NN with Fully Homomorphic Encryptions (FHE) techniques to get both confidentiality of the manipulated data and efficiency of the processing. While efficiency and accuracy are demonstrated when the number of non-linear layers is small (eg 2), Cryptonets unfortunately becomes ineffective for deeper NNs which let the problem of privacy preserving matching open in these contexts. This work successfully addresses this problem by combining the original ideas of Cryptonets’ solution with the batch normalization principle introduced at ICML 2015 by Ioffe and Szegedy. We experimentally validate the soundness of our approach with a neural network with 6 non-linear layers. When applied to the MNIST database, it competes the accuracy of the best non-secure versions, thus significantly improving Cryptonets.",
"title": ""
},
{
"docid": "935d22c1fdddaab40d8c94384f08fab2",
"text": "Face biometrics is widely used in various applications including border control and facilitating the verification of travellers' identity claim with respect to his electronic passport (ePass). As in most countries, passports are issued to a citizen based on the submitted photo which allows the applicant to provide a morphed face photo to conceal his identity during the application process. In this work, we propose a novel approach leveraging the transferable features from a pre-trained Deep Convolutional Neural Networks (D-CNN) to detect both digital and print-scanned morphed face image. Thus, the proposed approach is based on the feature level fusion of the first fully connected layers of two D-CNN (VGG19 and AlexNet) that are specifically fine-tuned using the morphed face image database. The proposed method is extensively evaluated on the newly constructed database with both digital and print-scanned morphed face images corresponding to bona fide and morphed data reflecting a real-life scenario. The obtained results consistently demonstrate improved detection performance of the proposed scheme over previously proposed methods on both the digital and the print-scanned morphed face image database.",
"title": ""
},
{
"docid": "18c8fcba57c295568942fa40b605c27e",
"text": "The Internet of Things (IoT), an emerging global network of uniquely identifiable embedded computing devices within the existing Internet infrastructure, is transforming how we live and work by increasing the connectedness of people and things on a scale that was once unimaginable. In addition to increased communication efficiency between connected objects, the IoT also brings new security and privacy challenges. Comprehensive measures that enable IoT device authentication and secure access control need to be established. Existing hardware, software, and network protection methods, however, are designed against fraction of real security issues and lack the capability to trace the provenance and history information of IoT devices. To mitigate this shortcoming, we propose an RFID-enabled solution that aims at protecting endpoint devices in IoT supply chain. We take advantage of the connection between RFID tag and control chip in an IoT device to enable data transfer from tag memory to centralized database for authentication once deployed. Finally, we evaluate the security of our proposed scheme against various attacks.",
"title": ""
},
{
"docid": "8fe6e954db9080e233bbc6dbf8117914",
"text": "This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.",
"title": ""
},
{
"docid": "6b83827500e4ea22c9fed3288d0506a7",
"text": "This study develops a high-performance stand-alone photovoltaic (PV) generation system. To make the PV generation system more flexible and expandable, the backstage power circuit is composed of a high step-up converter and a pulsewidth-modulation (PWM) inverter. In the dc-dc power conversion, the high step-up converter is introduced to improve the conversion efficiency in conventional boost converters to allow the parallel operation of low-voltage PV arrays, and to decouple and simplify the control design of the PWM inverter. Moreover, an adaptive total sliding-mode control system is designed for the voltage control of the PWM inverter to maintain a sinusoidal output voltage with lower total harmonic distortion and less variation under various output loads. In addition, an active sun tracking scheme without any light sensors is investigated to make the PV modules face the sun directly for capturing the maximum irradiation and promoting system efficiency. Experimental results are given to verify the validity and reliability of the high step-up converter, the PWM inverter control, and the active sun tracker for the high-performance stand-alone PV generation system.",
"title": ""
},
{
"docid": "d39f806d1a8ecb33fab4b5ebb49b0dd1",
"text": "Texture analysis has been a particularly dynamic field with different computer vision and image processing applications. Most of the existing texture analysis techniques yield to significant results in different applications but fail in difficult situations with high sensitivity to noise. Inspired by previous works on texture analysis by structure layer modeling, this paper deals with representing the texture's structure layer using the structure tensor field. Based on texture pattern size approximation, the proposed algorithm investigates the adaptability of the structure tensor to the local geometry of textures by automatically estimating the sub-optimal structure tensor size. An extension of the algorithm targeting non-structured textures is also proposed. Results show that using the proposed tensor size regularization method, relevant local information can be extracted by eliminating the need of repetitive tensor field computation with different tensor size to reach an acceptable performance.",
"title": ""
},
{
"docid": "924146534d348e7a44970b1d78c97e9c",
"text": "Little is known of the extent to which heterosexual couples are satisfied with their current frequency of sex and the degree to which this predicts overall sexual and relationship satisfaction. A population-based survey of 4,290 men and 4,366 women was conducted among Australians aged 16 to 64 years from a range of sociodemographic backgrounds, of whom 3,240 men and 3,304 women were in regular heterosexual relationships. Only 46% of men and 58% of women were satisfied with their current frequency of sex. Dissatisfied men were overwhelmingly likely to desire sex more frequently; among dissatisfied women, only two thirds wanted sex more frequently. Age was a significant factor but only for men, with those aged 35-44 years tending to be least satisfied. Men and women who were dissatisfied with their frequency of sex were also more likely to express overall lower sexual and relationship satisfaction. The authors' findings not only highlight desired frequency of sex as a major factor in satisfaction, but also reveal important gender and other sociodemographic differences that need to be taken into account by researchers and therapists seeking to understand and improve sexual and relationship satisfaction among heterosexual couples. Other issues such as length of time spent having sex and practices engaged in may also be relevant, particularly for women.",
"title": ""
},
{
"docid": "ecd7da1f742b4c92f3c748fd19098159",
"text": "Abstract. Today, a paradigm shift is being observed in science, where the focus is gradually shifting toward the cloud environments to obtain appropriate, robust and affordable services to deal with Big Data challenges (Sharma et al. 2014, 2015a, 2015b). Cloud computing avoids any need to locally maintain the overly scaled computing infrastructure that include not only dedicated space, but the expensive hardware and software also. In this paper, we study the evolution of as-a-Service modalities, stimulated by cloud computing, and explore the most complete inventory of new members beyond traditional cloud computing stack.",
"title": ""
}
] | scidocsrr |
26f2f3806246833bbf25e08aae9fcf89 | Creating efficient codebooks for visual recognition | [
{
"docid": "3da4bcf1e3bcb3c5feb27fd05e43da80",
"text": "This paper introduces a texture representation suitable for recognizing images of textured surfaces under a wide range of transformations, including viewpoint changes and nonrigid deformations. At the feature extraction stage, a sparse set of affine Harris and Laplacian regions is found in the image. Each of these regions can be thought of as a texture element having a characteristic elliptic shape and a distinctive appearance pattern. This pattern is captured in an affine-invariant fashion via a process of shape normalization followed by the computation of two novel descriptors, the spin image and the RIFT descriptor. When affine invariance is not required, the original elliptical shape serves as an additional discriminative feature for texture recognition. The proposed approach is evaluated in retrieval and classification tasks using the entire Brodatz database and a publicly available collection of 1,000 photographs of textured surfaces taken from different viewpoints.",
"title": ""
}
] | [
{
"docid": "1475e98affe2415565a81715b3ea5c77",
"text": "In this paper we offer an overview on the topic of Microservices Science and Engineering (MSE) and we provide a collection of bibliographic references and links relevant to understand an emerging field. We try to clarify some misunderstandings related to microservices and Service-Oriented Architectures, and we also describe projects and applications our team have been working on in the recent past, both regarding programming languages construction and intelligent buildings.",
"title": ""
},
{
"docid": "3adb2815bceb4a3bf11e5d3a595ac098",
"text": "Orientation estimation using low cost sensors is an important task for Micro Aerial Vehicles (MAVs) in order to obtain a good feedback for the attitude controller. The challenges come from the low accuracy and noisy data of the MicroElectroMechanical System (MEMS) technology, which is the basis of modern, miniaturized inertial sensors. In this article, we describe a novel approach to obtain an estimation of the orientation in quaternion form from the observations of gravity and magnetic field. Our approach provides a quaternion estimation as the algebraic solution of a system from inertial/magnetic observations. We separate the problems of finding the \"tilt\" quaternion and the heading quaternion in two sub-parts of our system. This procedure is the key for avoiding the impact of the magnetic disturbances on the roll and pitch components of the orientation when the sensor is surrounded by unwanted magnetic flux. We demonstrate the validity of our method first analytically and then empirically using simulated data. We propose a novel complementary filter for MAVs that fuses together gyroscope data with accelerometer and magnetic field readings. The correction part of the filter is based on the method described above and works for both IMU (Inertial Measurement Unit) and MARG (Magnetic, Angular Rate, and Gravity) sensors. We evaluate the effectiveness of the filter and show that it significantly outperforms other common methods, using publicly available datasets with ground-truth data recorded during a real flight experiment of a micro quadrotor helicopter.",
"title": ""
},
{
"docid": "94c9eec9aa4f36bf6b2d83c3cc8dbb12",
"text": "Many real world security problems can be modelled as finite zero-sum games with structured sequential strategies and limited interactions between the players. An abstract class of games unifying these models are the normal-form games with sequential strategies (NFGSS). We show that all games from this class can be modelled as well-formed imperfect-recall extensiveform games and consequently can be solved by counterfactual regret minimization. We propose an adaptation of the CFR algorithm for NFGSS and compare its performance to the standard methods based on linear programming and incremental game generation. We validate our approach on two security-inspired domains. We show that with a negligible loss in precision, CFR can compute a Nash equilibrium with five times less computation than its competitors. Game theory has been recently used to model many real world security problems, such as protecting airports (Pita et al. 2008) or airplanes (Tsai et al. 2009) from terrorist attacks, preventing fare evaders form misusing public transport (Yin et al. 2012), preventing attacks in computer networks (Durkota et al. 2015), or protecting wildlife from poachers (Fang, Stone, and Tambe 2015). Many of these security problems are sequential in nature. Rather than a single monolithic action, the players’ strategies are formed by sequences of smaller individual decisions. For example, the ticket inspectors make a sequence of decisions about where to check tickets and which train to take; a network administrator protects the network against a sequence of actions an attacker uses to penetrate deeper into the network. Sequential decision making in games has been extensively studied from various perspectives. Recent years have brought significant progress in solving massive imperfectinformation extensive-form games with a focus on the game of poker. Counterfactual regret minimization (Zinkevich et al. 2008) is the family of algorithms that has facilitated much of this progress, with a recent incarnation (Tammelin et al. 2015) essentially solving for the first time a variant of poker commonly played by people (Bowling et al. 2015). However, there has not been any transfer of these results to research on real world security problems. Copyright c © 2016, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. We focus on an abstract class of sequential games that can model many sequential security games, such as games taking place in physical space that can be discretized as a graph. This class of games is called normal-form games with sequential strategies (NFGSS) (Bosansky et al. 2015) and it includes, for example, existing game theoretic models of ticket inspection (Jiang et al. 2013), border patrolling (Bosansky et al. 2015), and securing road networks (Jain et al. 2011). In this work we formally prove that any NFGSS can be modelled as a slightly generalized chance-relaxed skew well-formed imperfect-recall game (CRSWF) (Lanctot et al. 2012; Kroer and Sandholm 2014), a subclass of extensiveform games with imperfect recall in which counterfactual regret minimization is guaranteed to converge to the optimal strategy. We then show how to adapt the recent variant of the algorithm, CFR, directly to NFGSS and present experimental validation on two distinct domains modelling search games and ticket inspection. We show that CFR is applicable and efficient in domains with imperfect recall that are substantially different from poker. Moreover, if we are willing to sacrifice a negligible degree of approximation, CFR can find a solution substantially faster than methods traditionally used in research on security games, such as formulating the game as a linear program (LP) and incrementally building the game model by double oracle methods.",
"title": ""
},
{
"docid": "deccbb39b92e01611de6d0749f550726",
"text": "As product prices become increasingly available on the World Wide Web, consumers attempt to understand how corporations vary these prices over time. However, corporations change prices based on proprietary algorithms and hidden variables (e.g., the number of unsold seats on a flight). Is it possible to develop data mining techniques that will enable consumers to predict price changes under these conditions?This paper reports on a pilot study in the domain of airline ticket prices where we recorded over 12,000 price observations over a 41 day period. When trained on this data, Hamlet --- our multi-strategy data mining algorithm --- generated a predictive model that saved 341 simulated passengers $198,074 by advising them when to buy and when to postpone ticket purchases. Remarkably, a clairvoyant algorithm with complete knowledge of future prices could save at most $320,572 in our simulation, thus HAMLET's savings were 61.8% of optimal. The algorithm's savings of $198,074 represents an average savings of 23.8% for the 341 passengers for whom savings are possible. Overall, HAMLET saved 4.4% of the ticket price averaged over the entire set of 4,488 simulated passengers. Our pilot study suggests that mining of price data available over the web has the potential to save consumers substantial sums of money per annum.",
"title": ""
},
{
"docid": "ca97660e1411f7aceb38bdc56952063a",
"text": "Trying to take advantage of the growing passion for games, Gamification is a trending phenomenon that aims at motivating people by applying elements common to games in different contexts. While first applications of Gamification exist in finance, health, education and entertainment, utility of Gamification in various contexts has not been sufficiently explored. Aiming to understand how Gamification can be applied to information systems to increase end-user motivation, we performed a systematic literature review to identify game elements used in Gamification. Our study yields a synthesis of mechanics and dynamics in five clusters – system design, challenges, rewards, social influences and user specifics. While our study reveals that Gamification has potential for motivating information system end-users, we also discuss the potential risks. Future research should analyse concrete implementations of Gamification in information systems contexts and investigate related long-term effects. From a practical perspective, we present Gamification as an innovative approach to enhancing end-user motivation to utilise information systems and illustrate the various options that can be applied to design Gamification applications.",
"title": ""
},
{
"docid": "3427740a87691629bd6cf97792089f62",
"text": "Maintainers face the daunting task of wading through a collection of both new and old revisions, trying to ferret out revisions which warrant personal inspection. One can rank revisions by size/lines of code (LOC), but often, due to the distribution of the size of changes, revisions will be of similar size. If we can't rank revisions by LOC perhaps we can rank by Halstead's and McCabe's complexity metrics? However, these metrics are problematic when applied to code fragments (revisions) written in multiple languages: special parsers are required which may not support the language or dialect used; analysis tools may not understand code fragments. We propose using the statistical moments of indentation as a lightweight, language independent, revision/diff friendly metric which actually proxies classical complexity metrics. We have extensively evaluated our approach against the entire CVS histories of the 278 of the most popular and most active SourceForge projects. We found that our results are linearly correlated and rank-correlated with traditional measures of complexity, suggesting that measuring indentation is a cheap and accurate proxy for code complexity of revisions. Thus ranking revisions by the standard deviation and summation of indentation will be very similar to ranking revisions by complexity.",
"title": ""
},
{
"docid": "5664d82c9b372e14d7fd8f28b9bdff35",
"text": "The perceived resolution of matrix displays increases when the relative position of the color subpixels is taken into account. ‘Subpixel rendering’ algorithms are being used to convert an input image to subpixel-corrected display images. This paper deals with the consequences of the subpixel structure, and the theoretical background of the resolution gain. We will show that this theory allows a low-cost implementation in an image scaler. This leads to high flexibility, allowing different subpixel arrangements and a simple control over the trade-off between perceived resolution and color errors.",
"title": ""
},
{
"docid": "4acfb49be406de472af9080d3cdc6fa4",
"text": "Evolution provides a creative fount of complex and subtle adaptations that often surprise the scientists who discover them. However, the creativity of evolution is not limited to the natural world: artificial organisms evolving in computational environments have also elicited surprise and wonder from the researchers studying them. The process of evolution is an algorithmic process that transcends the substrate in which it occurs. Indeed, many researchers in the field of digital evolution can provide examples of how their evolving algorithms and organisms have creatively subverted their expectations or intentions, exposed unrecognized bugs in their code, produced unexpectedly adaptations, or engaged in behaviors and outcomes uncannily convergent with ones found in nature. Such stories routinely reveal surprise and creativity by evolution in these digital worlds, but they rarely fit into the standard scientific narrative. Instead they are often treated as mere obstacles to be overcome, rather than results that warrant study in their own right. Bugs are fixed, experiments are refocused, and one-off surprises are collapsed into a single data point. The stories themselves are traded among researchers through oral tradition, but that mode of information transmission is inefficient and prone to error and outright loss. Moreover, the fact that these stories tend to be shared only among practitioners means that many natural scientists do not realize how interesting and lifelike digital organisms are and how natural their evolution can be. To our knowledge, no collection of such anecdotes has been published before. This paper is the crowd-sourced product of researchers in the fields of artificial life and evolutionary computation who have provided first-hand accounts of such cases. It thus serves as a written, fact-checked collection of scientifically important and even entertaining stories. In doing so we also present here substantial evidence that the existence and importance of evolutionary surprises extends beyond the natural world, and may indeed be a universal property of all complex evolving systems.",
"title": ""
},
{
"docid": "7f5cff666fa5aba3dff963fb5372a8ed",
"text": "In 1985, the National Academy of Sciences sponsored a conference in Annapolis, Maryland, to discuss common property resource management. This conference was a watershed in the development of the theoretical underpinning of institutional design for successful common pool resource (CPR) management. Since then, an international network of over 2,000 researchers has developed, and the International Association for the Study of Common Property (IASCP), formed in 1989, has held two successful international conferences. Dominating the intellectual evolution of the field has been the work of Elinor Ostrom, co-director of the Workshop in Political Theory and Policy Analysis at Indiana University. Her book, Governing the Commons, presents a lucid exposition of the current state of institutional analysis of common property problems. Part of the Cam-bridge series on Political Economy of Institutions and Decisions, the book addresses how common pool resources may be managed successfully without falling prey to the \"tragedy of the commons.\" Common pool resources are characterized by subtractability (i.e., withdrawal by one user reduces the amount of the resource left for other users) and joint use by a group of appropriators. Thus, a common village grazing field has forage for a limited number of beasts, and all the villagers are entitled to pasture their animals on the field. Community rules of access and management are required to sustain the field from season to season. Problems in managing CPRs arise when the rational individual determines that he will still have access to the resource even if he does not fully contribute to its maintenance (the \"free rider\" problem). An extensive literature discusses the effect of free riders, concluding that common pool resources will inevitably fall into ruin. One of two solutions is usually offered to avoid this problem: centralized governmental regulation or privatization. Noting the numerous occasions in which common pool resources are managed successfully with neither centralized governmental control nor privatization, Ostrom argues for a third approach to resolving the problem of the commons: the design of durable cooperative institutions that are organized and governed by the resource users. In Governing the Commons she examines small-scale common-pool resources. Resource user groups examined range in size from 50-15,000 people who rely substantially on the common pool resource for their economic well-being. She has further",
"title": ""
},
{
"docid": "cbf878cd5fbf898bdf88a2fcf5024826",
"text": "Hypotheses involving mediation are common in the behavioral sciences. Mediation exists when a predictor affects a dependent variable indirectly through at least one intervening variable, or mediator. Methods to assess mediation involving multiple simultaneous mediators have received little attention in the methodological literature despite a clear need. We provide an overview of simple and multiple mediation and explore three approaches that can be used to investigate indirect processes, as well as methods for contrasting two or more mediators within a single model. We present an illustrative example, assessing and contrasting potential mediators of the relationship between the helpfulness of socialization agents and job satisfaction. We also provide SAS and SPSS macros, as well as Mplus and LISREL syntax, to facilitate the use of these methods in applications.",
"title": ""
},
{
"docid": "79f87d478af99ef60efadb7c5ff7c4ec",
"text": "This study proposes an interior permanent magnet (IPM) brushless dc (BLDC) motor design strategy that utilizes BLDC control based on Hall sensor signals. The magnetic flux of IPM motors varies according to the rotor position and abnormal Hall sensor problems are related to magnetic flux. To find the cause of the abnormality in the Hall sensors, an analysis of the magnetic flux density at the Hall sensor position by finite element analysis is conducted. In addition, an IPM model with a notch structure is proposed to solve abnormal Hall sensor problems and its magnetic equivalent circuit (MEC) model is derived. Based on the MEC model, an optimal rotor design method is proposed and the final model is derived. However, the Hall sensor signal achieved from the optimal rotor is not perfect. To improve the accuracy of the BLDC motor control, a rotor position estimation method is proposed. Finally, experiments are performed to evaluate the performance of the proposed IPM-type BLDC motor and the Hall sensor compensation method.",
"title": ""
},
{
"docid": "587c6f30cda5f45a6b43d55197d2ed40",
"text": "We present a mechanism that puts users in the center of control and empowers them to dictate the access to their collections of data. Revisiting the fundamental mechanisms in security for providing protection, our solution uses capabilities, access lists, and access rights following well-understood formal notions for reasoning about access. This contribution presents a practical, correct, auditable, transparent, distributed, and decentralized mechanism that is well-matched to the current emerging environments including Internet of Things, smart city, precision medicine, and autonomous cars. It is based on well-tested principles and practices used in distributed authorization, cryptocurrencies, and scalable computing.",
"title": ""
},
{
"docid": "d7c236983c54213f17a0d8db886d5f2f",
"text": "Traffic light detection is an important system because it can alert driver on upcoming traffic light so that he/she can anticipate a head of time. In this paper we described our work on detecting traffic light color using machine learning approach. Using HSV color representation, our approach is to extract features based on an area of X×X pixels. Traffic light color model is then created by applying a learning algorithm on a set of examples of features representing pixels of traffic and non-traffic light colors. The learned model is then used to classify whether an area of pixels contains traffic light color or not. Evaluation of this approach reveals that it significantly improves the detection performance over the one based on value-range color segmentation technique.",
"title": ""
},
{
"docid": "7d25c646a8ce7aa862fba7088b8ea915",
"text": "Neuro-dynamic programming (NDP for short) is a relatively new class of dynamic programming methods for control and sequential decision making under uncertainty. These methods have the potential of dealing with problems that for a long time were thought to be intractable due to either a large state space or the lack of an accurate model. They combine ideas from the fields of neural networks, artificial intelligence, cognitive science, simulation, and approximation theory. We will delineate the major conceptual issues, survey a number of recent developments, describe some computational experience, and address a number of open questions. We consider systems where decisions are made in stages. The outcome of each decision is not fully predictable but can be anticipated to some extent before the next decision is made. Each decision results in some immediate cost but also affects the context in which future decisions are to be made and therefore affects the cost incurred in future stages. Dynamic programming (DP for short) provides a mathematical formalization of the tradeoff between immediate and future costs. Generally, in DP formulations there is a discrete-time dynamic system whose state evolves according to given transition probabilities that depend on a decision/control u. In particular, if we are in state i and we choose decision u, we move to state j with given probability pij(u). Simultaneously with this transition, we incur a cost g(i, u, j). In comparing, however, the available decisions u, it is not enough to look at the magnitude of the cost g(i, u, j); we must also take into account how desirable the next state j is. We thus need a way to rank or rate states j. This is done by using the optimal cost (over all remaining stages) starting from state j, which is denoted by J∗(j). These costs can be shown to",
"title": ""
},
{
"docid": "4e4bd38230dba0012227d8b40b01e867",
"text": "In this paper, we present a travel guidance system W2Go (Where to Go), which can automatically recognize and rank the landmarks for travellers. In this system, a novel Automatic Landmark Ranking (ALR) method is proposed by utilizing the tag and geo-tag information of photos in Flickr and user knowledge from Yahoo Travel Guide. ALR selects the popular tourist attractions (landmarks) based on not only the subjective opinion of the travel editors as is currently done on sites like WikiTravel and Yahoo Travel Guide, but also the ranking derived from popularity among tourists. Our approach utilizes geo-tag information to locate the positions of the tag-indicated places, and computes the probability of a tag being a landmark/site name. For potential landmarks, impact factors are calculated from the frequency of tags, user numbers in Flickr, and user knowledge in Yahoo Travel Guide. These tags are then ranked based on the impact factors. Several representative views for popular landmarks are generated from the crawled images with geo-tags to describe and present them in context of information derived from several relevant reference sources. The experimental comparisons to the other systems are conducted on eight famous cities over the world. User-based evaluation demonstrates the effectiveness of the proposed ALR method and the W2Go system.",
"title": ""
},
{
"docid": "033b05d21f5b8fb5ce05db33f1cedcde",
"text": "Seasonal occurrence of the common cutworm Spodoptera litura (Fab.) (Lepidoptera: Noctuidae) moths captured in synthetic sex pheromone traps and associated field population of eggs and larvae in soybean were examined in India from 2009 to 2011. Male moths of S. litura first appeared in late July or early August and continued through October. Peak male trap catches occurred during the second fortnight of September, which was within soybean reproductive stages. Similarly, the first appearance of S. litura egg masses and larval populations were observed after the first appearance of male moths in early to mid-August, and were present in the growing season up to late September to mid-October. The peak appearance of egg masses and larval populations always corresponded with the peak activity of male moths recorded during mid-September in all years. Correlation studies showed that weekly mean trap catches were linearly and positively correlated with egg masses and larval populations during the entire growing season of soybean. Seasonal means of male moth catches in pheromone traps during the 2010 and 2011 seasons were significantly lower than the catches during the 2009 season. However, seasonal means of the egg masses and larval populations were not significantly different between years. Pheromone traps may be useful indicators of the onset of numbers of S. litura eggs and larvae in soybean fields.",
"title": ""
},
{
"docid": "c7d2419eaec21acce9b9dbb3040ed647",
"text": "Current text classification systems typically use term stems for representing document content. Ontologies allow the usage of features on a higher semantic level than single words for text classification purposes. In this paper we propose such an enhancement of the classical document representation through concepts extracted from background knowledge. Boosting, a successful machine learning technique is used for classification. Comparative experimental evaluations in three different settings support our approach through consistent improvement of the results. An analysis of the results shows that this improvement is due to two separate effects.",
"title": ""
},
{
"docid": "d2d2d78631bff4ac25d482f3fa49bdf0",
"text": "The increasing prominence of data streams arising in a wide range of advanced applications such as fraud detection and trend learning has led to the study of online mining of frequent itemsets (FIs). Unlike mining static databases, mining data streams poses many new challenges. In addition to the one-scan nature, the unbounded memory requirement and the high data arrival rate of data streams, the combinatorial explosion of itemsets exacerbates the mining task. The high complexity of the FI mining problem hinders the application of the stream mining techniques. We recognize that a critical review of existing techniques is needed in order to design and develop efficient mining algorithms and data structures that are able to match the processing rate of the mining with the high arrival rate of data streams. Within a unifying set of notations and terminologies, we describe in this paper the efforts and main techniques for mining data streams and present a comprehensive survey of a number of the state-of-the-art algorithms on mining frequent itemsets over data streams. We classify the stream-mining techniques into two categories based on the window model that they adopt in order to provide insights into how and why the techniques are useful. Then, we further analyze the algorithms according to whether they are exact or approximate and, for approximate approaches, whether they are false-positive or false-negative. We also discuss various interesting issues, including the merits and limitations in existing research and substantive areas for future research.",
"title": ""
},
{
"docid": "a4e122d0b827d25bea48d41487437d74",
"text": "We introduce UniAuth, a set of mechanisms for streamlining authentication to devices and web services. With UniAuth, a user first authenticates himself to his UniAuth client, typically his smartphone or wearable device. His client can then authenticate to other services on his behalf. In this paper, we focus on exploring the user experiences with an early iPhone prototype called Knock x Knock. To manage a variety of accounts securely in a usable way, Knock x Knock incorporates features not supported in existing password managers, such as tiered and location-aware lock control, authentication to laptops via knocking, and storing credentials locally while working with laptops seamlessly. In two field studies, 19 participants used Knock x Knock for one to three weeks with their own devices and accounts. Our participants were highly positive about Knock x Knock, demonstrating the desirability of our approach. We also discuss interesting edge cases and design implications.",
"title": ""
},
{
"docid": "77c98efaba38e54e8aae1216ed9ac0c0",
"text": "There is a disconnect between explanatory artificial intelligence (XAI) methods and the types of explanations that are useful for and demanded by society (policy makers, government officials, etc.) Questions that experts in artificial intelligence (AI) ask opaque systems provide inside explanations, focused on debugging, reliability, and validation. These are different from those that society will ask of these systems to build trust and confidence in their decisions. Although explanatory AI systems can answer many questions that experts desire, they often don’t explain why they made decisions in a way that is precise (true to the model) and understandable to humans. These outside explanations can be used to build trust, comply with regulatory and policy changes, and act as external validation. In this paper, we focus on XAI methods for deep neural networks (DNNs) because of DNNs’ use in decision-making and inherent opacity. We explore the types of questions that explanatory DNN systems can answer and discuss challenges in building explanatory systems that provide outside explanations for societal requirements and benefit.",
"title": ""
}
] | scidocsrr |
76eb60f0799df01a8a24943c98214c6b | A Deep Learning Approach to Link Prediction in Dynamic Networks | [
{
"docid": "40f21a8702b9a0319410b716bda0a11e",
"text": "A number of supervised learning methods have been introduced in the last decade. Unfortunately, the last comprehensive empirical evaluation of supervised learning was the Statlog Project in the early 90's. We present a large-scale empirical comparison between ten supervised learning methods: SVMs, neural nets, logistic regression, naive bayes, memory-based learning, random forests, decision trees, bagged trees, boosted trees, and boosted stumps. We also examine the effect that calibrating the models via Platt Scaling and Isotonic Regression has on their performance. An important aspect of our study is the use of a variety of performance criteria to evaluate the learning methods.",
"title": ""
},
{
"docid": "a864a63a12fc30e05f6a7a64ff931d98",
"text": "Prediction of links - both new as well as recurring - in a social network representing interactions between individuals is an important problem. In the recent years, there is significant interest in methods that use only the graph structure to make predictions. However, most of them consider a single snapshot of the network as the input, neglecting an important aspect of these social networks viz., their evolution over time.\n In this work, we investigate the value of incorporating the history information available on the interactions (or links) of the current social network state. Our results unequivocally show that time-stamps of past interactions significantly improve the prediction accuracy of new and recurrent links over rather sophisticated methods proposed recently. Furthermore, we introduce a novel testing method which reflects the application of link prediction better than previous approaches.",
"title": ""
}
] | [
{
"docid": "09e8e0d6a0df9228ece3ea9416a7d5e4",
"text": "This paper reviews and summarizes Maglev train technologies from an electrical engineering point of view and assimilates the results of works over the past three decades carried out all over the world. Many researches and developments concerning the Maglev train have been accomplished; however, they are not always easy to understand. The purpose of this paper is to make the Maglev train technologies clear at a glance. Included are general understandings, technologies, and worldwide practical projects. Further research needs are also addressed.",
"title": ""
},
{
"docid": "994bebd20ef2594f5337387d97c6bd12",
"text": "In complex, open, and heterogeneous environments, agents must be able to reorganize towards the most appropriate organizations to adapt unpredictable environment changes within Multi-Agent Systems (MAS). Types of reorganization can be seen from two different levels. The individual agents level (micro-level) in which an agent changes its behaviors and interactions with other agents to adapt its local environment. And the organizational level (macro-level) in which the whole system changes it structure by adding or removing agents. This chapter is dedicated to overview different aspects of what is called MAS Organization including its motivations, paradigms, models, and techniques adopted for statically or dynamically organizing agents in MAS.",
"title": ""
},
{
"docid": "ee20233660c2caa4a24dbfb512172277",
"text": "Any projection of a 3D scene into a wide-angle image unavoidably results in distortion. Current projection methods either bend straight lines in the scene, or locally distort the shapes of scene objects. We present a method that minimizes this distortion by adapting the projection to content in the scene, such as salient scene regions and lines, in order to preserve their shape. Our optimization technique computes a spatially-varying projection that respects user-specified constraints while minimizing a set of energy terms that measure wide-angle image distortion. We demonstrate the effectiveness of our approach by showing results on a variety of wide-angle photographs, as well as comparisons to standard projections.",
"title": ""
},
{
"docid": "d72e4df2e396a11ae7130ca7e0b2fb56",
"text": "Advances in location-acquisition and wireless communication technologies have led to wider availability of spatio-temporal (ST) data, which has unique spatial properties (i.e. geographical hierarchy and distance) and temporal properties (i.e. closeness, period and trend). In this paper, we propose a <u>Deep</u>-learning-based prediction model for <u>S</u>patio-<u>T</u>emporal data (DeepST). We leverage ST domain knowledge to design the architecture of DeepST, which is comprised of two components: spatio-temporal and global. The spatio-temporal component employs the framework of convolutional neural networks to simultaneously model spatial near and distant dependencies, and temporal closeness, period and trend. The global component is used to capture global factors, such as day of the week, weekday or weekend. Using DeepST, we build a real-time crowd flow forecasting system called UrbanFlow1. Experiment results on diverse ST datasets verify DeepST's ability to capture ST data's spatio-temporal properties, showing the advantages of DeepST beyond four baseline methods.",
"title": ""
},
{
"docid": "6ad201e411520ff64881b49915415788",
"text": "What is the right supervisory signal to train visual representations? Current approaches in computer vision use category labels from datasets such as ImageNet to train ConvNets. However, in case of biological agents, visual representation learning does not require millions of semantic labels. We argue that biological agents use physical interactions with the world to learn visual representations unlike current vision systems which just use passive observations (images and videos downloaded from web). For example, babies push objects, poke them, put them in their mouth and throw them to learn representations. Towards this goal, we build one of the first systems on a Baxter platform that pushes, pokes, grasps and observes objects in a tabletop environment. It uses four different types of physical interactions to collect more than 130K datapoints, with each datapoint providing supervision to a shared ConvNet architecture allowing us to learn visual representations. We show the quality of learned representations by observing neuron activations and performing nearest neighbor retrieval on this learned representation. Quantitatively, we evaluate our learned ConvNet on image classification tasks and show improvements compared to learning without external data. Finally, on the task of instance retrieval, our network outperforms the ImageNet network on recall@1 by 3 %.",
"title": ""
},
{
"docid": "c98ac230a74b68a24554ce3021466b49",
"text": "Enterprise social media can provide visibility of users' actions and thus has the potential to reveal insights about users in the organization. We mined large-scale social media use in an enterprise to examine: a) user roles with such broad platforms and b) whether people with large social networks are highly regarded. First, a factor analysis revealed that most variance of social media usage is explained by commenting and 'liking' behaviors while other usage can be characterized as patterns of distinct tool usage. These results informed the development of a model showing that online network size interacts with other media usage to predict who is highly assessed in the organization. We discovered that the smaller one's online social network size in the organization, the more highly assessed they were by colleagues. We explain this inverse relationship as due to friending behavior being highly visible but not yet valued in the organization.",
"title": ""
},
{
"docid": "e49e74c4104116b54d49147028c3392d",
"text": "Defining hope as a cognitive set comprising agency (belief in one's capacity to initiate and sustain actions) and pathways (belief in one's capacity to generate routes) to reach goals, the Hope Scale was developed and validated previously as a dispositional self-report measure of hope (Snyder et al., 1991). The present 4 studies were designed to develop and validate a measure of state hope. The 6-item State Hope Scale is internally consistent and reflects the theorized agency and pathways components. The relationships of the State Hope Scale to other measures demonstrate concurrent and discriminant validity; moreover, the scale is responsive to events in the lives of people as evidenced by data gathered through both correlational and causal designs. The State Hope Scale offers a brief, internally consistent, and valid self-report measure of ongoing goal-directed thinking that may be useful to researchers and applied professionals.",
"title": ""
},
{
"docid": "9b94a383b2a6e778513a925cc88802ad",
"text": "Pedestrian behavior modeling and analysis is important for crowd scene understanding and has various applications in video surveillance. Stationary crowd groups are a key factor influencing pedestrian walking patterns but was largely ignored in literature. In this paper, a novel model is proposed for pedestrian behavior modeling by including stationary crowd groups as a key component. Through inference on the interactions between stationary crowd groups and pedestrians, our model can be used to investigate pedestrian behaviors. The effectiveness of the proposed model is demonstrated through multiple applications, including walking path prediction, destination prediction, personality classification, and abnormal event detection. To evaluate our model, a large pedestrian walking route dataset1 is built. The walking routes of 12, 684 pedestrians from a one-hour crowd surveillance video are manually annotated. It will be released to the public and benefit future research on pedestrian behavior analysis and crowd scene understanding.",
"title": ""
},
{
"docid": "bbedbe2d901f63e3f163ea0f24a2e2d7",
"text": "a r t i c l e i n f o a b s t r a c t The leader trait perspective is perhaps the most venerable intellectual tradition in leadership research. Despite its early prominence in leadership research, it quickly fell out of favor among leadership scholars. Thus, despite recent empirical support for the perspective, conceptual work in the area lags behind other theoretical perspectives. Accordingly, the present review attempts to place the leader trait perspective in the context of supporting intellectual traditions, including evolutionary psychology and behavioral genetics. We present a conceptual model that considers the source of leader traits, mediators and moderators of their effects on leader emergence and leadership effectiveness, and distinguish between perceived and actual leadership effectiveness. We consider both the positive and negative effects of specific \" bright side \" personality traits: the Big Five traits, core self-evaluations, intelligence, and charisma. We also consider the positive and negative effects of \" dark side \" leader traits: Narcissism, hubris, dominance, and Machiavellianism. If one sought to find singular conditions that existed across species, one might find few universals. One universal that does exist, at least those species that have brains and nervous systems, is leadership. From insects to reptiles to mammals, leadership exists as surely as collective activity exists. There is the queen bee, and there is the alpha male. Though the centrality of leadership may vary by species (it seems more important to mammals than, say, to avians and reptiles), it is fair to surmise that whenever there is social activity, a social structure develops, and one (perhaps the) defining characteristic of that structure is the emergence of a leader or leaders. The universality of leadership, however, does not deny the importance of individual differences — indeed the emergence of leadership itself is proof of individual differences. Moreover, even casual observation of animal (including human) collective behavior shows the existence of a leader. Among a herd of 100 cattle or a pride of 20 lions, one is able to detect a leadership structure (especially at times of eating, mating, and attack). One quickly wonders: What has caused this leadership structure to emerge? Why has one animal (the alpha) emerged to lead the collective? And how does this leadership cause this collective to flourish — or founder? Given these questions, it is of no surprise that the earliest conceptions of leadership focused on individual …",
"title": ""
},
{
"docid": "756d6388fc5aa289e7f95cd14d66819e",
"text": "Cluster analysis of biological networks is one of the most important approaches for identifying functional modules and predicting protein functions. Furthermore, visualization of clustering results is crucial to uncover the structure of biological networks. In this paper, ClusterViz, an APP of Cytoscape 3 for cluster analysis and visualization, has been developed. In order to reduce complexity and enable extendibility for ClusterViz, we designed the architecture of ClusterViz based on the framework of Open Services Gateway Initiative. According to the architecture, the implementation of ClusterViz is partitioned into three modules including interface of ClusterViz, clustering algorithms and visualization and export. ClusterViz fascinates the comparison of the results of different algorithms to do further related analysis. Three commonly used clustering algorithms, FAG-EC, EAGLE and MCODE, are included in the current version. Due to adopting the abstract interface of algorithms in module of the clustering algorithms, more clustering algorithms can be included for the future use. To illustrate usability of ClusterViz, we provided three examples with detailed steps from the important scientific articles, which show that our tool has helped several research teams do their research work on the mechanism of the biological networks.",
"title": ""
},
{
"docid": "f153ee3853f40018ed0ae8b289b1efcf",
"text": "In this paper, the common mode (CM) EMI noise characteristic of three popular topologies of resonant converter (LLC, CLL and LCL) is analyzed. The comparison of their EMI performance is provided. A state-of-art LLC resonant converter with matrix transformer is used as an example to further illustrate the CM noise problem of resonant converters. The CM noise model of LLC resonant converter is provided. A novel method of shielding is provided for matrix transformer to reduce common mode noise. The CM noise of LLC converter has a significantly reduction with shielding. The loss of shielding is analyzed by finite element analysis (FEA) tool. Then the method to reduce the loss of shielding is discussed. There is very little efficiency sacrifice for LLC converter with shielding according to the experiment result.",
"title": ""
},
{
"docid": "ba65c99adc34e05cf0cd1b5618a21826",
"text": "We investigate a family of bugs in blockchain-based smart contracts, which we call event-ordering (or EO) bugs. These bugs are intimately related to the dynamic ordering of contract events, i.e., calls of its functions on the blockchain, and enable potential exploits of millions of USD worth of Ether. Known examples of such bugs and prior techniques to detect them have been restricted to a small number of event orderings, typicall 1 or 2. Our work provides a new formulation of this general class of EO bugs as finding concurrency properties arising in long permutations of such events. The technical challenge in detecting our formulation of EO bugs is the inherent combinatorial blowup in path and state space analysis, even for simple contracts. We propose the first use of partial-order reduction techniques, using happen-before relations extracted automatically for contracts, along with several other optimizations built on a dynamic symbolic execution technique. We build an automatic tool called ETHRACER that requires no hints from users and runs directly on Ethereum bytecode. It flags 7-11% of over ten thousand contracts analyzed in roughly 18.5 minutes per contract, providing compact event traces that human analysts can run as witnesses. These witnesses are so compact that confirmations require only a few minutes of human effort. Half of the flagged contracts have subtle EO bugs, including in ERC-20 contracts that carry hundreds of millions of dollars worth of Ether. Thus, ETHRACER is effective at detecting a subtle yet dangerous class of bugs which existing tools miss.",
"title": ""
},
{
"docid": "86aaee95a4d878b53fd9ee8b0735e208",
"text": "The tensegrity concept has long been considered as a basis for lightweight and compact packaging deployable structures, but very few studies are available. This paper presents a complete design study of a deployable tensegrity mast with all the steps involved: initial formfinding, structural analysis, manufacturing and deployment. Closed-form solutions are used for the formfinding. A manufacturing procedure in which the cables forming the outer envelope of the mast are constructed by two-dimensional weaving is used. The deployment of the mast is achieved through the use of self-locking hinges. A stiffness comparison between the tensegrity mast and an articulated truss mast shows that the tensegrity mast is weak in bending.",
"title": ""
},
{
"docid": "082f19bb94536f61a7c9e4edd9a9c829",
"text": "Phytoplankton abundance and composition and the cyanotoxin, microcystin, were examined relative to environmental parameters in western Lake Erie during late-summer (2003–2005). Spatially explicit distributions of phytoplankton occurred on an annual basis, with the greatest chlorophyll (Chl) a concentrations occurring in waters impacted by Maumee River inflows and in Sandusky Bay. Chlorophytes, bacillariophytes, and cyanobacteria contributed the majority of phylogenetic-group Chl a basin-wide in 2003, 2004, and 2005, respectively. Water clarity, pH, and specific conductance delineated patterns of group Chl a, signifying that water mass movements and mixing were primary determinants of phytoplankton accumulations and distributions. Water temperature, irradiance, and phosphorus availability delineated patterns of cyanobacterial biovolumes, suggesting that biotic processes (most likely, resource-based competition) controlled cyanobacterial abundance and composition. Intracellular microcystin concentrations corresponded to Microcystis abundance and environmental parameters indicative of conditions coincident with biomass accumulations. It appears that environmental parameters regulate microcystin indirectly, via control of cyanobacterial abundance and distribution.",
"title": ""
},
{
"docid": "f06de491c9de78e7bedd39d83a4bc3d5",
"text": "Recent advances in visual tracking showed that deep Convolutional Neural Networks (CNN) trained for image classification can be strong feature extractors for discriminative trackers. However, due to the drastic difference between image classification and tracking, extra treatments such as model ensemble and feature engineering must be carried out to bridge the two domains. Such procedures are either time consuming or hard to generalize well across datasets. In this paper we discovered that the internal structure of Region Proposal Network (RPN)’s top layer feature can be utilized for robust visual tracking. We showed that such property has to be unleashed by a novel loss function which simultaneously considers classification accuracy and bounding box quality. Without ensemble and any extra treatment on feature maps, our proposed method achieved state-of-the-art results on several large scale benchmarks including OTB50, OTB100 and VOT2016. We will make our code publicly available.",
"title": ""
},
{
"docid": "2b8c0923372e97ca5781378b7e220021",
"text": "Motivated by requirements of Web 2.0 applications, a plethora of non-relational databases raised in recent years. Since it is very difficult to choose a suitable database for a specific use case, this paper evaluates the underlying techniques of NoSQL databases considering their applicability for certain requirements. These systems are compared by their data models, query possibilities, concurrency controls, partitioning and replication opportunities.",
"title": ""
},
{
"docid": "5d8cce4bc41812ab45eb83c7a2a35c30",
"text": "Following B.B. Mandelbrot's fractal theory (1982), it was found that the fractal dimension could be obtained in medical images by the concept of fractional Brownian motion. An estimation concept for determination of the fractal dimension based upon the concept of fractional Brownian motion is discussed. Two applications are found: (1) classification; (2) edge enhancement and detection. For the purpose of classification, a normalized fractional Brownian motion feature vector is defined from this estimation concept. It represented the normalized average absolute intensity difference of pixel pairs on a surface of different scales. The feature vector uses relatively few data items to represent the statistical characteristics of the medial image surface and is invariant to linear intensity transformation. For edge enhancement and detection application, a transformed image is obtained by calculating the fractal dimension of each pixel over the whole medical image. The fractal dimension value of each pixel is obtained by calculating the fractal dimension of 7x7 pixel block centered on this pixel.",
"title": ""
},
{
"docid": "b16f7a4242a9ff353d7726e66669ba97",
"text": "The ARPA MT Evaluation methodology effort is intended to provide a basis for measuring and thereby facilitating the progress of MT systems of the ARPAsponsored research program. The evaluation methodologies have the further goal of being useful for identifying the context of that progress among developed, production MT systems in use today. Since 1991, the evaluations have evolved as we have discovered more about what properties are valuable to measure, what properties are not, and what elements of the tests/evaluations can be adjusted to enhance significance of the results while still remaining relatively portable. This paper describes this evolutionary process, along with measurements of the most recent MT evaluation (January 1994) and the current evaluation process now underway.",
"title": ""
},
{
"docid": "33aca3fca17c8a9c786b35b4da4de47c",
"text": "This paper is concerned with the design of the power control system for a single-phase voltage source inverter feeding a parallel resonant induction heating load. The control of the inverter output current, meaning the active component of the current through the induction coil when the control frequency is equal or slightly exceeds the resonant frequency, is achieved by a Proportional-IntegralDerivative controller tuned in accordance with the Modulus Optimum criterion in Kessler variant. The response of the current loop for different work pipes and set currents has been tested by simulation under the Matlab-Simulink environment and illustrates a very good behavior of the control system.",
"title": ""
},
{
"docid": "d0c940a651b1231c6ef4f620e7acfdcc",
"text": "Harvard Business School Working Paper Number 05-016. Working papers are distributed in draft form for purposes of comment and discussion only. They may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author(s). Abstract Much recent research has pointed to the critical role of architecture in the development of a firm's products, services and technical capabilities. A common theme in these studies is the notion that specific characteristics of a product's design – for example, the degree of modularity it exhibits – can have a profound effect on among other things, its performance, the flexibility of the process used to produce it, the value captured by its producer, and the potential for value creation at the industry level. Unfortunately, this stream of work has been limited by the lack of appropriate tools, metrics and terminology for characterizing key attributes of a product's architecture in a robust fashion. As a result, there is little empirical evidence that the constructs emerging in the literature have power in predicting the phenomena with which they are associated. This paper reports data from a research project which seeks to characterize the differences in design structure between complex software products. In particular, we adopt a technique based upon Design Structure Matrices (DSMs) to map the dependencies between different elements of a design then develop metrics that allow us to compare the structures of these different DSMs. We demonstrate the power of this approach in two ways: First, we compare the design structures of two complex software products – the Linux operating system and the Mozilla web browser – that were developed via contrasting modes of organization: specifically, open source versus proprietary development. We find significant differences in their designs, consistent with an interpretation that Linux possesses a more \" modular \" architecture. We then track the evolution of Mozilla, paying particular attention to a major \" redesign \" effort that took place several months after its release as an open source product. We show that this effort resulted in a design structure that was significantly more modular than its predecessor, and indeed, more modular than that of a comparable version of Linux. Our findings demonstrate that it is possible to characterize the structure of complex product designs and draw meaningful conclusions about the precise ways in which they differ. We provide a description of a set of tools …",
"title": ""
}
] | scidocsrr |
a1a6ee5c1d83166619656b9a51c222d2 | Crowdsourced time-sync video tagging using temporal and personalized topic modeling | [
{
"docid": "42b5d245a0f18cbb532e7f2f890a0de4",
"text": "A natural evaluation metric for statistical topic models is the probability of held-out documents given a trained model. While exact computation of this probability is intractable, several estimators for this probability have been used in the topic modeling literature, including the harmonic mean method and empirical likelihood method. In this paper, we demonstrate experimentally that commonly-used methods are unlikely to accurately estimate the probability of held-out documents, and propose two alternative methods that are both accurate and efficient.",
"title": ""
},
{
"docid": "eae92d06d00d620791e6b247f8e63c36",
"text": "Tagging systems have become major infrastructures on the Web. They allow users to create tags that annotate and categorize content and share them with other users, very helpful in particular for searching multimedia content. However, as tagging is not constrained by a controlled vocabulary and annotation guidelines, tags tend to be noisy and sparse. Especially new resources annotated by only a few users have often rather idiosyncratic tags that do not reflect a common perspective useful for search. In this paper we introduce an approach based on Latent Dirichlet Allocation (LDA) for recommending tags of resources in order to improve search. Resources annotated by many users and thus equipped with a fairly stable and complete tag set are used to elicit latent topics to which new resources with only a few tags are mapped. Based on this, other tags belonging to a topic can be recommended for the new resource. Our evaluation shows that the approach achieves significantly better precision and recall than the use of association rules, suggested in previous work, and also recommends more specific tags. Moreover, extending resources with these recommended tags significantly improves search for new resources.",
"title": ""
},
{
"docid": "209de57ac23ab35fa731b762a10f782a",
"text": "Although fully generative models have been successfully used to model the contents of text documents, they are often awkward to apply to combinations of text data and document metadata. In this paper we propose a Dirichlet-multinomial regression (DMR) topic model that includes a log-linear prior on document-topic distributions that is a function of observed features of the document, such as author, publication venue, references, and dates. We show that by selecting appropriate features, DMR topic models can meet or exceed the performance of several previously published topic models designed for specific data.",
"title": ""
}
] | [
{
"docid": "cc64adfeed5dcc457e03bd03efcd03ba",
"text": "This work presents methods for path planning and obstacle avoidance for the humanoid robot QRIO, allowing the robot to autonomously walk around in a home environment. For an autonomous robot, obstacle detection and localization as well as representing them in a map are crucial tasks for the success of the robot. Our approach is based on plane extraction from data captured by a stereo-vision system that has been developed specifically for QRIO. We briefly overview the general software architecture composed of perception, short and long term memory, behavior control, and motion control, and emphasize on our methods for obstacle detection by plane extraction, occupancy grid mapping, and path planning. Experimental results complete the description of our system.",
"title": ""
},
{
"docid": "61cbdff852aa544a6f7cc57bc76903ff",
"text": "Modern natural language processing and understanding applications have enjoyed a great boost utilizing neural networks models. However, this is not the case for most languages especially low-resource ones with insufficient annotated training data. Cross-lingual transfer learning methods improve the performance on a lowresource target language by leveraging labeled data from other (source) languages, typically with the help of cross-lingual resources such as parallel corpora. In this work, we propose the first zero-resource multilingual transfer learning model1 that can utilize training data in multiple source languages, while not requiring target language training data nor cross-lingual supervision. Unlike existing methods that only rely on language-invariant features for cross-lingual transfer, our approach utilizes both language-invariant and language-specific features in a coherent way. Our model leverages adversarial networks to learn language-invariant features and mixture-of-experts models to dynamically exploit the relation between the target language and each individual source language. This enables our model to learn effectively what to share between various languages in the multilingual setup. It results in significant performance gains over prior art, as shown in an extensive set of experiments over multiple text classification and sequence tagging tasks including a large-scale real-world industry dataset.",
"title": ""
},
{
"docid": "687dbb03f675f0bf70e6defa9588ae23",
"text": "This paper presents a novel method for discovering causal relations between events encoded in text. In order to determine if two events from the same sentence are in a causal relation or not, we first build a graph representation of the sentence that encodes lexical, syntactic, and semantic information. In a second step, we automatically extract multiple graph patterns (or subgraphs) from such graph representations and sort them according to their relevance in determining the causality between two events from the same sentence. Finally, in order to decide if these events are causal or not, we train a binary classifier based on what graph patterns can be mapped to the graph representation associated with the two events. Our experimental results show that capturing the feature dependencies of causal event relations using a graph representation significantly outperforms an existing method that uses a flat representation of features.",
"title": ""
},
{
"docid": "6e197b28345fad3b76cde4e1cbfa392a",
"text": "This paper presents a novel ultra-low-power dual-phase current-mode relaxation oscillator, which produces a 122 kHz digital clock and has total power consumption of 14.4 nW at 0.6 V. Its frequency dependence is 327 ppm/°C over a temperature range of -20° C to 100° C, and its supply voltage coefficient is ±3.0%/V from 0.6 V to 1.8 V. The proposed oscillator is fabricated in 0.18 μm CMOS technology and occupies 0.03 mm2. At room temperature it achieves a figure of merit of 120 pW/kHz, making it one of the most efficient relaxation oscillators reported to date.",
"title": ""
},
{
"docid": "a9975365f0bad734b77b67f63bdf7356",
"text": "Most existing models for multilingual natural language processing (NLP) treat language as a discrete category, and make predictions for either one language or the other. In contrast, we propose using continuous vector representations of language. We show that these can be learned efficiently with a character-based neural language model, and used to improve inference about language varieties not seen during training. In experiments with 1303 Bible translations into 990 different languages, we empirically explore the capacity of multilingual language models, and also show that the language vectors capture genetic relationships between languages.",
"title": ""
},
{
"docid": "3e1690ae4d61d87edb0e4c3ce40f6a88",
"text": "Despite previous efforts in auditing software manually and automatically, buffer overruns are still being discovered in programs in use. A dynamic bounds checker detects buffer overruns in erroneous software before it occurs and thereby prevents attacks from corrupting the integrity of the system. Dynamic buffer overrun detectors have not been adopted widely because they either (1) cannot guard against all buffer overrun attacks, (2) break existing code, or (3) incur too high an overhead. This paper presents a practical detector called CRED (C Range Error Detector) that avoids each of these deficiencies. CRED finds all buffer overrun attacks as it directly checks for the bounds of memory accesses. Unlike the original referent-object based bounds-checking technique, CRED does not break existing code because it uses a novel solution to support program manipulation of out-of-bounds addresses. Finally, by restricting the bounds checks to strings in a program, CRED’s overhead is greatly reduced without sacrificing protection in the experiments we performed. CRED is implemented as an extension of the GNU C compiler version 3.3.1. The simplicity of our design makes possible a robust implementation that has been tested on over 20 open-source programs, comprising over 1.2 million lines of C code. CRED proved effective in detecting buffer overrun attacks on programs with known vulnerabilities, and is the only tool found to guard against a testbed of 20 different buffer overflow attacks[34]. Finding overruns only on strings impose an overhead of less This research was performed while the first author was at Stanford University, and this material is based upon work supported in part by the National Science Foundation under Grant No. 0086160. than 26% for 14 of the programs, and an overhead of up to 130% for the remaining six, while the previous state-ofthe-art bounds checker by Jones and Kelly breaks 60% of the programs and is 12 times slower. Incorporating wellknown techniques for optimizing bounds checking into CRED could lead to further performance improvements.",
"title": ""
},
{
"docid": "77da7651b0e924d363c859d926e8c9da",
"text": "Manual feedback in basic robot-assisted minimally invasive surgery (RMIS) training can consume a significant amount of time from expert surgeons’ schedule and is prone to subjectivity. In this paper, we explore the usage of different holistic features for automated skill assessment using only robot kinematic data and propose a weighted feature fusion technique for improving score prediction performance. Moreover, we also propose a method for generating ‘task highlights’ which can give surgeons a more directed feedback regarding which segments had the most effect on the final skill score. We perform our experiments on the publicly available JHU-ISI Gesture and Skill Assessment Working Set (JIGSAWS) and evaluate four different types of holistic features from robot kinematic data—sequential motion texture (SMT), discrete Fourier transform (DFT), discrete cosine transform (DCT) and approximate entropy (ApEn). The features are then used for skill classification and exact skill score prediction. Along with using these features individually, we also evaluate the performance using our proposed weighted combination technique. The task highlights are produced using DCT features. Our results demonstrate that these holistic features outperform all previous Hidden Markov Model (HMM)-based state-of-the-art methods for skill classification on the JIGSAWS dataset. Also, our proposed feature fusion strategy significantly improves performance for skill score predictions achieving up to 0.61 average spearman correlation coefficient. Moreover, we provide an analysis on how the proposed task highlights can relate to different surgical gestures within a task. Holistic features capturing global information from robot kinematic data can successfully be used for evaluating surgeon skill in basic surgical tasks on the da Vinci robot. Using the framework presented can potentially allow for real-time score feedback in RMIS training and help surgical trainees have more focused training.",
"title": ""
},
{
"docid": "7be6ee5dee7fc6b64da29e0b60814fee",
"text": "J. P. Guilford (1950) asked in his inaugural address to the American Psychological Association why schools were not producing more creative persons. He also asked, “Why is there so little apparent correlation between education and creative productiveness” (p. 444)? This article presents a review of past and current research on the relation of education to creativity in students of preschool age through age 16 in U.S. public schools. Several models of creative thinking are presented (e.g., Guilford, 1985; Renzulli, 1992; Runco & Chand, 1995), as well as techniques for developing creativity (e.g., Davis, 1982; Sternberg & Williams, 1996). Some research presented indicates a relation between creativity and learning (e.g., Karnes et al., 1961; Torrance, 1981). Implications for research and practice",
"title": ""
},
{
"docid": "e2262042d05f56796be0a81373e01b2f",
"text": "Server virtualization is a fundamental technological innovation that is used extensively in IT enterprises. Server virtualization enables creation of multiple virtual machines on single underlying physical machine. It is realized either in form of hypervisors or containers. Hypervisor is an extra layer of abstraction between the hardware and virtual machines that emulates underlying hardware. In contrast, the more recent container-based virtualization technology runs on host kernel without additional layer of abstraction. Thus container technology is expected to provide near native performance compared to hypervisor based technology. We have conducted a series of experiments to measure and compare the performance of workloads over hypervisor based virtual machines, Docker containers and native bare metal machine. We use a standard benchmark workload suite that stresses CPU, memory, disk IO and system. The results obtained show that Docker containers provide better or similar performance compared to traditional hypervisor based virtual machines in almost all the tests. However as expected the native system still provides the best performance as compared to either containers or hypervisors.",
"title": ""
},
{
"docid": "5a9d0e5046129bbdad435980f125db37",
"text": "The impact of channel width scaling on low-frequency noise (LFN) and high-frequency performance in multifinger MOSFETs is reported in this paper. The compressive stress from shallow trench isolation (STI) cannot explain the lower LFN in extremely narrow devices. STI top corner rounding (TCR)-induced Δ<i>W</i> is identified as an important factor that is responsible for the increase in transconductance <i>Gm</i> and the reduction in LFN with width scaling to nanoscale regime. A semi-empirical model was derived to simulate the effective mobility (μ<sub>eff</sub>) degradation from STI stress and the increase in effective width (<i>W</i><sub>eff</sub>) from Δ<i>W</i> due to STI TCR. The proposed model can accurately predict width scaling effect on <i>Gm</i> based on a tradeoff between μ<sub>eff</sub> and <i>W</i><sub>eff</sub>. The enhanced STI stress may lead to an increase in interface traps density (<i>N</i><sub>it</sub>), but the influence is relatively minor and can be compensated by the <i>W</i><sub>eff</sub> effect. Unfortunately, the extremely narrow devices suffer <i>fT</i> degradation due to an increase in <i>C</i><sub>gg</sub>. The investigation of impact from width scaling on μ<sub>eff</sub>, <i>Gm</i>, and LFN, as well as the tradeoff between LFN and high-frequency performance, provides an important layout guideline for analog and RF circuit design.",
"title": ""
},
{
"docid": "75d76315376a1770c4be06d420a0bf96",
"text": "Motor vehicles greatly influence human life but are also a major cause of death and road congestion, which is an obstacle to future economic development. We believe that by learning driving patterns, useful navigation support can be provided for drivers. In this paper, we present a simple and reliable method for the recognition of driving events using hidden Markov models (HMMs), popular stochastic tools for studying time series data. A data acquisition system was used to collect longitudinal and lateral acceleration and speed data from a real vehicle in a normal driving environment. Data were filtered, normalized, segmented, and quantified to obtain the symbolic representation necessary for use with discrete HMMs. Observation sequences for training and evaluation were manually selected and classified as events of a particular type. An appropriate model size was selected, and the model was trained for each type of driving events. Observation sequences from the training set were evaluated by multiple models, and the highest probability decides what kind of driving event this sequence represents. The recognition results showed that HMMs could recognize driving events very accurately and reliably.",
"title": ""
},
{
"docid": "58b5bf62497220a3f27dc0b4a89d851e",
"text": "Applications and systems are constantly faced with decisions to make, often using a policy to pick from a set of actions based on some contextual information. We create a service that uses machine learning to accomplish this goal. The service uses exploration, logging, and online learning to create a counterfactually sound system supporting a full data lifecycle. The system is general: it works for any discrete choices, with respect to any reward metric, and can work with many learning algorithms and feature representations. The service has a simple API, and was designed to be modular and reproducible to ease deployment and debugging, respectively. We demonstrate how these properties enable learning systems that are robust and safe. Our evaluation shows that the Decision Service makes decisions in real time and incorporates new data quickly into learned policies. A large-scale deployment for a personalized news website has been handling all traffic since Jan. 2016, resulting in a 25% relative lift in clicks. By making the Decision Service externally available, we hope to make optimal decision making available to all.",
"title": ""
},
{
"docid": "4ed4bab7f0ef009ed1bb2e803c3c7833",
"text": "Significant amounts of knowledge in science and technology have so far not been published as Linked Open Data but are contained in the text and tables of legacy PDF publications. Making such information available as RDF would, for example, provide direct access to claims and facilitate surveys of related work. A lot of valuable tabular information that till now only existed in PDF documents would also finally become machine understandable. Instead of studying scientific literature or engineering patents for months, it would be possible to collect such input by simple SPARQL queries. The SemAnn approach enables collaborative annotation of text and tables in PDF documents, a format that is still the common denominator of publishing, thus maximising the potential user base. The resulting annotations in RDF format are available for querying through a SPARQL endpoint. To incentivise users with an immediate benefit for making the effort of annotation, SemAnn recommends related papers, taking into account the hierarchical context of annotations in a novel way. We evaluated the usability of SemAnn and the usefulness of its recommendations by analysing annotations resulting from tasks assigned to test users and by interviewing them. While the evaluation shows that even few annotations lead to a good recall, we also observed unexpected, serendipitous recommendations, which confirms the merit of our low-threshold annotation support for the crowd.",
"title": ""
},
{
"docid": "ba0481ae973970f96f7bf7b1a5461f16",
"text": "WEP is a protocol for securing wireless networks. In the past years, many attacks on WEP have been published, totally breaking WEP’s security. This thesis summarizes all major attacks on WEP. Additionally a new attack, the PTW attack, is introduced, which was partially developed by the author of this document. Some advanced versions of the PTW attack which are more suiteable in certain environments are described as well. Currently, the PTW attack is fastest publicly known key recovery attack against WEP protected networks.",
"title": ""
},
{
"docid": "128ea037369e69aefa90ec37ae1f9625",
"text": "The deep two-stream architecture [23] exhibited excellent performance on video based action recognition. The most computationally expensive step in this approach comes from the calculation of optical flow which prevents it to be real-time. This paper accelerates this architecture by replacing optical flow with motion vector which can be obtained directly from compressed videos without extra calculation. However, motion vector lacks fine structures, and contains noisy and inaccurate motion patterns, leading to the evident degradation of recognition performance. Our key insight for relieving this problem is that optical flow and motion vector are inherent correlated. Transferring the knowledge learned with optical flow CNN to motion vector CNN can significantly boost the performance of the latter. Specifically, we introduce three strategies for this, initialization transfer, supervision transfer and their combination. Experimental results show that our method achieves comparable recognition performance to the state-of-the-art, while our method can process 390.7 frames per second, which is 27 times faster than the original two-stream method.",
"title": ""
},
{
"docid": "1c61be03a48c6f48f45a4f5823b6eaa4",
"text": "Large classrooms have traditionally provided multiple blackboards on which an entire lecture could be visible. In recent decades, classrooms were augmented with a data projector and screen, allowing computer-generated slides to replace hand-written blackboard presentations and overhead transparencies as the medium of choice. Many lecture halls and conference rooms will soon be equipped with multiple projectors that provide large, high-resolution displays of comparable size to an old fashioned array of blackboards. The predominant presentation software, however, is still designed for a single medium-resolution projector. With the ultimate goal of designing rich presentation tools that take full advantage of increased screen resolution and real estate, we conducted an observational study to examine current practice with both traditional whiteboards and blackboards, and computer-generated slides. We identify several categories of observed usage, and highlight differences between traditional media and computer slides. We then present design guidelines for presentation software that capture the advantages of the old and the new and describe a working prototype based on those guidelines that more fully utilizes the capabilities of multiple displays.",
"title": ""
},
{
"docid": "d38f389809b9ed973e3b92216496909c",
"text": "Bullwhip effect in the supply chain distribution network is a phenomenon that is highly avoided because it can lead to high operational costs. It drew the attention of researchers to examine ways to minimize the bullwhip effect. Bullwhip effect occurs because of incorrect company planning in pursuit of customer demand. Bullwhip effect occurs due to increased amplitude of demand variance towards upper supply chain level. If the product handled is a perishable product it will make the bullwhip effect more sensitive. The purpose of this systematic literature review is to map out some of the variables used in constructing mathematical models to minimize the bullwhip effect on food supply chains that have perishable product characteristics. The result of this systematic literature review is that the authors propose an appropriate optimization model that will be applied in the food supply chain sales on the train in Indonesian railways in the next research.",
"title": ""
},
{
"docid": "9c452434ad1c25d0fbe71138b6c39c4b",
"text": "Dual control frameworks for systems subject to uncertainties aim at simultaneously learning the unknown parameters while controlling the system dynamics. We propose a robust dual model predictive control algorithm for systems with bounded uncertainty with application to soft landing control. The algorithm exploits a robust control invariant set to guarantee constraint enforcement in spite of the uncertainty, and a constrained estimation algorithm to guarantee admissible parameter estimates. The impact of the control input on parameter learning is accounted for by including in the cost function a reference input, which is designed online to provide persistent excitation. The reference input design problem is non-convex, and here is solved by a sequence of relaxed convex problems. The results of the proposed method in a soft-landing control application in transportation systems are shown.",
"title": ""
},
{
"docid": "6c08b9488b5f5c7e4b91d2b8941a9ced",
"text": "Modern affiliate marketing networks provide an infrastructure for connecting merchants seeking customers with independent marketers (affiliates) seeking compensation. This approach depends on Web cookies to identify, at checkout time, which affiliate should receive a commission. Thus, scammers ``stuff'' their own cookies into a user's browser to divert this revenue. This paper provides a measurement-based characterization of cookie-stuffing fraud in online affiliate marketing. We use a custom-built Chrome extension, AffTracker, to identify affiliate cookies and use it to gather data from hundreds of thousands of crawled domains which we expect to be targeted by fraudulent affiliates. Overall, despite some notable historical precedents, we found cookie-stuffing fraud to be relatively scarce in our data set. Based on what fraud we detected, though, we identify which categories of merchants are most targeted and which third-party affiliate networks are most implicated in stuffing scams. We find that large affiliate networks are targeted significantly more than merchant-run affiliate programs. However, scammers use a wider range of evasive techniques to target merchant-run affiliate programs to mitigate the risk of detection suggesting that in-house affiliate programs enjoy stricter policing.",
"title": ""
}
] | scidocsrr |
0f1525313cf095d9a5cd350e1f6197c7 | Semantic Web in data mining and knowledge discovery: A comprehensive survey | [
{
"docid": "cb08df0c8ff08eecba5d7fed70c14f1e",
"text": "In this article, we propose a family of efficient kernels for l a ge graphs with discrete node labels. Key to our method is a rapid feature extraction scheme b as d on the Weisfeiler-Lehman test of isomorphism on graphs. It maps the original graph to a sequ ence of graphs, whose node attributes capture topological and label information. A fami ly of kernels can be defined based on this Weisfeiler-Lehman sequence of graphs, including a highly e ffici nt kernel comparing subtree-like patterns. Its runtime scales only linearly in the number of e dges of the graphs and the length of the Weisfeiler-Lehman graph sequence. In our experimental evaluation, our kernels outperform state-of-the-art graph kernels on several graph classifica tion benchmark data sets in terms of accuracy and runtime. Our kernels open the door to large-scale ap plic tions of graph kernels in various disciplines such as computational biology and social netwo rk analysis.",
"title": ""
},
{
"docid": "ec58ee349217d316f87ff684dba5ac2b",
"text": "This paper is a survey of inductive rule learning algorithms that use a separate-and-conquer strategy. This strategy can be traced back to the AQ learning system and still enjoys popularity as can be seen from its frequent use in inductive logic programming systems. We will put this wide variety of algorithms into a single framework and analyze them along three different dimensions, namely their search, language and overfitting avoidance biases.",
"title": ""
}
] | [
{
"docid": "c5759678a84864a843c20c5f4a23f29f",
"text": "We propose a novel framework called transient imaging for image formation and scene understanding through impulse illumination and time images. Using time-of-flight cameras and multi-path analysis of global light transport, we pioneer new algorithms and systems for scene understanding through time images. We demonstrate that our proposed transient imaging framework allows us to accomplish tasks that are well beyond the reach of existing imaging technology. For example, one can infer the geometry of not only the visible but also the hidden parts of a scene, enabling us to look around corners. Traditional cameras estimate intensity per pixel I(x,y). Our transient imaging camera captures a 3D time-image I(x,y,t) for each pixel and uses an ultra-short pulse laser for illumination. Emerging technologies are supporting cameras with a temporal-profile per pixel at picosecond resolution, allowing us to capture an ultra-high speed time-image. This time-image contains the time profile of irradiance incident at a sensor pixel. We experimentally corroborated our theory with free space hardware experiments using a femtosecond laser and a picosecond accurate sensing device. The ability to infer the structure of hidden scene elements, unobservable by both the camera and illumination source, will create a range of new computer vision opportunities.",
"title": ""
},
{
"docid": "4d2b0b01fae0ff2402fc2feaa5657574",
"text": "In this paper, we give an algorithm for the analysis and correction of the distorted QR barcode (QR-code) image. The introduced algorithm is based on the code area finding by four corners detection for 2D barcode. We combine Canny edge detection with contours finding algorithms to erase noises and reduce computation and utilize two tangents to approximate the right-bottom point. Then, we give a detail description on how to use inverse perspective transformation in rebuilding a QR-code image from a distorted one. We test our algorithm on images taken by mobile phones. The experiment shows that our algorithm is effective.",
"title": ""
},
{
"docid": "66a8e7c076ad2cfb7bbe42836607a039",
"text": "The Spider system at the Oak Ridge National Laboratory’s Leadership Computing Facility (OLCF) is the world’s largest scale Lustre parallel file system. Envisioned as a shared parallel file system capable of delivering both the bandwidth and capacity requirements of the OLCF’s diverse computational environment, the project had a number of ambitious goals. To support the workloads of the OLCF’s diverse computational platforms, the aggregate performance and storage capacity of Spider exceed that of our previously deployed systems by a factor of 6x 240 GB/sec, and 17x 10 Petabytes, respectively. Furthermore, Spider supports over 26,000 clients concurrently accessing the file system, which exceeds our previously deployed systems by nearly 4x. In addition to these scalability challenges, moving to a center-wide shared file system required dramatically improved resiliency and fault-tolerance mechanisms. This paper details our efforts in designing, deploying, and operating Spider. Through a phased approach of research and development, prototyping, deployment, and transition to operations, this work has resulted in a number of insights into large-scale parallel file system architectures, from both the design and the operational perspectives. We present in this paper our solutions to issues such as network congestion, performance baselining and evaluation, file system journaling overheads, and high availability in a system with tens of thousands of components. We also discuss areas of continued challenges, such as stressed metadata performance and the need for file system quality of service alongside with our efforts to address them. Finally, operational aspects of managing a system of this scale are discussed along with real-world data and observations.",
"title": ""
},
{
"docid": "70ec2398526863c05b41866593214d0a",
"text": "Matrix factorization (MF) is one of the most popular techniques for product recommendation, but is known to suffer from serious cold-start problems. Item cold-start problems are particularly acute in settings such as Tweet recommendation where new items arrive continuously. In this paper, we present a meta-learning strategy to address item cold-start when new items arrive continuously. We propose two deep neural network architectures that implement our meta-learning strategy. The first architecture learns a linear classifier whose weights are determined by the item history while the second architecture learns a neural network whose biases are instead adjusted. We evaluate our techniques on the real-world problem of Tweet recommendation. On production data at Twitter, we demonstrate that our proposed techniques significantly beat the MF baseline and also outperform production models for Tweet recommendation.",
"title": ""
},
{
"docid": "933f8ba333e8cbef574b56348872b313",
"text": "Automatic image annotation has been an important research topic in facilitating large scale image management and retrieval. Existing methods focus on learning image-tag correlation or correlation between tags to improve annotation accuracy. However, most of these methods evaluate their performance using top-k retrieval performance, where k is fixed. Although such setting gives convenience for comparing different methods, it is not the natural way that humans annotate images. The number of annotated tags should depend on image contents. Inspired by the recent progress in machine translation and image captioning, we propose a novel Recurrent Image Annotator (RIA) model that forms image annotation task as a sequence generation problem so that RIA can natively predict the proper length of tags according to image contents. We evaluate the proposed model on various image annotation datasets. In addition to comparing our model with existing methods using the conventional top-k evaluation measures, we also provide our model as a high quality baseline for the arbitrary length image tagging task. Moreover, the results of our experiments show that the order of tags in training phase has a great impact on the final annotation performance.",
"title": ""
},
{
"docid": "b0575058a6950bc17a976504145dca0e",
"text": "BACKGROUND\nCitation screening is time consuming and inefficient. We sought to evaluate the performance of Abstrackr, a semi-automated online tool for predictive title and abstract screening.\n\n\nMETHODS\nFour systematic reviews (aHUS, dietary fibre, ECHO, rituximab) were used to evaluate Abstrackr. Citations from electronic searches of biomedical databases were imported into Abstrackr, and titles and abstracts were screened and included or excluded according to the entry criteria. This process was continued until Abstrackr predicted and classified the remaining unscreened citations as relevant or irrelevant. These classification predictions were checked for accuracy against the original review decisions. Sensitivity analyses were performed to assess the effects of including case reports in the aHUS dataset whilst screening and the effects of using larger imbalanced datasets with the ECHO dataset. The performance of Abstrackr was calculated according to the number of relevant studies missed, the workload saving, the false negative rate, and the precision of the algorithm to correctly predict relevant studies for inclusion, i.e. further full text inspection.\n\n\nRESULTS\nOf the unscreened citations, Abstrackr's prediction algorithm correctly identified all relevant citations for the rituximab and dietary fibre reviews. However, one relevant citation in both the aHUS and ECHO reviews was incorrectly predicted as not relevant. The workload saving achieved with Abstrackr varied depending on the complexity and size of the reviews (9 % rituximab, 40 % dietary fibre, 67 % aHUS, and 57 % ECHO). The proportion of citations predicted as relevant, and therefore, warranting further full text inspection (i.e. the precision of the prediction) ranged from 16 % (aHUS) to 45 % (rituximab) and was affected by the complexity of the reviews. The false negative rate ranged from 2.4 to 21.7 %. Sensitivity analysis performed on the aHUS dataset increased the precision from 16 to 25 % and increased the workload saving by 10 % but increased the number of relevant studies missed. Sensitivity analysis performed with the larger ECHO dataset increased the workload saving (80 %) but reduced the precision (6.8 %) and increased the number of missed citations.\n\n\nCONCLUSIONS\nSemi-automated title and abstract screening with Abstrackr has the potential to save time and reduce research waste.",
"title": ""
},
{
"docid": "9feeeabb8491a06ae130c99086a9d069",
"text": "Dopamine (DA) is a key transmitter in the basal ganglia, yet DA transmission does not conform to several aspects of the classic synaptic doctrine. Axonal DA release occurs through vesicular exocytosis and is action potential- and Ca²⁺-dependent. However, in addition to axonal release, DA neurons in midbrain exhibit somatodendritic release by an incompletely understood, but apparently exocytotic, mechanism. Even in striatum, axonal release sites are controversial, with evidence for DA varicosities that lack postsynaptic specialization, and largely extrasynaptic DA receptors and transporters. Moreover, DA release is often assumed to reflect a global response to a population of activities in midbrain DA neurons, whether tonic or phasic, with precise timing and specificity of action governed by other basal ganglia circuits. This view has been reinforced by anatomical evidence showing dense axonal DA arbors throughout striatum, and a lattice network formed by DA axons and glutamatergic input from cortex and thalamus. Nonetheless, localized DA transients are seen in vivo using voltammetric methods with high spatial and temporal resolution. Mechanistic studies using similar methods in vitro have revealed local regulation of DA release by other transmitters and modulators, as well as by proteins known to be disrupted in Parkinson's disease and other movement disorders. Notably, the actions of most other striatal transmitters on DA release also do not conform to the synaptic doctrine, with the absence of direct synaptic contacts for glutamate, GABA, and acetylcholine (ACh) on striatal DA axons. Overall, the findings reviewed here indicate that DA signaling in the basal ganglia is sculpted by cooperation between the timing and pattern of DA input and those of local regulatory factors.",
"title": ""
},
{
"docid": "b2c299e13eff8776375c14357019d82e",
"text": "This paper is focused on the application of complementary split-ring resonators (CSRRs) to the suppression of the common (even) mode in microstrip differential transmission lines. By periodically and symmetrically etching CSRRs in the ground plane of microstrip differential lines, the common mode can be efficiently suppressed over a wide band whereas the differential signals are not affected. Throughout the paper, we present and discuss the principle for the selective common-mode suppression, the circuit model of the structure (including the models under even- and odd-mode excitation), the strategies for bandwidth enhancement of the rejected common mode, and a methodology for common-mode filter design. On the basis of the dispersion relation for the common mode, it is shown that the maximum achievable rejection bandwidth can be estimated. Finally, theory is validated by designing and measuring a differential line and a balanced bandpass filter with common-mode suppression, where double-slit CSRRs (DS-CSRRs) are used in order to enhance the common-mode rejection bandwidth. Due to the presence of DS-CSRRs, the balanced filter exhibits more than 40 dB of common-mode rejection within a 34% bandwidth around the filter pass band.",
"title": ""
},
{
"docid": "353f91c6e35cd5703b5b238f929f543e",
"text": "This paper provides an overview of prominent deep learning toolkits and, in particular, reports on recent publications that contributed open source software for implementing tasks that are common in intelligent user interfaces (IUI). We provide a scientific reference for researchers and software engineers who plan to utilise deep learning techniques within their IUI research and development projects. ACM Classification",
"title": ""
},
{
"docid": "7ddfa92cee856e2ef24caf3e88d92b93",
"text": "Applications are getting increasingly interconnected. Although the interconnectedness provide new ways to gather information about the user, not all user information is ready to be directly implemented in order to provide a personalized experience to the user. Therefore, a general model is needed to which users’ behavior, preferences, and needs can be connected to. In this paper we present our works on a personality-based music recommender system in which we use users’ personality traits as a general model. We identified relationships between users’ personality and their behavior, preferences, and needs, and also investigated different ways to infer users’ personality traits from user-generated data of social networking sites (i.e., Facebook, Twitter, and Instagram). Our work contributes to new ways to mine and infer personality-based user models, and show how these models can be implemented in a music recommender system to positively contribute to the user experience.",
"title": ""
},
{
"docid": "786ef1b656c182ab71f7a63e7f263b3f",
"text": "The spectrum of a first-order sentence is the set of cardinalities of its finite models. This paper is concerned with spectra of sentences over languages that contain only unary function symbols. In particular, it is shown that a set S of natural numbers is the spectrum of a sentence over the language of one unary function symbol precisely if S is an eventually periodic set.",
"title": ""
},
{
"docid": "a9b96c162e9a7f39a90c294167178c05",
"text": "The performance of automotive radar systems is expected to significantly increase in the near future. With enhanced resolution capabilities more accurate and denser point clouds of traffic participants and roadside infrastructure can be acquired and so the amount of gathered information is growing drastically. One main driver for this development is the global trend towards self-driving cars, which all rely on precise and fine-grained sensor information. New radar signal processing concepts have to be developed in order to provide this additional information. This paper presents a prototype high resolution radar sensor which helps to facilitate algorithm development and verification. The system is operational under real-time conditions and achieves excellent performance in terms of range, velocity and angular resolution. Complex traffic scenarios can be acquired out of a moving test vehicle, which is very close to the target application. First measurement runs on public roads are extremely promising and show an outstanding single-snapshot performance. Complex objects can be precisely located and recognized by their contour shape. In order to increase the possible recording time, the raw data rate is reduced by several orders of magnitude in real-time by means of constant false alarm rate (CFAR) processing. The number of target cells can still exceed more than 10 000 points in a single measurement cycle for typical road scenarios.",
"title": ""
},
{
"docid": "7b45559be60b099de0bcf109c9a539b7",
"text": "The split-heel technique has distinct advantages over the conventional medial or lateral approach in the operative debridement of extensive and predominantly plantar chronic calcaneal osteomyelitis in children above 5 years of age. We report three cases (age 5.5-11 years old) of chronic calcaneal osteomyelitis in children treated using the split-heel approach with 3-10 years follow-up showing excellent functional and cosmetic results.",
"title": ""
},
{
"docid": "b27e5e9540e625912a4e395079f6ac68",
"text": "We propose Cooperative Training (CoT) for training generative models that measure a tractable density for discrete data. CoT coordinately trains a generator G and an auxiliary predictive mediator M . The training target of M is to estimate a mixture density of the learned distribution G and the target distribution P , and that of G is to minimize the Jensen-Shannon divergence estimated through M . CoT achieves independent success without the necessity of pre-training via Maximum Likelihood Estimation or involving high-variance algorithms like REINFORCE. This low-variance algorithm is theoretically proved to be unbiased for both generative and predictive tasks. We also theoretically and empirically show the superiority of CoT over most previous algorithms in terms of generative quality and diversity, predictive generalization ability and computational cost.",
"title": ""
},
{
"docid": "6ceab65cc9505cf21824e9409cf67944",
"text": "Estimating the confidence for a link is a critical task for Knowledge Graph construction. Link prediction, or predicting the likelihood of a link in a knowledge graph based on prior state is a key research direction within this area. We propose a Latent Feature Embedding based link recommendation model for prediction task and utilize Bayesian Personalized Ranking based optimization technique for learning models for each predicate. Experimental results on largescale knowledge bases such as YAGO2 show that our approach achieves substantially higher performance than several state-of-art approaches. Furthermore, we also study the performance of the link prediction algorithm in terms of topological properties of the Knowledge Graph and present a linear regression model to reason about its expected level",
"title": ""
},
{
"docid": "c2d4f97913bb3acceb3703f1501547a8",
"text": "Pattern recognition is the discipline studying the design and operation of systems capable to recognize patterns with specific properties in data so urce . Intrusion detection, on the other hand, is in charge of identifying anomalou s activities by analyzing a data source, be it the logs of an operating system or in the network traffic. It is easy to find similarities between such research fields , and it is straightforward to think of a way to combine them. As to the descriptions abov e, we can imagine an Intrusion Detection System (IDS) using techniques prop er of the pattern recognition field in order to discover an attack pattern within the network traffic. What we propose in this work is such a system, which exp loits the results of research in the field of data mining, in order to discover poten tial attacks. The paper also presents some experimental results dealing with p erformance of our system in a real-world operational scenario.",
"title": ""
},
{
"docid": "32faa5a14922d44101281c783cf6defb",
"text": "A novel multifocus color image fusion algorithm based on the quaternion wavelet transform (QWT) is proposed in this paper, aiming at solving the image blur problem. The proposed method uses a multiresolution analysis procedure based on the quaternion wavelet transform. The performance of the proposed fusion scheme is assessed by some experiments, and the experimental results show that the proposed method is effective and performs better than the existing fusion methods.",
"title": ""
},
{
"docid": "b3ffb805b3dcffc4e5c9cec47f90e566",
"text": "Real-time ride-sharing, which enables on-the-fly matching between riders and drivers (even en-route), is an important problem due to its environmental and societal benefits. With the emergence of many ride-sharing platforms (e.g., Uber and Lyft), the design of a scalable framework to match riders and drivers based on their various constraints while maximizing the overall profit of the platform becomes a distinguishing business strategy.\n A key challenge of such framework is to satisfy both types of the users in the system, e.g., reducing both riders' and drivers' travel distances. However, the majority of the existing approaches focus only on minimizing the total travel distance of drivers which is not always equivalent to shorter trips for riders. Hence, we propose a fair pricing model that simultaneously satisfies both the riders' and drivers' constraints and desires (formulated as their profiles). In particular, we introduce a distributed auction-based framework where each driver's mobile app automatically bids on every nearby request taking into account many factors such as both the driver's and the riders' profiles, their itineraries, the pricing model, and the current number of riders in the vehicle. Subsequently, the server determines the highest bidder and assigns the rider to that driver. We show that this framework is scalable and efficient, processing hundreds of tasks per second in the presence of thousands of drivers. We compare our framework with the state-of-the-art approaches in both industry and academia through experiments on New York City's taxi dataset. Our results show that our framework can simultaneously match more riders to drivers (i.e., higher service rate) by engaging the drivers more effectively. Moreover, our frame-work schedules shorter trips for riders (i.e., better service quality). Finally, as a consequence of higher service rate and shorter trips, our framework increases the overall profit of the ride-sharing platforms.",
"title": ""
},
{
"docid": "32fe17034223a3ea9a7c52b4107da760",
"text": "With the prevalence of the internet, mobile devices and commercial streaming music services, the amount of digital music available is greater than ever. Sorting through all this music is an extremely time-consuming task. Music recommendation systems search through this music automatically and suggest new songs to users. Music recommendation systems have been developed in commercial and academic settings, but more research is needed. The perfect system would handle all the user’s listening needs while requiring only minimal user input. To this end, I have reviewed 20 articles within the field of music recommendation with the goal of finding how the field can be improved. I present a survey of music recommendation, including an explanation of collaborative and content-based filtering with their respective strengths and weaknesses. I propose a novel next-track recommendation system that incorporates techniques advocated by the literature. The system relies heavily on user skipping behavior to drive both a content-based and a collaborative approach. It uses active learning to balance the needs of exploration vs. exploitation in playing music for the user.",
"title": ""
}
] | scidocsrr |
c96961e39cc0c86ce7c02b7f3da00879 | The prevalence and impact of depression among medical students: a nationwide cross-sectional study in South Korea. | [
{
"docid": "f84f279b6ef3b112a0411f5cba82e1b0",
"text": "PHILADELPHIA The difficulties inherent in obtaining consistent and adequate diagnoses for the purposes of research and therapy have been pointed out by a number of authors. Pasamanick12 in a recent article viewed the low interclinician agreement on diagnosis as an indictment of the present state of psychiatry and called for \"the development of objective, measurable and verifiable criteria of classification based not on personal or parochial considerations, buton behavioral and other objectively measurable manifestations.\" Attempts by other investigators to subject clinical observations and judgments to objective measurement have resulted in a wide variety of psychiatric rating ~ c a l e s . ~ J ~ These have been well summarized in a review article by Lorr l1 on \"Rating Scales and Check Lists for the E v a 1 u a t i o n of Psychopathology.\" In the area of psychological testing, a variety of paper-andpencil tests have been devised for the purpose of measuring specific personality traits; for example, the Depression-Elation Test, devised by Jasper in 1930. This report describes the development of an instrument designed to measure the behavioral manifestations of depression. In the planning of the research design of a project aimed at testing certain psychoanalytic formulations of depression, the necessity for establishing an appropriate system for identifying depression was recognized. Because of the reports on the low degree of interclinician agreement on diagnosis,13 we could not depend on the clinical diagnosis, but had to formulate a method of defining depression that would be reliable and valid. The available instruments were not considered adequate for our purposes. The Minnesota Multiphasic Personality Inventory, for example, was not specifically designed",
"title": ""
}
] | [
{
"docid": "b59d72a5c2661c6646663dbbf8d5e30b",
"text": "Media representation of mental illness has received growing research attention within a variety of academic disciplines. Cultural and media studies have often dominated in this research and discussion. More recently healthcare professionals have become interested in this debate, yet despite the importance of this subject only a selection of papers have been published in professional journals relating to nursing and healthcare. This paper examines the way in which mental illness in the United Kingdom is portrayed in public life. Literature from the field of media studies is explored alongside the available material from the field of mental healthcare. Three main areas are used to put forward an alternative approach: film representation and newspaper reporting of mental illness; the nature of the audience; and finally the concept of myth. The paper concludes by considering this approach in the context of current mental health policy on mental health promotion.",
"title": ""
},
{
"docid": "ebbf02210b8e887a0564319594bc6ce5",
"text": "Polycystic ovary syndrome (PCOS) is one of the most common endocrine and metabolic disorders in premenopausal women. Heterogeneous by nature, PCOS is defined by a combination of signs and symptoms of androgen excess and ovarian dysfunction in the absence of other specific diagnoses. The aetiology of this syndrome remains largely unknown, but mounting evidence suggests that PCOS might be a complex multigenic disorder with strong epigenetic and environmental influences, including diet and lifestyle factors. PCOS is frequently associated with abdominal adiposity, insulin resistance, obesity, metabolic disorders and cardiovascular risk factors. The diagnosis and treatment of PCOS are not complicated, requiring only the judicious application of a few well-standardized diagnostic methods and appropriate therapeutic approaches addressing hyperandrogenism, the consequences of ovarian dysfunction and the associated metabolic disorders. This article aims to provide a balanced review of the latest advances and current limitations in our knowledge about PCOS while also providing a few clear and simple principles, based on current evidence-based clinical guidelines, for the proper diagnosis and long-term clinical management of women with PCOS.",
"title": ""
},
{
"docid": "9e3562c5d4baf6be3293486383e62b3e",
"text": "Many philosophical and contemplative traditions teach that \"living in the moment\" increases happiness. However, the default mode of humans appears to be that of mind-wandering, which correlates with unhappiness, and with activation in a network of brain areas associated with self-referential processing. We investigated brain activity in experienced meditators and matched meditation-naive controls as they performed several different meditations (Concentration, Loving-Kindness, Choiceless Awareness). We found that the main nodes of the default-mode network (medial prefrontal and posterior cingulate cortices) were relatively deactivated in experienced meditators across all meditation types. Furthermore, functional connectivity analysis revealed stronger coupling in experienced meditators between the posterior cingulate, dorsal anterior cingulate, and dorsolateral prefrontal cortices (regions previously implicated in self-monitoring and cognitive control), both at baseline and during meditation. Our findings demonstrate differences in the default-mode network that are consistent with decreased mind-wandering. As such, these provide a unique understanding of possible neural mechanisms of meditation.",
"title": ""
},
{
"docid": "5eab71f546a7dc8bae157a0ca4dd7444",
"text": "We introduce a new usability inspection method called HED (heuristic evaluation during demonstrations) for measuring and comparing usability of competing complex IT systems in public procurement. The method presented enhances traditional heuristic evaluation to include the use context, comprehensive view of the system, and reveals missing functionality by using user scenarios and demonstrations. HED also quantifies the results in a comparable way. We present findings from a real-life validation of the method in a large-scale procurement project of a healthcare and social welfare information system. We analyze and compare the performance of HED to other usability evaluation methods used in procurement. Based on the analysis HED can be used to evaluate the level of usability of an IT system during procurement correctly, comprehensively and efficiently.",
"title": ""
},
{
"docid": "cd71e990546785bd9ba0c89620beb8d2",
"text": "Crime is one of the most predominant and alarming aspects in our society and its prevention is a vital task. Crime analysis is a systematic way of detecting and investigating patterns and trends in crime. In this work, we use various clustering approaches of data mining to analyse the crime data of Tamilnadu. The crime data is extracted from National Crime Records Bureau (NCRB) of India. It consists of crime information about six cities namely Chennai, Coimbatore, Salem, Madurai, Thirunelvelli and Thiruchirapalli from the year 2000–2014 with 1760 instances and 9 attributes to represent the instances. K-Means clustering, Agglomerative clustering and Density Based Spatial Clustering with Noise (DBSCAN) algorithms are used to cluster crime activities based on some predefined cases and the results of these clustering are compared to find the best suitable clustering algorithm for crime detection. The result of K-Means clustering algorithm is visualized using Google Map for interactive and easy understanding. The K-Nearest Neighbor (KNN) classification is used for crime prediction. The performance of each clustering algorithms are evaluated using the metrics such as precision, recall and F-measure, and the results are compared. This work helps the law enforcement agencies to predict and detect crimes in Tamilnadu with improved accuracy and thus reduces the crime rate.",
"title": ""
},
{
"docid": "bc432ab6ba8075aa9e142dd186a1e2a5",
"text": "The impact of missing data on quantitative research can be serious, leading to biased estimates of parameters, loss of information, decreased statistical power, increased standard errors, and weakened generalizability of findings. In this paper, we discussed and demonstrated three principled missing data methods: multiple imputation, full information maximum likelihood, and expectation-maximization algorithm, applied to a real-world data set. Results were contrasted with those obtained from the complete data set and from the listwise deletion method. The relative merits of each method are noted, along with common features they share. The paper concludes with an emphasis on the importance of statistical assumptions, and recommendations for researchers. Quality of research will be enhanced if (a) researchers explicitly acknowledge missing data problems and the conditions under which they occurred, (b) principled methods are employed to handle missing data, and (c) the appropriate treatment of missing data is incorporated into review standards of manuscripts submitted for publication.",
"title": ""
},
{
"docid": "9ac16df20364b0ae28d3164bbfb08654",
"text": "Complex event detection is an advanced form of data stream processing where the stream(s) are scrutinized to identify given event patterns. The challenge for many complex event processing (CEP) systems is to be able to evaluate event patterns on high-volume data streams while adhering to realtime constraints. To solve this problem, in this paper we present a hardware based complex event detection system implemented on field-programmable gate arrays (FPGAs). By inserting the FPGA directly into the data path between the network interface and the CPU, our solution can detect complex events at gigabit wire speed with constant and fully predictable latency, independently of network load, packet size or data distribution. This is a significant improvement over CPU based systems and an architectural approach that opens up interesting opportunities for hybrid stream engines that combine the flexibility of the CPU with the parallelism and processing power of FPGAs.",
"title": ""
},
{
"docid": "de887adb8d3383ffa1ed4aa033e0bd4a",
"text": "An offline recognition system for Arabic handwritten words is presented. The recognition system is based on a semi-continuous 1-dimensional HMM. From each binary word image normalization parameters were estimated. First height, length, and baseline skew are normalized, then features are collected using a sliding window approach. This paper presents these methods in more detail. Some parameters were modified and the consequent effect on the recognition results are discussed. Significant tests were performed using the new IFN/ENIT database of handwritten Arabic words. The comprehensive database consists of 26459 Arabic words (Tunisian town/village names) handwritten by 411 different writers and is free for non-commercial research. In the performed tests we achieved maximal recognition rates of about 89% on a word level.",
"title": ""
},
{
"docid": "309a20834f17bd87e10f8f1c051bf732",
"text": "Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with military cipher machines and PIN processing in banking payment networks, expanding in the 1990s into embedded applications: token vending machines for prepayment electricity and mobile phone credit. Major applications such as GSM mobile phone identification and pay TV set-top boxes have pushed low-cost cryptoprocessors toward ubiquity. In the last five years, dedicated crypto chips have been embedded in devices such as game console accessories and printer ink cartridges, to control product and accessory after markets. The \"Trusted Computing\" initiative will soon embed cryptoprocessors in PCs so they can identify each other remotely. This paper surveys the range of applications of tamper-resistant hardware and the array of attack and defense mechanisms which have evolved in the tamper-resistance arms race.",
"title": ""
},
{
"docid": "b64a2e6bb533043a48b7840b72f71331",
"text": "Autonomous long range navigation in partially known planetary-like terrain is an open challenge for robotics. Navigating several hundreds of meters without any human intervention requires the robot to be able to build various representations of its environment, to plan and execute trajectories according to the kind of terrain traversed, to localize itself as it moves, and to schedule, start, control and interrupt these various activities. In this paper, we brie y describe some functionalities that are currently running on board the Marsokhod model robot Lama at LAAS/CNRS. We then focus on the necessity to integrate various instances of the perception and decision functionalities, and on the di culties raised by this integration.",
"title": ""
},
{
"docid": "67da66dc42bfc1f2ca103ff80c7a5eb9",
"text": "Low voltage (LV) analog circuit design techniques are addressed in this tutorial. In particular, (i) technology considerations; (ii) transistor model capable to provide performance and power tradeoffs; (iii) low voltage implementation techniques capable to reduce the power supply requirements, such as bulk-driven, floating-gate, and self-cascode MOSFETs; (iv) basic LV building blocks; (v) multi-stage frequency compensation topologies; and (vi) fully-differential and fully-balanced systems. key words: analog circuits, amplifiers, transistor model, bulkdriven, floating-gate, self-cascode, NGCC frequency compensation, fully-differential and fully-balanced systems.",
"title": ""
},
{
"docid": "29aa7084f7d6155d4626b682a5fc88ef",
"text": "There is an underlying cascading behavior over road networks. Traffic cascading patterns are of great importance to easing traffic and improving urban planning. However, what we can observe is individual traffic conditions on different road segments at discrete time intervals, rather than explicit interactions or propagation (e.g., A→B) between road segments. Additionally, the traffic from multiple sources and the geospatial correlations between road segments make it more challenging to infer the patterns. In this paper, we first model the three-fold influences existing in traffic propagation and then propose a data-driven approach, which finds the cascading patterns through maximizing the likelihood of observed traffic data. As this is equivalent to a submodular function maximization problem, we solve it by using an approximate algorithm with provable near-optimal performance guarantees based on its submodularity. Extensive experiments on real-world datasets demonstrate the advantages of our approach in both effectiveness and efficiency.",
"title": ""
},
{
"docid": "c2c81d5f7c1be2f6a877811cd61f055d",
"text": "Since the cognitive revolution of the sixties, representation has served as the central concept of cognitive theory and representational theories of mind have provided the establishment view in cognitive science (Fodor, 1980; Gardner, 1985; Vera & Simon, 1993). Central to this line of thinking is the belief that knowledge exists solely in the head, and instruction involves finding the most efficient means for facilitating the “acquisition” of this knowledge (Gagne, Briggs, & Wager, 1993). Over the last two decades, however, numerous educational psychologists and instructional designers have begun abandoning cognitive theories that emphasize individual thinkers and their isolated minds. Instead, these researchers have adopted theories that emphasize the social and contextualized nature of cognition and meaning (Brown, Collins, & Duguid, 1989; Greeno, 1989, 1997; Hollan, Hutchins, & Kirsch, 2000; Lave & Wenger, 1991; Resnick, 1987; Salomon, 1993). Central to these reconceptualizations is an emphasis on contextualized activity and ongoing participation as the core units of analysis (Barab & Kirshner, 2001; Barab & Plucker, 2002; Brown & Duguid, 1991; Cook & Yanow, 1993;",
"title": ""
},
{
"docid": "cc4c028027c1761428d5f80e07b1b614",
"text": "When humans and other mammals run, the body's complex system of muscle, tendon and ligament springs behaves like a single linear spring ('leg spring'). A simple spring-mass model, consisting of a single linear leg spring and a mass equivalent to the animal's mass, has been shown to describe the mechanics of running remarkably well. Force platform measurements from running animals, including humans, have shown that the stiffness of the leg spring remains nearly the same at all speeds and that the spring-mass system is adjusted for higher speeds by increasing the angle swept by the leg spring. The goal of the present study is to determine the relative importance of changes to the leg spring stiffness and the angle swept by the leg spring when humans alter their stride frequency at a given running speed. Human subjects ran on treadmill-mounted force platform at 2.5ms-1 while using a range of stride frequencies from 26% below to 36% above the preferred stride frequency. Force platform measurements revealed that the stiffness of the leg spring increased by 2.3-fold from 7.0 to 16.3 kNm-1 between the lowest and highest stride frequencies. The angle swept by the leg spring decreased at higher stride frequencies, partially offsetting the effect of the increased leg spring stiffness on the mechanical behavior of the spring-mass system. We conclude that the most important adjustment to the body's spring system to accommodate higher stride frequencies is that leg spring becomes stiffer.",
"title": ""
},
{
"docid": "f5d58660137891111a009bc841950ad2",
"text": "Lateral brow ptosis is a common aging phenomenon, contributing to the lateral upper eyelid hooding, in addition to dermatochalasis. Lateral brow lift complements upper blepharoplasty in achieving a youthful periorbital appearance. In this study, the author reports his experience in utilizing a temporal (pretrichial) subcutaneous lateral brow lift technique under local anesthesia. A retrospective analysis of all patients undergoing the proposed technique by one surgeon from 2009 to 2016 was conducted. Additional procedures were recorded. Preoperative and postoperative photographs at the longest follow-up visit were used for analysis. Operation was performed under local anesthesia. The surgical technique included a temporal (pretrichial) incision with subcutaneous dissection toward the lateral brow, with superolateral lift and closure. Total of 45 patients (44 females, 1 male; mean age: 58 years) underwent the temporal (pretrichial) subcutaneous lateral brow lift technique under local anesthesia in office setting. The procedure was unilateral in 4 cases. Additional procedures included upper blepharoplasty (38), ptosis surgery (16), and lower blepharoplasty (24). Average follow-up time was 1 year (range, 6 months to 5 years). All patients were satisfied with the eyebrow contour and scar appearance. One patient required additional brow lift on one side for asymmetry. There were no cases of frontal nerve paralysis. In conclusion, the temporal (pretrichial) subcutaneous approach is an effective, safe technique for lateral brow lift/contouring, which can be performed under local anesthesia. It is ideal for women. Additional advantages include ease of operation, cost, and shortening the hairline (if necessary).",
"title": ""
},
{
"docid": "ae5fac207e5d3bf51bffbf2ec01fd976",
"text": "Deep learning has revolutionized the way sensor data are analyzed and interpreted. The accuracy gains these approaches offer make them attractive for the next generation of mobile, wearable and embedded sensory applications. However, state-of-the-art deep learning algorithms typically require a significant amount of device and processor resources, even just for the inference stages that are used to discriminate high-level classes from low-level data. The limited availability of memory, computation, and energy on mobile and embedded platforms thus pose a significant challenge to the adoption of these powerful learning techniques. In this paper, we propose SparseSep, a new approach that leverages the sparsification of fully connected layers and separation of convolutional kernels to reduce the resource requirements of popular deep learning algorithms. As a result, SparseSep allows large-scale DNNs and CNNs to run efficiently on mobile and embedded hardware with only minimal impact on inference accuracy. We experiment using SparseSep across a variety of common processors such as the Qualcomm Snapdragon 400, ARM Cortex M0 and M3, and Nvidia Tegra K1, and show that it allows inference for various deep models to execute more efficiently; for example, on average requiring 11.3 times less memory and running 13.3 times faster on these representative platforms.",
"title": ""
},
{
"docid": "061dc618163d08972b73af42e8628159",
"text": "< draft-ietf-pkix-ipki-new-rfc2527-01.txt > Status of this Memo This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of 6 months and may be updated, replaced, or may become obsolete by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as work in progress. To view the entire list of current Internet-Drafts, please check the \"1id-abstracts.txt\" listing contained in the Internet-Drafts Shadow Directories on ftp.is.co.za (Africa), ftp.nordu.net (Northern Europe), ftp.nis.garr.it (Southern Europe), munnari.oz.au (Pacific Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast). Abstract This document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates. In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement. This document is being submitted to the RFC Editor with a request for publication as an Informational RFC that will supercede RFC 2527 [CPF].",
"title": ""
},
{
"docid": "f4009fde2b4ac644d3b83b664e178b5f",
"text": "This chapter describes the history of metaheuristics in five distinct periods, starting long before the first use of the term and ending a long time in the future.",
"title": ""
}
] | scidocsrr |
2b5a46814aa5174fa48ac321b968f545 | A Low Profile and Low Sidelobe Wideband Slot Antenna Array Feb by an Amplitude-Tapering Waveguide Feed-Network | [
{
"docid": "06b81ec29ee26f13720891eea9f902df",
"text": "This paper reports the design of a Waveguide-Fed Cavity Backed Slot Antenna Array in Ku-band. The antenna is made entire via simple milling process. The overall antenna structure consists of 3 layers. The bottom layer is a waveguide feed network to provide corporate power division. In turn, the waveguide feed network is fed by a conventional SMA connector from the back. The waveguide network couples energy to an array of cavity via an aperture. This constitutes the middle layer. Each cavity then excites an array of 2×2 radiating slots in the top layer. The radiating slot elements and the feed network are designed to achieve wide bandwidth and gain performance. Finally, an 8×8 array antenna is designed with about 25dBi gain and bandwidth of 1.6GHz in the Ku-band.",
"title": ""
}
] | [
{
"docid": "f21ce699eafeeee63ae0fcf7e467f4f8",
"text": "This paper proposes a high-frequency-link soft-switching pulse-width modulated dc-dc converter for electric vehicle (EV) on-board battery chargers. Zero-voltage switching of power switches is achieved from light load to full load. Reverse-recovery losses can be reduced in the secondary side output diodes without using any additional circuit components. Zero-current switching of output diodes is achieved by using the series-resonant circuit in the secondary side. The circulating current in the primary side full-bridge circuit can be changed by the operation modes of the output diode current. As a result, a high efficiency can be achieved for EV on-board battery chargers. The performance of the proposed converter is evaluated throughout experimental results for a 2.0-kW prototype circuit.",
"title": ""
},
{
"docid": "ddef63f11a6e88c42acb23f2e9da6faa",
"text": "The use of terrestrial and aquatic invertebrates as a management tool for monitoring change in ecosystems is reviewed and critically evaluated. Their suitability and value for assessing a range of environmental problems from pollution impacts, through habitat evaluation for conservation to the long-term degradation and recovery of ecosystems, is critically discussed. Guidelines are provided for the choice of appropriate bioindicators. Examples of the use of a broad spectrum of invertebrates to assess a variety of environmental problems are summarized. The particular potential of invertebrates for monitoring montane ecosystems is highlighted.",
"title": ""
},
{
"docid": "4dcaed57f837c76137518b52b38c0eab",
"text": "We describe a simple modification of neural networks which consists in extending the commonly used linear layer structure to an arbitrary graph structure. This allows us to combine the benefits of convolutional neural networks with the benefits of regular networks. The joint model has only a small increase in parameter size and training and decoding time are virtually unaffected. We report significant improvements over very strong baselines on two LVCSR tasks and one speech activity detection task.",
"title": ""
},
{
"docid": "354e25229d851e4e3e1626de31c8ac98",
"text": "While feedforward deep convolutional neural networks (CNNs) have been a great success in computer vision, it is important to note that the human visual cortex generally contains more feedback than feedforward connections. In this paper, we will briefly introduce the background of feedbacks in the human visual cortex, which motivates us to develop a computational feedback mechanism in deep neural networks. In addition to the feedforward inference in traditional neural networks, a feedback loop is introduced to infer the activation status of hidden layer neurons according to the \"goal\" of the network, e.g., high-level semantic labels. We analogize this mechanism as \"Look and Think Twice.\" The feedback networks help better visualize and understand how deep neural networks work, and capture visual attention on expected objects, even in images with cluttered background and multiple objects. Experiments on ImageNet dataset demonstrate its effectiveness in solving tasks such as image classification and object localization.",
"title": ""
},
{
"docid": "95ae44469494aff0f511e77d7924ed36",
"text": "In a practical training for the Faculty of Electrical Engineering at Eindhoven University of Technology, a literature search to the past developments concerning the Phase Correlation algorithm was carried out and the algorithm was implemented. The Phase Correlation algorithm is a method for measuring the motion in a video sequence, based on the Fourier shift theorem. It was found that an enhanced implementation of the Phase Correlation algorithm gives very good results, comparable to the results of 3-D Recursive Search (a popular method for motion estimation in consumer electronics equipment). The estimated motion vectors have a close relation to the true motion in a scene, which makes this algorithm very suitable for video format conversion. It is concluded that Phase Correlation and 3-D Recursive Search, together with object based motion estimation, are the best methods for motion estimation currently available.",
"title": ""
},
{
"docid": "9414090a3b69200982127e15d124a11b",
"text": "The research reported here was originally motivated by the results of Lisa R. Anderson and Charles A. Holt (1997), who demonstrated the existence of cascades in sequences of individual decisions. In certain environments the decisions of individuals tended to reflect only the decisions of those who went before them and did not reflect the information they held privately. Our first question was whether the results they reported would replicate. Reflections on the problem led us to realize that the study of cascades is a branch of three strands of research. While these strands of research have similarities, they tend to reflect differences about the principles governing behavior. The first strand of research is the conformity or “herding” research which is focused primarily on models that might explain similarities in individual choices or interdependencies of preferences. Typically the phenomenon is called “herds,” “fads,” or “conformity,” which reflects a concern with “incorrect” or “wrong” cascades, despite the recognition that cascades can result from rational, Bayesian-Nash behavior. Even though the literature is less dramatic, it is easy to liken the behavior to lemmings in which each follows the one ahead over a cliff and falls to its death, all of which suggests that the behavior is viewed as being somewhat dysfunctional. Aspects of the second strand of research, the information aggregation literature, are frequently employed in the first strand. However, when viewed independently as an information aggregation issue, the topic of cascades is approached differently and aspects of market stability also become involved. 1 Cascade behavior is a Pareto improvement over behavior in which individuals base decisions only on their private information, since a cascade reflects an integration of more private information than any single individual possesses. However, all information is not integrated into a cascading system and the pattern of decisions themselves do not summarize and publicize a summary of private information as prices can do in markets. The phenomena involves an information externality or public good inefficiency problem fostered by the nature of the decision-making institutions and environment. The private information of those who make decisions, after the first person or two, is not made available to those who follow. Some of the early decision makers fail to contribute to the “public good” of pooled information. Thus, the information aggregation literature leads naturally to questions about the role of institutions and the efficiency of the system in both an allocation sense and in an information sense. The third strand of literature also leads to issues about institutions as well as the underlying reasons for the observed patterns of behavior. Cascades were observed many years ago by social psychologists, although they were given other names. Psychologists distinguished between conformity due to integration of private *Hung: H. John Heinz III School of Public Policy and Management, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213; Plott: Division of the Humanities and Social Sciences, M/C 228-77, California Institute of Technology, Pasadena, CA 91125. The financial support of the National Science Foundation and the Laboratory of Experimental Economics and Political Science is gratefully acknowledged. We are also deeply appreciative of the collaboration of David Winkler, who developed the software programs and helped extensively with the experiments. We benefited from conversations with Colin Camerer, David Grether, Richard McKelvey, Anthony Ziegelmeyer, and participants at the Economic Science Association meetings in October 1998, as well as comments from the anonymous referees. 1 Issues of market instability are closely related to the cascade phenomena by virtue of the interdependence of preferences and beliefs. See Gary S. Becker (1991), Edi Karni and Dan Levine (1994), and Plott and Jared Smith (1999). 2 For example, Abhijit V. Banerjee (1992) discusses “herd externalities,” and Sushil Bikhchandani et al. (1998) discuss the positive externality of revealing one’s private signal.",
"title": ""
},
{
"docid": "8096963007e7b6bfbcaf406e16125df9",
"text": "This paper analyses the substantially growing markets for crowdfunding, in which retail investors lend to borrowers without financial intermediaries. Critics suggest these markets allow sophisticated investors to take advantage of unsophisticated investors. The growth and viability of these markets critically depends on the underlying incentives. We provide evidence of perverse incentives in crowdfunding that are not fully recognized by the market. In particular we look at group leader bids in the presence of origination fees and find that these bids are (wrongly) perceived as a signal of good loan quality, resulting in lower interest rates. Yet these loans actually have higher default rates. These adverse incentives are overcome only with sufficient skin in the game and when there are no origination fees. The results provide important implications for crowdfunding, its structure and regulation.",
"title": ""
},
{
"docid": "6b5a7e58a8407fa5cda402d4996a3a10",
"text": "In the last few years, Hadoop become a \"de facto\" standard to process large scale data as an open source distributed system. With combination of data mining techniques, Hadoop improve data analysis utility. That is why, there are amount of research is studied to apply data mining technique to mapreduce framework in Hadoop. However, data mining have a possibility to cause a privacy violation and this threat is a huge obstacle for data mining using Hadoop. To solve this problem, numerous studies have been conducted. However, existing studies were insufficient and had several drawbacks. In this paper, we propose the privacy preserving data mining technique in Hadoop that is solve privacy violation without utility degradation. We focus on association rule mining algorithm that is representative data mining algorithm. We validate the proposed technique to satisfy performance and preserve data privacy through the experimental results.",
"title": ""
},
{
"docid": "5814f71c0fbbd1721f6c3ad948895c62",
"text": "Technological innovations made it possible to create more and more realistic figures. Such figures are often created according to human appearance and behavior allowing interaction with artificial systems in a natural and familiar way. In 1970, the Japanese roboticist Masahiro Mori observed, however, that robots and prostheses with a very – but not perfect – human-like appearance can elicit eerie, uncomfortable, and even repulsive feelings. While real people or stylized figures do not seem to evoke such negative feelings, human depictions with only minor imperfections fall into the “uncanny valley,” as Mori put it. Today, further innovations in computer graphics led virtual characters into the uncanny valley. Thus, they have been subject of a number of disciplines. For research, virtual characters created by computer graphics are particularly interesting as they are easy to manipulate and, thus, can significantly contribute to a better understanding of the uncanny valley and human perception. For designers and developers of virtual characters such as in animated movies or games, it is important to understand how the appearance and human-likeness or virtual realism influence the experience and interaction of the user and how they can create believable and acceptable avatars and virtual characters despite the uncanny valley. This work investigates these aspects and is the next step in the exploration of the uncanny valley.",
"title": ""
},
{
"docid": "95dab9a47faac6956e35a0807afaa16f",
"text": "We introduce HoME: a Household Multimodal Environment for artificial agents to learn from vision, audio, semantics, physics, and interaction with objects and other agents, all within a realistic context. HoME integrates over 45,000 diverse 3D house layouts based on the SUNCG dataset, a scale which may facilitate learning, generalization, and transfer. HoME is an open-source, OpenAI Gym-compatible platform extensible to tasks in reinforcement learning, language grounding, soundbased navigation, robotics, multi-agent learning, and more. We hope HoME better enables artificial agents to learn as humans do: in an interactive, multimodal, and richly contextualized setting.",
"title": ""
},
{
"docid": "cb0b7879f61630b467aa595d961bfcef",
"text": "UNLABELLED\nGlucagon-like peptide 1 (GLP-1[7-36 amide]) is an incretin hormone primarily synthesized in the lower gut (ileum, colon/rectum). Nevertheless, there is an early increment in plasma GLP-1 immediately after ingesting glucose or mixed meals, before nutrients have entered GLP-1 rich intestinal regions. The responsible signalling pathway between the upper and lower gut is not clear. It was the aim of this study to see, whether small intestinal resection or colonectomy changes GLP-1[7-36 amide] release after oral glucose. In eight healthy controls, in seven patients with inactive Crohn's disease (no surgery), in nine patients each after primarily jejunal or ileal small intestinal resections, and in six colonectomized patients not different in age (p = 0.10), body-mass-index (p = 0.24), waist-hip-ratio (p = 0.43), and HbA1c (p = 0.22), oral glucose tolerance tests (75 g) were performed in the fasting state. GLP-1[7-36 amide], insulin C-peptide, GIP and glucagon (specific (RIAs) were measured over 240 min.\n\n\nSTATISTICS\nRepeated measures ANOVA, t-test (significance: p < 0.05). A clear and early (peak: 15-30 min) GLP-1[7-36 amide] response was observed in all subjects, without any significant difference between gut-resected and control groups (p = 0.95). There were no significant differences in oral glucose tolerance (p = 0.21) or in the suppression of pancreatic glucagon (p = 0.36). Colonectomized patients had a higher insulin (p = 0.011) and C-peptide (p = 0.0023) response in comparison to all other groups. GIP responses also were higher in the colonectomized patients (p = 0.0005). Inactive Crohn's disease and resections of the small intestine as well as proctocolectomy did not change overall GLP-1[7-36 amide] responses and especially not the early increment after oral glucose. This may indicate release of GLP-1[7-36 amide] after oral glucose from the small number of GLP-1[7-36 amide] producing L-cells in the upper gut rather than from the main source in the ileum, colon and rectum. Colonectomized patients are characterized by insulin hypersecretion, which in combination with their normal oral glucose tolerance possibly indicates a reduced insulin sensitivity in this patient group. GIP may play a role in mediating insulin hypersecretion in these patients.",
"title": ""
},
{
"docid": "88229017a9d4df8dfc44e996a116cbad",
"text": "BACKGROUND\nThe Society of Thoracic Surgeons (STS)/American College of Cardiology Transcatheter Valve Therapy (TVT) Registry captures all procedures with Food and Drug Administration-approved transcatheter valve devices performed in the United States, and is mandated as a condition of reimbursement by the Centers for Medicaid & Medicare Services.\n\n\nOBJECTIVES\nThis annual report focuses on patient characteristics, trends, and outcomes of transcatheter aortic and mitral valve catheter-based valve procedures in the United States.\n\n\nMETHODS\nWe reviewed data for all patients receiving commercially approved devices from 2012 through December 31, 2015, that are entered in the TVT Registry.\n\n\nRESULTS\nThe 54,782 patients with transcatheter aortic valve replacement demonstrated decreases in expected risk of 30-day operative mortality (STS Predicted Risk of Mortality [PROM]) of 7% to 6% and transcatheter aortic valve replacement PROM (TVT PROM) of 4% to 3% (both p < 0.0001) from 2012 to 2015. Observed in-hospital mortality decreased from 5.7% to 2.9%, and 1-year mortality decreased from 25.8% to 21.6%. However, 30-day post-procedure pacemaker insertion increased from 8.8% in 2013 to 12.0% in 2015. The 2,556 patients who underwent transcatheter mitral leaflet clip in 2015 were similar to patients from 2013 to 2014, with hospital mortality of 2% and with mitral regurgitation reduced to grade ≤2 in 87% of patients (p < 0.0001). The 349 patients who underwent mitral valve-in-valve and mitral valve-in-ring procedures were high risk, with an STS PROM for mitral valve replacement of 11%. The observed hospital mortality was 7.2%, and 30-day post-procedure mortality was 8.5%.\n\n\nCONCLUSIONS\nThe TVT Registry is an innovative registry that that monitors quality, patient safety and trends for these rapidly evolving new technologies.",
"title": ""
},
{
"docid": "576819d44c53e29e495fe594ce624f17",
"text": "This paper proposes a new off line error compensation model by taking into accounting of geometric and cutting force induced errors in a 3-axis CNC milling machine. Geometric error of a 3-axis milling machine composes of 21 components, which can be measured by laser interferometer within the working volume. Geometric error estimation determined by back-propagation neural network is proposed and used separately in the geometric error compensation model. Likewise, cutting force induced error estimation by back-propagation neural network determined based on a flat end mill behavior observation is proposed and used separately in the cutting force induced error compensation model. Various experiments over a wide range of cutting conditions are carried out to investigate cutting force and machine error relation. Finally, the combination of geometric and cutting force induced errors is modeled by the combined back-propagation neural network. This unique model is used to compensate both geometric and cutting force induced errors simultaneously by a single model. Experimental tests have been carried out in order to validate the performance of geometric and cutting force induced errors compensation model. # 2004 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "75907a92ed7b75ce7f62b6e7e8727f73",
"text": "Employee portals are utilized by many companies to improve companies’ information exchange, communication, and employee collaboration, as well as to better support their business processes. Owing to limited IT budgets and the need to justify investments in employee portals, assessing the benefits of these is an important field in research and practice. Thus, the purpose of this study is to gain a better understanding of employee portal success. We introduce a theoretical model for this that is based on the DeLone and McLean IS Success Model. Furthermore, we develop hypotheses regarding the associations between different models’ success dimensions and test them using more than 10,000 employees’ responses collected in a survey of 22 companies. Our results indicate that besides the factors contributing to IS success in general, other success dimensions – like the quality of the collaboration and process support – have to be considered when aiming for a successful employee portal. The study’s findings make it possible for practitioners to understand the levers with which to improve their employee portals. By empirically validating a comprehensive success model for employee portals, the study’s results advance theoretical development in the area of collaboration-centered systems and present a basis for further research in this field. 2010 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "dd32079de1ca0b5cac5b2dc5fc146d17",
"text": "In this paper, we propose a new authentication method to prevent authentication vulnerability of Claim Token method of Membership Service provide in Private BlockChain. We chose Hyperledger Fabric v1.0 using JWT authentication method of membership service. TOTP, which generate OTP tokens and user authentication codes that generate additional time-based password on existing authentication servers, has been applied to enforce security and two-factor authentication method to provide more secure services.",
"title": ""
},
{
"docid": "f4562d3b45761d01e64f1f72bee5eec7",
"text": "We introduce two Python frameworks to train neural networks on large datasets: Blocks and Fuel. Blocks is based on Theano, a linear algebra compiler with CUDA-support (Bastien et al., 2012; Bergstra et al., 2010). It facilitates the training of complex neural network models by providing parametrized Theano operations, attaching metadata to Theano’s symbolic computational graph, and providing an extensive set of utilities to assist training the networks, e.g. training algorithms, logging, monitoring, visualization, and serialization. Fuel provides a standard format for machine learning datasets. It allows the user to easily iterate over large datasets, performing many types of pre-processing on the fly.",
"title": ""
},
{
"docid": "ce8d70f73b3bf312dc0a88aa646eea55",
"text": "1.1 Introduction Intelligent agents are a new paradigm for developing software applications. More than this, agent-based computing has been hailed as 'the next significant breakthrough in software development' (Sargent, 1992), and 'the new revolution in software' (Ovum, 1994). Currently, agents are the focus of intense interest on the part of many sub-fields of computer science and artificial intelligence. Agents are being used in an increasingly wide variety of applications, ranging from comparatively small systems such as email filters to large, open, complex, mission critical systems such as air traffic control. At first sight, it may appear that such extremely different types of system can have little in common. And yet this is not the case: in both, the key abstraction used is that of an agent. Our aim in this article is to help the reader to understand why agent technology is seen as a fundamentally important new tool for building such a wide array of systems. More precisely, our aims are five-fold: • to introduce the reader to the concept of an agent and agent-based systems, • to help the reader to recognize the domain characteristics that indicate the appropriateness of an agent-based solution, • to introduce the main application areas in which agent technology has been successfully deployed to date, • to identify the main obstacles that lie in the way of the agent system developer, and finally • to provide a guide to the remainder of this book. We begin, in this section, by introducing some basic concepts (such as, perhaps most importantly, the notion of an agent). In Section 1.2, we give some general guidelines on the types of domain for which agent technology is appropriate. In Section 1.3, we survey the key application domains for intelligent agents. In Section 1.4, we discuss some issues in agent system development, and finally, in Section 1.5, we outline the structure of this book. Before we can discuss the development of agent-based systems in detail, we have to describe what we mean by such terms as 'agent' and 'agent-based system'. Unfortunately, we immediately run into difficulties, as some key concepts in agent-based computing lack universally accepted definitions. In particular, there is no real agreement even on the core question of exactly what an agent is (see Franklin and Graesser (1996) for a discussion). However, we believe that most researchers",
"title": ""
},
{
"docid": "f0de7977c22d5fa16cae768337794b30",
"text": "Deep learning research over the past years has shown that by increasing the scope or difficulty of the learning problem over time, increasingly complex learning problems can be addressed. We study incremental learning in the context of sequence learning, using generative RNNs in the form of multi-layer recurrent Mixture Density Networks. While the potential of incremental or curriculum learning to enhance learning is known, indiscriminate application of the principle does not necessarily lead to improvement, and it is essential therefore to know which forms of incremental or curriculum learning have a positive effect. This research contributes to that aim by comparing three instantiations of incremental or curriculum learning. We introduce Incremental Sequence Learning, a simple incremental approach to sequence learning. Incremental Sequence Learning starts out by using only the first few steps of each sequence as training data. Each time a performance criterion has been reached, the length of the parts of the sequences used for training is increased. To evaluate Incremental Sequence Learning and comparison methods, we introduce and make available a novel sequence learning task and data set: predicting and classifying MNIST pen stroke sequences, where the familiar handwritten digit images have been transformed to pen stroke sequences representing the skeletons of the digits. We find that Incremental Sequence Learning greatly speeds up sequence learning and reaches the best test performance level of regular sequence learning 20 times faster, reduces the test error by 74%, and in general performs more robustly; it displays lower variance and achieves sustained progress after all three comparison methods have stopped improving. The two other instantiations of curriculum learning do not result in any noticeable improvement. A trained sequence prediction model is also used in transfer learning to the task of sequence classification, where it is found that transfer learning realizes improved classification performance compared to methods that learn to classify from scratch.",
"title": ""
},
{
"docid": "02781a25d8fb7ed69480f944d63b56ae",
"text": "Technology-supported learning systems have proved to be helpful in many learning situations. These systems require an appropriate representation of the knowledge to be learned, the Domain Module. The authoring of the Domain Module is cost and labor intensive, but its development cost might be lightened by profiting from semiautomatic Domain Module authoring techniques and promoting knowledge reuse. DOM-Sortze is a system that uses natural language processing techniques, heuristic reasoning, and ontologies for the semiautomatic construction of the Domain Module from electronic textbooks. To determine how it might help in the Domain Module authoring process, it has been tested with an electronic textbook, and the gathered knowledge has been compared with the Domain Module that instructional designers developed manually. This paper presents DOM-Sortze and describes the experiment carried out.",
"title": ""
},
{
"docid": "ca8c13c0a7d637234460f20caaa15df5",
"text": "This paper presents a nonlinear control law for an automobile to autonomously track a trajectory, provided in real-time, on rapidly varying, off-road terrain. Existing methods can suffer from a lack of global stability, a lack of tracking accuracy, or a dependence on smooth road surfaces, any one of which could lead to the loss of the vehicle in autonomous off-road driving. This work treats automobile trajectory tracking in a new manner, by considering the orientation of the front wheels - not the vehicle's body - with respect to the desired trajectory, enabling collocated control of the system. A steering control law is designed using the kinematic equations of motion, for which global asymptotic stability is proven. This control law is then augmented to handle the dynamics of pneumatic tires and of the servo-actuated steering wheel. To control vehicle speed, the brake and throttle are actuated by a switching proportional integral (PI) controller. The complete control system consumes a negligible fraction of a computer's resources. It was implemented on a Volkswagen Touareg, \"Stanley\", the Stanford Racing Team's entry in the DARPA Grand Challenge 2005, a 132 mi autonomous off-road race. Experimental results from Stanley demonstrate the ability of the controller to track trajectories between obstacles, over steep and wavy terrain, through deep mud puddles, and along cliff edges, with a typical root mean square (RMS) crosstrack error of under 0.1 m. In the DARPA National Qualification Event 2005, Stanley was the only vehicle out of 40 competitors to not hit an obstacle or miss a gate, and in the DARPA Grand Challenge 2005 Stanley had the fastest course completion time.",
"title": ""
}
] | scidocsrr |
bc04f53bf1928db5a36744a94216ce73 | Smart e-Health Gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems | [
{
"docid": "be99f6ba66d573547a09d3429536049e",
"text": "With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart Meter, public security, intelligent building and so on. Because of its huge market prospects, Internet of Things has been paid close attention by several governments all over the world, which is regarded as the third wave of information technology after Internet and mobile communication network. Bridging between wireless sensor networks with traditional communication networks or Internet, IOT Gateway plays an important role in IOT applications, which facilitates the seamless integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. In this paper, we proposed an IOT Gateway system based on Zigbee and GPRS protocols according to the typical IOT application scenarios and requirements from telecom operators, presented the data transmission between wireless sensor networks and mobile communication networks, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and finally gave an implementation of prototyping system and system validation.",
"title": ""
}
] | [
{
"docid": "ec6f53bd2cbc482c1450934b1fd9e463",
"text": "Cloud computing providers have setup several data centers at different geographical locations over the Internet in order to optimally serve needs of their customers around the world. However, existing systems do not support mechanisms and policies for dynamically coordinating load distribution among different Cloud-based data centers in order to determine optimal location for hosting application services to achieve reasonable QoS levels. Further, the Cloud computing providers are unable to predict geographic distribution of users consuming their services, hence the load coordination must happen automatically, and distribution of services must change in response to changes in the load. To counter this problem, we advocate creation of federated Cloud computing environment (InterCloud) that facilitates just-in-time, opportunistic, and scalable provisioning of application services, consistently achieving QoS targets under variable workload, resource and network conditions. The overall goal is to create a computing environment that supports dynamic expansion or contraction of capabilities (VMs, services, storage, and database) for handling sudden variations in service demands. This paper presents vision, challenges, and architectural elements of InterCloud for utility-oriented federation of Cloud computing environments. The proposed InterCloud environment supports scaling of applications across multiple vendor clouds. We have validated our approach by conducting a set of rigorous performance evaluation study using the CloudSim toolkit. The results demonstrate that federated Cloud computing model has immense potential as it offers significant performance gains as regards to response time and cost saving under dynamic workload scenarios.",
"title": ""
},
{
"docid": "fb7f079d104e81db41b01afe67cdf3b0",
"text": "In this paper, we address natural human-robot interaction (HRI) in a smart assisted living (SAIL) system for the elderly and the disabled. Two common HRI problems are studied: hand gesture recognition and daily activity recognition. For hand gesture recognition, we implemented a neural network for gesture spotting and a hierarchical hidden Markov model for context-based recognition. For daily activity recognition, a multisensor fusion scheme is developed to process motion data collected from the foot and the waist of a human subject. Experiments using a prototype wearable sensor system show the effectiveness and accuracy of our algorithms.",
"title": ""
},
{
"docid": "c142745b4f4fe202fb4c59a494060f70",
"text": "We created a comprehensive set of health-system performance measurements for China nationally and regionally, with health-system coverage and catastrophic medical spending as major indicators. With respect to performance of health-care delivery, China has done well in provision of maternal and child health services, but poorly in addressing non-communicable diseases. For example, coverage of hospital delivery increased from 20% in 1993 to 62% in 2003 for women living in rural areas. However, effective coverage of hypertension treatment was only 12% for patients living in urban areas and 7% for those in rural areas in 2004. With respect to performance of health-care financing, 14% of urban and 16% of rural households incurred catastrophic medical expenditure in 2003. Furthermore, 15% of urban and 22% of rural residents had affordability difficulties when accessing health care. Although health-system coverage improved for both urban and rural areas from 1993 to 2003, affordability difficulties had worsened in rural areas. Additionally, substantial inter-regional and intra-regional inequalities in health-system coverage and health-care affordability measures exist. People with low income not only receive lower health-system coverage than those with high income, but also have an increased probability of either not seeking health care when ill or undergoing catastrophic medical spending. China's current health-system reform efforts need to be assessed for their effect on performance indicators, for which substantial data gaps exist.",
"title": ""
},
{
"docid": "9a7786a5f05876bc9265246531077c81",
"text": "PURPOSE\nThe aim of this in vivo study was to evaluate the clinical performance of porcelain veneers after 5 and 10 years of clinical service.\n\n\nMATERIALS AND METHODS\nA single operator placed porcelain laminates on 87 maxillary anterior teeth in 25 patients. All restorations were recalled at 5 years and 93% of the restorations at 10 years. Clinical performance was assessed in terms of esthetics, marginal integrity, retention, clinical microleakage, caries recurrence, fracture, vitality, and patient satisfaction. Failures were recorded either as \"clinically unacceptable but repairable\" or as \"clinically unacceptable with replacement needed\".\n\n\nRESULTS\nPorcelain veneers maintained their esthetic appearance after 10 years of clinical service. None of the veneers were lost. The percentage of restorations that remained \"clinically acceptable\" (without need for intervention) significantly decreased from an average of 92% (95 CI: 90% to 94%) at 5 years to 64% (95 CI: 51% to 77%) at 10 years. Fractures of porcelain (11%) and large marginal defects (20%) were the main reason for failure. Marginal defects were especially noticed at locations where the veneer ended in an existing composite filling. At such vulnerable locations, severe marginal discoloration (19%) and caries recurrence (10%) were frequently observed. Most of the restorations that present one or more \"clinically unacceptable\" problems (28%) were repairable. Only 4% of the restorations needed to be replaced at the 10-year recall.\n\n\nCONCLUSION\nIt was concluded that labial porcelain veneers represent a reliable, effective procedure for conservative treatment of unesthetic anterior teeth. Occlusion, preparation design, presence of composite fillings, and the adhesive used to bond veneers to tooth substrate are covariables that contribute to the clinical outcome of these restorations in the long-term.",
"title": ""
},
{
"docid": "ee4ebafe1b40e3d2020b2fb9a4b881f6",
"text": "Probing the lowest energy configuration of a complex system by quantum annealing was recently found to be more effective than its classical, thermal counterpart. By comparing classical and quantum Monte Carlo annealing protocols on the two-dimensional random Ising model (a prototype spin glass), we confirm the superiority of quantum annealing relative to classical annealing. We also propose a theory of quantum annealing based on a cascade of Landau-Zener tunneling events. For both classical and quantum annealing, the residual energy after annealing is inversely proportional to a power of the logarithm of the annealing time, but the quantum case has a larger power that makes it faster.",
"title": ""
},
{
"docid": "eb52b00d6aec954e3c64f7043427709c",
"text": "The paper presents a ball on plate balancing system useful for various educational purposes. A touch-screen placed on the plate is used for ball's position sensing and two servomotors are employed for balancing the plate in order to control ball's Cartesian coordinates. The design of control embedded systems is demonstrated for different control algorithms in compliance with FreeRTOS real time operating system and dsPIC33 microcontroller. On-line visualizations useful for system monitoring are provided by a PC host application connected with the embedded application. The measurements acquired during real-time execution and the parameters of the system are stored in specific data files, as support for any desired additional analysis. Taking into account the properties of this controlled system (instability, fast dynamics) and the capabilities of the embedded architecture (diversity of the involved communication protocols, diversity of employed hardware components, usage of an open source real time operating system), this educational setup allows a good illustration of numerous theoretical and practical aspects related to system engineering and applied informatics.",
"title": ""
},
{
"docid": "da270ae9b62c04d785ea6aad02db2ae9",
"text": "We study the complexity problem in artificial feedforward neural networks designed to approximate real valued functions of several real variables; i.e., we estimate the number of neurons in a network required to ensure a given degree of approximation to every function in a given function class. We indicate how to construct networks with the indicated number of neurons evaluating standard activation functions. Our general theorem shows that the smoother the activation function, the better the rate of approximation.",
"title": ""
},
{
"docid": "de17b1fcae6336947e82adab0881b5ba",
"text": "Presence of duplicate documents in the World Wide Web adversely affects crawling, indexing and relevance, which are the core building blocks of web search. In this paper, we present a set of techniques to mine rules from URLs and utilize these learnt rules for de-duplication using just URL strings without fetching the content explicitly. Our technique is composed of mining the crawl logs and utilizing clusters of similar pages to extract specific rules from URLs belonging to each cluster. Preserving each mined rules for de-duplication is not efficient due to the large number of specific rules. We present a machine learning technique to generalize the set of rules, which reduces the resource footprint to be usable at web-scale. The rule extraction techniques are robust against web-site specific URL conventions. We demonstrate the effectiveness of our techniques through experimental evaluation.",
"title": ""
},
{
"docid": "0ebecd74a2b4e5df55cbb51016c060c9",
"text": "Because of the increasing detail and size of virtual worlds, designers are more and more urged to consider employing procedural methods to alleviate part of their modeling work. However, such methods are often unintuitive to use, difficult to integrate, and provide little user control, making their application far from straightforward.\n In our declarative modeling approach, designers are provided with a more productive and simplified virtual world modeling workflow that matches better with their iterative way of working. Using interactive procedural sketching, they can quickly layout a virtual world, while having proper user control at the level of large terrain features. However, in practice, designers require a finer level of control. Integrating procedural techniques with manual editing in an iterative modeling workflow is an important topic that has remained relatively unaddressed until now.\n This paper identifies challenges of this integration and discusses approaches to combine these methods in such a way that designers can freely mix them, while the virtual world model is kept consistent during all modifications. We conclude that overcoming the challenges mentioned, for example in a declarative modeling context, is instrumental to achieve the much desired adoption of procedural modeling in mainstream virtual world modeling.",
"title": ""
},
{
"docid": "d95cd76008dd65d5d7f00c82bad013d3",
"text": "Though data analysis tools continue to improve, analysts still expend an inordinate amount of time and effort manipulating data and assessing data quality issues. Such \"data wrangling\" regularly involves reformatting data values or layout, correcting erroneous or missing values, and integrating multiple data sources. These transforms are often difficult to specify and difficult to reuse across analysis tasks, teams, and tools. In response, we introduce Wrangler, an interactive system for creating data transformations. Wrangler combines direct manipulation of visualized data with automatic inference of relevant transforms, enabling analysts to iteratively explore the space of applicable operations and preview their effects. Wrangler leverages semantic data types (e.g., geographic locations, dates, classification codes) to aid validation and type conversion. Interactive histories support review, refinement, and annotation of transformation scripts. User study results show that Wrangler significantly reduces specification time and promotes the use of robust, auditable transforms instead of manual editing.",
"title": ""
},
{
"docid": "c86f477a1a2900a1b3d5dc80974c6f7c",
"text": "The understanding of the metal and transition metal dichalcogenide (TMD) interface is critical for future electronic device technologies based on this new class of two-dimensional semiconductors. Here, we investigate the initial growth of nanometer-thick Pd, Au, and Ag films on monolayer MoS2. Distinct growth morphologies are identified by atomic force microscopy: Pd forms a uniform contact, Au clusters into nanostructures, and Ag forms randomly distributed islands on MoS2. The formation of these different interfaces is elucidated by large-scale spin-polarized density functional theory calculations. Using Raman spectroscopy, we find that the interface homogeneity shows characteristic Raman shifts in E2g(1) and A1g modes. Interestingly, we show that insertion of graphene between metal and MoS2 can effectively decouple MoS2 from the perturbations imparted by metal contacts (e.g., strain), while maintaining an effective electronic coupling between metal contact and MoS2, suggesting that graphene can act as a conductive buffer layer in TMD electronics.",
"title": ""
},
{
"docid": "187c696aeb78607327fd817dfa9446ba",
"text": "OBJECTIVE\nThe integration of SNOMED CT into the Unified Medical Language System (UMLS) involved the alignment of two views of synonymy that were different because the two vocabulary systems have different intended purposes and editing principles. The UMLS is organized according to one view of synonymy, but its structure also represents all the individual views of synonymy present in its source vocabularies. Despite progress in knowledge-based automation of development and maintenance of vocabularies, manual curation is still the main method of determining synonymy. The aim of this study was to investigate the quality of human judgment of synonymy.\n\n\nDESIGN\nSixty pairs of potentially controversial SNOMED CT synonyms were reviewed by 11 domain vocabulary experts (six UMLS editors and five noneditors), and scores were assigned according to the degree of synonymy.\n\n\nMEASUREMENTS\nThe synonymy scores of each subject were compared to the gold standard (the overall mean synonymy score of all subjects) to assess accuracy. Agreement between UMLS editors and noneditors was measured by comparing the mean synonymy scores of editors to noneditors.\n\n\nRESULTS\nAverage accuracy was 71% for UMLS editors and 75% for noneditors (difference not statistically significant). Mean scores of editors and noneditors showed significant positive correlation (Spearman's rank correlation coefficient 0.654, two-tailed p < 0.01) with a concurrence rate of 75% and an interrater agreement kappa of 0.43.\n\n\nCONCLUSION\nThe accuracy in the judgment of synonymy was comparable for UMLS editors and nonediting domain experts. There was reasonable agreement between the two groups.",
"title": ""
},
{
"docid": "a7cc577ae2a09a5ff18333b7bfb47001",
"text": "Metacercariae of an unidentified species of Apophallus Lühe, 1909 are associated with overwinter mortality in coho salmon, Oncorhynchus kisutch (Walbaum, 1792), in the West Fork Smith River, Oregon. We infected chicks with these metacercariae in order to identify the species. The average size of adult worms was 197 × 57 μm, which was 2 to 11 times smaller than other described Apophallus species. Eggs were also smaller, but larger in proportion to body size, than in other species of Apophallus. Based on these morphological differences, we describe Apophallus microsoma n. sp. In addition, sequences from the cytochrome c oxidase 1 gene from Apophallus sp. cercariae collected in the study area, which are likely conspecific with experimentally cultivated A. microsoma, differ by >12% from those we obtained from Apophallus donicus ( Skrjabin and Lindtrop, 1919 ) and from Apophallus brevis Ransom, 1920 . The taxonomy and pathology of Apophallus species is reviewed.",
"title": ""
},
{
"docid": "886c284d72a01db9bc4eb9467e14bbbb",
"text": "The Bitcoin cryptocurrency introduced a novel distributed consensus mechanism relying on economic incentives. While a coalition controlling a majority of computational power may undermine the system, for example by double-spending funds, it is often assumed it would be incentivized not to attack to protect its long-term stake in the health of the currency. We show how an attacker might purchase mining power (perhaps at a cost premium) for a short duration via bribery. Indeed, bribery can even be performed in-band with the system itself enforcing the bribe. A bribing attacker would not have the same concerns about the long-term health of the system, as their majority control is inherently short-lived. New modeling assumptions are needed to explain why such attacks have not been observed in practice. The need for all miners to avoid short-term profits by accepting bribes further suggests a potential tragedy of the commons which has not yet been analyzed.",
"title": ""
},
{
"docid": "d13145bc68472ed9a06bafd86357c5dd",
"text": "Modeling cloth with fiber-level geometry can produce highly realistic details. However, rendering fiber-level cloth models not only has a high memory cost but it also has a high computation cost even for offline rendering applications. In this paper we present a real-time fiber-level cloth rendering method for current GPUs. Our method procedurally generates fiber-level geometric details on-the-fly using yarn-level control points for minimizing the data transfer to the GPU. We also reduce the rasterization operations by collectively representing the fibers near the center of each ply that form the yarn structure. Moreover, we employ a level-of-detail strategy to minimize or completely eliminate the generation of fiber-level geometry that would have little or no impact on the final rendered image. Furthermore, we introduce a simple yarn-level ambient occlusion approximation and self-shadow computation method that allows lighting with self-shadows using relatively low-resolution shadow maps. We demonstrate the effectiveness of our approach by comparing our simplified fiber geometry to procedurally generated references and display knitwear containing more than a hundred million individual fiber curves at real-time frame rates with shadows and ambient occlusion.",
"title": ""
},
{
"docid": "2e0585860c1fa533412ff1fea76632cb",
"text": "Author Co-citation Analysis (ACA) has long been used as an effective method for identifying the intellectual structure of a research domain, but it relies on simple co-citation counting, which does not take the citation content into consideration. The present study proposes a new method for measuring the similarity between co-cited authors by considering author's citation content. We collected the full-text journal articles in the information science domain and extracted the citing sentences to calculate their similarity distances. We compared our method with traditional ACA and found out that our approach, while displaying a similar intellectual structure for the information science domain as the other baseline methods, also provides more details about the sub-disciplines in the domain than with traditional ACA.",
"title": ""
},
{
"docid": "3669d58dc1bed1d83e5d0d6747771f0e",
"text": "To cite: He A, Kwatra SG, Kim N, et al. BMJ Case Rep Published online: [please include Day Month Year] doi:10.1136/bcr-2016214761 DESCRIPTION A 26-year-old woman with a reported history of tinea versicolour presented for persistent hypopigmentation on her bilateral forearms. Detailed examination revealed multiple small (5–10 mm), irregularly shaped white macules on the extensor surfaces of the bilateral forearms overlying slightly erythaematous skin. The surrounding erythaematous skin blanched with pressure and with elevation of the upper extremities the white macules were no longer visible (figures 1 and 2). A clinical diagnosis of Bier spots was made based on the patient’s characteristic clinical features. Bier spots are completely asymptomatic and are often found on the extensor surfaces of the upper and lower extremities, although they are sometimes generalised. They are a benign physiological vascular anomaly, arising either from cutaneous vessels responding to venous hypertension or from small vessel vasoconstriction leading to tissue hypoxia. 3 Our patient had neither personal nor family history of vascular disease. Bier spots are easily diagnosed by a classic sign on physical examination: the pale macules disappear with pressure applied on the surrounding skin or by elevating the affected limbs (figure 2). However, Bier spots can be easily confused with a variety of other disorders associated with hypopigmented macules. The differential diagnosis includes vitiligo, postinflammatory hypopigmentation and tinea versicolour, which was a prior diagnosis in this case. Bier spots are often idiopathic and regress spontaneously, although there are reports of Bier spots heralding systemic diseases, such as scleroderma renal crisis, mixed cryoglobulinaemia or lymphoma. Since most Bier spots are idiopathic and transient, no treatment is required.",
"title": ""
},
{
"docid": "4d832a8716aebf7c36ae6894ce1bac33",
"text": "Autonomous vehicles require a reliable perception of their environment to operate in real-world conditions. Awareness of moving objects is one of the key components for the perception of the environment. This paper proposes a method for detection and tracking of moving objects (DATMO) in dynamic environments surrounding a moving road vehicle equipped with a Velodyne laser scanner and GPS/IMU localization system. First, at every time step, a local 2.5D grid is built using the last sets of sensor measurements. Along time, the generated grids combined with localization data are integrated into an environment model called local 2.5D map. In every frame, a 2.5D grid is compared with an updated 2.5D map to compute a 2.5D motion grid. A mechanism based on spatial properties is presented to suppress false detections that are due to small localization errors. Next, the 2.5D motion grid is post-processed to provide an object level representation of the scene. The detected moving objects are tracked over time by applying data association and Kalman filtering. The experiments conducted on different sequences from KITTI dataset showed promising results, demonstrating the applicability of the proposed method.",
"title": ""
},
{
"docid": "ac34478a54d67abce7c892e058295e63",
"text": "The popularity of the term \"integrated curriculum\" has grown immensely in medical education over the last two decades, but what does this term mean and how do we go about its design, implementation, and evaluation? Definitions and application of the term vary greatly in the literature, spanning from the integration of content within a single lecture to the integration of a medical school's comprehensive curriculum. Taking into account the integrated curriculum's historic and evolving base of knowledge and theory, its support from many national medical education organizations, and the ever-increasing body of published examples, we deem it necessary to present a guide to review and promote further development of the integrated curriculum movement in medical education with an international perspective. We introduce the history and theory behind integration and provide theoretical models alongside published examples of common variations of an integrated curriculum. In addition, we identify three areas of particular need when developing an ideal integrated curriculum, leading us to propose the use of a new, clarified definition of \"integrated curriculum\", and offer a review of strategies to evaluate the impact of an integrated curriculum on the learner. This Guide is presented to assist educators in the design, implementation, and evaluation of a thoroughly integrated medical school curriculum.",
"title": ""
}
] | scidocsrr |
673ff1460830ec05f4c68c46a6b0b84e | Impact Of Employee Participation On Job Satisfaction , Employee Commitment And Employee Productivity | [
{
"docid": "3fd9fd52be3153fe84f2ea6319665711",
"text": "The theories of supermodular optimization and games provide a framework for the analysis of systems marked by complementarity. We summarize the principal results of these theories and indicate their usefulness by applying them to study the shift to 'modern manufacturing'. We also use them to analyze the characteristic features of the Lincoln Electric Company's strategy and structure.",
"title": ""
}
] | [
{
"docid": "c252cca4122984aac411a01ce28777f7",
"text": "An image-based visual servo control is presented for an unmanned aerial vehicle (UAV) capable of stationary or quasi-stationary flight with the camera mounted onboard the vehicle. The target considered consists of a finite set of stationary and disjoint points lying in a plane. Control of the position and orientation dynamics is decoupled using a visual error based on spherical centroid data, along with estimations of the linear velocity and the gravitational inertial direction extracted from image features and an embedded inertial measurement unit. The visual error used compensates for poor conditioning of the image Jacobian matrix by introducing a nonhomogeneous gain term adapted to the visual sensitivity of the error measurements. A nonlinear controller, that ensures exponential convergence of the system considered, is derived for the full dynamics of the system using control Lyapunov function design techniques. Experimental results on a quadrotor UAV, developed by the French Atomic Energy Commission, demonstrate the robustness and performance of the proposed control strategy.",
"title": ""
},
{
"docid": "7ad244791a1ef91495aa3e0f4cf43f0c",
"text": "T he education and research communities are abuzz with new (or at least re-discovered) ideas about the nature of cognition and learning. Terms like situated cognition,\" \"distributed cognition,\" and \"communities of practice\" fill the air. Recent dialogue in Educational Researcher (Anderson, Reder, & Simon, 1996, 1997; Greeno, 1997) typifies this discussion. Some have argued that the shifts in world view that these discussions represent are even more fundamental than the now-historical shift from behaviorist to cognitive views of learning (Shuell, 1986). These new iaeas about the nature of knowledge, thinking, and learning--which are becoming known as the \"situative perspective\" (Greeno, 1997; Greeno, Collins, & Resnick, 1996)--are interacting with, and sometimes fueling, current reform movements in education. Most discussions of these ideas and their implications for educational practice have been cast primarily in terms of students. Scholars and policymakers have considered, for example, how to help students develop deep understandings of subject matter, situate students' learning in meaningful contexts, and create learning communities in which teachers and students engage in rich discourse about important ideas (e.g., National Council of Teachers of Mathematics, 1989; National Education Goals Panel, 1991; National Research Council, 1993). Less attention has been paid to teachers--either to their roles in creating learning experiences consistent with the reform agenda or to how they themselves learn new ways of teaching. In this article we focus on the latter. Our purpose in considering teachers' learning is twofold. First, we use these ideas about the nature of learning and knowing as lenses for understanding recent research on teacher learning. Second, we explore new issues about teacher learning and teacher education that this perspective brings to light. We begin with a brief overview of three conceptual themes that are central to the situative perspect ive-that cognition is (a) situated in particular physical and social contexts; (b) social in nature; and (c) distributed across the individual, other persons, and tools.",
"title": ""
},
{
"docid": "2136c0e78cac259106d5424a2985e5d7",
"text": "Stylistic composition is a creative musical activity, in which students as well as renowned composers write according to the style of another composer or period. We describe and evaluate two computational models of stylistic composition, called Racchman-Oct2010 and Racchmaninof-Oct2010. The former is a constrained Markov model and the latter embeds this model in an analogy-based design system. Racchmaninof-Oct2010 applies a pattern discovery algorithm called SIACT and a perceptually validated formula for rating pattern importance, to guide the generation of a new target design from an existing source design. A listening study is reported concerning human judgments of music excerpts that are, to varying degrees, in the style of mazurkas by Frédédric Chopin (1810-1849). The listening study acts as an evaluation of the two computational models and a third, benchmark system called Experiments in Musical Intelligence (EMI). Judges’ responses indicate that some aspects of musical style, such as phrasing and rhythm, are being modeled effectively by our algorithms. Judgments are also used to identify areas for future improvements. We discuss the broader implications of this work for the fields of engineering and design, where there is potential to make use of our models of hierarchical repetitive structure. Data and code to accompany this paper are available from www.tomcollinsresearch.net",
"title": ""
},
{
"docid": "4b8470edc0d643e9baeceae7d15a3c8b",
"text": "The authors have investigated potential applications of artificial neural networks for electrocardiographic QRS detection and beat classification. For the task of QRS detection, the authors used an adaptive multilayer perceptron structure to model the nonlinear background noise so as to enhance the QRS complex. This provided more reliable detection of QRS complexes even in a noisy environment. For electrocardiographic QRS complex pattern classification, an artificial neural network adaptive multilayer perceptron was used as a pattern classifier to distinguish between normal and abnormal beat patterns, as well as to classify 12 different abnormal beat morphologies. Preliminary results using the MIT/BIH (Massachusetts Institute of Technology/Beth Israel Hospital, Cambridge, MA) arrhythmia database are encouraging.",
"title": ""
},
{
"docid": "d2146f1821812ca65cfd56f557252200",
"text": "This paper presents an automatic annotation tool AATOS for providing documents with semantic annotations. The tool links entities found from the texts to ontologies defined by the user. The application is highly configurable and can be used with different natural language Finnish texts. The application was developed as a part of the WarSampo and Semantic Finlex projects and tested using Kansa Taisteli magazine articles and consolidated Finnish legislation of Semantic Finlex. The quality of the automatic annotation was evaluated by measuring precision and recall against existing manual annotations. The results showed that the quality of the input text, as well as the selection and configuration of the ontologies impacted the results.",
"title": ""
},
{
"docid": "e6c0aa517c857ed217fc96aad58d7158",
"text": "Conjoined twins, popularly known as Siamese twins, result from aberrant embryogenesis [1]. It is a rare presentation with an incidence of 1 in 50,000 births. Since 60% of these cases are still births, so the true incidence is estimated to be approximately 1 in 200,000 births [2-4]. This disorder is more common in females with female to male ratio of 3:1 [5]. Conjoined twins are classified based on their site of attachment with a suffix ‘pagus’ which is a Greek term meaning “fixed”. The main types of conjoined twins are omphalopagus (abdomen), thoracopagus (thorax), cephalopagus (ventrally head to umbilicus), ischipagus (pelvis), parapagus (laterally body side), craniopagus (head), pygopagus (sacrum) and rachipagus (vertebral column) [6]. Cephalophagus is an extremely rare variant of conjoined twins with an incidence of 11% among all cases. These types of twins are fused at head, thorax and upper abdominal cavity. They are pre-dominantly of two types: Janiceps (two faces are on the either side of the head) or non Janiceps type (normal single head and face). We hereby report a case of non janiceps cephalopagus conjoined twin, which was diagnosed after delivery.",
"title": ""
},
{
"docid": "42b6aca92046022cf77b724e2704348b",
"text": "We explore a model-based approach to reinforcement learning where partially or totally unknown dynamics are learned and explicit planning is performed. We learn dynamics with neural networks, and plan behaviors with differential dynamic programming (DDP). In order to handle complicated dynamics, such as manipulating liquids (pouring), we consider temporally decomposed dynamics. We start from our recent work [1] where we used locally weighted regression (LWR) to model dynamics. The major contribution of this paper is making use of deep learning in the form of neural networks with stochastic DDP, and showing the advantages of neural networks over LWR. For this purpose, we extend neural networks for: (1) modeling prediction error and output noise, (2) computing an output probability distribution for a given input distribution, and (3) computing gradients of output expectation with respect to an input. Since neural networks have nonlinear activation functions, these extensions were not easy. We provide an analytic solution for these extensions using some simplifying assumptions. We verified this method in pouring simulation experiments. The learning performance with neural networks was better than that of LWR. The amount of spilled materials was reduced. We also present early results of robot experiments using a PR2. Accompanying video: https://youtu.be/aM3hE1J5W98.",
"title": ""
},
{
"docid": "a470aa1ba955cdb395b122daf2a17b6a",
"text": "Many real-world sequential decision making problems are partially observable by nature, and the environment model is typically unknown. Consequently, there is great need for reinforcement learning methods that can tackle such problems given only a stream of rewards and incomplete and noisy observations. In this paper, we propose deep variational reinforcement learning (DVRL), which introduces an inductive bias that allows an agent to learn a generative model of the environment and perform inference in that model to effectively aggregate the available information. We develop an n-step approximation to the evidence lower bound (ELBO), allowing the model to be trained jointly with the policy. This ensures that the latent state representation is suitable for the control task. In experiments on Mountain Hike and flickering Atari we show that our method outperforms previous approaches relying on recurrent neural networks to encode the past.",
"title": ""
},
{
"docid": "cfec098f84e157a2e12f0ff40551c977",
"text": "In this paper, an online news recommender system for the popular social network, Facebook, is described. This system provides daily newsletters for communities on Facebook. The system fetches the news articles and filters them based on the community description to prepare the daily news digest. Explicit survey feedback from the users show that most users found the application useful and easy to use. They also indicated that they could get some community specific articles that they would not have got otherwise.",
"title": ""
},
{
"docid": "1d0d5ad5371a3f7b8e90fad6d5299fa7",
"text": "Vascularization of embryonic organs or tumors starts from a primitive lattice of capillaries. Upon perfusion, this lattice is remodeled into branched arteries and veins. Adaptation to mechanical forces is implied to play a major role in arterial patterning. However, numerical simulations of vessel adaptation to haemodynamics has so far failed to predict any realistic vascular pattern. We present in this article a theoretical modeling of vascular development in the yolk sac based on three features of vascular morphogenesis: the disconnection of side branches from main branches, the reconnection of dangling sprouts (\"dead ends\"), and the plastic extension of interstitial tissue, which we have observed in vascular morphogenesis. We show that the effect of Poiseuille flow in the vessels can be modeled by aggregation of random walkers. Solid tissue expansion can be modeled by a Poiseuille (parabolic) deformation, hence by deformation under hits of random walkers. Incorporation of these features, which are of a mechanical nature, leads to realistic modeling of vessels, with important biological consequences. The model also predicts the outcome of simple mechanical actions, such as clamping of vessels or deformation of tissue by the presence of obstacles. This study offers an explanation for flow-driven control of vascular branching morphogenesis.",
"title": ""
},
{
"docid": "729cb5a59c1458ce6c9ef3fa29ca1d98",
"text": "The Simulink/Stateflow toolset is an integrated suite enabling model-based design and has become popular in the automotive and aeronautics industries. We have previously developed a translator called Simtolus from Simulink to the synchronous language Lustre and we build upon that work by encompassing Stateflow as well. Stateflow is problematical for synchronous languages because of its unbounded behaviour so we propose analysis techniques to define a subset of Stateflow for which we can define a synchronous semantics. We go further and define a \"safe\" subset of Stateflow which elides features which are potential sources of errors in Stateflow designs. We give an informal presentation of the Stateflow to Lustre translation process and show how our model-checking tool Lesar can be used to verify some of the semantical checks we have proposed. Finally, we present a small case-study.",
"title": ""
},
{
"docid": "18c56e9d096ba4ea48a0579626f83edc",
"text": "PURPOSE\nThe purpose of this study was to provide an overview of platelet-rich plasma (PRP) injected into the scalp for the management of androgenic alopecia.\n\n\nMATERIALS AND METHODS\nA literature review was performed to evaluate the benefits of PRP in androgenic alopecia.\n\n\nRESULTS\nHair restoration has been increasing. PRP's main components of platelet-derived growth factor, transforming growth factor, and vascular endothelial growth factor have the potential to stimulate hard and soft tissue wound healing. In general, PRP showed a benefit on patients with androgenic alopecia, including increased hair density and quality. Currently, different PRP preparations are being used with no standard technique.\n\n\nCONCLUSION\nThis review found beneficial effects of PRP on androgenic alopecia. However, more rigorous study designs, including larger samples, quantitative measurements of effect, and longer follow-up periods, are needed to solidify the utility of PRP for treating patients with androgenic alopecia.",
"title": ""
},
{
"docid": "bff21b4a0bc4e7cc6918bc7f107a5ca5",
"text": "This paper discusses driving system design based on traffic rules. This allows fully automated driving in an environment with human drivers, without necessarily changing equipment on other vehicles or infrastructure. It also facilitates cooperation between the driving system and the host driver during highly automated driving. The concept, referred to as legal safety, is illustrated for highly automated driving on highways with distance keeping, intelligent speed adaptation, and lane-changing functionalities. Requirements by legal safety on perception and control components are discussed. This paper presents the actual design of a legal safety decision component, which predicts object trajectories and calculates optimal subject trajectories. System implementation on automotive electronic control units and results on vehicle and simulator are discussed.",
"title": ""
},
{
"docid": "2252d2fd9955cac5e16304cb90f9dd60",
"text": "A number of solutions have been proposed to address the free-riding problem in peer-to-peer file sharing systems. The solutions are either imperfect-they allow some users to cheat the system with malicious behavior, or expensive-they require human intervention, require servers, or incur high mental transaction costs. The authors proposed a method to address these weaknesses. Specifically, a utility function was introduced to capture contributions made by a user and an auditing scheme to ensure the integrity of a utility function's values. The method enabled to reduce cheating by a malicious peer: it is shown that this approach can efficiently detect malicious peers with a probability over 98%.",
"title": ""
},
{
"docid": "7e8c99297dd2f9f73f8d50d92115090b",
"text": "This paper proposes a new wrist mechanism for robot manipulation. To develop multi-dof wrist mechanisms that can emulate human wrists, compactness and high torque density are the major challenges. Traditional wrist mechanisms consist of series of rotary motors that require gearing to amplify the output torque. This often results in a bulky wrist mechanism. Instead, large linear force can be easily realized in a compact space by using lead screw motors. Inspired by the muscle-tendon actuation pattern, the proposed mechanism consists of two parallel placed linear motors. Their linear motions are transmitted to two perpendicular rotations through a spherical mechanism and two slider crank mechanisms. High torque density can be achieved. Static and dynamic models are developed to design the wrist mechanism. A wrist prototype and its position control experiments will be presented with results discussed. The novel mechanism is expected to serve as an alternative for robot manipulators in applications that require human-friendly interactions.",
"title": ""
},
{
"docid": "eede682da157ac788a300e9c3080c460",
"text": "We study question answering as a machine learning problem, and induce a function that maps open-domain questions to queries over a database of web extractions. Given a large, community-authored, question-paraphrase corpus, we demonstrate that it is possible to learn a semantic lexicon and linear ranking function without manually annotating questions. Our approach automatically generalizes a seed lexicon and includes a scalable, parallelized perceptron parameter estimation scheme. Experiments show that our approach more than quadruples the recall of the seed lexicon, with only an 8% loss in precision.",
"title": ""
},
{
"docid": "116fd1ecd65f7ddfdfad6dca09c12876",
"text": "Malicious hardware Trojan circuitry inserted in safety-critical applications is a major threat to national security. In this work, we propose a novel application of a key-based obfuscation technique to achieve security against hardware Trojans. The obfuscation scheme is based on modifying the state transition function of a given circuit by expanding its reachable state space and enabling it to operate in two distinct modes -- the normal mode and the obfuscated mode. Such a modification obfuscates the rareness of the internal circuit nodes, thus making it difficult for an adversary to insert hard-to-detect Trojans. It also makes some inserted Trojans benign by making them activate only in the obfuscated mode. The combined effect leads to higher Trojan detectability and higher level of protection against such attack. Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security at modest design overhead.",
"title": ""
},
{
"docid": "73b81ca84f4072188e1a263e9a7ea330",
"text": "The digital workplace is widely acknowledged as an important organizational asset for optimizing knowledge worker productivity. While there is no particular research stream on the digital workplace, scholars have conducted intensive research on related topics. This study aims to summarize the practical implications of the current academic body of knowledge on the digital workplace. For this purpose, a screening of academic-practitioner literature was conducted, followed by a systematic review of academic top journal literature. The screening revealed four main research topics on the digital workplace that are present in academic-practitioner literature: 1) Collaboration, 2) Compliance, 3) Mobility, and 4) Stress and overload. Based on the four topics, this study categorizes practical implications on the digital workplace into 15 concepts. Thereby, it provides two main contributions. First, the study delivers condensed information for practitioners about digital workplace design. Second, the results shed light on the relevance of IS research.",
"title": ""
},
{
"docid": "127405febe57f4df6f8f16d42e0ac762",
"text": "In the recent years there has been an increase in scientific papers publications in Albania and its neighboring countries that have large communities of Albanian speaking researchers. Many of these papers are written in Albanian. It is a very time consuming task to find papers related to the researchers’ work, because there is no concrete system that facilitates this process. In this paper we present the design of a modular intelligent search system for articles written in Albanian. The main part of it is the recommender module that facilitates searching by providing relevant articles to the users (in comparison with a given one). We used a cosine similarity based heuristics that differentiates the importance of term frequencies based on their location in the article. We did not notice big differences on the recommendation results when using different combinations of the importance factors of the keywords, title, abstract and body. We got similar results when using only theand body. We got similar results when using only the title and abstract in comparison with the other combinations. Because we got fairly good results in this initial approach, we believe that similar recommender systems for documents written in Albanian can be built also in contexts not related to scientific publishing. Keywords—recommender system; Albanian; information retrieval; intelligent search; digital library",
"title": ""
},
{
"docid": "ac46286c7d635ccdcd41358666026c12",
"text": "This paper represents our first endeavor to explore how to better understand the complex nature, scope, and practices of eSports. Our goal is to explore diverse perspectives on what defines eSports as a starting point for further research. Specifically, we critically reviewed existing definitions/understandings of eSports in different disciplines. We then interviewed 26 eSports players and qualitatively analyzed their own perceptions of eSports. We contribute to further exploring definitions and theories of eSports for CHI researchers who have considered online gaming a serious and important area of research, and highlight opportunities for new avenues of inquiry for researchers who are interested in designing technologies for this unique genre.",
"title": ""
}
] | scidocsrr |
e16a5bc0fe6f52e76e6309a17713a024 | A lattice Boltzmann method for immiscible multiphase flow simulations using the level set method | [
{
"docid": "66532253c6a60d6c406717964c308879",
"text": "We present an overview of the lattice Boltzmann method (LBM), a parallel and efficient algorithm for simulating single-phase and multiphase fluid flows and for incorporating additional physical complexities. The LBM is especially useful for modeling complicated boundary conditions and multiphase interfaces. Recent extensions of this method are described, including simulations of fluid turbulence, suspension flows, and reaction diffusion systems.",
"title": ""
}
] | [
{
"docid": "d71faafdcf1b97951e979f13dbe91cb2",
"text": "We explore six challenges for neural machine translation: domain mismatch, amount of training data, rare words, long sentences, word alignment, and beam search. We show both deficiencies and improvements over the quality of phrasebased statistical machine translation.",
"title": ""
},
{
"docid": "8ba192226a3c3a4f52ca36587396e85c",
"text": "For many years I have been engaged in psychotherapy with individuals in distress. In recent years I have found myself increasingly concerned with the process of abstracting from that experience the general principles which appear to be involved in it. I have endeavored to discover any orderliness, any unity which seems to inhere in the subtle, complex tissue of interpersonal relationship in which I have so constantly been immersed in therapeutic work. One of the current products of this concern is an attempt to state, in formal terms, a theory of psychotherapy, of personality, and of interpersonal relationships which will encompass and contain the phenomena of my experience. What I wish to do in this paper is to take one very small segment of that theory, spell it out more completely, and explore its meaning and usefulness.",
"title": ""
},
{
"docid": "ba2c4133ac1cabe988f36ff5b381f3f9",
"text": "Developers often rely on penetration testing tools to detect vulnerabilities in web services, although frequently without really knowing their effectiveness. In fact, the lack of information on the internal state of the tested services and the complexity and variability of the responses analyzed, limits the effectiveness of such technique, highlighting the importance of evaluating and improving existing tools. The goal of this paper is to investigate if attack signatures and interface monitoring can be an effective mean to assess and improve the performance of penetration testing tools in web services environments. In practice, attacks performed by such tools are signed and the interfaces between the target application and external resources are monitored (e.g., between services and a database server), allowing gathering additional information on existing vulnerabilities. A prototype was implemented focusing on SQL injection vulnerabilities. The experimental evaluation results clearly show that the proposed approach can be used in real scenarios.",
"title": ""
},
{
"docid": "b670c8908aa2c8281b3164d7726b35d0",
"text": "We present a sketching interface for quickly and easily designing freeform models such as stuffed animals and other rotund objects. The user draws several 2D freeform strokes interactively on the screen and the system automatically constructs plausible 3D polygonal surfaces. Our system supports several modeling operations, including the operation to construct a 3D polygonal surface from a 2D silhouette drawn by the user: it inflates the region surrounded by the silhouette making wide areas fat, and narrow areas thin. Teddy, our prototype system, is implemented as a Java#8482; program, and the mesh construction is done in real-time on a standard PC. Our informal user study showed that a first-time user typically masters the operations within 10 minutes, and can construct interesting 3D models within minutes.",
"title": ""
},
{
"docid": "ae585aae554c5fbe4a18f7f2996b7e93",
"text": "UNLABELLED\nCaloric restriction occurs when athletes attempt to reduce body fat or make weight. There is evidence that protein needs increase when athletes restrict calories or have low body fat.\n\n\nPURPOSE\nThe aims of this review were to evaluate the effects of dietary protein on body composition in energy-restricted resistance-trained athletes and to provide protein recommendations for these athletes.\n\n\nMETHODS\nDatabase searches were performed from earliest record to July 2013 using the terms protein, and intake, or diet, and weight, or train, or restrict, or energy, or strength, and athlete. Studies (N = 6) needed to use adult (≥ 18 yrs), energy-restricted, resistance-trained (> 6 months) humans of lower body fat (males ≤ 23% and females ≤ 35%) performing resistance training. Protein intake, fat free mass (FFM) and body fat had to be reported.\n\n\nRESULTS\nBody fat percentage decreased (0.5-6.6%) in all study groups (N = 13) and FFM decreased (0.3-2.7kg) in nine of 13. Six groups gained, did not lose, or lost nonsignificant amounts of FFM. Five out of these six groups were among the highest in body fat, lowest in caloric restriction, or underwent novel resistance training stimuli. However, the one group that was not high in body fat that underwent substantial caloric restriction, without novel training stimuli, consumed the highest protein intake out of all the groups in this review (2.5-2.6g/kg).\n\n\nCONCLUSIONS\nProtein needs for energy-restricted resistance-trained athletes are likely 2.3-3.1g/kg of FFM scaled upwards with severity of caloric restriction and leanness.",
"title": ""
},
{
"docid": "752eea750f91318c3c45d250059cb597",
"text": "To estimate the value functions of policies from exploratory data, most model-free offpolicy algorithms rely on importance sampling, where the use of importance sampling ratios often leads to estimates with severe variance. It is thus desirable to learn off-policy without using the ratios. However, such an algorithm does not exist for multi-step learning with function approximation. In this paper, we introduce the first such algorithm based on temporal-difference (TD) learning updates. We show that an explicit use of importance sampling ratios can be eliminated by varying the amount of bootstrapping in TD updates in an action-dependent manner. Our new algorithm achieves stability using a two-timescale gradient-based TD update. A prior algorithm based on lookup table representation called Tree Backup can also be retrieved using action-dependent bootstrapping, becoming a special case of our algorithm. In two challenging off-policy tasks, we demonstrate that our algorithm is stable, effectively avoids the large variance issue, and can perform substantially better than its state-of-the-art counterpart.",
"title": ""
},
{
"docid": "0a414cd886ebf2a311d27b17c53e535f",
"text": "We consider the problem of classifying documents not by topic, but by overall sentiment. Previous approaches to sentiment classification have favored domain-specific, supervised machine learning (Naive Bayes, maximum entropy classification, and support vector machines). Inherent in these methodologies is the need for annotated training data. Building on previous work, we examine an unsupervised system of iteratively extracting positive and negative sentiment items which can be used to classify documents. Our method is completely unsupervised and only requires linguistic insight into the semantic orientation of sentiment.",
"title": ""
},
{
"docid": "6b0cfbadd815713179b2312293174379",
"text": "In order to take full advantage of the SiC devices' high-temperature and high-frequency capabilities, a transformer isolated gate driver is designed for the SiC JFET phase leg module to achieve a fast switching speed of 26V/ns and a small cross-talking voltage of 4.2V in a 650V and 5A inductive load test. Transformer isolated gate drive circuits suitable for high-temperature applications are compared with respect to different criteria. Based on the comparison, an improved edge triggered gate drive topology is proposed. Then, using the proposed gate drive topology, special issues in the phase-leg gate drive design are discussed. Several strategies are implemented to improve the phase-leg gate drive performance and alleviate the cross-talking issue. Simulation and experimental results are given for verification purposes.",
"title": ""
},
{
"docid": "337a37fab4eb5ed603dac81697be58eb",
"text": "Hazard analysis was conducted to identify critical control points (CCPs) during cocoa processing and milk chocolate manufacture and applied into a hazard analysis and critical control point (HACCP) plan. During the process, the different biological, physical and chemical hazards identified at each processing stage in the hazard analysis worksheet were incorporated into the HACCP plan to assess the risks associated with the processes. Physical hazards such as metals, stones, fibres, plastics and papers; chemical hazards such as pesticide residues, mycotoxins and heavy metals; and microbiological hazards such as Staphyloccous aureus, coliforms, Salmonella, Aspergillus and Penicillium were identified. ISO 22000 analysis was conducted for the determination of some pre-requisite programmes (PrPs) during the chocolate processing and compared with the HACCP system. The ISO 22000 Analysis worksheet reduced the CCPs for both cocoa processing and chocolate manufacture due to the elimination of the pre-requisite programmes (PrPs). Monitoring systems were established for the CCPs identified and these included preventive measures, critical limits, corrective actions, assignment of responsibilities and verification procedures. The incorporation of PrPs in the ISO 22000 made the system simple, more manageable and effective since a smaller number of CCPs were obtained.",
"title": ""
},
{
"docid": "5910bcdd2dcacb42d47194a70679edb1",
"text": "Developing effective suspicious activity detection methods has become an increasingly critical problem for governments and financial institutions in their efforts to fight money laundering. Previous anti-money laundering (AML) systems were mostly rule-based systems which suffered from low efficiency and could can be easily learned and evaded by money launders. Recently researchers have begun to use machine learning methods to solve the suspicious activity detection problem. However nearly all these methods focus on detecting suspicious activities on accounts or individual level. In this paper we propose a sequence matching based algorithm to identify suspicious sequences in transactions. Our method aims to pick out suspicious transaction sequences using two kinds of information as reference sequences: 1) individual account’s transaction history and 2) transaction information from other accounts in a peer group. By introducing the reference sequences, we can combat those who want to evade regulations by simply learning and adapting reporting criteria, and easily detect suspicious patterns. The initial results show that our approach is highly accurate.",
"title": ""
},
{
"docid": "1cecb4765c865c0f44c76f5ed2332c13",
"text": "Speaker indexing or diarization is an important task in audio processing and retrieval. Speaker diarization is the process of labeling a speech signal with labels corresponding to the identity of speakers. This paper includes a comprehensive review on the evolution of the technology and different approaches in speaker indexing and tries to offer a fully detailed discussion on these approaches and their contributions. This paper reviews the most common features for speaker diarization in addition to the most important approaches for speech activity detection (SAD) in diarization frameworks. Two main tasks of speaker indexing are speaker segmentation and speaker clustering. This paper includes a separate review on the approaches proposed for these subtasks. However, speaker diarization systems which combine the two tasks in a unified framework are also introduced in this paper. Another discussion concerns the approaches for online speaker indexing which has fundamental differences with traditional offline approaches. Other parts of this paper include an introduction on the most common performance measures and evaluation datasets. To conclude this paper, a complete framework for speaker indexing is proposed, which is aimed to be domain independent and parameter free and applicable for both online and offline applications. 2012 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "2c5e8e4025572925e72e9f51db2b3d95",
"text": "This article reveals our work on refactoring plug-ins for Eclipse's C++ Development Tooling (CDT).\n With CDT a reliable open source IDE exists for C/C++ developers. Unfortunately it has been lacking of overarching refactoring support. There used to be just one single refactoring - Rename. But our plug-in provides several new refactorings which support a C++ developer in his everyday work.",
"title": ""
},
{
"docid": "601953c3d7b8986520e670c2b3778810",
"text": "With their intuitive graphical approach and expressive analysis techniques, Petri nets are suitable for a wide range of applications and teaching scenarios, and they have gained wide acceptance as a modeling technique in areas such as software design and control engineering. The core theoretical principles have been studied for many decades and there is now a comprehensive research literature that complements the extensive implementation experience.",
"title": ""
},
{
"docid": "f9692d0410cb97fd9c2ecf6f7b043b9f",
"text": "This paper develops and analyzes four energy scenarios for California that are both exploratory and quantitative. The businessas-usual scenario represents a pathway guided by outcomes and expectations emerging from California’s energy crisis. Three alternative scenarios represent contexts where clean energy plays a greater role in California’s energy system: Split Public is driven by local and individual activities; Golden State gives importance to integrated state planning; Patriotic Energy represents a national drive to increase energy independence. Future energy consumption, composition of electricity generation, energy diversity, and greenhouse gas emissions are analyzed for each scenario through 2035. Energy savings, renewable energy, and transportation activities are identified as promising opportunities for achieving alternative energy pathways in California. A combined approach that brings together individual and community activities with state and national policies leads to the largest energy savings, increases in energy diversity, and reductions in greenhouse gas emissions. Critical challenges in California’s energy pathway over the next decades identified by the scenario analysis include dominance of the transportation sector, dependence on fossil fuels, emissions of greenhouse gases, accounting for electricity imports, and diversity of the electricity sector. The paper concludes with a set of policy lessons revealed from the California energy scenarios. r 2003 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "62e11fc84fd018ad9f5004c35c407878",
"text": "The transactional memory programming paradigm is gaining momentum as the approach of choice for replacing locks in concurrent programming. This paper introduces the transactional locking II (TL2) algorithm, a software transactional memory (STM) algorithm based on a combination of commit-time locking and a novel global version-clock based validation technique. TL2 improves on state-of-the-art STMs in the following ways: (1) unlike all other STMs it fits seamlessly with any systems memory life-cycle, including those using malloc/free (2) unlike all other lock-based STMs it efficiently avoids periods of unsafe execution, that is, using its novel version-clock validation, user code is guaranteed to operate only on consistent memory states, and (3) in a sequence of high performance benchmarks, while providing these new properties, it delivered overall performance comparable to (and in many cases better than) that of all former STM algorithms, both lock-based and non-blocking. Perhaps more importantly, on various benchmarks, TL2 delivers performance that is competitive with the best hand-crafted fine-grained concurrent structures. Specifically, it is ten-fold faster than a single lock. We believe these characteristics make TL2 a viable candidate for deployment of transactional memory today, long before hardware transactional support is available.",
"title": ""
},
{
"docid": "34c47fc822f728104f861abb8b44bcf3",
"text": "In recent years, the demand for high purity spinning processes has been growing in certain industry branches, such as the semiconductor, biotechnological, pharmaceutical, and chemical industry. Therefore, the cleanness specifications have been tightened, and hermetically sealed process chambers are preferred. This paper presents an advantageous solution for such an application featuring a large scale, wide air gap, and a high accelerating bearingless segment motor. Bearingless slice motors allow complete magnetic levitation in combination with a very compact and economic design. The disc-shaped rotor holds permanent magnets generating magnetic flux in the air gap. Hence, three degrees of freedom are passively stabilized by reluctance forces. Thus, only the radial rotor position and the rotor angle have to be controlled actively. The announced bearingless segment motor is a subtype of the bearingless slice motor, featuring separate independent stator elements. This leads to a reduction of stator iron, cost, and weight and, in addition, leaves space for sensors and electronics enabling a very compact system design.",
"title": ""
},
{
"docid": "9c3bf9101b93251d81d796c5595c155a",
"text": "Big Data Analytics (BDA) is one of themainstream technologies that change our perspectives on processing of information. Together with information security, BDA could be an extremely effective tool to learn more about communication and social networks.There will be infinite possibilities to find new methods of tracking cybercrimes using big data from different sources. BDA in information security also changes our thinking about security algorithms; they must change from a small data paradigm to big ones. This special issue is to analyze how the latest trends in this area help learn more about cyberspace and new threats using big data approaches. It contains seven papers and the details were listed as follows:",
"title": ""
},
{
"docid": "9c68b87f99450e85f3c0c6093429937d",
"text": "We present a method for activity recognition that first estimates the activity performer's location and uses it with input data for activity recognition. Existing approaches directly take video frames or entire video for feature extraction and recognition, and treat the classifier as a black box. Our method first locates the activities in each input video frame by generating an activity mask using a conditional generative adversarial network (cGAN). The generated mask is appended to color channels of input images and fed into a VGG-LSTM network for activity recognition. To test our system, we produced two datasets with manually created masks, one containing Olympic sports activities and the other containing trauma resuscitation activities. Our system makes activity prediction for each video frame and achieves performance comparable to the state-of-the-art systems while simultaneously outlining the location of the activity. We show how the generated masks facilitate the learning of features that are representative of the activity rather than accidental surrounding information.",
"title": ""
},
{
"docid": "a6c22ddea3d32eb1a435ea23c1cb52b0",
"text": "In this paper the letter segmentation of photographs was used, taken from a Parrot AR Drone’s camera with the aim of establishing a stimulusresponse, where the original picture formed by Red, Green and Blue (RGB) colors was segmented by color (choosing the red channel). Once the character is recognized, the Drone executes the corresponding action. Noise-free number patterns were initially used and then some pixels were added in the image in order to make a set of patterns more robust, which provided the training set for neural network and thus are able to interpolate new patterns. Edge techniques detection were used for image segmentation including Sobel filter and filters for noise removal based on the median filtering, that is a low pass filter. All this took place in a closed environment, expecting to extend this to different environments. 61 Research in Computing Science 107 (2015) pp. 61–71; rec. 2015-08-04; acc. 2015-10-19",
"title": ""
},
{
"docid": "5c0d74be236f8836017dc2c1f6de16df",
"text": "Person re-identification is the problem of recognizing people across images or videos from non-overlapping views. Although there has been much progress in person re-identification for the last decade, it still remains a challenging task because of severe appearance changes of a person due to diverse camera viewpoints and person poses. In this paper, we propose a novel framework for person reidentification by analyzing camera viewpoints and person poses, so-called Pose-aware Multi-shot Matching (PaMM), which robustly estimates target poses and efficiently conducts multi-shot matching based on the target pose information. Experimental results using public person reidentification datasets show that the proposed methods are promising for person re-identification under diverse viewpoints and pose variances.",
"title": ""
}
] | scidocsrr |
da4dceaf228a008ed5462e90668a6333 | Advanced battery management system using MATLAB/Simulink | [
{
"docid": "4b9953e7ff548a0d1b09bca3c3f3c38f",
"text": "Battery management system (BMS) is an integral part of any electrical vehicle, which ensures that the batteries are not subjected to conditions outside their specified safe operating conditions. Thus the safety of the battery as well as of the passengers depend on the design of the BMS. In the present work a preliminary work is carried out to simulate a typical BMS for hybrid electrical vehicle. The various functional blocks of the BMS are implemented in SIMULINK toolbox of MATLAB. The BMS proposed is equipped with a battery model in which SOC is used as one of the states to overcome the limitation of stand-alone coulomb counting method for SOC estimation. The parameters of the battery are extracted from experimental results and incorporated in the model. The simulation results are validated by experimental results.",
"title": ""
}
] | [
{
"docid": "6d2667dd550e14d4d46b24d9c8580106",
"text": "Deficits in gratification delay are associated with a broad range of public health problems, such as obesity, risky sexual behavior, and substance abuse. However, 6 decades of research on the construct has progressed less quickly than might be hoped, largely because of measurement issues. Although past research has implicated 5 domains of delay behavior, involving food, physical pleasures, social interactions, money, and achievement, no published measure to date has tapped all 5 components of the content domain. Existing measures have been criticized for limitations related to efficiency, reliability, and construct validity. Using an innovative Internet-mediated approach to survey construction, we developed the 35-item 5-factor Delaying Gratification Inventory (DGI). Evidence from 4 studies and a large, diverse sample of respondents (N = 10,741) provided support for the psychometric properties of the measure. Specifically, scores on the DGI demonstrated strong internal consistency and test-retest reliability for the 35-item composite, each of the 5 domains, and a 10-item short form. The 5-factor structure fit the data well and had good measurement invariance across subgroups. Construct validity was supported by correlations with scores on closely related self-control measures, behavioral ratings, Big Five personality trait measures, and measures of adjustment and psychopathology, including those on the Minnesota Multiphasic Personality Inventory-2-Restructured Form. DGI scores also showed incremental validity in accounting for well-being and health-related variables. The present investigation holds implications for improving public health, accelerating future research on gratification delay, and facilitating survey construction research more generally by demonstrating the suitability of an Internet-mediated strategy.",
"title": ""
},
{
"docid": "37a5089b7e9e427d330d4720cdcf00d9",
"text": "3D shape models are naturally parameterized using vertices and faces, i.e., composed of polygons forming a surface. However, current 3D learning paradigms for predictive and generative tasks using convolutional neural networks focus on a voxelized representation of the object. Lifting convolution operators from the traditional 2D to 3D results in high computational overhead with little additional benefit as most of the geometry information is contained on the surface boundary. Here we study the problem of directly generating the 3D shape surface of rigid and non-rigid shapes using deep convolutional neural networks. We develop a procedure to create consistent ‘geometry images’ representing the shape surface of a category of 3D objects. We then use this consistent representation for category-specific shape surface generation from a parametric representation or an image by developing novel extensions of deep residual networks for the task of geometry image generation. Our experiments indicate that our network learns a meaningful representation of shape surfaces allowing it to interpolate between shape orientations and poses, invent new shape surfaces and reconstruct 3D shape surfaces from previously unseen images. Our code is available at https://github.com/sinhayan/surfnet.",
"title": ""
},
{
"docid": "b9d12a2c121823a81902375f6be893bb",
"text": "Internet users are often victimized by malicious attackers. Some attackers infect and use innocent users’ machines to launch large-scale attacks without the users’ knowledge. One of such attacks is the click-fraud attack. Click-fraud happens in Pay-Per-Click (PPC) ad networks where the ad network charges advertisers for every click on their ads. Click-fraud has been proved to be a serious problem for the online advertisement industry. In a click-fraud attack, a user or an automated software clicks on an ad with a malicious intent and advertisers need to pay for those valueless clicks. Among many forms of click-fraud, botnets with the automated clickers are the most severe ones. In this paper, we present a method for detecting automated clickers from the user-side. The proposed method to Fight Click-Fraud, FCFraud, can be integrated into the desktop and smart device operating systems. Since most modern operating systems already provide some kind of anti-malware service, our proposed method can be implemented as a part of the service. We believe that an effective protection at the operating system level can save billions of dollars of the advertisers. Experiments show that FCFraud is 99.6% (98.2% in mobile ad library generated traffic) accurate in classifying ad requests from all user processes and it is 100% successful in detecting clickbots in both desktop and mobile devices. We implement a cloud backend for the FCFraud service to save battery power in mobile devices. The overhead of executing FCFraud is also analyzed and we show that it is reasonable for both the platforms. Copyright c © 2016 John Wiley & Sons, Ltd.",
"title": ""
},
{
"docid": "316aadaf77171c03167ad8147b2d8ebb",
"text": "Rheumatoid arthritis destroys joints of the body like erosion in bones which intern may cause deformity and characterized by inflammation of the tissue around the joints as well as in other organs of the body. At the beginning of this disease mainly the joints of hand and wrist are affected making hand radiograph analysis very important. Lately manual JSW measurement in hand X-ray digital radiograph of Arthritis patients were in use but it has disadvantages like inaccuracy, inter-reader variability. The reproducible quantification of the progression of joint space narrowing and the erosive bone destructions caused by RA is crucial during treatment and in imaging biomarkers in clinical trials. Current manual scoring methods exhibit interreader variability, even after intensive training, and thus, impede the efficient monitoring of the disease. Hand radiograph analysis is difficult for radiologist as there are 14 number of hand joints. To avoid observer dependency, computer-aided analysis is required. Wrist joint space narrowing is a main radiographic outcome of rheumatoid arthritis (RA). Yet, automatic radiographic wrist joint space width (JSW) quantification with statistical properties for RA patients has not been widely investigated. The automated analysis of statistical properties helps to reduce need of skilled personnel.",
"title": ""
},
{
"docid": "9b504f633488016fad865dee6fbdf3ef",
"text": "Transmission lines is the important factor of the power system. Transmission and distribution lines has good contribution in the generating unit and consumers to obtain the continuity of electric supply. To economically transfer high power between systems and from control generating field. Transmission line run over hundreds of kilometers to supply electrical power to the consumers. It is a required for industries to detect the faults in the power system as early as possible. “Fault Detection and Auto Line Distribution System With GSM Module” is a automation technique used for fault detection in AC supply and auto sharing of power. The significance undetectable faults is that they represent a serious public safety hazard as well as a risk of arcing ignition of fires. This paper represents under voltage and over current fault detection. It is useful in technology to provide many applications like home, industry etc..",
"title": ""
},
{
"docid": "d96f7c54d669771f9fa881e97bddd5f6",
"text": "Conceptual modeling is one major topic in information systems research and becomes even more important with the arising of new software engineering principles like model driven architecture (MDA) or serviceoriented architectures (SOA). Research on conceptual modeling is characterized by a dilemma: Empirical research confirms that in practice conceptual modeling is often perceived as difficult and not done well. The application of reusable conceptual models is a promising approach to support model designers. At the same time, the IS research community claims for a sounder theoretical base for conceptual modeling. The design science research paradigm delivers a framework to fortify the theoretical foundation of research on conceptual models. We provide insights on how to achieve both, relevance and rigor, in conceptual modeling by identifying requirements for reusable conceptual models on the basis of the design science research paradigm.",
"title": ""
},
{
"docid": "c123d61a6a94e963d4fbf6075c496599",
"text": "Most metastatic tumors, such as those originating in the prostate, lung, and gastrointestinal tract, respond poorly to conventional chemotherapy. Novel treatment strategies for advanced cancer are therefore desperately needed. Dietary restriction of the essential amino acid methionine offers promise as such a strategy, either alone or in combination with chemotherapy or other treatments. Numerous in vitro and animal studies demonstrate the effectiveness of dietary methionine restriction in inhibiting growth and eventually causing death of cancer cells. In contrast, normal host tissues are relatively resistant to methionine restriction. These preclinical observations led to a phase I clinical trial of dietary methionine restriction for adults with advanced cancer. Preliminary findings from this trial indicate that dietary methionine restriction is safe and feasible for the treatment of patients with advanced cancer. In addition, the trial has yielded some preliminary evidence of antitumor activity. One patient with hormone-independent prostate cancer experienced a 25% reduction in serum prostate-specific antigen (PSA) after 12 weeks on the diet, and a second patient with renal cell cancer experienced an objective radiographic response. The possibility that methionine restriction may act synergistically with other cancer treatments such as chemotherapy is being explored. Findings to date support further investigation of dietary methionine restriction as a novel treatment strategy for advanced cancer.",
"title": ""
},
{
"docid": "c15aa2444187dffe2be4636ad00babdd",
"text": "Most people have become “big data” producers in their daily life. Our desires, opinions, sentiments, social links as well as our mobile phone calls and GPS track leave traces of our behaviours. To transform these data into knowledge, value is a complex task of data science. This paper shows how the SoBigData Research Infrastructure supports data science towards the new frontiers of big data exploitation. Our research infrastructure serves a large community of social sensing and social mining researchers and it reduces the gap between existing research centres present at European level. SoBigData integrates resources and creates an infrastructure where sharing data and methods among text miners, visual analytics researchers, socio-economic scientists, network scientists, political scientists, humanities researchers can indeed occur. The main concepts related to SoBigData Research Infrastructure are presented. These concepts support virtual and transnational (on-site) access to the resources. Creating and supporting research communities are considered to be of vital importance for the success of our research infrastructure, as well as contributing to train the new generation of data scientists. Furthermore, this paper introduces the concept of exploratory and shows their role in the promotion of the use of our research infrastructure. The exploratories presented in this paper represent also a set of real applications in the context of social mining. Finally, a special attention is given to the legal and ethical aspects. Everything in SoBigData is supervised by an ethical and legal framework.",
"title": ""
},
{
"docid": "e077bb23271fbc056290be84b39a9fcc",
"text": "Rovers will continue to play an important role in planetary exploration. Plans include the use of the rocker-bogie rover configuration. Here, models of the mechanics of this configuration are presented. Methods for solving the inverse kinematics of the system and quasi-static force analysis are described. Also described is a simulation based on the models of the rover’s performance. Experimental results confirm the validity of the models.",
"title": ""
},
{
"docid": "2a880c868e21d16f1cb9d377e9961ff2",
"text": "This paper presents the results of an action research project into the practice of formulating a knowledge management strategy for a middle-sized supply chain solution provider in Australia. The paper contrasts our practice of formulating the strategy with expectations and understandings of strategy and knowledge management strategy critical success factors identified from the literature. We have adopted an action research approach incorporating multiple iterative phases. With the cooperation of the company, this approach has enabled a change in organisational culture to one which now fosters a knowledge sharing environment.",
"title": ""
},
{
"docid": "b6b9e1eaf17f6cdbc9c060e467021811",
"text": "Tumour-associated viruses produce antigens that, on the face of it, are ideal targets for immunotherapy. Unfortunately, these viruses are experts at avoiding or subverting the host immune response. Cervical-cancer-associated human papillomavirus (HPV) has a battery of immune-evasion mechanisms at its disposal that could confound attempts at HPV-directed immunotherapy. Other virally associated human cancers might prove similarly refractive to immuno-intervention unless we learn how to circumvent their strategies for immune evasion.",
"title": ""
},
{
"docid": "fc9699b4382b1ddc6f60fc6ec883a6d3",
"text": "Applications hosted in today's data centers suffer from internal fragmentation of resources, rigidity, and bandwidth constraints imposed by the architecture of the network connecting the data center's servers. Conventional architectures statically map web services to Ethernet VLANs, each constrained in size to a few hundred servers owing to control plane overheads. The IP routers used to span traffic across VLANs and the load balancers used to spray requests within a VLAN across servers are realized via expensive customized hardware and proprietary software. Bisection bandwidth is low, severly constraining distributed computation Further, the conventional architecture concentrates traffic in a few pieces of hardware that must be frequently upgraded and replaced to keep pace with demand - an approach that directly contradicts the prevailing philosophy in the rest of the data center, which is to scale out (adding more cheap components) rather than scale up (adding more power and complexity to a small number of expensive components).\n Commodity switching hardware is now becoming available with programmable control interfaces and with very high port speeds at very low port cost, making this the right time to redesign the data center networking infrastructure. In this paper, we describe monsoon, a new network architecture, which scales and commoditizes data center networking monsoon realizes a simple mesh-like architecture using programmable commodity layer-2 switches and servers. In order to scale to 100,000 servers or more,monsoon makes modifications to the control plane (e.g., source routing) and to the data plane (e.g., hot-spot free multipath routing via Valiant Load Balancing). It disaggregates the function of load balancing into a group of regular servers, with the result that load balancing server hardware can be distributed amongst racks in the data center leading to greater agility and less fragmentation. The architecture creates a huge, flexible switching domain, supporting any server/any service and unfragmented server capacity at low cost.",
"title": ""
},
{
"docid": "533566714729c146967238ff59222a16",
"text": "Several recent papers investigate Active Learning (AL) for mitigating the datadependence of deep learning for natural language processing. However, the applicability of AL to real-world problems remains an open question. While in supervised learning, practitioners can try many different methods, evaluating each against a validation set before selecting a model, AL affords no such luxury. Over the course of one AL run, an agent annotates its dataset exhausting its labeling budget. Thus, given a new task, an active learner has no opportunity to compare models and acquisition functions. This paper provides a largescale empirical study of deep active learning, addressing multiple tasks and, for each, multiple datasets, multiple models, and a full suite of acquisition functions. We find that across all settings, Bayesian active learning by disagreement, using uncertainty estimates provided either by Dropout or Bayes-by-Backprop significantly improves over i.i.d. baselines and usually outperforms classic uncertainty sampling.",
"title": ""
},
{
"docid": "ca82ceafc6079f416d9f7b94a7a6a665",
"text": "When Big data and cloud computing join forces together, several domains like: healthcare, disaster prediction and decision making become easier and much more beneficial to users in term of information gathering, although cloud computing will reduce time and cost of analyzing information for big data, it may harm the confidentiality and integrity of the sensitive data, for instance, in healthcare, when analyzing disease's spreading area, the name of the infected people must remain secure, hence the obligation to adopt a secure model that protect sensitive data from malicious users. Several case studies on the integration of big data in cloud computing, urge on how easier it would be to analyze and manage big data in this complex envronement. Companies must consider outsourcing their sensitive data to the cloud to take advantage of its beneficial resources such as huge storage, fast calculation, and availability, yet cloud computing might harm the security of data stored and computed in it (confidentiality, integrity). Therefore, strict paradigm must be adopted by organization to obviate their outsourced data from being stolen, damaged or lost. In this paper, we compare between the existing models to secure big data implementation in the cloud computing. Then, we propose our own model to secure Big Data on the cloud computing environement, considering the lifecycle of data from uploading, storage, calculation to its destruction.",
"title": ""
},
{
"docid": "1c2dae29ed066eec72e72c1173bd263d",
"text": "Wireless Sensor Networks (WSNs) are important and necessary platforms for the future as the concept \"Internet of Things\" has emerged lately. They are used for monitoring, tracking, or controlling of many applications in industry, health care, habitat, and military. However, the quality of data collected by sensor nodes is affected by anomalies that occur due to various reasons, such as node failures, reading errors, unusual events, and malicious attacks. Therefore, anomaly detection is a necessary process to ensure the quality of sensor data before it is utilized for making decisions. In this review, we present the challenges of anomaly detection in WSNs and state the requirements to design efficient and effective anomaly detection models. We then review the latest advancements of data anomaly detection research in WSNs and classify current detection approaches in five main classes based on the detection methods used to design these approaches. Varieties of the state-of-the-art models for each class are covered and their limitations are highlighted to provide ideas for potential future works. Furthermore, the reviewed approaches are compared and evaluated based on how well they meet the stated requirements. Finally, the general limitations of current approaches are mentioned and further research opportunities are suggested and discussed.",
"title": ""
},
{
"docid": "854b473b0ee6d3cf4d1a34cd79a658e3",
"text": "Blockchain provides a new approach for participants to maintain reliable databases in untrusted networks without centralized authorities. However, there are still many serious problems in real blockchain systems in IP network such as the lack of support for multicast and the hierarchies of status. In this paper, we design a bitcoin-like blockchain system named BlockNDN over Named Data Networking and we implement and deploy it on our cluster as well. The resulting design solves those problems in IP network. It provides completely decentralized systems and simplifies system architecture. It also improves the weak-connectivity phenomenon and decreases the broadcast overhead.",
"title": ""
},
{
"docid": "76aacf8fd5c24f64211015ce9c196bf0",
"text": "In industrially relevant Cu/ZnO/Al2 O3 catalysts for methanol synthesis, the strong metal support interaction between Cu and ZnO is known to play a key role. Here we report a detailed chemical transmission electron microscopy study on the nanostructural consequences of the strong metal support interaction in an activated high-performance catalyst. For the first time, clear evidence for the formation of metastable \"graphite-like\" ZnO layers during reductive activation is provided. The description of this metastable layer might contribute to the understanding of synergistic effects between the components of the Cu/ZnO/Al2 O3 catalysts.",
"title": ""
},
{
"docid": "2f7edc539bc61f8fc07bc6f5f8e496e0",
"text": "We investigate the contextual multi-armed bandit problem in an adversarial setting and introduce an online algorithm that asymptotically achieves the performance of the best contextual bandit arm selection strategy under certain conditions. We show that our algorithm is highly efficient and provides significantly improved performance with a guaranteed performance upper bound in a strong mathematical sense. We have no statistical assumptions on the context vectors and the loss of the bandit arms, hence our results are guaranteed to hold even in adversarial environments. We use a tree notion in order to partition the space of context vectors in a nested structure. Using this tree, we construct a large class of context dependent bandit arm selection strategies and adaptively combine them to achieve the performance of the best strategy. We use the hierarchical nature of introduced tree to implement this combination with a significantly low computational complexity, thus our algorithm can be efficiently used in applications involving big data. Through extensive set of experiments involving synthetic and real data, we demonstrate significant performance gains achieved by the proposed algorithm with respect to the state-of-the-art adversarial bandit algorithms.",
"title": ""
},
{
"docid": "ad4596e24f157653a36201767d4b4f3b",
"text": "We present a character-based model for joint segmentation and POS tagging for Chinese. The bidirectional RNN-CRF architecture for general sequence tagging is adapted and applied with novel vector representations of Chinese characters that capture rich contextual information and lower-than-character level features. The proposed model is extensively evaluated and compared with a state-of-the-art tagger respectively on CTB5, CTB9 and UD Chinese. The experimental results indicate that our model is accurate and robust across datasets in different sizes, genres and annotation schemes. We obtain stateof-the-art performance on CTB5, achieving 94.38 F1-score for joint segmentation and POS tagging.",
"title": ""
},
{
"docid": "4830c447cb27d5ad1696bb25ce8c89fd",
"text": "For a grid-connected converter with an LCL filter, the harmonic compensators of a proportional-resonant (PR) controller are usually limited to several low-order current harmonics due to system instability when the compensated frequency is out of the bandwidth of the system control loop. In this paper, a new current feedback method for PR current control is proposed. The weighted average value of the currents flowing through the two inductors of the LCL filter is used as the feedback to the current PR regulator. Consequently, the control system with the LCL filter is degraded from a third-order function to a first-order one. A large proportional control-loop gain can be chosen to obtain a wide control-loop bandwidth, and the system can be optimized easily for minimum current harmonic distortions, as well as system stability. The inverter system with the proposed controller is investigated and compared with those using traditional control methods. Experimental results on a 5-kW fuel-cell inverter are provided, and the new current control strategy has been verified.",
"title": ""
}
] | scidocsrr |
9c7dc490b76a8818771600465f25f29f | SieveQ: A Layered BFT Protection System for Critical Services | [
{
"docid": "076ab7223de2d7eee7b3875bc2bb82e4",
"text": "Firewalls are network devices which enforce an organization’s security policy. Since their development, various methods have been used to implement firewalls. These methods filter network traffic at one or more of the seven layers of the ISO network model, most commonly at the application, transport, and network, and data-link levels. In addition, researchers have developed some newer methods, such as protocol normalization and distributed firewalls, which have not yet been widely adopted. Firewalls involve more than the technology to implement them. Specifying a set of filtering rules, known as a policy, is typically complicated and error-prone. High-level languages have been developed to simplify the task of correctly defining a firewall’s policy. Once a policy has been specified, the firewall needs to be tested to determine if it actually implements the policy correctly. Little work exists in the area of firewall theory; however, this article summarizes what exists. Because some data must be able to pass in and out of a firewall, in order for the protected network to be useful, not all attacks can be stopped by firewalls. Some emerging technologies, such as Virtual Private Networks (VPN) and peer-to-peer networking pose new challenges for firewalls.",
"title": ""
}
] | [
{
"docid": "312d05085096de7d4dfaaef815f35249",
"text": "Chemomechanical caries removal allies an atraumatic technique with antimicrobiotic characteristics, minimizing painful stimuli and maximally preserving healthy dental structures. The purpose of this study was to compare the cytotoxic effects of papain-based gel (Papacarie) and another caries-removing substance, Carisolv, to a nontreatment control on cultured fibroblasts in vitro and the biocompatibility in subcutaneous tissue in vivo. The cytotoxicity analysis was performed on fibroblast cultures (NIH-3T3) after 0-, 4-, 8-, and 12-hour exposure (cell viability assay) and after 1-, 3-, 5-, and 7-day exposure (survival assay). In the in vivo study, the 2 compounds were introduced into polyethylene tubes that were implanted into subcutaneous tissues of rats. After 1, 7, 14, 30, and 60 days, tissue samples were examined histologically. Cell viability did not differ between the 2 experimental groups. The control group, however, showed significantly higher percentage viability. There were no differences in cell survival between the control and experimental groups. The histological analysis revealed a moderate inflammatory response at 2 and 7 days and a mild response at 15 days, becoming almost imperceptible by 30 and 60 days in both experimental groups. The 2 tested substances exhibited acceptable biocompatibilities and demonstrated similar responses in the in vitro cytotoxicity and in vivo implantation assay.",
"title": ""
},
{
"docid": "ffef173f4e0c757c6d780d0af5d9c00b",
"text": "Minding the Body, the Primordial Communication Medium Embodiment: The Teleology of Interface Design Embodiment: Thinking through our Technologically Extended Bodies User Embodiment and Three Forms in Which the Body \"Feels\" Present in the Virtual Environment Presence: Emergence of a Design Goal and Theoretical Problem Being There: The Sense of Physical Presence in Cyberspace Being with another Body: Designing the Illusion of Social Presence Is This Body Really \"Me\"? Self Presence, Body Schema, Self-consciousness, and Identity The Cyborg's Dilemma Footnotes References About the Author The intrinsic relationship that arises between tools and organs, and one that is to be revealed and emphasized – although it is more one of unconscious discovery than of conscious invention – is that in the tool the human continually produces itself. Since the organ whose utility and power is to be increased is the controlling factor, the appropriate form of a tool can be derived only from that organ. Ernst Kapp, 1877, quoted in [Mitcham, 1994, p. 23] Abstract StudyW Academ Excellen Award Collab-U CMC Play E-Commerce Symposium Net Law InfoSpaces Usenet NetStudy VEs Page 1 of 29 THE CYBORG'S DILEMNA: PROGRESSIVE EMBODIMENT IN VIRTUAL ENVIR...StudyW Academ Excellen Award Collab-U CMC Play E-Commerce Symposium Net Law InfoSpaces Usenet NetStudy VEs Page 1 of 29 THE CYBORG'S DILEMNA: PROGRESSIVE EMBODIMENT IN VIRTUAL ENVIR... 9/11/2005 http://jcmc.indiana.edu/vol3/issue2/biocca2.html How does the changing representation of the body in virtual environments affect the mind? This article considers how virtual reality interfaces are evolving to embody the user progressively. The effect of embodiment on the sensation of physical presence, social presence, and self presence in virtual environments is discussed. The effect of avatar representation on body image and body schema distortion is also considered. The paper ends with the introduction of the cyborg's dilemma, a paradoxical situation in which the development of increasingly \"natural\" and embodied interfaces leads to \"unnatural\" adaptations or changes in the user. In the progressively tighter coupling of user to interface, the user evolves as a cyborg. Minding the Body, the Primordial Communication Medium In the twentieth century we have made a successful transition from the sooty iron surfaces of the industrial revolution to the liquid smooth surfaces of computer graphics. On our computer monitors we may be just beginning to see a reflective surface that looks increasingly like a mirror. In the virtual world that exists on the other side of the mirror's surface we can just barely make out the form of a body that looks like us, like another self. Like Narcissus looking into the pond, we are captured by the experience of this reflection of our bodies. But that reflected body looks increasingly like a cyborg. [2] This article explores an interesting pattern in media interface development that I will call progressive embodiment. Each progressive step in the development of sensor and display technology moves telecommunication technology towards a tighter coupling of the body to the interface. The body is becoming present in both physical space and cyberspace. The interface is adapting to the body; the body is adapting to the interface [(Biocca & Rolland, in press)]. Why is this occurring? One argument is that attempts to optimize the communication bandwidth of distributed, multi-user virtual environments such as social VRML worlds and collaborative virtual environments drives this steady augmentation of the body and the mind [(see Biocca, 1995)]. It has become a key to future stages of interface development. On the other hand, progressive embodiment may be part of a larger pattern, the cultural evolution of humans and communication artifacts towards a mutual integration and greater \"somatic flexibility\" [(Bateson, 1972)]. The pattern of progressive embodiment raises some fundamental and interesting questions. In this article we pause to consider these developments. New media like distributed immersive virtual environments sometimes force us to take a closer look at what is fundamental about communication. Inevitably, theorists interested in the fundamentals of communication return in some way or another to a discussion of the body and the mind. At the birth of new media, theories dwell on human factors in communication [(Biocca, 1995)] and are often more psychological than sociological. For example when radio and film appeared, [Arnheim (1957)] and [Munsterberg (1916)] used the perceptual theories of Gestalt psychology to try to make sense of how each medium affected the senses. In the 1960s McLuhan [(1966; McLuhan & McLuhan, 1988)] refocused our attention on media technology when he assembled a controversial psychological theory to examine electronic media and make pronouncements about the consequences of imbalances in the \"sensorium.\" Page 2 of 29 THE CYBORG'S DILEMNA: PROGRESSIVE EMBODIMENT IN VIRTUAL ENVIR... 9/11/2005 http://jcmc.indiana.edu/vol3/issue2/biocca2.html Before paper, wires, and silicon, the primordial communication medium is the body. At the center of all communication rests the body, the fleshy gateway to the mind. [Becker & Schoenbach (1989)] argue that \"a veritable 'new mass medium' for some experts, has to address new senses of new combinations of senses. It has to use new channels of information\" (p. 5). In other words, each new medium must somehow engage the body in a new way. But this leads us to ask, are all the media collectively addressing the body in some systematic way? Are media progressively embodying the user? 1.1 The senses as channels to the mind \"Each of us lives within ... the prison of his own brain. Projecting from it are millions of fragile sensory nerve fibers, in groups uniquely adapted to sample the energetic states of the world around us: heat, light, force, and chemical composition. That is all we ever know of it directly; all else is logical inference (1975, p. 131) [(see Sekuler & Blake, 1994 p. 2)]. The senses are the portals to the mind. Sekuler and Blake extend their observation to claim that the senses are \"communication channels to reality.\" Consider for a moment the body as an information acquisition system. As aliens from some distant planet we observe humans and see the body as an array of sensors propelled through space to scan, rub, and grab the environment. In some ways, that is how virtual reality designers see users [(Durlach & Mavor, 1994)]. Many immersive virtual reality designers tend to be implicitly or explicitly Gibsonian: they accept the perspective of the noted perceptual psychologist [J.J. Gibson (1966, 1979)]. Immersive virtual environments are places where vision and the other senses are meant to be active. Users make use of the affordances in the environments from which they perceive the structure of the virtual world in ways similar to the manner they construct the physical world. Through motion and collisions with objects the senses pick up invariances in energy fields flowing over the body's receptors. When we walk or reach for an object in the virtual or physical world, we guide the senses in this exploration of the space in same way that a blind man stretches out a white cane to explore the space while in motion. What we know about the world is embodied, it is constructed from patterns of energy detected by the body. The body is the surface on which all energy fields impinge, on which communication and telecommunication takes form. 1.2 The body as a display device for a mind The body is integrated with the mind as a representational system, or as the neuroscientist, Antonio Damasio, puts it, \"a most curious physiological arrangement ... has turned the brain into the body's captive audience\" [(Damasio, 1994, p. xv)]. In some ways, the body is a primordial display device, a kind of internal mental simulator. The body is a representational medium for the mind. Some would claim that thought is embodied or modeled by the body. Johnson and Lakoff [(Johnson, 1987; Lakoff & Johnson, 1980; Lakoff, 1987)] argue against a view of reasoning as manipulation of prepositional representations (the \"objectives position\"), a tabulation and manipulation of abstract symbols. They might suggest a kind of sensory-based \"image schemata\" that are critical to instantiating mental transformations associated with metaphor and analogy. In a way virtual environments are objectified metaphors and analogies delivered as sensory patterns instantiating \"image schemata.\" In his book, Decartes' Error, the neuroscientist Damasio explains how the body is used as a means of embodying thought: Page 3 of 29 THE CYBORG'S DILEMNA: PROGRESSIVE EMBODIMENT IN VIRTUAL ENVIR... 9/11/2005 http://jcmc.indiana.edu/vol3/issue2/biocca2.html \"...the body as represented in the brain, may constitute the indispensable frame of reference for the neural processes that we experience as the mind; that our very organism rather than some absolute experiential reality is used as the ground of reference for the constructions we make of the world around us and for the construction of the ever-present sense of subjectivity that is part and parcel of our experiences; that our most refined thoughts and best actions, our greatest joys and deepest sorrows, use the body as a yardstick\" [(Damasio, 1994, p. xvi)]. Damasio's title, Descartes' Error, warns against the misleading tendency to think of the body and mind, reason and emotion, as separate systems. Figure 1. Range of possible input (sensors) and output (effectors) devices for a virtual reality system. Illustrates the pattern of progressive embodiment in virtual reality systems. Source: Biocca & Delaney, 1995 1.3 The body as a communication device The body is also an expressive communication device [(Benthall & Polhemus, 1975)], a social semiotic vehicle for representing mental states (e.g., emotions, observations, plans, etc.)",
"title": ""
},
{
"docid": "9421ae8a5d90707dce15fb3940abf9f4",
"text": "PURPOSE\nNuclear magnetic resonance (NMR) spectroscopy has been used to quantify lipid wax, cholesterol ester terpenoid and glyceride composition, saturation, oxidation, and CH₂ and CH₃ moiety distribution. This tool was used to measure changes in human meibum composition with meibomian gland dysfunction (MGD).\n\n\nMETHODS\n(1)H-NMR spectra of meibum from 39 donors with meibomian gland dysfunction (Md) were compared to meibum from 33 normal donors (Mn).\n\n\nRESULTS\nPrincipal component analysis (PCA) was applied to the CH₂/CH₃ regions of a set of training NMR spectra of human meibum. PCA discriminated between Mn and Md with an accuracy of 86%. There was a bias toward more accurately predicting normal samples (92%) compared with predicting MGD samples (78%). When the NMR spectra of Md were compared with those of Mn, three statistically significant decreases were observed in the relative amounts of CH₃ moieties at 1.26 ppm, the products of lipid oxidation above 7 ppm, and the =CH moieties at 5.2 ppm associated with terpenoids.\n\n\nCONCLUSIONS\nLoss of the terpenoids could be deleterious to meibum since they exhibit a plethora of mostly positive biological functions and could account for the lower level of cholesterol esters observed in Md compared with Mn. All three changes could account for the higher degree of lipid order of Md compared with age-matched Mn. In addition to the power of NMR spectroscopy to detect differences in the composition of meibum, it is promising that NMR can be used as a diagnostic tool.",
"title": ""
},
{
"docid": "b03d88449eaf4e393dc842340f6951ea",
"text": "Use of mobile personal computers in open networked environment is revolutionalising the way we use computers. Mobile networked computing is raising important information security and privacy issues. This paper is concerned with the design of authentication protocols for a mobile computing environment. The paper rst analyses the authenti-cation initiator protocols proposed by Beller,Chang and Yacobi (BCY) and the modiications considered by Carlsen and points out some weaknesses. The paper then suggests improvements to these protocols. The paper proposes secure end-to-end protocols between mobile users using both symmetric and public key based systems. These protocols enable mutual authentication and establish a shared secret key between mobile users. Furthermore, these protocols provide a certain degree of anonymity of the communicating users to be achieved visa -vis other system users.",
"title": ""
},
{
"docid": "6ecdcdc577855f34afa387cf39004855",
"text": "To explore when the presence of compensation enhances repurchase intentions after a service failure, the authors use an experimental procedure nd evaluate the impact of compensation in different stability and locus of responsibility conditions. Findings from three studies using scenarios rom different service industries indicate that compensation is necessary only when the company is responsible for the failure and the failure ccurs frequently. If the failure occurs infrequently or the company is not responsible, compensation does not affect repurchase intentions. The esults further demonstrate that stability and locus of responsibility attributions influence the perceived equity of the exchange, which mediates the ffectiveness of compensation as a recovery effort. The authors discuss the theoretical and managerial implications. 2008 New York University. Published by Elsevier Inc. All rights reserved.",
"title": ""
},
{
"docid": "80a205a05f72a2fa9e7d4e1e310f0787",
"text": "The emerging wireless charging technology is a promising alternative to address the power constraint problem in sensor networks. Comparing to existing approaches, this technology can replenish energy in a more controllable manner and does not require accurate location of or physical alignment to sensor nodes. However, little work has been reported on designing and implementing a wireless charging system for sensor networks. In this paper, we design such a system, build a proof-of-concept prototype, conduct experiments on the prototype to evaluate its feasibility and performance in small-scale networks, and conduct extensive simulations to study its performance in large-scale networks. Experimental and simulation results demonstrate that the proposed system can utilize the wireless charging technology effectively to prolong the network lifetime through delivering energy by a robot to where it is needed. The effects of various configuration and design parameters have also been studied, which may serve as useful guidelines in actual deployment of the proposed system in practice.",
"title": ""
},
{
"docid": "a03761cb260e132b4041d40b5a11137d",
"text": "Policy gradient is an efficient technique for improving a policy in a reinforcement learning setting. However, vanilla online variants are on-policy only and not able to take advantage of off-policy data. In this paper we describe a new technique that combines policy gradient with off-policy Q-learning, drawing experience from a replay buffer. This is motivated by making a connection between the fixed points of the regularized policy gradient algorithm and the Q-values. This connection allows us to estimate the Q-values from the action preferences of the policy, to which we apply Q-learning updates. We refer to the new technique as ‘PGQL’, for policy gradient and Q-learning. We also establish an equivalency between action-value fitting techniques and actor-critic algorithms, showing that regularized policy gradient techniques can be interpreted as advantage function learning algorithms. We conclude with some numerical examples that demonstrate improved data efficiency and stability of PGQL. In particular, we tested PGQL on the full suite of Atari games and achieved performance exceeding that of both asynchronous advantage actor-critic (A3C) and Q-learning.",
"title": ""
},
{
"docid": "7fb2348fbde9dbef88357cc79ff394c5",
"text": "This paper presents a measurement system with capacitive sensor connected to an open-source electronic platform Arduino Uno. A simple code was modified in the project, which ensures that the platform works as interface for the sensor. The code can be modified and upgraded at any time to fulfill other specific applications. The simulations were carried out in the platform's own environment and the collected data are represented in graphical form. Accuracy of developed measurement platform is 0.1 pF.",
"title": ""
},
{
"docid": "ddd704cb92e6f563a19b6928cdf41c4d",
"text": "Convolutional neural networks have achieved astonishing results in different application areas. Various methods which allow us to use these models on mobile and embedded devices have been proposed. Especially binary neural networks seem to be a promising approach for these devices with low computational power. However, understanding binary neural networks and training accurate models for practical applications remains a challenge. In our work, we focus on increasing our understanding of the training process and making it accessible to everyone. We publish our code and models based on BMXNet for everyone to use. Within this framework, we systematically evaluated different network architectures and hyperparameters to provide useful insights on how to train a binary neural network. Further, we present how we improved accuracy by increasing the number of connections in the network.",
"title": ""
},
{
"docid": "70789bc929ef7d36f9bb4a02793f38f5",
"text": "Lock managers are among the most studied components in concurrency control and transactional systems. However, one question seems to have been generally overlooked: “When there are multiple lock requests on the same object, which one(s) should be granted first?” Nearly all existing systems rely on a FIFO (first in, first out) strategy to decide which transaction(s) to grant the lock to. In this paper, however, we show that the lock scheduling choices have significant ramifications on the overall performance of a transactional system. Despite the large body of research on job scheduling outside the database context, lock scheduling presents subtle but challenging requirements that render existing results on scheduling inapt for a transactional database. By carefully studying this problem, we present the concept of contention-aware scheduling, show the hardness of the problem, and propose novel lock scheduling algorithms (LDSF and bLDSF), which guarantee a constant factor approximation of the best scheduling. We conduct extensive experiments using a popular database on both TPC-C and a microbenchmark. Compared to FIFO— the default scheduler in most database systems—our bLDSF algorithm yields up to 300x speedup in overall transaction latency. Alternatively, our LDSF algorithm, which is simpler and achieves comparable performance to bLDSF, has already been adopted by open-source community, and was chosen as the default scheduling strategy in MySQL 8.0.3+. PVLDB Reference Format: Boyu Tian, Jiamin Huang, Barzan Mozafari, Grant Schoenebeck. Contention-Aware Lock Scheduling for Transactional Databases. PVLDB, 11 (5): xxxx-yyyy, 2018. DOI: 10.1145/3177732.3177740",
"title": ""
},
{
"docid": "b2b40bf9ee148df9973fd9f69b80ff57",
"text": "Convolutional Neural Networks (CNNs) are becoming increasingly popular due to their superior performance in the domain of computer vision, in applications such as objection detection and recognition. However, they demand complex, power-consuming hardware which makes them unsuitable for implementation on low-power mobile and embedded devices. In this paper, a description and comparison of various techniques is presented which aim to mitigate this problem. This is primarily achieved by quantizing the floating-point weights and activations to reduce the hardware requirements, and adapting the training and inference algorithms to maintain the network’s performance.",
"title": ""
},
{
"docid": "cb0b7879f61630b467aa595d961bfcef",
"text": "UNLABELLED\nGlucagon-like peptide 1 (GLP-1[7-36 amide]) is an incretin hormone primarily synthesized in the lower gut (ileum, colon/rectum). Nevertheless, there is an early increment in plasma GLP-1 immediately after ingesting glucose or mixed meals, before nutrients have entered GLP-1 rich intestinal regions. The responsible signalling pathway between the upper and lower gut is not clear. It was the aim of this study to see, whether small intestinal resection or colonectomy changes GLP-1[7-36 amide] release after oral glucose. In eight healthy controls, in seven patients with inactive Crohn's disease (no surgery), in nine patients each after primarily jejunal or ileal small intestinal resections, and in six colonectomized patients not different in age (p = 0.10), body-mass-index (p = 0.24), waist-hip-ratio (p = 0.43), and HbA1c (p = 0.22), oral glucose tolerance tests (75 g) were performed in the fasting state. GLP-1[7-36 amide], insulin C-peptide, GIP and glucagon (specific (RIAs) were measured over 240 min.\n\n\nSTATISTICS\nRepeated measures ANOVA, t-test (significance: p < 0.05). A clear and early (peak: 15-30 min) GLP-1[7-36 amide] response was observed in all subjects, without any significant difference between gut-resected and control groups (p = 0.95). There were no significant differences in oral glucose tolerance (p = 0.21) or in the suppression of pancreatic glucagon (p = 0.36). Colonectomized patients had a higher insulin (p = 0.011) and C-peptide (p = 0.0023) response in comparison to all other groups. GIP responses also were higher in the colonectomized patients (p = 0.0005). Inactive Crohn's disease and resections of the small intestine as well as proctocolectomy did not change overall GLP-1[7-36 amide] responses and especially not the early increment after oral glucose. This may indicate release of GLP-1[7-36 amide] after oral glucose from the small number of GLP-1[7-36 amide] producing L-cells in the upper gut rather than from the main source in the ileum, colon and rectum. Colonectomized patients are characterized by insulin hypersecretion, which in combination with their normal oral glucose tolerance possibly indicates a reduced insulin sensitivity in this patient group. GIP may play a role in mediating insulin hypersecretion in these patients.",
"title": ""
},
{
"docid": "b34dbcd4a852e55b698df76d73afe0e9",
"text": "We present a new method for automatically detecting circular objects in images: we detect an osculating circle to an elliptic arc using a Hough transform, iteratively deforming it into an ellipse, removing outlier pixels, and searching for a separate edge. The voting space is restricted to one and two dimensions for efficiency, and special weighting schemes are introduced to enhance the accuracy. We demonstrate the effectiveness of our method using real images. Finally, we apply our method to the calibration of a turntable for 3-D object shape reconstruction.",
"title": ""
},
{
"docid": "fe6d2d70c2afcb7129bcb030f0486d75",
"text": "A novel 24-GHz patch series-fed antenna array is presented for radar system. It consists of an 8×8 transmitting antenna array and two 8×4 co-aperture receiving antenna arrays, which can not only achieve good suppression of side lobes and high aperture efficiency, but also avoid ambiguity in angle measurement. The simulated results show that the gains of the transmitting and the receiving antenna arrays are respectively 20.9dBi and 15.9dBi, while the suppressions of side lobes in two planes are both over 20dB.",
"title": ""
},
{
"docid": "7d03c3e0e20b825809bebb5b2da1baed",
"text": "Flexoelectricity and the concomitant emergence of electromechanical size-effects at the nanoscale have been recently exploited to propose tantalizing concepts such as the creation of “apparently piezoelectric” materials without piezoelectric materials, e.g. graphene, emergence of “giant” piezoelectricity at the nanoscale, enhanced energy harvesting, among others. The aforementioned developments pertain primarily to hard ceramic crystals. In this work, we develop a nonlinear theoretical framework for flexoelectricity in soft materials. Using the concept of soft electret materials, we illustrate an interesting nonlinear interplay between the so-called Maxwell stress effect and flexoelectricity, and propose the design of a novel class of apparently piezoelectric materials whose constituents are intrinsically non-piezoelectric. In particular, we show that the electret-Maxwell stress based mechanism can be combined with flexoelectricity to achieve unprecedentedly high values of electromechanical coupling. Flexoelectricity is also important for a special class of soft materials: biological membranes. In this context, flexoelectricity manifests itself as the development of polarization upon changes in curvature. Flexoelectricity is found to be important in a number of biological functions including hearing, ion transport and in some situations where mechanotransduction is necessary. In this work, we present a simple linearized theory of flexoelectricity in biological membranes and some illustrative examples. & 2013 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "0074ae2f7753c0ba51657dfb8ee76ccb",
"text": "Cooley and Tukey have disclosed a procedure for synthesizing and analyzing Fourier series for discrete periodic complex functions. For functions of period <i>N</i>, where <i>N</i> is a power of 2, computation times are proportional to <i>N</i> log<sub>2</sub> <i>N</i> as expressed in Eq. (0).",
"title": ""
},
{
"docid": "5b97d597534e65bf5d00f89d8df97767",
"text": "Research into online gaming has steadily increased over the last decade, although relatively little research has examined the relationship between online gaming addiction and personality factors. This study examined the relationship between a number of personality traits (sensation seeking, self-control, aggression, neuroticism, state anxiety, and trait anxiety) and online gaming addiction. Data were collected over a 1-month period using an opportunity sample of 123 university students at an East Midlands university in the United Kingdom. Gamers completed all the online questionnaires. Results of a multiple linear regression indicated that five traits (neuroticism, sensation seeking, trait anxiety, state anxiety, and aggression) displayed significant associations with online gaming addiction. The study suggests that certain personality traits may be important in the acquisition, development, and maintenance of online gaming addiction, although further research is needed to replicate the findings of the present study.",
"title": ""
},
{
"docid": "a50a9f45b25f21ce4ef04f686d25e36f",
"text": "Twitter is the largest and most popular micro-blogging website on Internet. Due to low publication barrier, anonymity and wide penetration, Twitter has become an easy target or platform for extremists to disseminate their ideologies and opinions by posting hate and extremism promoting tweets. Millions of tweets are posted on Twitter everyday and it is practically impossible for Twitter moderators or an intelligence and security analyst to manually identify such tweets, users and communities. However, automatic classification of tweets into predefined categories is a non-trivial problem problem due to short text of the tweet (the maximum length of a tweet can be 140 characters) and noisy content (incorrect grammar, spelling mistakes, presence of standard and non-standard abbreviations and slang). We frame the problem of hate and extremism promoting tweet detection as a one-class or unary-class categorization problem by learning a statistical model from a training set containing only the objects of one class . We propose several linguistic features such as presence of war, religious, negative emotions and offensive terms to discriminate hate and extremism promoting tweets from other tweets. We employ a single-class SVM and KNN algorithm for one-class classification task. We conduct a case-study on Jihad, perform a characterization study of the tweets and measure the precision and recall of the machine-learning based classifier. Experimental results on large and real-world dataset demonstrate that the proposed approach is effective with F-score of 0.60 and 0.83 for the KNN and SVM classifier respectively.",
"title": ""
},
{
"docid": "92993ce699e720568d2e1b12a605bc3e",
"text": "Techniques for violent scene detection and affective impact prediction in videos can be deployed in many applications. In MediaEval 2015, we explore deep learning methods to tackle this challenging problem. Our system consists of several deep learning features. First, we train a Convolutional Neural Network (CNN) model with a subset of ImageNet classes selected particularly for violence detection. Second, we adopt a specially designed two-stream CNN framework [1] to extract features on both static frames and motion optical flows. Third, Long Short Term Memory (LSTM) models are applied on top of the two-stream CNN features, which can capture the longer-term temporal dynamics. In addition, several conventional motion and audio features are also extracted as complementary information to the deep learning features. By fusing all the advanced features, we achieve a mean average precision of 0.296 in the violence detection subtask, and an accuracy of 0.418 and 0.488 for arousal and valence respectively in the induced affect detection subtask. 1. SYSTEM DESCRIPTION Figure 1 gives an overview of our system. In this short paper, we briefly describe each of the key components. For more information about the task definitions, interested readers may refer to [2].",
"title": ""
}
] | scidocsrr |
8b8dc7b5d0dd0560c4ce38e2aacd0143 | Training Confidence-calibrated Classifiers for Detecting Out-of-Distribution Samples | [
{
"docid": "d68360ff167b03691b79583c29ae8cd9",
"text": "Confidence calibration – the problem of predicting probability estimates representative of the true correctness likelihood – is important for classification models in many applications. We discover that modern neural networks, unlike those from a decade ago, are poorly calibrated. Through extensive experiments, we observe that depth, width, weight decay, and Batch Normalization are important factors influencing calibration. We evaluate the performance of various post-processing calibration methods on state-ofthe-art architectures with image and document classification datasets. Our analysis and experiments not only offer insights into neural network learning, but also provide a simple and straightforward recipe for practical settings: on most datasets, temperature scaling – a singleparameter variant of Platt Scaling – is surprisingly effective at calibrating predictions.",
"title": ""
}
] | [
{
"docid": "1635b235c59cc57682735202c0bb2e0d",
"text": "The introduction of structural imaging of the brain by computed tomography (CT) scans and magnetic resonance imaging (MRI) has further refined classification of head injury for prognostic, diagnosis, and treatment purposes. We describe a new classification scheme to be used both as a research and a clinical tool in association with other predictors of neurologic status.",
"title": ""
},
{
"docid": "f8ecc204d84c239b9f3d544fd8d74a5c",
"text": "Storyline detection from news articles aims at summarizing events described under a certain news topic and revealing how those events evolve over time. It is a difficult task because it requires first the detection of events from news articles published in different time periods and then the construction of storylines by linking events into coherent news stories. Moreover, each storyline has different hierarchical structures which are dependent across epochs. Existing approaches often ignore the dependency of hierarchical structures in storyline generation. In this paper, we propose an unsupervised Bayesian model, called dynamic storyline detection model, to extract structured representations and evolution patterns of storylines. The proposed model is evaluated on a large scale news corpus. Experimental results show that our proposed model outperforms several baseline approaches.",
"title": ""
},
{
"docid": "07ffe189312da8519c4a6260402a0b22",
"text": "Computational social science is an emerging research area at the intersection of computer science, statistics, and the social sciences, in which novel computational methods are used to answer questions about society. The field is inherently collaborative: social scientists provide vital context and insight into pertinent research questions, data sources, and acquisition methods, while statisticians and computer scientists contribute expertise in developing mathematical models and computational tools. New, large-scale sources of demographic, behavioral, and network data from the Internet, sensor networks, and crowdsourcing systems augment more traditional data sources to form the heart of this nascent discipline, along with recent advances in machine learning, statistics, social network analysis, and natural language processing. The related research area of social computing deals with the mechanisms through which people interact with computational systems, examining questions such as how and why people contribute user-generated content and how to design systems that better enable them to do so. Examples of social computing systems include prediction markets, crowdsourcing markets, product review sites, and collaboratively edited wikis, all of which encapsulate some notion of aggregating crowd wisdom, beliefs, or ideas—albeit in different ways. Like computational social science, social computing blends techniques from machine learning and statistics with ideas from the social sciences. For example, the economics literature on incentive design has been especially influential.",
"title": ""
},
{
"docid": "d35623e1c73a30c2879a1750df295246",
"text": "Online human textual interaction often carries important emotional meanings inaccessible to computers. We propose an approach to textual emotion recognition in the context of computer-mediated communication. The proposed recognition approach works at the sentence level and uses the standard Ekman emotion classification. It is grounded in a refined keyword-spotting method that employs: a WordNet-based word lexicon, a lexicon of emoticons, common abbreviations and colloquialisms, and a set of heuristic rules. The approach is implemented through the Synesketch software system. Synesketch is published as a free, open source software library. Several Synesketch-based applications presented in the paper, such as the the emotional visual chat, stress the practical value of the approach. Finally, the evaluation of the proposed emotion recognition algorithm shows high accuracy and promising results for future research and applications.",
"title": ""
},
{
"docid": "a6c185cbba7d1d039dd7ad06e09b1fbd",
"text": "History-based branch direction predictors for conditional branches are shown to be highly accurate. Indirect branches however, are hard to predict as they may have multiple targets corresponding to a single indirect branch instruction. We propose the Value Based BTB Indexing (VBBI), a correlation-based target address prediction scheme for indirect jump instructions. For each static hard-to-predict indirect jump instruction, the compiler identifies a ‘hint instruction’, whose output value strongly correlates with the target address of the indirect jump instruction. At run time, multiple target addresses of the indirect jump instruction are stored and subsequently accessed from the BTB at different indices computed using the jump instruction PC and the hint instruction output values. In case the hint instruction has not finished its execution when the jump instruction is fetched, a second and more accurate target address prediction is made when the hint instruction output is available, thus reducing the jump misprediction penalty. We compare our design to the regular BTB design and the best previously proposed indirect jump predictor, the tagged target cache (TTC). Our evaluation shows that the VBBI scheme improves the indirect jump target prediction accuracy by 48% and 18%, compared with the baseline BTB and TTC designs, respectively. This results in average performance improvement of 16.4% over the baseline BTB scheme, and 13% improvement over the TTC predictor. Out of this performance improvement 2% is contributed by target prediction overriding which is accurate 96% of the time.",
"title": ""
},
{
"docid": "8b67be5c3adac9bcdbc1aa836708987d",
"text": "The adaptive toolbox is a Darwinian-inspired theory that conceives of the mind as a modular system that is composed of heuristics, their building blocks, and evolved capacities. The study of the adaptive toolbox is descriptive and analyzes the selection and structure of heuristics in social and physical environments. The study of ecological rationality is prescriptive and identifies the structure of environments in which specific heuristics either succeed or fail. Results have been used for designing heuristics and environments to improve professional decision making in the real world.",
"title": ""
},
{
"docid": "2dfb8e3f50c1968b441872fa4aa13fec",
"text": "An ultra-wideband Vivaldi antenna with dual-polarization capability is presented. A two-section quarter-wave balun feedline is developed to feed the tapered slot antenna, which improves the impedance matching performance especially in the low frequency regions. The dual-polarization is realized by orthogonally combining two identical Vivaldi antennas without a galvanic contact. Measured results have been presented with a fractional bandwidth of 172% from 0.56 GHz to 7.36 GHz for S11 < −10 dB and a good port isolation of S21 < −22 dB. The measured antenna gain of up to 9.4 dBi and cross-polarization discrimination (XPD) of more than 18 dB is achieved, making the antenna suitable for mobile communication testing in chambers or open-site facilities.",
"title": ""
},
{
"docid": "aac39295e7e884237c5b929c32b3c050",
"text": "Leveraging the most recent success in expanding the electrochemical stability window of aqueous electrolytes, in this work we create a unique Li-ion/sulfur chemistry of both high energy density and safety. We show that in the superconcentrated aqueous electrolyte, lithiation of sulfur experiences phase change from a high-order polysulfide to low-order polysulfides through solid-liquid two-phase reaction pathway, where the liquid polysulfide phase in the sulfide electrode is thermodynamically phase-separated from the superconcentrated aqueous electrolyte. The sulfur with solid-liquid two-phase exhibits a reversible capacity of 1,327 mAh/(g of S), along with fast reaction kinetics and negligible polysulfide dissolution. By coupling a sulfur anode with different Li-ion cathode materials, the aqueous Li-ion/sulfur full cell delivers record-high energy densities up to 200 Wh/(kg of total electrode mass) for >1,000 cycles at ∼100% coulombic efficiency. These performances already approach that of commercial lithium-ion batteries (LIBs) using a nonaqueous electrolyte, along with intrinsic safety not possessed by the latter. The excellent performance of this aqueous battery chemistry significantly promotes the practical possibility of aqueous LIBs in large-format applications.",
"title": ""
},
{
"docid": "563dd9e9a2997606c8294b58b75011e5",
"text": "In ship, submarine, or airborne satellite communication or multi-function radar operations, dual-band phased array antennas with dual-linear or circular polarizations are needed. We present a dual-band/dual-polarization phased array design using a interleaved cross-dipole radiator and a cavity-backed disk radiator in the same lattice structure. The low band radiator is a disk radiator sitting on top of a dielectric puck in a cavity and the high band radiator is the cross dipole element printed on a low-K dielectric layer above the disk-cavity plane. Dual-linear or circular polarizations can be achieved using these two elements to cover two separate bands with about a 2:1 ratio. This is a relatively low profile, compact and rigid array. Good impedance match for both bands can be obtained over a wide scan volume.",
"title": ""
},
{
"docid": "56350d15aa156d6f43e80e39352a59b9",
"text": "As the further development of narrowband digital array radar, wideband digital array radar(WDAR) get more and more research all over the world, for it not only has the advantages of narrowband digital array radar such as compact structure, large dynamic range and flexible digital beam control ability, but also can do high resolution processing such as target imaging. In this paper, based on studying some existing experimental platforms of WDAR, the authors present the basic architecture and function modules of WDAR, analyze the characteristics of WDAR compared with conventional radar, and then some key technologies of WDAR are concisely discussed, the last section conclude the paper.",
"title": ""
},
{
"docid": "90fe763855ca6c4fabe4f9d042d5c61a",
"text": "While learning models of intuitive physics is an increasingly active area of research, current approaches still fall short of natural intelligences in one important regard: they require external supervision, such as explicit access to physical states, at training and sometimes even at test times. Some authors have relaxed such requirements by supplementing the model with an handcrafted physical simulator. Still, the resulting methods are unable to automatically learn new complex environments and to understand physical interactions within them. In this work, we demonstrated for the first time learning such predictors directly from raw visual observations and without relying on simulators. We do so in two steps: first, we learn to track mechanically-salient objects in videos using causality and equivariance, two unsupervised learning principles that do not require auto-encoding. Second, we demonstrate that the extracted positions are sufficient to successfully train visual motion predictors that can take the underlying environment into account. We validate our predictors on synthetic datasets; then, we introduce a new dataset, ROLL4REAL, consisting of real objects rolling on complex terrains (pool table, elliptical bowl, and random height-field). We show that in all such cases it is possible to learn reliable extrapolators of the object trajectories from raw videos alone, without any form of external supervision and with no more prior knowledge than the choice of a convolutional neural network architecture.",
"title": ""
},
{
"docid": "bf760ee2c4fe9c04f07638bd91d9675e",
"text": "Agile development methods are commonly used to iteratively develop the information systems and they can easily handle ever-changing business requirements. Scrum is one of the most popular agile software development frameworks. The popularity is caused by the simplified process framework and its focus on teamwork. The objective of Scrum is to deliver working software and demonstrate it to the customer faster and more frequent during the software development project. However the security requirements for the developing information systems have often a low priority. This requirements prioritization issue results in the situations where the solution meets all the business requirements but it is vulnerable to potential security threats. The major benefit of the Scrum framework is the iterative development approach and the opportunity to automate penetration tests. Therefore the security vulnerabilities can be discovered and solved more often which will positively contribute to the overall information system protection against potential hackers. In this research paper the authors propose how the agile software development framework Scrum can be enriched by considering the penetration tests and related security requirements during the software development lifecycle. Authors apply in this paper the knowledge and expertise from their previous work focused on development of the new information system penetration tests methodology PETA with focus on using COBIT 4.1 as the framework for management of these tests, and on previous work focused on tailoring the project management framework PRINCE2 with Scrum. The outcomes of this paper can be used primarily by the security managers, users, developers and auditors. The security managers may benefit from the iterative software development approach and penetration tests automation. The developers and users will better understand the importance of the penetration tests and they will learn how to effectively embed the tests into the agile development lifecycle. Last but not least the auditors may use the outcomes of this paper as recommendations for companies struggling with penetrations testing embedded in the agile software development process.",
"title": ""
},
{
"docid": "5170cb57e50cfb1c1b4e9fbccd12127b",
"text": "Mobile and wireless networks have made tremendous growth in the last fifteen years. Today 3G mobile systems are on the ground providing IP connectivity for real-time and non-realtime services. Then, the concepts of 4G is already much discussed and it is almost certain that 4G will include several standards under a common umbrella, similarly to 3G, but with IEEE 802.xx wireless mobile networks included from the beginning. The main contribution of this paper is definition of 5G (Fifth Generation) mobile network concept, which is seen as user-centric concept instead of operator-centric as in 3G or service-centric concept as seen for 4G. In the proposed concept the mobile user is on the top of all. The 5G terminals will have software defined radios and modulation scheme as well as new error-control schemes can be downloaded from the Internet on the run. The development is seen towards the user terminals as a focus of the5G mobile networks. The terminals will have access to different wireless technologies at the same time and the terminal should be able to combine different flows from different technologies. Each network will be responsible for handling user-mobility, while the terminal will make the final choice among different wireless/mobile access network providers for a given service. The proposal in this paper is fundamental shift in the mobile networking philosophy compared to existing 3G and near-soon 4G mobile technologies, and this concept is called here the 5G.",
"title": ""
},
{
"docid": "88ab27740e5c957993fd70f0bf6ac841",
"text": "We examine the problem of discrete stock price prediction using a synthesis of linguistic, financial and statistical techniques to create the Arizona Financial Text System (AZFinText). The research within this paper seeks to contribute to the AZFinText system by comparing AZFinText’s predictions against existing quantitative funds and human stock pricing experts. We approach this line of research using textual representation and statistical machine learning methods on financial news articles partitioned by similar industry and sector groupings. Through our research, we discovered that stocks partitioned by Sectors were most predictable in measures of Closeness, Mean Squared Error (MSE) score of 0.1954, predicted Directional Accuracy of 71.18% and a Simulated Trading return of 8.50% (compared to 5.62% for the S&P 500 index). In direct comparisons to existing market experts and quantitative mutual funds, our system’s trading return of 8.50% outperformed well-known trading experts. Our system also performed well against the top 10 quantitative mutual funds of 2005, where our system would have placed fifth. When comparing AZFinText against only those quantitative funds that monitor the same securities, AZFinText had a 2% higher return than the best performing quant fund.",
"title": ""
},
{
"docid": "09a50c87a1aa9f4ef8935049d9578963",
"text": "Online taxicab platforms like DiDi and Uber have impacted hundreds of millions of users on their choices of traveling, but how do users feel about the ride-sharing services, and how to improve their experience? While current ride-sharing services have collected massive travel data, it remains challenging to develop data-driven techniques for modeling and predicting user ride experience. In this work, we aim to accurately predict passenger satisfaction over their rides and understand the key factors that lead to good/bad experiences. Based on in-depth analysis of large-scale travel data from a popular taxicab platform in China, we develop PHINE (Pattern-aware Heterogeneous Information Network Embedding) for data-driven user experience modeling. Our PHINE framework is novel in that it is composed of spatial-temporal node binding and grouping for addressing the inherent data variation, and pattern preservation based joint training for modeling the interactions among drivers, passengers, locations, and time. Extensive experiments on 12 real-world travel datasets demonstrate the effectiveness of PHINE over strong baseline methods. We have deployed PHINE in the DiDi Big Data Center, delivering high-quality predictions for passenger satisfaction on a daily basis.",
"title": ""
},
{
"docid": "0a17722ba7fbeda51784cdd699f54b3f",
"text": "One of the greatest challenges food research is facing in this century lies in maintaining sustainable food production and at the same time delivering high quality food products with an added functionality to prevent life-style related diseases such as, cancer, obesity, diabetes, heart disease, stroke. Functional foods that contain bioactive components may provide desirable health benefits beyond basic nutrition and play important roles in the prevention of life-style related diseases. Polyphenols and carotenoids are plant secondary metabolites which are well recognized as natural antioxidants linked to the reduction of the development and progression of life-style related diseases. This chapter focuses on healthpromoting food ingredients (polyphenols and carotenoids), food structure and functionality, and bioavailability of these bioactive ingredients, with examples on their commercial applications, namely on functional foods. Thereafter, in order to support successful development of health-promoting food ingredients, this chapter contributes to an understanding of the relationship between food structures, ingredient functionality, in relation to the breakdown of food structures in the gastrointestinal tract and its impact on the bioavailability of bioactive ingredients. The overview on food processing techniques and the processing of functional foods given here will elaborate novel delivery systems for functional food ingredients and their applications in food. Finally, this chapter concludes with microencapsulation techniques and examples of encapsulation of polyphenols and carotenoids; the physical structure of microencapsulated food ingredients and their impacts on food sensorial properties; yielding an outline on the controlled release of encapsulated bioactive compounds in food products.",
"title": ""
},
{
"docid": "37a833b09bdf74b1fed7f20dd4ff699f",
"text": "The blood and lymphatic systems are the two major circulatory systems in our body. Although the blood system has been studied extensively, the lymphatic system has received much less scientific and medical attention because of its elusive morphology and mysterious pathophysiology. However, a series of landmark discoveries made in the past decade has begun to change the previous misconception of the lymphatic system to be secondary to the more essential blood vascular system. In this article, we review the current understanding of the development and pathology of the lymphatic system. We hope to convince readers that the lymphatic system is no less essential than the blood circulatory system for human health and well-being.",
"title": ""
},
{
"docid": "b8584fa2dc6882a3d9670f387ea8185c",
"text": "Measures aimed to improve the diversity of images and image features in evolutionary art help to direct search toward more novel and creative parts of the artistic search domain. To date such measures have not focused on selecting from all individuals based on their contribution to diversity of feature metrics. In recent work on TSP problem instance classification, selection based on a direct measure of each individual's contribution to diversity was successfully used to generate hard and easy TSP instances. In this work we use this search framework to evolve diverse variants of a source image in one and two feature dimensions. The resulting images show the spectrum of effects from transforming images to score across the range of each feature. The results also reveal interesting correlations between feature values in two dimensions.",
"title": ""
},
{
"docid": "786d1ba82d326370684395eba5ef7cd3",
"text": "A miniaturized dual-band Wilkinson power divider with a parallel LC circuit at the midpoints of two coupled-line sections is proposed in this paper. General design equations for parallel inductor L and capacitor C are derived from even- and odd-mode analysis. Generally speaking, characteristic impedances between even and odd modes are different in two coupled-line sections, and their electrical lengths are also different in inhomogeneous medium. This paper proved that a parallel LC circuit compensates for the characteristic impedance differences and the electrical length differences for dual-band operation. In other words, the proposed model provides self-compensation structure, and no extra compensation circuits are needed. Moreover, the upper limit of the frequency ratio range can be adjusted by two coupling strengths, where loose coupling for the first coupled-line section and tight coupling for the second coupled-line section are preferred for a wider frequency ratio range. Finally, an experimental circuit shows good agreement with the theoretical simulation.",
"title": ""
}
] | scidocsrr |
a6342b8695c4580618fd66a9c984e048 | Watching Subtitled Films Can Help Learning Foreign Languages | [
{
"docid": "fa99f24d38858b5951c7af587194f4e3",
"text": "Understanding foreign speech is difficult, in part because of unusual mappings between sounds and words. It is known that listeners in their native language can use lexical knowledge (about how words ought to sound) to learn how to interpret unusual speech-sounds. We therefore investigated whether subtitles, which provide lexical information, support perceptual learning about foreign speech. Dutch participants, unfamiliar with Scottish and Australian regional accents of English, watched Scottish or Australian English videos with Dutch, English or no subtitles, and then repeated audio fragments of both accents. Repetition of novel fragments was worse after Dutch-subtitle exposure but better after English-subtitle exposure. Native-language subtitles appear to create lexical interference, but foreign-language subtitles assist speech learning by indicating which words (and hence sounds) are being spoken.",
"title": ""
}
] | [
{
"docid": "9ec39badc92094783fcaaa28c2eb2f7a",
"text": "In trying to solve multiobjective optimization problems, many traditional methods scalarize the objective vector into a single objective. In those cases, the obtained solution is highly sensitive to the weight vector used in the scalarization process and demands that the user have knowledge about the underlying problem. Moreover, in solving multiobjective problems, designers may be interested in a set of Pareto-optimal points, instead of a single point. Since genetic algorithms (GAs) work with a population of points, it seems natural to use GAs in multiobjective optimization problems to capture a number of solutions simultaneously. Although a vector evaluated GA (VEGA) has been implemented by Schaffer and has been tried to solve a number of multiobjective problems, the algorithm seems to have bias toward some regions. In this paper, we investigate Goldberg's notion of nondominated sorting in GAs along with a niche and speciation method to find multiple Pareto-optimal points simultaneously. The proof-of-principle results obtained on three problems used by Schaffer and others suggest that the proposed method can be extended to higher dimensional and more difficult multiobjective problems. A number of suggestions for extension and application of the algorithm are also discussed.",
"title": ""
},
{
"docid": "2b605b67b31c0e3b09f9eef2a15c8bfe",
"text": "With the tremendous growth of wind power worldwide in the past decade, there has been an equally great demand for simplified, standard, and publicly available models for simulating wind power generators in commercially available power system simulation tools for stability analysis. Several efforts have been on the way to meet this need. The Western Electricity Coordinating Council's Renewable Energy Modeling Task Force has successfully achieved this goal and more recently has been working on expanding these models to include the ability to model complex plants, energy storage, and frequency response capabilities. This paper presents an account of these latest developments.",
"title": ""
},
{
"docid": "881c2d1fe3ed87fa628d30f879a4ce2e",
"text": "Healthcare industry has perpetually been on the forefront in the adoption and utilization of information and communication technologies (ICT) for the efficient healthcare administration and treatment. Recent developments in ICT and the emergence of Internet of Things (IoT) have opened up new avenues for research and exploration in the all fields including medical and healthcare industry. Hospitals have started using the cell instruments for communication intent and for this intent internet of things (IoT) has been used and fused with wi-fi sensor node reminiscent of RFID, NFC tag and small sensor nodes. The usage of a cellular agent in healthcare procedure underneath wi-fi community environment gives a chance to explore improved services for patients and staffs reminiscent of medical professionals and nurses given that of its mobility. In this paper novel method to utilize it IoT within the field of scientific and crafty wellness care are presented. The majority of the survey exist about the different healthcare approaches used in the IoT, similar to, wireless well-being monitoring, U-healthcare, E-healthcare, Age-friendly healthcare techniques. This paper describes and proposes a complete monitoring existence cycle and effective healthcare monitoring system designed by using the IoT and RFID tags. The experimental results in this paper show the robust output against various medical emergencies. In this system to get the veracious evaluation results, supervising and weighing the health status of patient and to increase the power of IoT, the combination of microcontroller with sensors is presented.",
"title": ""
},
{
"docid": "92d3987fc0b5d5962f50871ecc23743e",
"text": "Wireless sensor networks (WSNs) have become a hot area of research in recent years due to the realization of their ability in myriad applications including military surveillance, facility monitoring, target detection, and health care applications. However, many WSN design problems involve tradeoffs between multiple conflicting optimization objectives such as coverage preservation and energy conservation. Many of the existing sensor network design approaches, however, generally focus on a single optimization objective. For example, while both energy conservation in a cluster-based WSNs and coverage-maintenance protocols have been extensively studied in the past, these have not been integrated in a multi-objective optimization manner. This paper employs a recently developed multiobjective optimization algorithm, the so-called multi-objective evolutionary algorithm based on decomposition (MOEA/D) to solve simultaneously the coverage preservation and energy conservation design problems in cluster-based WSNs. The performance of the proposed approach, in terms of coverage and network lifetime is compared with a state-of-the-art evolutionary approach called NSGA II. Under the same environments, simulation results on different network topologies reveal that MOEA/D provides a feasible approach for extending the network lifetime while preserving more coverage area.",
"title": ""
},
{
"docid": "834239a853196d410784b648fd96e456",
"text": "Online consumer reviews can help customers decrease uncertainty and risk faced in online shopping. However, information overload and conflicting comments in online reviews can get consumers confused. Therefore, it is important for both researchers and practitioners to understand the characteristics of helpful reviews. But studies examining the determinants of perceived review helpfulness produce mixed findings. We review extant research about the determinant factors of perceived helpfulness. Conflicting findings exist for six review related factors, namely review extremity, review readability, review total votes, linear review rating, quadratic review rating, and review sentiment. We conduct a metaanalysis to reconcile the contradictory findings on the influence of review related factors over perceived review helpfulness. The meta-analysis results confirm that review extremity, readability, total votes, and positive sentiment have a negative influence on helpfulness, but review rating is positively related to helpfulness. We also examine those studies whose findings are contradictive with the meta-analysis results. Measure discrepancy and reviewed product type are the two main reasons why mixed findings exist in extant research.",
"title": ""
},
{
"docid": "e86a7a9b16ab38954a4c71d33f717106",
"text": "OBJECTIVE\nTo evaluate the usefulness of septal batten grafts to correct cartilaginous septal deformities in endonasal septoplasty.\n\n\nDESIGN\nRetrospective study.\n\n\nSETTING\nUniversity medical center.\n\n\nPATIENTS\nOf 430 patients who underwent endonasal septoplasties from January 2006 to January 2011, 30 received septal batten grafts and were enrolled in the study. Twenty-eight patients were male and 2 were female.\n\n\nMAIN OUTCOME MEASURES\nThirty consecutive patients received septal batten grafts and were followed up for more than 6 months. Patterns of septal deformity, materials used for batten graft, surgical results, symptom improvement, findings of acoustic rhinometry, and surgical complications were investigated.\n\n\nRESULTS\nAmong the 30 patients, 5 were revision cases. Most of the deformities were characterized as moderate to severe degrees of curved or angulated deviations of the cartilaginous septum. The batten graft was performed with either septal cartilage (n = 21) or bony septum (n = 9). A straight septum was achieved in 90% of all procedures. Subjective symptoms of nasal obstruction were improved in all patients, as evaluated by the Nasal Obstruction Symptom Evaluation scale. Acoustic rhinometry revealed that after surgery the mean minimal cross-sectional area changed from 0.33 cm² to 0.42 cm² (P = .02) and the nasal volume from 4.71 mL to 6.28 mL (P = .02). There were no major complications, eg, septal perforation or saddle nose, and no revision surgery was needed.\n\n\nCONCLUSION\nEndonasal septal batten graft is a safe, useful, and effective technique to straighten moderate to severe septal cartilage deformities that are otherwise not correctable via conventional septoplasty techniques.",
"title": ""
},
{
"docid": "682432bc24847bcca3fdeba01c08a5c6",
"text": "The effect of high K-concentration, insulin and the L-type Ca 2+ channel blocker PN 200-110 on cytosolic intracellular free calcium ([Ca2+]i) was studied in single ventricular myocytes of 10-day-old embryonic chick heart, 20-week-old human fetus and rabbit aorta (VSM) single cells using the Ca2+-sensitive fluorescent dye, Fura-2 microfluorometry and digital imaging technique. Depolarization of the cell membrane of both heart and VSM cells with continuous superfusion of 30 mM [K+]o induced a rapid transient increase of [Ca2+]j that was followed by a sustained component. The early transient increase of [Ca2+]i by high [K+]o was blocked by the L-type calcium channel antagonist nifedipine. However, the sustained component was found to be insensitive to this drug. PN 200-110 another L-type Ca 2+ blocker was found to decrease both the early transient and the sustained increase of [Ca2+]i induced by depolarization of the cell membrane with high [K+]o. Insulin at a concentration of 40 to 80 tzU/rnl only produced a sustained increase of [Ca2+]i that was blocked by PN 200-110 or by lowering the extracellular Ca 2+ concentration with EGTA. The sustained increase of [Ca2+]i induced by high [K+]o or insulin was insensitive to metabolic inhibitors such as KCN and ouabain as well to the fast Na + channel blocker, tetrodotoxin and to the increase of intracellular concentrations of cyclic nucleotides. Using the patch clamp technique, insulin did not affect the L-type Ca 2+ current and the delayed outward K + current. These results suggest that the early increase of [Ca2+]i during depolarization of the cell membrane of heart and VSM cells with high [K+]o is due to the opening and decay of an L-type Ca z+ channel. However, the sustained increase of [Ca2+]i during a sustained depolarization is due to the activation of a resting (R) Ca 2+ channel that is insensitive to lowering [ATP]i and sensitive to insulin. (Mol Cell Biochem 117: 93--106, 1992)",
"title": ""
},
{
"docid": "63be439a99df4a16976d4006602c25a9",
"text": "Measuring the spatiotemporal complexity of cortical responses to direct perturbations provides a reliable index of the brain's capacity for consciousness in humans under both physiological and pathological conditions. Upon loss of consciousness, the complex pattern of causal interactions observed during wakefulness collapses into a stereotypical slow wave, suggesting that cortical bistability may play a role. Bistability is mainly expressed in the form of slow oscillations, a default pattern of activity that emerges from cortical networks in conditions of functional or anatomical disconnection. Here, we employ an in vitro model to understand the relationship between bistability and complexity in cortical circuits. We adapted the perturbational complexity index applied in humans to electrically stimulated cortical slices under different neuromodulatory conditions. At this microscale level, we demonstrate that perturbational complexity can be effectively modulated by pharmacological reduction of bistability and, albeit to a lesser extent, by enhancement of excitability, providing mechanistic insights into the macroscale measurements performed in humans.",
"title": ""
},
{
"docid": "d742bec0d6fd34443866c2df5e108f2b",
"text": "Automation of the surrounding environment of a modern human being allows increasing his wor k efficiency and comfort. There has been a significant developme nt in the area of an individual’s routine tasks and those can be automated. In the present times, we can find most o f the people clinging to their mobile phones and sm art devices throughout the day. Hence with the help of his comp anion – a mobile phone, some daily household tasks can be accomplished by personifying the use of the mobile phone. Analyzing the current smart phone market, novice mobile users are opting for Android based phones. It has b ecome a second name for a mobile phone in layman te rms. Home Automation System (HAS) has been designed for mobil e phones having Android platform to automate an 8 bit Bluetooth interfaced microcontroller which controls a number of home appliances like lights, fans, bulbs and man y more using on/off relay. This paper presents the automated app roach of controlling the devices in a household tha t could ease the tasks of using the traditional method of the switch . The most famous and efficient technology for shor t range wireless communicationBluetooth is used here to automate t he system. The HAS system for Android users is a st ep towards the ease of the tasks by controlling one to twenty four different appliances in any home environment.",
"title": ""
},
{
"docid": "35225f6ca92daf5b17bdd2a5395b83ca",
"text": "A neural network with a single layer of hidden units of gaussian type is proved to be a universal approximator for real-valued maps defined on convex, compact sets of Rn.",
"title": ""
},
{
"docid": "cc3f821bd9617d31a8b303c4982e605f",
"text": "Body composition in older adults can be assessed using simple, convenient but less precise anthropometric methods to assess (regional) body fat and skeletal muscle, or more elaborate, precise and costly methods such as computed tomography and magnetic resonance imaging. Body weight and body fat percentage generally increase with aging due to an accumulation of body fat and a decline in skeletal muscle mass. Body weight and fatness plateau at age 75–80 years, followed by a gradual decline. However, individual weight patterns may differ and the periods of weight loss and weight (re)gain common in old age may affect body composition. Body fat redistributes with aging, with decreasing subcutaneous and appendicular fat and increasing visceral and ectopic fat. Skeletal muscle mass declines with aging, a process called sarcopenia. Obesity in old age is associated with a higher risk of mobility limitations, disability and mortality. A higher waist circumference and more visceral fat increase these risks, independent of overall body fatness, as do involuntary weight loss and weight cycling. The role of low skeletal muscle mass in the development of mobility limitations and disability remains controversial, but it is much smaller than the role of high body fat. Low muscle mass does not seem to increase mortality risk in older adults.",
"title": ""
},
{
"docid": "0a80057b2c43648e668809e185a68fe6",
"text": "A seminar that surveys state-of-the-art microprocessors offers an excellent forum for students to see how computer architecture techniques are employed in practice and for them to gain a detailed knowledge of the state of the art in microprocessor design. Princeton and the University of Virginia have developed such a seminar, organized around student presentations and a substantial research project. The course can accommodate a range of students, from advanced undergraduates to senior graduate students. The course can also be easily adapted to a survey of embedded processors. This paper describes the version taught at the University of Virginia and lessons learned from the experience.",
"title": ""
},
{
"docid": "d94d0db91e65bde2b1918ca95cc275bb",
"text": "This study was undertaken to investigate the positive and negative effects of excessive Internet use on undergraduate students. The Internet Effect Scale (IES), especially constructed by the authors to determine these effects, consisted of seven dimensions namely: behavioral problems, interpersonal problems, educational problems, psychological problems, physical problems, Internet abuse, and positive effects. The sample consisted of 200 undergraduate students studying at the GC University Lahore, Pakistan. A set of Pearson Product Moment correlations showed positive associations between time spent on the Internet and various dimensions of the IES indicating that excessive Internet use can lead to a host of problems of educational, physical, psychological and interpersonal nature. However, a greater number of students reported positive than negative effects of Internet use. Without negating the advantages of Internet, the current findings suggest that Internet use should be within reasonable limits focusing more on activities enhancing one's productivity.",
"title": ""
},
{
"docid": "c2c409f637e006f11804113220a4092b",
"text": "Mortality in patients with pulmonary tuberculosis remains high, especially in those who develop acute respiratory distress syndrome (ARDS). We report on a-48-year-old man with ARDS due to severe pulmonary tuberculosis who was rescued by extracorporeal membrane oxygenation (ECMO). He was initially hospitalized in the intensive care unit and noninvasive positive-pressure ventilation started. He was also administered anti-tuberculosis drugs and received systemic corticosteroid therapy. Six days later, further deterioration of gas exchange prompted the decision to intubate. However, he experienced progressive deterioration of arterial oxygenation despite conventional ventilatory support. We therefore decided to administer ECMO on day 9. After initiation of these treatments and ECMO support, pulmonary infiltrate and oxygenation status gradually improved and ECMO was discontinued on day 52. The patient was finally discharged from our hospital without severe disability. ECMO should be considered one of the treatment options for the management of ARDS due to severe pulmonary tuberculosis.",
"title": ""
},
{
"docid": "a6f1480f52d142a013bb88a92e47b0d7",
"text": "An isolated switched high step up boost DC-DC converter is discussed in this paper. The main objective of this paper is to step up low voltage to very high voltage. This paper mainly initiates at boosting a 30V DC into 240V DC. The discussed converter benefits from the continuous input current. Usually, step-up DC-DC converters are suitable for input whose voltage level is very low. The circuital design comprises of four main stages. Firstly, an impedance network which is used to boost the low input voltage. Secondly a switching network which is used to boost the input voltage then an isolation transformer which is used to provide higher boosting ability and finally a voltage multiplier rectifier which is used to rectify the secondary voltage of the transformer. No switching deadtime is required, which increases the reliability of the converter. Comparing with the existing step-up topologies indicates that this new design is hybrid, portable, higher power density and the size of the whole system is also reduced. The principles as well as operations were analysed and experimentally worked out, which provides a higher efficiency. KeywordImpedance Network, Switching Network, Isolation Transformer, Voltage Multiplier Rectifier, MicroController, DC-DC Boost Converter __________________________________________________________________________________________________",
"title": ""
},
{
"docid": "db98bd36655243109e0497899b093375",
"text": "The Cameron project has developed a language called single assignment C (SA-C), and a compiler for mapping image-based applications written in SA-C to field programmable gate arrays (FPGAs). The paper tests this technology by implementing several applications in SA-C and compiling them to an Annapolis Microsystems (AMS) WildStar board with a Xilinx XV2000E FPGA. The performance of these applications on the FPGA is compared to the performance of the same applications written in assembly code or C for an 800 MHz Pentium III. (Although no comparison across processors is perfect, these chips were the first of their respective classes fabricated at 0.18 microns, and are therefore of comparable ages.) We find that applications written in SA-C and compiled to FPGAs are between 8 and 800 times faster than the equivalent program run on the Pentium III.",
"title": ""
},
{
"docid": "68388b2f67030d85030d5813df2e147d",
"text": "Radio signal propagation modeling plays an important role in designing wireless communication systems. The propagation models are used to calculate the number and position of base stations and predict the radio coverage. Different models have been developed to predict radio propagation behavior for wireless communication systems in different operating environments. In this paper we shall limit our discussion to the latest achievements in radio propagation modeling related to tunnels. The main modeling approaches used for propagation in tunnels are reviewed, namely, numerical methods for solving Maxwell equations, waveguide or modal approach, ray tracing based methods and two-slope path loss modeling. They are discussed in terms of modeling complexity and required information on the environment including tunnel geometry and electric as well as magnetic properties of walls.",
"title": ""
},
{
"docid": "44ef466e59603fc90a30217e7fab00cf",
"text": "We address the problem of content-aware, foresighted resource reciprocation for media streaming over peer-to-peer (P2P) networks. The envisioned P2P network consists of autonomous and self-interested peers trying to maximize their individual utilities. The resource reciprocation among such peers is modeled as a stochastic game and peers determine the optimal strategies for resource reciprocation using a Markov Decision Process (MDP) framework. Unlike existing solutions, this framework takes the content and the characteristics of the video signal into account by introducing an artificial currency in order to maximize the video quality in the entire network.",
"title": ""
},
{
"docid": "39036fc99ab177774593bd0fb0fbeef0",
"text": "Manipulation of deformable objects, such as ropes and cloth, is an important but challenging problem in robotics. We present a learning-based system where a robot takes as input a sequence of images of a human manipulating a rope from an initial to goal configuration, and outputs a sequence of actions that can reproduce the human demonstration, using only monocular images as input. To perform this task, the robot learns a pixel-level inverse dynamics model of rope manipulation directly from images in a self-supervised manner, using about 60K interactions with the rope collected autonomously by the robot. The human demonstration provides a high-level plan of what to do and the low-level inverse model is used to execute the plan. We show that by combining the high and low-level plans, the robot can successfully manipulate a rope into a variety of target shapes using only a sequence of human-provided images for direction.",
"title": ""
},
{
"docid": "0151ad8176711618e6cd5b0e20abf0cb",
"text": "Skeleton-based action recognition has made great progress recently, but many problems still remain unsolved. For example, the representations of skeleton sequences captured by most of the previous methods lack spatial structure information and detailed temporal dynamics features. In this paper, we propose a novel model with spatial reasoning and temporal stack learning (SR-TSL) for skeleton-based action recognition, which consists of a spatial reasoning network (SRN) and a temporal stack learning network (TSLN). The SRN can capture the high-level spatial structural information within each frame by a residual graph neural network, while the TSLN can model the detailed temporal dynamics of skeleton sequences by a composition of multiple skip-clip LSTMs. During training, we propose a clip-based incremental loss to optimize the model. We perform extensive experiments on the SYSU 3D Human-Object Interaction dataset and NTU RGB+D dataset and verify the effectiveness of each network of our model. The comparison results illustrate that our approach achieves much better results than the state-of-the-art methods.",
"title": ""
}
] | scidocsrr |
6df1a7305a93c3b3d8ea7de8d3e0cab0 | Design of a Single-Switch DC/DC Converter for a PV-Battery-Powered Pump System With PFM+PWM Control | [
{
"docid": "91ff59f45c49a6951b6ae0e801661d57",
"text": "This paper presents the analysis, design, and implementation of a parallel connected maximum power point tracking (MPPT) system for stand-alone photovoltaic power generation. The parallel connection of the MPPT system reduces the negative influence of power converter losses in the overall efficiency because only a part of the generated power is processed by the MPPT system. Furthermore, all control algorithms used in the classical series-connected MPPT can be applied to the parallel system. A simple bidirectional dc-dc power converter is proposed for the MPPT implementation and presents the functions of battery charger and step-up converter. The operation characteristics of the proposed circuit are analyzed with the implementation of a prototype in a practical application.",
"title": ""
}
] | [
{
"docid": "f0d76f2795747fdf9abd006dd2f59043",
"text": "Over the past century, a major shift in North American food practices has been taking place. However, the literature on this topic is lacking in several areas. Some available research on food and cooking practices in the current context is presented, with a focus on how these are affecting health and how they might be contributing to health inequalities within the population. First, cooking and cooking skills are examined, along with the ambiguities related to terms associated with cooking in the research literature. Food choice, cooking, and health are described, particularly in relation to economic factors that may lead to health inequalities within the population. The importance of developing an understanding of factors within the wider food system as part of food choice and cooking skills is presented, and gaps in the research literature are examined and areas for future research are presented. Cooking practices are not well studied but are important to an understanding of human nutritional health as it relates to cultural, environmental, and economic factors.",
"title": ""
},
{
"docid": "4650411615ad68be9596e5de3c0613f1",
"text": "Based on the limitations of traditional English class, an English listening class was designed by Edmodo platform through making use of the advantages of flipped classroom. On this class, students will carry out online autonomous learning before class, teacher will guide students learning collaboratively in class, as well as after-school reflection and summary will be realized. By analyzing teaching effect on flipped classroom, it can provide reference and teaching model for English listening classes in local universities.",
"title": ""
},
{
"docid": "eacf6862ee299f933d5ae73612e40223",
"text": "Purpose of this paper is to approach and solve Sudoku as a Constraint Satisfaction Problem and to compare various heuristics and their effects on solving the problem. Heuristics compared include Backtracking with Forward Checking and Minimum Remaining Value, Arc Consistency, and Arc Consistency Pre-Processing.",
"title": ""
},
{
"docid": "55772e55adb83d4fd383ddebcf564a71",
"text": "The generation of multi-functional drug delivery systems, namely solid dosage forms loaded with nano-sized carriers, remains little explored and is still a challenge for formulators. For the first time, the coupling of two important technologies, 3D printing and nanotechnology, to produce innovative solid dosage forms containing drug-loaded nanocapsules was evaluated here. Drug delivery devices were prepared by fused deposition modelling (FDM) from poly(ε-caprolactone) (PCL) and Eudragit® RL100 (ERL) filaments with or without a channelling agent (mannitol). They were soaked in deflazacort-loaded nanocapsules (particle size: 138nm) to produce 3D printed tablets (printlets) loaded with them, as observed by SEM. Drug loading was improved by the presence of the channelling agent and a linear correlation was obtained between the soaking time and the drug loading (r2=0.9739). Moreover, drug release profiles were dependent on the polymeric material of tablets and the presence of the channelling agent. In particular, tablets prepared with a partially hollow core (50% infill) had a higher drug loading (0.27% w/w) and faster drug release rate. This study represents an original approach to convert nanocapsules suspensions into solid dosage forms as well as an efficient 3D printing method to produce novel drug delivery systems, as personalised nanomedicines.",
"title": ""
},
{
"docid": "09c50033443696a183dcdb1e0fc93cf0",
"text": "In this paper, we introduce a novel FPGA architecture with memristor-based reconfiguration (mrFPGA). The proposed architecture is based on the existing CMOS-compatible memristor fabrication process. The programmable interconnects of mrFPGA use only memristors and metal wires so that the interconnects can be fabricated over logic blocks, resulting in significant reduction of overall area and interconnect delay but without using a 3D die-stacking process. Using memristors to build up the interconnects can also provide capacitance shielding from unused routing paths and reduce interconnect delay further. Moreover we propose an improved architecture that allows adaptive buffer insertion in interconnects to achieve more speedup. Compared to the fixed buffer pattern in conventional FPGAs, the positions of inserted buffers in mrFPGA are optimized on demand. A complete CAD flow is provided for mrFPGA, with an advanced P&R tool named mrVPR that was developed for mrFPGA. The tool can deal with the novel routing structure of mrFPGA, the memristor shielding effect, and the algorithm for optimal buffer insertion. We evaluate the area, performance and power consumption of mrFPGA based on the 20 largest MCNC benchmark circuits. Results show that mrFPGA achieves 5.18x area savings, 2.28x speedup and 1.63x power savings. Further improvement is expected with combination of 3D technologies and mrFPGA.",
"title": ""
},
{
"docid": "dcd82cbb2b89585c69b6483b6e77050f",
"text": "In recent years, the technological advances in mapping genes have made it increasingly easy to store and use a wide variety of biological data. Such data are usually in the form of very long strings for which it is difficult to determine the most relevant features for a classification task. For example, a typical DNA string may be millions of characters long, and there may be thousands of such strings in a database. In many cases, the classification behavior of the data may be hidden in the compositional behavior of certain segments of the string which cannot be easily determined apriori. Another problem which complicates the classification task is that in some cases the classification behavior is reflected in global behavior of the string, whereas in others it is reflected in local patterns. Given the enormous variation in the behavior of the strings over different data sets, it is useful to develop an approach which is sensitive to both the global and local behavior of the strings for the purpose of classification. For this purpose, we will exploit the multi-resolution property of wavelet decomposition in order to create a scheme which can mine classification characteristics at different levels of granularity. The resulting scheme turns out to be very effective in practice on a wide range of problems.",
"title": ""
},
{
"docid": "a730a3c079e9cdb2c77fa945cbc8f685",
"text": "In the last 30 years a sea of change has occurred in the outlook for these cancers. Chemotherapy has allowed better local and systemic control5, 6. Better imaging with CT and MRI has allowed the surgeon to accurately define the extent and therefore plan tumor resection. Advances in bioengineering have provided exciting options for reconstruction and the world has moved from amputation to limb salvage. In osteosarcoma, survival improved from dismal 10-20% to 50-70%7, 8. Long term studies showed that limb salvage operations, performed with wide margins and chemotherapy did not compromise the survival or local control compared to an amputation9-14.",
"title": ""
},
{
"docid": "33a2037df789e61a72efdab53afd9995",
"text": "Cancer-associated cachexia is a disorder characterized by loss of body weight with specific losses of skeletal muscle and adipose tissue. Cachexia is driven by a variable combination of reduced food intake and metabolic changes, including elevated energy expenditure, excess catabolism and inflammation. Cachexia is highly associated with cancers of the pancreas, oesophagus, stomach, lung, liver and bowel; this group of malignancies is responsible for half of all cancer deaths worldwide. Cachexia involves diverse mediators derived from the cancer cells and cells within the tumour microenvironment, including inflammatory and immune cells. In addition, endocrine, metabolic and central nervous system perturbations combine with these mediators to elicit catabolic changes in skeletal and cardiac muscle and adipose tissue. At the tissue level, mechanisms include activation of inflammation, proteolysis, autophagy and lipolysis. Cachexia associates with a multitude of morbidities encompassing functional, metabolic and immune disorders as well as aggravated toxicity and complications of cancer therapy. Patients experience impaired quality of life, reduced physical, emotional and social well-being and increased use of healthcare resources. To date, no effective medical intervention completely reverses cachexia and there are no approved drug therapies. Adequate nutritional support remains a mainstay of cachexia therapy, whereas drugs that target overactivation of catabolic processes, cell injury and inflammation are currently under investigation.",
"title": ""
},
{
"docid": "d2cefbafb0d0ab30daa17630bc800026",
"text": "To assess the feasibility, technical success, and effectiveness of high-resolution magnetic resonance (MR)-guided posterior femoral cutaneous nerve (PFCN) blocks. A retrospective analysis of 12 posterior femoral cutaneous nerve blocks in 8 patients [6 (75 %) female, 2 (25 %) male; mean age, 47 years; range, 42–84 years] with chronic perineal pain suggesting PFCN neuropathy was performed. Procedures were performed with a clinical wide-bore 1.5-T MR imaging system. High-resolution MR imaging was utilized for visualization and targeting of the PFCN. Commercially available, MR-compatible 20-G needles were used for drug delivery. Variables assessed were technical success (defined as injectant surrounding the targeted PFCN on post-intervention MR images) effectiveness, (defined as post-interventional regional anesthesia of the target area innervation downstream from the posterior femoral cutaneous nerve block), rate of complications, and length of procedure time. MR-guided PFCN injections were technically successful in 12/12 cases (100 %) with uniform perineural distribution of the injectant. All blocks were effective and resulted in post-interventional regional anesthesia of the expected areas (12/12, 100 %). No complications occurred during the procedure or during follow-up. The average total procedure time was 45 min (30–70) min. Our initial results demonstrate that this technique of selective MR-guided PFCN blocks is feasible and suggest high technical success and effectiveness. Larger studies are needed to confirm our initial results.",
"title": ""
},
{
"docid": "c16381b3e4c0accf5388863ea858245d",
"text": "This article presents recent achievements and trends in high-speed indoor visible light communication (VLC) research. We address potential applications and future visions for the VLC technology, where transport of information is “piggybacked” on the original lighting function of LED-based lamps. To mature this technology and transfer it into practice, our recent research is focused on real-time implementation and trials. For the first time, a bidirectional real-time VLC prototype achieving data rates of up to 500 Mb/s is presented. This system paves the way for future real world applications. Finally, we discuss the remaining technical challenges as well as the research outlook in the field of high-speed VLC systems.",
"title": ""
},
{
"docid": "7fea0d7636249086c8f2017fec3f3f78",
"text": "This paper introduces a method of constructing random numbergenerators from four of the basic primitives provided by FPGAs: Flip-Flips, Lookup-Tables, Shift Registers, and RAMs. The construction methodis designed to ensure maximum clock rates, while using the minimum of resources, and providing statistical quality at the level of the best software generators. In all platforms tested, the generators are limited in speed only by the clock distribution network or the maximum clockspeed of the underlying RAM primitives, using a platform independent VHDL description with no placement or other hints. The area utilisation is also very low, with a Virtex-5 generator requiring just one Block-RAMand 41 slices to produce 48Gb/s at 550MHz: over 14 times faster than the commonly used Mersenne-Twister RNG on an Opteron at 2.2GHz, while providing the same level of quality",
"title": ""
},
{
"docid": "27513d1309f370e9bd8426d0d9971447",
"text": "Online social networks can often be represented as heterogeneous information networks containing abundant information about: who, where, when and what. Nowadays, people are usually involved in multiple social networks simultaneously. The multiple accounts of the same user in different networks are mostly isolated from each other without any connection between them. Discovering the correspondence of these accounts across multiple social networks is a crucial prerequisite for many interesting inter-network applications, such as link recommendation and community analysis using information from multiple networks. In this paper, we study the problem of anchor link prediction across multiple heterogeneous social networks, i.e., discovering the correspondence among different accounts of the same user. Unlike most prior work on link prediction and network alignment, we assume that the anchor links are one-to-one relationships (i.e., no two edges share a common endpoint) between the accounts in two social networks, and a small number of anchor links are known beforehand. We propose to extract heterogeneous features from multiple heterogeneous networks for anchor link prediction, including user's social, spatial, temporal and text information. Then we formulate the inference problem for anchor links as a stable matching problem between the two sets of user accounts in two different networks. An effective solution, MNA (Multi-Network Anchoring), is derived to infer anchor links w.r.t. the one-to-one constraint. Extensive experiments on two real-world heterogeneous social networks show that our MNA model consistently outperform other commonly-used baselines on anchor link prediction.",
"title": ""
},
{
"docid": "e10249cbe600bfeec5bd9d7f00d34540",
"text": "In this paper, we consider first-order methods for solving stochastic non-convex optimization problems. The key building block of the proposed algorithms is firstorder procedures to extract negative curvature from the Hessian matrix through a principled sequence starting from noise, which are referred to NEgative-curvatureOriginated-from-Noise or NEON and are of independent interest. Based on this building block, we design purely first-order stochastic algorithms for escaping from non-degenerate saddle points with a much better time complexity (almost linear time in the problem’s dimensionality) under a bounded variance condition of stochastic gradients than previous first-order stochastic algorithms. In particular, we develop a general framework of first-order stochastic algorithms with a secondorder convergence guarantee based on our new technique and existing algorithms that may only converge to a first-order stationary point. For finding a nearly second-order stationary point x such that ‖∇F (x)‖ ≤ and ∇F (x) ≥ − √ I (in high probability), the best time complexity of the presented algorithms is Õ(d/ ), where F (·) denotes the objective function and d is the dimensionality of the problem. To the best of our knowledge, this is the first theoretical result of first-order stochastic algorithms with an almost linear time in terms of problem’s dimensionality for finding second-order stationary points, which is even competitive with existing stochastic algorithms hinging on the second-order information.",
"title": ""
},
{
"docid": "d529d1052fce64ae05fbc64d2b0450ab",
"text": "Today, many industrial companies must face problems raised by maintenance. In particular, the anomaly detection problem is probably one of the most challenging. In this paper we focus on the railway maintenance task and propose to automatically detect anomalies in order to predict in advance potential failures. We first address the problem of characterizing normal behavior. In order to extract interesting patterns, we have developed a method to take into account the contextual criteria associated to railway data (itinerary, weather conditions, etc.). We then measure the compliance of new data, according to extracted knowledge, and provide information about the seriousness and the exact localization of a detected anomaly. 2010 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "aa6dd2e44b992dd7f11c5d82f0b11556",
"text": "It is well known that violent video games increase aggression, and that stress increases aggression. Many violent video games can be stressful because enemies are trying to kill players. The present study investigates whether violent games increase aggression by inducing stress in players. Stress was measured using cardiac coherence, defined as the synchronization of the rhythm of breathing to the rhythm of the heart. We predicted that cardiac coherence would mediate the link between exposure to violent video games and subsequent aggression. Specifically, we predicted that playing a violent video game would decrease cardiac coherence, and that cardiac coherence, in turn, would correlate negatively with aggression. Participants (N = 77) played a violent or nonviolent video game for 20 min. Cardiac coherence was measured before and during game play. After game play, participants had the opportunity to blast a confederate with loud noise through headphones during a reaction time task. The intensity and duration of noise blasts given to the confederate was used to measure aggression. As expected, violent video game players had lower cardiac coherence levels and higher aggression levels than did nonviolent game players. Cardiac coherence, in turn, was negatively related to aggression. This research offers another possible reason why violent games can increase aggression-by inducing stress. Cardiac coherence can be a useful tool to measure stress induced by violent video games. Cardiac coherence has several desirable methodological features as well: it is noninvasive, stable against environmental disturbances, relatively inexpensive, not subject to demand characteristics, and easy to use.",
"title": ""
},
{
"docid": "b4ab47d8ec52d7a8e989bfc9d6c0d173",
"text": "In this paper, we consider the problem of recovering the spatial layout of indoor scenes from monocular images. The presence of clutter is a major problem for existing single-view 3D reconstruction algorithms, most of which rely on finding the ground-wall boundary. In most rooms, this boundary is partially or entirely occluded. We gain robustness to clutter by modeling the global room space with a parameteric 3D “box” and by iteratively localizing clutter and refitting the box. To fit the box, we introduce a structured learning algorithm that chooses the set of parameters to minimize error, based on global perspective cues. On a dataset of 308 images, we demonstrate the ability of our algorithm to recover spatial layout in cluttered rooms and show several examples of estimated free space.",
"title": ""
},
{
"docid": "3c848d254ae907a75dcbf502ed94aa84",
"text": "We study the problem of computing routes for electric vehicles (EVs) in road networks. Since their battery capacity is limited, and consumed energy per distance increases with velocity, driving the fastest route is often not desirable and may even be infeasible. On the other hand, the energy-optimal route may be too conservative in that it contains unnecessary detours or simply takes too long. In this work, we propose to use multicriteria optimization to obtain Pareto sets of routes that trade energy consumption for speed. In particular, we exploit the fact that the same road segment can be driven at different speeds within reasonable intervals. As a result, we are able to provide routes with low energy consumption that still follow major roads, such as freeways. Unfortunately, the size of the resulting Pareto sets can be too large to be practical. We therefore also propose several nontrivial techniques that can be applied on-line at query time in order to speed up computation and filter insignificant solutions from the Pareto sets. Our extensive experimental study, which uses a real-world energy consumption model, reveals that we are able to compute diverse sets of alternative routes on continental networks that closely resemble the exact Pareto set in just under a second—several orders of magnitude faster than the exhaustive algorithm. 1998 ACM Subject Classification G.2.2 Graph Theory, G.2.3 Applications",
"title": ""
},
{
"docid": "45f534e9bc92e4f70a1dc25b8d82f62c",
"text": "A new implementation has been proposed for the beta multiplier voltage reference to improve its performance with regard to process variations. The scope for silicon tunability on the proposed circuit is also discussed. The circuit was implemented in a 0.18 /spl mu/ process and was found to have a temperature sensitivity of less than 500 ppm/C in the virgin die without trimming.",
"title": ""
},
{
"docid": "d263d778738494e26e160d1c46874fff",
"text": "We introduce new online models for two important aspectsof modern financial markets: Volume Weighted Average Pricetrading and limit order books. We provide an extensivestudy of competitive algorithms in these models and relatethem to earlier online algorithms for stock trading.",
"title": ""
},
{
"docid": "f391d24622a123cf35c56693ac3b0044",
"text": "Web users are confronted with the daunting challenges of creating, remembering, and using more and more strong passwords than ever before in order to protect their valuable assets on different websites. Password manager is one of the most popular approaches designed to address these challenges by saving users' passwords and later automatically filling the login forms on behalf of users. Fortunately, all the five most popular Web browsers have provided password managers as a useful built-in feature. Unfortunately, the designs of all those Browser-based Password Managers (BPMs) have severe security vulnerabilities. In this paper, we uncover the vulnerabilities of existing BPMs and analyze how they can be exploited by attackers to crack users' saved passwords. Moreover, we propose a novel Cloud-based Storage-Free BPM (CSF-BPM) design to achieve a high level of security with the desired confidentiality, integrity, and availability properties. We have implemented a CSF-BPM system into Firefox and evaluated its correctness and performance. We believe CSF-BPM is a rational design that can also be integrated into other popular Web browsers.",
"title": ""
}
] | scidocsrr |
67d11402a53a224307834eb226c43aa2 | A new mobile-based multi-factor authentication scheme using pre-shared number, GPS location and time stamp | [
{
"docid": "6356a0272b95ade100ad7ececade9e36",
"text": "We describe a browser extension, PwdHash, that transparently produces a different password for each site, improving web password security and defending against password phishing and other attacks. Since the browser extension applies a cryptographic hash function to a combination of the plaintext password entered by the user, data associated with the web site, and (optionally) a private salt stored on the client machine, theft of the password received at one site will not yield a password that is useful at another site. While the scheme requires no changes on the server side, implementing this password method securely and transparently in a web browser extension turns out to be quite difficult. We describe the challenges we faced in implementing PwdHash and some techniques that may be useful to anyone facing similar security issues in a browser environment.",
"title": ""
},
{
"docid": "7b4e9043e11d93d8152294f410390f6d",
"text": "In this paper, we present a series of methods to authenticate a user with a graphical password. To that end, we employ the user¿s personal handheld device as the password decoder and the second factor of authentication. In our methods, a service provider challenges the user with an image password. To determine the appropriate click points and their order, the user needs some hint information transmitted only to her handheld device. We show that our method can overcome threats such as key-loggers, weak password, and shoulder surfing. With the increasing popularity of handheld devices such as cell phones, our approach can be leveraged by many organizations without forcing the user to memorize different passwords or carrying around different tokens.",
"title": ""
},
{
"docid": "679759d8f8e4c4ef5a2bb1356a61d7f5",
"text": "This paper describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short user-defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method.",
"title": ""
},
{
"docid": "0f503bded2c4b0676de16345d4596280",
"text": "An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several challenges, related to privacy, reliability, security of the biometric data. Inter-operability is also required among the devices used for the authentication. Moreover, very often biometric authentication in itself is not sufficient as a conclusive proof of identity and has to be complemented with multiple other proofs of identity like passwords, SSN, or other user identifiers. Multi-factor authentication mechanisms are thus required to enforce strong authentication based on the biometric and identifiers of other nature.In this paper we provide a two-phase authentication mechanism for federated identity management systems. The first phase consists of a two-factor biometric authentication based on zero knowledge proofs. We employ techniques from vector-space model to generate cryptographic biometric keys. These keys are kept secret, thus preserving the confidentiality of the biometric data, and at the same time exploit the advantages of a biometric authentication. The second authentication combines several authentication factors in conjunction with the biometric to provide a strong authentication. A key advantage of our approach is that any unanticipated combination of factors can be used. Such authentication system leverages the information of the user that are available from the federated identity management system.",
"title": ""
}
] | [
{
"docid": "13c7278393988ec2cfa9a396255e6ff3",
"text": "Finding good transfer functions for rendering medical volumes is difficult, non-intuitive, and time-consuming. We introduce a clustering-based framework for the automatic generation of transfer functions for volumetric data. The system first applies mean shift clustering to oversegment the volume boundaries according to their low-high (LH) values and their spatial coordinates, and then uses hierarchical clustering to group similar voxels. A transfer function is then automatically generated for each cluster such that the number of occlusions is reduced. The framework also allows for semi-automatic operation, where the user can vary the hierarchical clustering results or the transfer functions generated. The system improves the efficiency and effectiveness of visualizing medical images and is suitable for medical imaging applications.",
"title": ""
},
{
"docid": "3a80168bda1d5d92a5d767117581806a",
"text": "During the last years a wide range of algorithms and devices have been made available to easily acquire range images. The increasing abundance of depth data boosts the need for reliable and unsupervised analysis techniques, spanning from part registration to automated segmentation. In this context, we focus on the recognition of known objects in cluttered and incomplete 3D scans. Locating and fitting a model to a scene are very important tasks in many scenarios such as industrial inspection, scene understanding, medical imaging and even gaming. For this reason, these problems have been addressed extensively in the literature. Several of the proposed methods adopt local descriptor-based approaches, while a number of hurdles still hinder the use of global techniques. In this paper we offer a different perspective on the topic: We adopt an evolutionary selection algorithm that seeks global agreement among surface points, while operating at a local level. The approach effectively extends the scope of local descriptors by actively selecting correspondences that satisfy global consistency constraints, allowing us to attack a more challenging scenario where model and scene have different, unknown scales. This leads to a novel and very effective pipeline for 3D object recognition, which is validated with an extensive set of experiments and comparisons with recent techniques at the state of the art.",
"title": ""
},
{
"docid": "104cf54cfa4bc540b17176593cdb77d8",
"text": "Nonlinear manifold learning from unorganized data points is a very challenging unsupervised learning and data visualization problem with a great variety of applications. In this paper we present a new algorithm for manifold learning and nonlinear dimension reduction. Based on a set of unorganized data points sampled with noise from the manifold, we represent the local geometry of the manifold using tangent spaces learned by fitting an affine subspace in a neighborhood of each data point. Those tangent spaces are aligned to give the internal global coordinates of the data points with respect to the underlying manifold by way of a partial eigendecomposition of the neighborhood connection matrix. We present a careful error analysis of our algorithm and show that the reconstruction errors are of second-order accuracy. We illustrate our algorithm using curves and surfaces both in 2D/3D and higher dimensional Euclidean spaces, and 64-by-64 pixel face images with various pose and lighting conditions. We also address several theoretical and algorithmic issues for further research and improvements.",
"title": ""
},
{
"docid": "7c1af982b6ac6aa6df4549bd16c1964c",
"text": "This paper deals with the problem of estimating the position of emitters using only direction of arrival information. We propose an improvement of newly developed algorithm for position finding of a stationary emitter called sensitivity analysis. The proposed method uses Taylor series expansion iteratively to enhance the estimation of the emitter location and reduce position finding error. Simulation results show that our proposed method makes a great improvement on accuracy of position finding with respect to sensitivity analysis method.",
"title": ""
},
{
"docid": "afadbcb8c025ad6feca693c05ce7b43f",
"text": "A data structure that implements a mergeable double-ended priority queue, namely therelaxed min-max heap, is presented. A relaxed min-max heap ofn items can be constructed inO(n) time. In the worst case, operationsfind_min() andfind_max() can be performed in constant time, while each of the operationsmerge(),insert(),delete_min(),delete_max(),decrease_key(), anddelete_key() can be performed inO(logn) time. Moreover,insert() hasO(1) amortized running time. If lazy merging is used,merge() will also haveO(1) worst-case and amortized time. The relaxed min-max heap is the first data structure that achieves these bounds using only two pointers (puls one bit) per item.",
"title": ""
},
{
"docid": "f591ae6217c769d3bca2c15a021125cc",
"text": "Recent years have witnessed an explosive growth of mobile devices. Mobile devices are permeating every aspect of our daily lives. With the increasing usage of mobile devices and intelligent applications, there is a soaring demand for mobile applications with machine learning services. Inspired by the tremendous success achieved by deep learning in many machine learning tasks, it becomes a natural trend to push deep learning towards mobile applications. However, there exist many challenges to realize deep learning in mobile applications, including the contradiction between the miniature nature of mobile devices and the resource requirement of deep neural networks, the privacy and security concerns about individuals' data, and so on. To resolve these challenges, during the past few years, great leaps have been made in this area. In this paper, we provide an overview of the current challenges and representative achievements about pushing deep learning on mobile devices from three aspects: training with mobile data, efficient inference on mobile devices, and applications of mobile deep learning. The former two aspects cover the primary tasks of deep learning. Then, we go through our two recent applications that apply the data collected by mobile devices to inferring mood disturbance and user identification. Finally, we conclude this paper with the discussion of the future of this area.",
"title": ""
},
{
"docid": "a70fa8bc2a48b3cf38bd99b6d1251140",
"text": "In many of today's online applications that facilitate data exploration, results from information filters such as recommender systems are displayed alongside traditional search tools. However, the effect of prediction algorithms on users who are performing open-ended data exploration tasks through a search interface is not well understood. This paper describes a study of three interface variations of a tool for analyzing commuter traffic anomalies in the San Francisco Bay Area. The system supports novel interaction between a prediction algorithm and a human analyst, and is designed to explore the boundaries, limitations and synergies of both. The degree of explanation of underlying data and algorithmic process was varied experimentally across each interface. The experiment (N=197) was performed to assess the impact of algorithm transparency/explanation on data analysis tasks in terms of search success, general insight into the underlying data set and user experience. Results show that 1) presence of recommendations in the user interface produced a significant improvement in recall of anomalies, 2) participants were able to detect anomalies in the data that were missed by the algorithm, 3) participants who used the prediction algorithm performed significantly better when estimating quantities in the data, and 4) participants in the most explanatory condition were the least biased by the algorithm's predictions when estimating quantities.",
"title": ""
},
{
"docid": "85c74646e74aaff7121042beaded5bfe",
"text": "We consider the sampling bias introduced in the study of online networks when collecting data through publicly available APIs (application programming interfaces). We assess differences between three samples of Twitter activity; the empirical context is given by political protests taking place in May 2012. We track online communication around these protests for the period of one month, and reconstruct the network of mentions and re-tweets according to the search and the streaming APIs, and to different filraph comparison tering parameters. We find that smaller samples do not offer an accurate picture of peripheral activity; we also find that the bias is greater for the network of mentions, partly because of the higher influence of snowballing in identifying relevant nodes. We discuss the implications of this bias for the study of diffusion dynamics and political communication through social media, and advocate the need for more uniform sampling procedures to study online communication. © 2014 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "33a1450fa00705d5ef20780b4e1de6b3",
"text": "This paper reviews the range of sensors used in electronic nose (e-nose) systems to date. It outlines the operating principles and fabrication methods of each sensor type as well as the applications in which the different sensors have been utilised. It also outlines the advantages and disadvantages of each sensor for application in a cost-effective low-power handheld e-nose system.",
"title": ""
},
{
"docid": "9f2d6c872761d8922cac8a3f30b4b7ba",
"text": "Recently, CNN reported on the future of brain-computer interfaces (BCIs). BCIs are devices that process a user's brain signals to allow direct communication and interaction with the environment. BCIs bypass the normal neuromuscular output pathways and rely on digital signal processing and machine learning to translate brain signals to action (Figure 1). Historically, BCIs were developed with biomedical applications in mind, such as restoring communication in completely paralyzed individuals and replacing lost motor function. More recent applications have targeted nondisabled individuals by exploring the use of BCIs as a novel input device for entertainment and gaming. The task of the BCI is to identify and predict behaviorally induced changes or \"cognitive states\" in a user's brain signals. Brain signals are recorded either noninvasively from electrodes placed on the scalp [electroencephalogram (EEG)] or invasively from electrodes placed on the surface of or inside the brain. BCIs based on these recording techniques have allowed healthy and disabled individuals to control a variety of devices. In this article, we will describe different challenges and proposed solutions for noninvasive brain-computer interfacing.",
"title": ""
},
{
"docid": "dcd705e131eb2b60c54ff5cb6ae51555",
"text": "Comprehension is one fundamental process in the software life cycle. Although necessary, this comprehension is difficult to obtain due to amount and complexity of information related to software. Thus, software visualization techniques and tools have been proposed to facilitate the comprehension process and to reduce maintenance costs. This paper shows the results from a Literature Systematic Review to identify software visualization techniques and tools. We analyzed 52 papers and we identified 28 techniques and 33 tools for software visualization. Among these techniques, 71% have been implemented and available to users, 48% use 3D visualization and 80% are generated using static analysis.",
"title": ""
},
{
"docid": "74686e9acab0a4d41c87cadd7da01889",
"text": "Automatic analysis of biomedical time series such as electroencephalogram (EEG) and electrocardiographic (ECG) signals has attracted great interest in the community of biomedical engineering due to its important applications in medicine. In this work, a simple yet effective bag-of-words representation that is able to capture both local and global structure similarity information is proposed for biomedical time series representation. In particular, similar to the bag-of-words model used in text document domain, the proposed method treats a time series as a text document and extracts local segments from the time series as words. The biomedical time series is then represented as a histogram of codewords, each entry of which is the count of a codeword appeared in the time series. Although the temporal order of the local segments is ignored, the bag-of-words representation is able to capture high-level structural information because both local and global structural information are well utilized. The performance of the bag-of-words model is validated on three datasets extracted from real EEG and ECG signals. The experimental results demonstrate that the proposed method is not only insensitive to parameters of the bag-of-words model such as local segment length and codebook size, but also robust to noise.",
"title": ""
},
{
"docid": "548b9580c2b36bd1730392a92f6640c2",
"text": "Image segmentation is an indispensable process in the visualization of human tissues, particularly during clinical analysis of magnetic resonance (MR) images. Unfortunately, MR images always contain a significant amount of noise caused by operator performance, equipment, and the environment, which can lead to serious inaccuracies with segmentation. A robust segmentation technique based on an extension to the traditional fuzzy c-means (FCM) clustering algorithm is proposed in this paper. A neighborhood attraction, which is dependent on the relative location and features of neighboring pixels, is shown to improve the segmentation performance dramatically. The degree of attraction is optimized by a neural-network model. Simulated and real brain MR images with different noise levels are segmented to demonstrate the superiority of the proposed technique compared to other FCM-based methods. This segmentation method is a key component of an MR image-based classification system for brain tumors, currently being developed.",
"title": ""
},
{
"docid": "c59652c2166aefb00469517cd270dea2",
"text": "Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characterization. Recently, new intrusion detection systems based on data mining are making their appearance in the field. This paper describes the design and experiences with the ADAM (Audit Data Analysis and Mining) system, which we use as a testbed to study how useful data mining techniques can be in intrusion detection.",
"title": ""
},
{
"docid": "681d0a6dcad967340cfb3ebe9cf7b779",
"text": "We demonstrate an integrated buck dc-dc converter for multi-V/sub CC/ microprocessors. At nominal conditions, the converter produces a 0.9-V output from a 1.2-V input. The circuit was implemented in a 90-nm CMOS technology. By operating at high switching frequency of 100 to 317 MHz with four-phase topology and fast hysteretic control, we reduced inductor and capacitor sizes by three orders of magnitude compared to previously published dc-dc converters. This eliminated the need for the inductor magnetic core and enabled integration of the output decoupling capacitor on-chip. The converter achieves 80%-87% efficiency and 10% peak-to-peak output noise for a 0.3-A output current and 2.5-nF decoupling capacitance. A forward body bias of 500 mV applied to PMOS transistors in the bridge improves efficiency by 0.5%-1%.",
"title": ""
},
{
"docid": "aa6c54a142442ee1de03c57f9afe8972",
"text": "Objectives: We present our 3 years experience with alar batten grafts, using a modified technique, for non-iatrogenic nasal valve/alar",
"title": ""
},
{
"docid": "714df72467bc3e919b7ea7424883cf26",
"text": "Although a lot of attention has been paid to software cost estimation since 1960, making accurate effort and schedule estimation is still a challenge. To collect evidence and identify potential areas of improvement in software cost estimation, it is important to investigate the estimation accuracy, the estimation method used, and the factors influencing the adoption of estimation methods in current industry. This paper analyzed 112 projects from the Chinese software project benchmarking dataset and conducted questionnaire survey on 116 organizations to investigate the above information. The paper presents the current situations related to software project estimation in China and provides evidence-based suggestions on how to improve software project estimation. Our survey results suggest, e.g., that large projects were more prone to cost and schedule overruns, that most computing managers and professionals were neither satisfied nor dissatisfied with the project estimation, that very few organizations (15%) used model-based methods, and that the high adoption cost and insignificant benefit after adoption were the main causes for low use of model-based methods.",
"title": ""
},
{
"docid": "c30ea570f744f576014aeacf545b027c",
"text": "We aimed to examine the effect of different doses of lutein supplementation on visual function in subjects with long-term computer display light exposure. Thirty-seven healthy subjects with long-term computer display light exposure ranging in age from 22 to 30 years were randomly assigned to one of three groups: Group L6 (6 mg lutein/d, n 12); Group L12 (12 mg lutein/d, n 13); and Group Placebo (maltodextrin placebo, n 12). Levels of serum lutein and visual performance indices such as visual acuity, contrast sensitivity and glare sensitivity were measured at weeks 0 and 12. After 12-week lutein supplementation, serum lutein concentrations of Groups L6 and L12 increased from 0.356 (SD 0.117) to 0.607 (SD 0.176) micromol/l, and from 0.328 (SD 0.120) to 0.733 (SD 0.354) micromol/l, respectively. No statistical changes from baseline were observed in uncorrected visual acuity and best-spectacle corrected visual acuity, whereas there was a trend toward increase in visual acuity in Group L12. Contrast sensitivity in Groups L6 and L12 increased with supplementation, and statistical significance was reached at most visual angles of Group L12. No significant change was observed in glare sensitivity over time. Visual function in healthy subjects who received the lutein supplement improved, especially in contrast sensitivity, suggesting that a higher intake of lutein may have beneficial effects on the visual performance.",
"title": ""
},
{
"docid": "decbbd09bcf7a36a3886d52864e9a08c",
"text": "INTRODUCTION\nBirth preparedness and complication readiness (BPCR) is a strategy to promote timely use of skilled maternal and neonatal care during childbirth. According to World Health Organization, BPCR should be a key component of focused antenatal care. Dakshina Kannada, a coastal district of Karnataka state, is categorized as a high-performing district (institutional delivery rate >25%) under the National Rural Health Mission. However, a substantial proportion of women in the district experience complications during pregnancy (58.3%), childbirth (45.7%), and postnatal (17.4%) period. There is a paucity of data on BPCR practice and the factors associated with it in the district. Exploring this would be of great use in the evidence-based fine-tuning of ongoing maternal and child health interventions.\n\n\nOBJECTIVE\nTo assess BPCR practice and the factors associated with it among the beneficiaries of two rural Primary Health Centers (PHCs) of Dakshina Kannada district, Karnataka, India.\n\n\nMETHODS\nA facility-based cross-sectional study was conducted among 217 pregnant (>28 weeks of gestation) and recently delivered (in the last 6 months) women in two randomly selected PHCs from June -September 2013. Exit interviews were conducted using a pre-designed semi-structured interview schedule. Information regarding socio-demographic profile, obstetric variables, and knowledge of key danger signs was collected. BPCR included information on five key components: identified the place of delivery, saved money to pay for expenses, mode of transport identified, identified a birth companion, and arranged a blood donor if the need arises. In this study, a woman who recalled at least two key danger signs in each of the three phases, i.e., pregnancy, childbirth, and postpartum (total six) was considered as knowledgeable on key danger signs. Optimal BPCR practice was defined as following at least three out of five key components of BPCR.\n\n\nOUTCOME MEASURES\nProportion, Odds ratio, and adjusted Odds ratio (adj OR) for optimal BPCR practice.\n\n\nRESULTS\nA total of 184 women completed the exit interview (mean age: 26.9±3.9 years). Optimal BPCR practice was observed in 79.3% (95% CI: 73.5-85.2%) of the women. Multivariate logistic regression revealed that age >26 years (adj OR = 2.97; 95%CI: 1.15-7.7), economic status of above poverty line (adj OR = 4.3; 95%CI: 1.12-16.5), awareness of minimum two key danger signs in each of the three phases, i.e., pregnancy, childbirth, and postpartum (adj OR = 3.98; 95%CI: 1.4-11.1), preference to private health sector for antenatal care/delivery (adj OR = 2.9; 95%CI: 1.1-8.01), and woman's discussion about the BPCR with her family members (adj OR = 3.4; 95%CI: 1.1-10.4) as the significant factors associated with optimal BPCR practice.\n\n\nCONCLUSION\nIn this study population, BPCR practice was better than other studies reported from India. Healthcare workers at the grassroots should be encouraged to involve women's family members while explaining BPCR and key danger signs with a special emphasis on young (<26 years) and economically poor women. Ensuring a reinforcing discussion between woman and her family members may further enhance the BPCR practice.",
"title": ""
}
] | scidocsrr |
641c9afbeda8417bd4a3a7e8855cfe85 | Recurrent Neural Network Predictions in Sentiment Analysis | [
{
"docid": "46221a961d66cb4c6b59c538b2621a4f",
"text": "We present a hierarchical convolutional document model with an architecture designed to support introspection of the document structure. Using this model, we show how to use visualisation techniques from the computer vision literature to identify and extract topic-relevant sentences. We also introduce a new scalable evaluation technique for automatic sentence extraction systems that avoids the need for time consuming human annotation of validation data.",
"title": ""
},
{
"docid": "126946b552f20bc5fe4e920381f52305",
"text": "Although deep learning models have proven effective at solving problems in natural language processing, the mechanism by which they come to their conclusions is often unclear. As a result, these models are generally treated as black boxes, yielding no insight of the underlying learned patterns. In this paper we consider Long Short Term Memory networks (LSTMs) and demonstrate a new approach for tracking the importance of a given input to the LSTM for a given output. By identifying consistently important patterns of words, we are able to distill state of the art LSTMs on sentiment analysis and question answering into a set of representative phrases. This representation is then quantitatively validated by using the extracted phrases to construct a simple, rule-based classifier which approximates the output of the LSTM.",
"title": ""
},
{
"docid": "ff0837ae319f4a40fdd58b91947447d7",
"text": "Text documents can be described by a number of abstract concepts such as semantic category, writing style, or sentiment. Machine learning (ML) models have been trained to automatically map documents to these abstract concepts, allowing to annotate very large text collections, more than could be processed by a human in a lifetime. Besides predicting the text's category very accurately, it is also highly desirable to understand how and why the categorization process takes place. In this paper, we demonstrate that such understanding can be achieved by tracing the classification decision back to individual words using layer-wise relevance propagation (LRP), a recently developed technique for explaining predictions of complex non-linear classifiers. We train two word-based ML models, a convolutional neural network (CNN) and a bag-of-words SVM classifier, on a topic categorization task and adapt the LRP method to decompose the predictions of these models onto words. Resulting scores indicate how much individual words contribute to the overall classification decision. This enables one to distill relevant information from text documents without an explicit semantic information extraction step. We further use the word-wise relevance scores for generating novel vector-based document representations which capture semantic information. Based on these document vectors, we introduce a measure of model explanatory power and show that, although the SVM and CNN models perform similarly in terms of classification accuracy, the latter exhibits a higher level of explainability which makes it more comprehensible for humans and potentially more useful for other applications.",
"title": ""
}
] | [
{
"docid": "070a1de608a35cddb69b84d5f081e94d",
"text": "Identifying potentially vulnerable locations in a code base is critical as a pre-step for effective vulnerability assessment; i.e., it can greatly help security experts put their time and effort to where it is needed most. Metric-based and pattern-based methods have been presented for identifying vulnerable code. The former relies on machine learning and cannot work well due to the severe imbalance between non-vulnerable and vulnerable code or lack of features to characterize vulnerabilities. The latter needs the prior knowledge of known vulnerabilities and can only identify similar but not new types of vulnerabilities. In this paper, we propose and implement a generic, lightweight and extensible framework, LEOPARD, to identify potentially vulnerable functions through program metrics. LEOPARD requires no prior knowledge about known vulnerabilities. It has two steps by combining two sets of systematically derived metrics. First, it uses complexity metrics to group the functions in a target application into a set of bins. Then, it uses vulnerability metrics to rank the functions in each bin and identifies the top ones as potentially vulnerable. Our experimental results on 11 real-world projects have demonstrated that, LEOPARD can cover 74.0% of vulnerable functions by identifying 20% of functions as vulnerable and outperform machine learning-based and static analysis-based techniques. We further propose three applications of LEOPARD for manual code review and fuzzing, through which we discovered 22 new bugs in real applications like PHP, radare2 and FFmpeg, and eight of them are new vulnerabilities.",
"title": ""
},
{
"docid": "ca769d200ccd4a0e122daeb171efa0de",
"text": "A color space defined by the fundamental spectral sensitivity functions of the human visual system is used to assist in the design of computer graphics displays for color-deficient users. The functions are derived in terms of the CIE standard observer color-matching functions. The Farnsworth-Munsell 100-hue test, a widely used color vision test administered using physical color samples, is then implemented on a digitally controlled color television monitor. The flexibility of this computer graphics medium is then used to extend the Farnsworth-Munsell test in a way that improves the specificity of the diagnoses rendered by the test. The issue of how the world appears to color-deficient observers is addressed, and a full-color image is modified to represent a color-defective view of the scene. Specific guidelines are offered for the design of computer graphics displays that will accommodate almost all color-deficient users.<<ETX>>",
"title": ""
},
{
"docid": "ae585aae554c5fbe4a18f7f2996b7e93",
"text": "UNLABELLED\nCaloric restriction occurs when athletes attempt to reduce body fat or make weight. There is evidence that protein needs increase when athletes restrict calories or have low body fat.\n\n\nPURPOSE\nThe aims of this review were to evaluate the effects of dietary protein on body composition in energy-restricted resistance-trained athletes and to provide protein recommendations for these athletes.\n\n\nMETHODS\nDatabase searches were performed from earliest record to July 2013 using the terms protein, and intake, or diet, and weight, or train, or restrict, or energy, or strength, and athlete. Studies (N = 6) needed to use adult (≥ 18 yrs), energy-restricted, resistance-trained (> 6 months) humans of lower body fat (males ≤ 23% and females ≤ 35%) performing resistance training. Protein intake, fat free mass (FFM) and body fat had to be reported.\n\n\nRESULTS\nBody fat percentage decreased (0.5-6.6%) in all study groups (N = 13) and FFM decreased (0.3-2.7kg) in nine of 13. Six groups gained, did not lose, or lost nonsignificant amounts of FFM. Five out of these six groups were among the highest in body fat, lowest in caloric restriction, or underwent novel resistance training stimuli. However, the one group that was not high in body fat that underwent substantial caloric restriction, without novel training stimuli, consumed the highest protein intake out of all the groups in this review (2.5-2.6g/kg).\n\n\nCONCLUSIONS\nProtein needs for energy-restricted resistance-trained athletes are likely 2.3-3.1g/kg of FFM scaled upwards with severity of caloric restriction and leanness.",
"title": ""
},
{
"docid": "50ab05d133dceaacf71b28b6a4b547bc",
"text": "The ability to measure human hand motions and interaction forces is critical to improving our understanding of manual gesturing and grasp mechanics. This knowledge serves as a basis for developing better tools for human skill training and rehabilitation, exploring more effective methods of designing and controlling robotic hands, and creating more sophisticated human-computer interaction devices which use complex hand motions as control inputs. This paper presents work on the design, fabrication, and experimental validation of a soft sensor-embedded glove which measures both hand motion and contact pressures during human gesturing and manipulation tasks. We design an array of liquid-metal embedded elastomer sensors to measure up to hundreds of Newtons of interaction forces across the human palm during manipulation tasks and to measure skin strains across phalangeal and carpal joints for joint motion tracking. The elastomeric sensors provide the mechanical compliance necessary to accommodate anatomical variations and permit a normal range of hand motion. We explore methods of assembling this soft sensor glove from modular, individually fabricated pressure and strain sensors and develop design guidelines for their mechanical integration. Experimental validation of a soft finger glove prototype demonstrates the sensitivity range of the designed sensors and the mechanical robustness of the proposed assembly method, and provides a basis for the production of a complete soft sensor glove from inexpensive modular sensor components.",
"title": ""
},
{
"docid": "3b27bb001a7d897a33f50b504508686d",
"text": "In this age, in this nation, public sentiment is everything. With it, nothing can fail; against it, nothing can succeed. Whoever molds public sentiment goes deeper than he who enacts statutes, or pronounces judicial decisions (Abraham Lincoln, 1858 ) [1]. It is apparent from President Lincoln's well known quote that legislators understood the force of open assumption quite a while prior. In today world, the Internet is the main source of information. An enormous amount of information and opinion online is scattered and unstructured with no machine to arrange it. Because of demand the public to know opinions about exact product and services, political issues, or social scientists. That’s led us to study of field Opining Mining and Sentiment Analysis. Opining Mining and Sentiment Analysis have recently played a significant role for researchers because analysis of online text is beneficial for the market research political issue, business intelligence, online shopping, and scientific survey from psychological. Sentiment Analysis identifies the polarity of extracted public opinions. This paper presents a survey which covers Opining Mining, Sentiment Analysis, techniques, tools and classification.",
"title": ""
},
{
"docid": "8c9823e26dba4b8aa3dcf0f967e529e1",
"text": "Anthropologists and archaeologists have paid little attention to the origin of music and musicality — far less than for either language or ‘art’. While art has been seen as an index of cognitive complexity and language as an essential tool of communication, music has suffered from our perception that it is an epiphenomenal ‘leisure activity’, and archaeologically inaccessible to boot. Nothing could be further from the truth, according to Steven Mithen; music is integral to human social life, he argues, and we can investigate its ancestry with the same rich range of analyses — neurological, physiological, ethnographic, linguistic, ethological and even archaeological — which have been deployed to study language.",
"title": ""
},
{
"docid": "4a2da43301b0a81801bf3acd4bd5c32d",
"text": "Video description is the automatic generation of natural language sentences that describe the contents of a given video. It has applications in human-robot interaction, helping the visually impaired and video subtitling. The past few years have seen a surge of research in this area due to the unprecedented success of deep learning in computer vision and natural language processing. Numerous methods, datasets and evaluation metrics have been proposed in the literature, calling the need for a comprehensive survey to focus research efforts in this flourishing new direction. This paper fills the gap by surveying the state of the art approaches with a focus on deep learning models; comparing benchmark datasets in terms of their domains, number of classes, and repository size; and identifying the pros and cons of various evaluation metrics like SPICE, CIDEr, ROUGE, BLEU, METEOR, and WMD. Classical video description approaches combined subject, object and verb detection with template based language models to generate sentences. However, the release of large datasets revealed that these methods can not cope with the diversity in unconstrained open domain videos. Classical approaches were followed by a very short era of statistical methods which were soon replaced with deep learning, the current state of the art in video description. Our survey shows that despite the fast-paced developments, video description research is still in its infancy due to the following reasons. Analysis of video description models is challenging because it is difficult to ascertain the contributions, towards accuracy or errors, of the visual features and the adopted language model in the final description. Existing datasets neither contain adequate visual diversity nor complexity of linguistic structures. Finally, current evaluation metrics fall short of measuring the agreement between machine generated descriptions with that of humans. We conclude our survey by listing promising future research directions.",
"title": ""
},
{
"docid": "3d90cdb88faee8794a9fd08143f7046e",
"text": "Genetic algorithms (GAs) have been found to be effective in the domain of medical image segmentation, since the problem can often be mapped to one of search in a complex and multimodal landscape. The challenges in medical image segmentation arise due to poor image contrast and artifacts that result in missing or diffuse organ/tissue boundaries. The resulting search space is therefore often noisy with a multitude of local optima. Not only does the genetic algorithmic framework prove to be effective in coming out of local optima, it also brings considerable flexibility into the segmentation procedure. In this paper, an attempt has been made to review the major applications of GAs to the domain of medical image segmentation.",
"title": ""
},
{
"docid": "fda40e94b771e6ac4d0390236fd4eb56",
"text": "How does users’ freedom of choice, or the lack thereof, affect interface preferences? The research reported in this article approaches this question from two theoretical perspectives. The first of these argues that an interface with a dominant market share benefits from the absence of competition because users acquire skills that are specific to that particular interface, which in turn reduces the probability that they will switch to a new competitor interface in the future. By contrast, the second perspective proposes that the advantage that a market leader has in being able to install a set of non-transferable skills in its user base is offset by a psychological force that causes humans to react against perceived constraints on their freedom of choice. We test a research model that incorporates the key predictions of these two theoretical perspectives in an experiment involving consequential interface choices. We find strong support for the second perspective, which builds upon the theory of psychological reactance.",
"title": ""
},
{
"docid": "fc70270345e636ceffceee6c07002375",
"text": "O-linked-N-acetyl-glucosamine glycosylation (O-GlcNAcylation) of the serine and threonine residues of cellular proteins is a dynamic process and affects phosphorylation. Prolonged O-GlcNAcylation has been linked to diabetes-related complications, including mitochondrial dysfunction. Mitochondria are dynamically remodeling organelles, that constantly fuse (fusion) and divide (fission). An imbalance of this process affects mitochondrial function. In this study, we found that dynamin-related protein 1 (DRP1) is O-GlcNAcylated in cardiomyocytes at threonine 585 and 586. O-GlcNAcylation was significantly enhanced by the chemical inhibition of N-acetyl-glucosaminidase. Increased O-GlcNAcylation decreases the phosphorylation of DRP1 at serine 637, which is known to regulate DRP1 function. In fact, increased O-GlcNAcylation augments the level of the GTP-bound active form of DRP1 and induces translocation of DRP1 from the cytoplasm to mitochondria. Mitochondrial fragmentation and decreased mitochondrial membrane potential also accompany the increased O-GlcNAcylation. In conclusion, this report shows, for the first time, that O-GlcNAcylation modulates DRP1 functionality in cardiac muscle cells.",
"title": ""
},
{
"docid": "fd63f9b9454358810a68fc003452509b",
"text": "The years that students spend in college are perhaps the most influential years on the rest of their lives. College students face many different decisions day in and day out that may determine how successful they will be in the future. They will choose majors, whether or not to play a sport, which clubs to join, whether they should join a fraternity or sorority, which classes to take, and how much time to spend studying. It is unclear what aspects of college will benefit a person the most down the road. Are some majors better than others? Is earning a high GPA important? Or will simply getting a degree be enough to make a good living? These are a few of the many questions that college students have.",
"title": ""
},
{
"docid": "bd25029684528da4a2cb8912464a567a",
"text": "Control over what is in focus and what is not in focus in an image is an important artistic tool. The range of depth in a 3D scene that is imaged in sufficient focus through an optics system, such as a camera lens, is called depth of field. Without depth of field, the entire scene appears completely in sharp focus, leading to an unnatural, overly crisp appearance. Current techniques for rendering depth of field in computer graphics are either slow or suffer from artifacts, or restrict the choice of point spread function (PSF). In this paper, we present a new image filter based on rectangle spreading which is constant time per pixel. When used in a layered depth of field framework, our filter eliminates the intensity leakage and depth discontinuity artifacts that occur in previous methods. We also present several extensions to our rectangle spreading method to allow flexibility in the appearance of the blur through control over the PSF.",
"title": ""
},
{
"docid": "922bcd1b9a941b9c4c765ed59ba0631c",
"text": "This article deals with automatic transcription of flamenco music recordings—more specifically, a cappella singing. We first study the specifics of flamenco singing and propose a transcription system based on fundamental frequency and energy estimation, which incorporates an iterative strategy for note segmentation and labeling. The proposed approach is evaluated on a music collection of 72 performances, including a variety of singers and recording conditions, and the presence or absence of percussion, background voices, and noise. We obtain satisfying results for the different approaches tested, and our system outperforms a state-of-the-art approach designed for other singing styles. In this study, we discuss the difficulties found in transcribing flamenco singing and in evaluating the obtained transcriptions, we analyze the influence of the different steps of the algorithm, and we state the main limitations of our approach and discuss challenges for future studies.",
"title": ""
},
{
"docid": "86ee8258559aebfdfa90964fe78429c2",
"text": "Voice search is the technology underlying many spoken dialog systems (SDSs) that provide users with the information they request with a spoken query. The information normally exists in a large database, and the query has to be compared with a field in the database to obtain the relevant information. The contents of the field, such as business or product names, are often unstructured text. This article categorized spoken dialog technology into form filling, call routing, and voice search, and reviewed the voice search technology. The categorization was made from the technological perspective. It is important to note that a single SDS may apply the technology from multiple categories. Robustness is the central issue in voice search. The technology in acoustic modeling aims at improved robustness to environment noise, different channel conditions, and speaker variance; the pronunciation research addresses the problem of unseen word pronunciation and pronunciation variance; the language model research focuses on linguistic variance; the studies in search give rise to improved robustness to linguistic variance and ASR errors; the dialog management research enables graceful recovery from confusions and understanding errors; and the learning in the feedback loop speeds up system tuning for more robust performance. While tremendous achievements have been accomplished in the past decade on voice search, large challenges remain. Many voice search dialog systems have automation rates around or below 50% in field trials.",
"title": ""
},
{
"docid": "39e332a58625a12ef3e14c1a547a8cad",
"text": "This paper presents an overview of the recent achievements in the held of substrate integrated waveguides (SIW) technology, with particular emphasis on the modeling strategy and design considerations of millimeter-wave integrated circuits as well as the physical interpretation of the operation principles and loss mechanisms of these structures. The most common numerical methods for modeling both SIW interconnects and circuits are presented. Some considerations and guidelines for designing SIW structures, interconnects and circuits are discussed, along with the physical interpretation of the major issues related to radiation leakage and losses. Examples of SIW circuits and components operating in the microwave and millimeter wave bands are also reported, with numerical and experimental results.",
"title": ""
},
{
"docid": "dbe6b892a0c1dd4a7082c1220d4b88b2",
"text": "This paper describes the participation of our MCAT search system in the NTCIR-12 MathIR Task. We introduce three granularity levels of textual information, new approach for generating dependency graph of math expressions, score normalization, cold-start weights, and unification. We find that these modules, except the cold-start weights, have a very good impact on the search performance of our system. The use of dependency graph significantly improves precision of our system, i.e., up to 24.52% and 104.20% relative improvements in the Main and Simto subtasks of the arXiv task, respectively. In addition, the implementation of unification delivers up to 2.90% and 57.14% precision improvements in the Main and Simto subtasks, respectively. Overall, our best submission achieves P@5 of 0.5448 in the Main subtask and 0.5500 in the Simto subtask. In the Wikipedia task, our system also performs well at the MathWikiFormula subtask. At the MathWiki subtask, however, due to a problem with handling queries formed as questions that contain many stop words, our system finishes second.",
"title": ""
},
{
"docid": "bf7b60b0fb5ace34306a082b2ca7c202",
"text": "Restricted Boltzmann Machines (RBMs) are being applied to a growing number of problems with great success. In the process of training an RBM one must pick a number of parameters, but often these parameters are brittle and produce poor performance when slightly off. Here we describe several useful visualizations to assist in choosing appropriate values for these parameters. We also demonstrate a successful application of an RBM to a unique domain: learning a representation of synthetic 3D shapes.",
"title": ""
},
{
"docid": "45022fe83fcd90ba6b63f3382791df7b",
"text": "In this paper, we present a generative sketch model for human hair analysis and synthesis. We treat hair images as 2D piecewise smooth vector (flow) fields and, thus, our representation is view-based in contrast to the physically-based 3D hair models in graphics. The generative model has three levels. The bottom level is the high-frequency band of the hair image. The middle level is a piecewise smooth vector field for the hair orientation, gradient strength, and growth directions. The top level is an attribute sketch graph for representing the discontinuities in the vector field. A sketch graph typically has a number of sketch curves which are divided into 11 types of directed primitives. Each primitive is a small window (say 5 times 7 pixels) where the orientations and growth directions are defined in parametric forms, for example, hair boundaries, occluding lines between hair strands, dividing lines on top of the hair, etc. In addition to the three level representation, we model the shading effects, i.e., the low-frequency band of the hair image, by a linear superposition of some Gaussian image bases and we encode the hair color by a color map. The inference algorithm is divided into two stages: 1) We compute the undirected orientation field and sketch graph from an input image and 2) we compute the hair growth direction for the sketch curves and the orientation field using a Swendsen-Wang cut algorithm. Both steps maximize a joint Bayesian posterior probability. The generative model provides a straightforward way for synthesizing realistic hair images and stylistic drawings (rendering) from a sketch graph and a few Gaussian bases. The latter can be either inferred from a real hair image or input (edited) manually using a simple sketching interface. We test our algorithm on a large data set of hair images with diverse hair styles. Analysis, synthesis, and rendering results are reported in the experiments",
"title": ""
},
{
"docid": "aa7026774074ed81dd7836ef6dc44334",
"text": "To improve safety on the roads, next-generation vehicles will be equipped with short-range communication technologies. Many applications enabled by such communication will be based on a continuous broadcast of information about the own status from each vehicle to the neighborhood, often referred as cooperative awareness or beaconing. Although the only standardized technology allowing direct vehicle-to-vehicle (V2V) communication has been IEEE 802.11p until now, the latest release of long-term evolution (LTE) included advanced device-to-device features designed for the vehicular environment (LTE-V2V) making it a suitable alternative to IEEE 802.11p. Advantages and drawbacks are being considered for both technologies, and which one will be implemented is still under debate. The aim of this paper is thus to provide an insight into the performance of both technologies for cooperative awareness and to compare them. The investigation is performed analytically through the implementation of novel models for both IEEE 802.11p and LTE-V2V able to address the same scenario, with consistent settings and focusing on the same output metrics. The proposed models take into account several aspects that are often neglected by related works, such as hidden terminals and capture effect in IEEE 802.11p, the impact of imperfect knowledge of vehicles position on the resource allocation in LTE-V2V, and the various modulation and coding scheme combinations that are available in both technologies. Results show that LTE-V2V allows us to maintain the required quality of service at even double or more the distance than IEEE 802.11p in moderate traffic conditions. However, due to the half-duplex nature of devices and the structure of LTE frames, it shows lower capacity than IEEE 802.11p if short distances and very high vehicle density are targeted.",
"title": ""
},
{
"docid": "fda80f2f0eb57a101dde880b48a80ba4",
"text": "In this paper, we analyze and compare existing human grasp taxonomies and synthesize them into a single new taxonomy (dubbed “The GRASP Taxonomy” after the GRASP project funded by the European Commission). We consider only static and stable grasps performed by one hand. The goal is to extract the largest set of different grasps that were referenced in the literature and arrange them in a systematic way. The taxonomy provides a common terminology to define human hand configurations and is important in many domains such as human-computer interaction and tangible user interfaces where an understanding of the human is basis for a proper interface. Overall, 33 different grasp types are found and arranged into the GRASP taxonomy. Within the taxonomy, grasps are arranged according to 1) opposition type, 2) the virtual finger assignments, 3) type in terms of power, precision, or intermediate grasp, and 4) the position of the thumb. The resulting taxonomy incorporates all grasps found in the reviewed taxonomies that complied with the grasp definition. We also show that due to the nature of the classification, the 33 grasp types might be reduced to a set of 17 more general grasps if only the hand configuration is considered without the object shape/size.",
"title": ""
}
] | scidocsrr |
202ca7528d9310831339a77fbece21a0 | Model-Based Genetic Algorithms for Algorithm Configuration | [
{
"docid": "af31f2a7a996977754f0d39fb51bcacf",
"text": "The evolutionary approach called Scatter Search, and its generalized form called Path Relinking, have proved unusually effective for solving a diverse array of optimization problems from both classical and real world settings. Scatter Search and Path Relinking differ from other evolutionary procedures, such as genetic algorithms, by providing unifying principles for joining solutions based on generalized path constructions (in both Euclidean and neighborhood spaces) and by utilizing strategic designs where other approaches resort to randomization. Scatter Search and Path Relinking are also intimately related to the Tabu Search metaheuristic, and derive additional advantages by making use of adaptive memory and associated memory-exploiting mechanisms that are capable of being adapted to particular contexts. We describe the features of Scatter Search and Path Relinking that set them apart from other evolutionary approaches, and that offer opportunities for creating increasingly more versatile and effective methods in the future. † Partially supported by the visiting professor fellowship program of the University of Valencia (Grant Ref. No. 42743).",
"title": ""
}
] | [
{
"docid": "bd1c93dfc02d90ad2a0c7343236342a7",
"text": "Osteochondritis dissecans (OCD) of the capitellum is an uncommon disorder seen primarily in the adolescent overhead athlete. Unlike Panner disease, a self-limiting condition of the immature capitellum, OCD is multifactorial and likely results from microtrauma in the setting of cartilage mismatch and vascular susceptibility. The natural history of OCD is poorly understood, and degenerative joint disease may develop over time. Multiple modalities aid in diagnosis, including radiography, MRI, and magnetic resonance arthrography. Lesion size, location, and grade determine management, which should attempt to address subchondral bone loss and articular cartilage damage. Early, stable lesions are managed with rest. Surgery should be considered for unstable lesions. Most investigators advocate arthroscopic débridement with marrow stimulation. Fragment fixation and bone grafting also have provided good short-term results, but concerns persist regarding the healing potential of advanced lesions. Osteochondral autograft transplantation appears to be promising and should be reserved for larger, higher grade lesions. Clinical outcomes and return to sport are variable. Longer-term follow-up studies are necessary to fully assess surgical management, and patients must be counseled appropriately.",
"title": ""
},
{
"docid": "bbb91e336f0125c0e8a0358f6afc9ef1",
"text": "In this paper, we study a new learning paradigm for neural machine translation (NMT). Instead of maximizing the likelihood of the human translation as in previous works, we minimize the distinction between human translation and the translation given by an NMT model. To achieve this goal, inspired by the recent success of generative adversarial networks (GANs), we employ an adversarial training architecture and name it as AdversarialNMT. In Adversarial-NMT, the training of the NMT model is assisted by an adversary, which is an elaborately designed 2D convolutional neural network (CNN). The goal of the adversary is to differentiate the translation result generated by the NMT model from that by human. The goal of the NMT model is to produce high quality translations so as to cheat the adversary. A policy gradient method is leveraged to co-train the NMT model and the adversary. Experimental results on English→French and German→English translation tasks show that Adversarial-NMT can achieve significantly better translation quality than several strong baselines.",
"title": ""
},
{
"docid": "400624533ddd2a0e1ebac1c7022238c1",
"text": "Graphene is a monolayer of tightly packed carbon atoms that possesses many interesting properties and has numerous exciting applications. In this work, we report the antibacterial activity of two water-dispersible graphene derivatives, graphene oxide (GO) and reduced graphene oxide (rGO) nanosheets. Such graphene-based nanomaterials can effectively inhibit the growth of E. coli bacteria while showing minimal cytotoxicity. We have also demonstrated that macroscopic freestanding GO and rGO paper can be conveniently fabricated from their suspension via simple vacuum filtration. Given the superior antibacterial effect of GO and the fact that GO can be mass-produced and easily processed to make freestanding and flexible paper with low cost, we expect this new carbon nanomaterial may find important environmental and clinical applications.",
"title": ""
},
{
"docid": "ca17aabbcbd3756d692117803504f441",
"text": "Novelty detection is the process of identifying the observation(s) that differ in some respect from the training observations (the target class). In reality, the novelty class is often absent during training, poorly sampled or not well defined. Therefore, one-class classifiers can efficiently model such problems. However, due to the unavailability of data from the novelty class, training an end-to-end deep network is a cumbersome task. In this paper, inspired by the success of generative adversarial networks for training deep models in unsupervised and semi-supervised settings, we propose an end-to-end architecture for one-class classification. Our architecture is composed of two deep networks, each of which trained by competing with each other while collaborating to understand the underlying concept in the target class, and then classify the testing samples. One network works as the novelty detector, while the other supports it by enhancing the inlier samples and distorting the outliers. The intuition is that the separability of the enhanced inliers and distorted outliers is much better than deciding on the original samples. The proposed framework applies to different related applications of anomaly and outlier detection in images and videos. The results on MNIST and Caltech-256 image datasets, along with the challenging UCSD Ped2 dataset for video anomaly detection illustrate that our proposed method learns the target class effectively and is superior to the baseline and state-of-the-art methods.",
"title": ""
},
{
"docid": "6ac9b6e2ddf1686087b456d3f0d3014b",
"text": "Ephaptic interactions between a neuron and axons or dendrites passing by its cell body can be, in principle, more significant than ephaptic interactions among axons in a fiber tract. Extracellular action potentials outside axons are small in amplitude and spatially spread out, while they are larger in amplitude and much more spatially confined near cell bodies. We estimated the extracellular potentials associated with an action potential in a cortical pyramidal cell using standard one-dimensional cable theory and volume conductor theory. Their spatial and temporal pattern reveal much about the location and timing of currents in the cell, especially in combination with a known morphology, and simple experiments could resolve questions about spike initiation. From the extracellular potential we compute the ephaptically induced polarization in a nearby passive cable. The magnitude of this induced voltage can be several mV, does not spread electrotonically, and depends only weakly on the passive properties of the cable. We discuss their possible functional relevance.",
"title": ""
},
{
"docid": "3f8860bc21f26b81b066f4c75b9390e1",
"text": "Adaptive filter algorithms are extensively use in active control applications and the availability of low cost powerful digital signal processor (DSP) platforms has opened the way for new applications and further research opportunities in e.g. the active control area. The field of active control demands a solid exposure to practical systems and DSP platforms for a comprehensive understanding of the theory involved. Traditional laboratory experiments prove to be insufficient to fulfill these demands and need to be complemented with more flexible and economic remotely controlled laboratories. The purpose of this thesis project is to implement a number of different adaptive control algorithms in the recently developed remotely controlled Virtual Instrument Systems in Reality (VISIR) ANC/DSP remote laboratory at Blekinge Institute of Technology and to evaluate the performance of these algorithms in the remote laboratory. In this thesis, performance of different filtered-x versions adaptive algorithms (NLMS, LLMS, RLS and FuRLMS) has been evaluated in a remote Laboratory. The adaptive algorithms were implemented remotely on a Texas Instrument DSP TMS320C6713 in an ANC system to attenuate low frequency noise which ranges from 0-200 Hz in a circular ventilation duct using single channel feed forward control. Results show that the remote lab can handle complex and advanced control algorithms. These algorithms were tested and it was found that remote lab works effectively and the achieved attenuation level for the algorithms used on the duct system is comparable to similar applications.",
"title": ""
},
{
"docid": "64d53035eb919d5e27daef6b666b7298",
"text": "The 3L-NPC (Neutral-Point-Clamped) is the most popular multilevel converter used in high-power medium-voltage applications. An important disadvantage of this structure is the unequal distribution of losses among the switches. The performances of 3L-NPC structure were improved by developing the 3L-ANPC (Active-NPC) converter which has more degrees of freedom. In this paper the switching states and the loss distribution problem are studied for different PWM strategies in a STATCOM application. The PSIM simulation results are shown in order to validate the PWM strategies studied for 3L-ANPC converter.",
"title": ""
},
{
"docid": "6d471fcfa68cfb474f2792892e197a66",
"text": "The introduction of software technology in a life-dependent environment requires the development team to execute a process that ensures a high level of software reliability and correctness. Despite their popularity, agile methods are generally assumed to be inappropriate as a process family in these environments due to their lack of emphasis on documentation, traceability, and other formal techniques. Agile methods, notably Scrum, favor empirical process control, or small constant adjustments in a tight feedback loop. This paper challenges the assumption that agile methods are inappropriate for safety-critical software development. Agile methods are flexible enough to encourage the rightamount of ceremony; therefore if safety-critical systems require greater emphasis on activities like formal specification and requirements management, then an agile process will include these as necessary activities. Furthermore, agile methods focus more on continuous process management and code-level quality than classic software engineering process models. We present our experiences on the image-guided surgical toolkit (IGSTK) project as a backdrop. IGSTK is an open source software project employing agile practices since 2004. We started with the assumption that a lighter process is better, focused on evolving code, and only adding process elements as the need arose. IGSTK has been adopted by teaching hospitals and research labs, and used for clinical trials. Agile methods have matured since the academic community suggested they are not suitable for safety-critical systems almost a decade ago, we present our experiences as a case study for renewing the discussion.",
"title": ""
},
{
"docid": "f847a04cb60bbbe5a2cd1ec1c4c9be6f",
"text": "This letter presents a wideband patch antenna on a low-temperature cofired ceramic substrate for Local Multipoint Distribution Service band applications. Conventional rectangular patch antennas have a narrow bandwidth. The proposed via-wall structure enhances the electric field coupling between the stacked patches to achieve wideband characteristics. We designed same-side and opposite-side feeding configurations and report on the fabrication of an experimental 28-GHz antenna used to validate the design concept. Measurements correlate well with the simulation results, achieving a 10-dB impedance bandwidth of 25.4% (23.4-30.2 GHz).",
"title": ""
},
{
"docid": "d5508bb363b6304fe21a808d531a8d41",
"text": "A dual-band printed log-periodic dipole array (LPDA) antenna for wireless communications, designed on a low-cost PET substrate and implemented by inkjet-printing conductive ink, is presented. The proposed antenna can be used for wireless communications both within the UHF (2.4–2.484 GHz) and SHF (5.2-5.8 GHz) wireless frequency bands, and presents a good out-of-band rejection, without the need of stopband filters. The antenna has been designed using a general-purpose 3-D computer-aided design software (CAD), CST Microwave Studio, and then realized. Measured results are in very good agreement with simulations.",
"title": ""
},
{
"docid": "b26a9a78f11227e894af0e58b3b01c98",
"text": "Although all the cells in an organism contain the same genetic information, differences in the cell phenotype arise from the expression of lineage-specific genes. During myelopoiesis, external differentiating signals regulate the expression of a set of transcription factors. The combined action of these transcription factors subsequently determines the expression of myeloid-specific genes and the generation of monocytes and macrophages. In particular, the transcription factor PU.1 has a critical role in this process. We review the contribution of several transcription factors to the control of macrophage development.",
"title": ""
},
{
"docid": "64e1953833fe13e0d99928e442d75d11",
"text": "We develop a new framework to achieve the goal of Wikipedia entity expansion and attribute extraction from the Web. Our framework takes a few existing entities that are automatically collected from a particular Wikipedia category as seed input and explores their attribute infoboxes to obtain clues for the discovery of more entities for this category and the attribute content of the newly discovered entities. One characteristic of our framework is to conduct discovery and extraction from desirable semi-structured data record sets which are automatically collected from the Web. A semi-supervised learning model with Conditional Random Fields is developed to deal with the issues of extraction learning and limited number of labeled examples derived from the seed entities. We make use of a proximate record graph to guide the semi-supervised learning process. The graph captures alignment similarity among data records. Then the semi-supervised learning process can leverage the unlabeled data in the record set by controlling the label regularization under the guidance of the proximate record graph. Extensive experiments on different domains have been conducted to demonstrate its superiority for discovering new entities and extracting attribute content.",
"title": ""
},
{
"docid": "06f8b713ed4020c99403c28cbd1befbc",
"text": "In the last decade, deep learning algorithms have become very popular thanks to the achieved performance in many machine learning and computer vision tasks. However, most of the deep learning architectures are vulnerable to so called adversarial examples. This questions the security of deep neural networks (DNN) for many securityand trust-sensitive domains. The majority of the proposed existing adversarial attacks are based on the differentiability of the DNN cost function. Defence strategies are mostly based on machine learning and signal processing principles that either try to detect-reject or filter out the adversarial perturbations and completely neglect the classical cryptographic component in the defence. In this work, we propose a new defence mechanism based on the second Kerckhoffs’s cryptographic principle which states that the defence and classification algorithm are supposed to be known, but not the key. To be compliant with the assumption that the attacker does not have access to the secret key, we will primarily focus on a gray-box scenario and do not address a white-box one. More particularly, we assume that the attacker does not have direct access to the secret block, but (a) he completely knows the system architecture, (b) he has access to the data used for training and testing and (c) he can observe the output of the classifier for each given input. We show empirically that our system is efficient against most famous state-of-the-art attacks in black-box and gray-box scenarios.",
"title": ""
},
{
"docid": "99b151b39c13e7106b680ae7935567fd",
"text": "Pediatricians have an important role not only in early recognition and evaluation of autism spectrum disorders but also in chronic management of these disorders. The primary goals of treatment are to maximize the child's ultimate functional independence and quality of life by minimizing the core autism spectrum disorder features, facilitating development and learning, promoting socialization, reducing maladaptive behaviors, and educating and supporting families. To assist pediatricians in educating families and guiding them toward empirically supported interventions for their children, this report reviews the educational strategies and associated therapies that are the primary treatments for children with autism spectrum disorders. Optimization of health care is likely to have a positive effect on habilitative progress, functional outcome, and quality of life; therefore, important issues, such as management of associated medical problems, pharmacologic and nonpharmacologic intervention for challenging behaviors or coexisting mental health conditions, and use of complementary and alternative medical treatments, are also addressed.",
"title": ""
},
{
"docid": "f945b645e492e2b5c6c2d2d4ea6c57ae",
"text": "PURPOSE\nThe aim of this review was to look at relevant data and research on the evolution of ventral hernia repair.\n\n\nMETHODS\nResources including books, research, guidelines, and online articles were reviewed to provide a concise history of and data on the evolution of ventral hernia repair.\n\n\nRESULTS\nThe evolution of ventral hernia repair has a very long history, from the recognition of ventral hernias to its current management, with significant contributions from different authors. Advances in surgery have led to more cases of ventral hernia formation, and this has required the development of new techniques and new materials for ventral hernia management. The biocompatibility of prosthetic materials has been important in mesh development. The functional anatomy and physiology of the abdominal wall has become important in ventral hernia management. New techniques in abdominal wall closure may prevent or reduce the incidence of ventral hernia in the future.\n\n\nCONCLUSION\nThe management of ventral hernia is continuously evolving as it responds to new demands and new technology in surgery.",
"title": ""
},
{
"docid": "9a42785b743ed0b38334819365977020",
"text": "Low-cost but high-performance robot arms are required for widespread use of service robots. Most robot arms use expensive motors and speed reducers to provide torques sufficient to support the robot mass and payload. If the gravitational torques due to the robot mass, which is usually much greater than the payload, can be compensated for by some means; the robot would need much smaller torques, which can be delivered by cheap actuator modules. To this end, we propose a novel counterbalance mechanism which can completely counterbalance the gravitational torques due to the robot mass. Since most 6-DOF robots have three pitch joints, which are subject to gravitational torques, we propose a 3-DOF counterbalance mechanism based on the double parallelogram mechanism, in which reference planes are provided to each joint for proper counterbalancing. A 5-DOF counterbalance robot arm was built to demonstrate the performance of the proposed mechanism. Simulation and experimental results showed that the proposed mechanism had effectively decreased the torque required to support the robot mass, thus allowing the prospective use of low-cost motors and speed reducers for high-performance robot arms.",
"title": ""
},
{
"docid": "6fec53c8c10c2e7114a1464b2b8e3024",
"text": "This paper provides generalized analysis of active filters used as electromagnetic interference (EMI) filters and active-power filters. Insertion loss and impedance increase of various types of active-filter topologies are described with applicable requirements and limitations as well as the rationale for selecting active-filter topology according to different applications.",
"title": ""
},
{
"docid": "9d803b0ce1f1af621466b1d7f97b7edf",
"text": "This research paper addresses the methodology and approaches to managing criminal computer forensic investigations in a law enforcement environment with management controls, operational controls, and technical controls. Management controls cover policy and standard operating procedures (SOP's), methodology, and guidance. Operational controls cover SOP requirements, seizing evidence, evidence handling, best practices, and education, training and awareness. Technical controls cover acquisition and analysis procedures, data integrity, rules of evidence, presenting findings, proficiency testing, and data archiving.",
"title": ""
},
{
"docid": "b22137cbb14396f1dcd24b2a15b02508",
"text": "This paper studies the self-alignment properties between two chips that are stacked on top of each other with copper pillars micro-bumps. The chips feature alignment marks used for measuring the resulting offset after assembly. The accuracy of the alignment is found to be better than 0.5 µm in × and y directions, depending on the process. The chips also feature waveguides and vertical grating couplers (VGC) fabricated in the front-end-of-line (FEOL) and organized in order to realize an optical interconnection between the chips. The coupling of light between the chips is measured and compared to numerical simulation. This high accuracy self-alignment was obtained after studying the impact of flux and fluxless treatments on the wetting of the pads and the successful assembly yield. The composition of the bump surface was analyzed with Time-of-Flight Secondary Ions Mass Spectroscopy (ToF-SIMS) in order to understand the impact of each treatment. This study confirms that copper pillars micro-bumps can be used to self-align photonic integrated circuits (PIC) with another die (for example a microlens array) in order to achieve high throughput alignment of optical fiber to the PIC.",
"title": ""
},
{
"docid": "900d98cbc830f3fc2b0f65b484f71a7c",
"text": "The current dominant approaches to face recognition rely on facial characteristics that are on or over the skin. Some of these characteristics have low permanency can be altered, and their phenomenology varies significantly with environmental factors (e.g., lighting). Many methodologies have been developed to address these problems to various degrees. However, the current framework of face recognition research has a potential weakness due to its very nature. We present a novel framework for face recognition based on physiological information. The motivation behind this effort is to capitalize on the permanency of innate characteristics that are under the skin. To establish feasibility, we propose a specific methodology to capture facial physiological patterns using the bioheat information contained in thermal imagery. First, the algorithm delineates the human face from the background using the Bayesian framework. Then, it localizes the superficial blood vessel network using image morphology. The extracted vascular network produces contour shapes that are characteristic to each individual. The branching points of the skeletonized vascular network are referred to as thermal minutia points (TMPs) and constitute the feature database. To render the method robust to facial pose variations, we collect for each subject to be stored in the database five different pose images (center, midleft profile, left profile, midright profile, and right profile). During the classification stage, the algorithm first estimates the pose of the test image. Then, it matches the local and global TMP structures extracted from the test image with those of the corresponding pose images in the database. We have conducted experiments on a multipose database of thermal facial images collected in our laboratory, as well as on the time-gap database of the University of Notre Dame. The good experimental results show that the proposed methodology has merit, especially with respect to the problem of low permanence over time. More importantly, the results demonstrate the feasibility of the physiological framework in face recognition and open the way for further methodological and experimental research in the area",
"title": ""
}
] | scidocsrr |
04e6e863c838a8374db298d31daa1be3 | Fast Multiview Face Detection | [
{
"docid": "1407b7bd4f597dd64642150629349e5e",
"text": "This paper presents a general trainable framework for object detection in static images of cluttered scenes. The detection technique we develop is based on a wavelet representation of an object class derived from a statistical analysis of the class instances. By learning an object class in terms of a subset of an overcomplete dictionary of wavelet basis functions, we derive a compact representation of an object class which is used as an input to a suppori vector machine classifier. This representation overcomes both the problem of in-class variability and provides a low false detection rate in unconstrained environments. We demonstrate the capabilities of the technique i n two domains whose inherent information content differs significantly. The first system is face detection and the second is the domain of people which, in contrast to faces, vary greatly in color, texture, and patterns. Unlike previous approaches, this system learns from examples and does not rely on any a priori (handcrafted) models or motion-based segmentation. The paper also presents a motion-based extension to enhance the performance of the detection algorithm over video sequences. The results presented here suggest that this architecture may well be quite general.",
"title": ""
}
] | [
{
"docid": "ab932e771c091f0f862dcedb96d6d202",
"text": "We present a simple and effective architecture for fine-grained visual recognition called Bilinear Convolutional Neural Networks (B-CNNs). These networks represent an image as a pooled outer product of features derived from two CNNs and capture localized feature interactions in a translationally invariant manner. B-CNNs belong to the class of orderless texture representations but unlike prior work they can be trained in an end-to-end manner. Our most accurate model obtains 84.1%, 79.4%, 86.9% and 91.3% per-image accuracy on the Caltech-UCSD birds [67], NABirds [64], FGVC aircraft [42], and Stanford cars [33] dataset respectively and runs at 30 frames-per-second on a NVIDIA Titan X GPU. We then present a systematic analysis of these networks and show that (1) the bilinear features are highly redundant and can be reduced by an order of magnitude in size without significant loss in accuracy, (2) are also effective for other image classification tasks such as texture and scene recognition, and (3) can be trained from scratch on the ImageNet dataset offering consistent improvements over the baseline architecture. Finally, we present visualizations of these models on various datasets using top activations of neural units and gradient-based inversion techniques. The source code for the complete system is available at http://vis-www.cs.umass.edu/bcnn.",
"title": ""
},
{
"docid": "03a578bbda273daec0181fdbbd6d3bcd",
"text": "Increasing widespread use of educational technologies is producing vast amounts of data. Such data can be used to help advance our understanding of student learning and enable more intelligent, interactive, engaging, and effective education. In this paper, we discuss the status and prospects of this new and powerful opportunity for data-driven development and optimization of educational technologies, focusing on Intelligent Tutoring Systems. We provide examples of use of a variety of techniques to develop or optimize the select, evaluate, suggest, and update functions of intelligent tutors, including probabilistic grammar learning, rule induction, Markov decision process, classification, and integrations of symbolic search and statistical inference.",
"title": ""
},
{
"docid": "1617f5581ff0e2ed46aa49e277431746",
"text": "Direct communication between two or more devices without the intervention of a base station, known as device-to-device (D2D) communication, is a promising way to improve performance of cellular networks in terms of spectral and energy efficiency. The D2D communication paradigm has been largely exploited in non-cellular technologies such as Bluetooth or Wi-Fi but it has not yet been fully incorporated into existing cellular networks. In this regard, a new proposal focusing on the integration of D2D communication into LTE-A has been recently approved by the 3GPP standardization community as discussed in this paper. In cellular networks, D2D communication introduces several critical issues, such as interference management and decisions on whether devices should communicate directly or not. In this survey, we provide a thorough overview of the state of the art focusing on D2D communication, especially within 3GPP LTE/LTE-A. First, we provide in-depth classification of papers looking at D2D from several perspectives. Then, papers addressing all major problems and areas related to D2D are presented and approaches proposed in the papers are compared according to selected criteria. On the basis of the surveyed papers, we highlight areas not satisfactorily addressed so far and outline major challenges for future work regarding efficient integration of D2D in cellular networks.",
"title": ""
},
{
"docid": "ba0fab446ba760a4cb18405a05cf3979",
"text": "Please c Disaster Summary. — This study aims at understanding the role of education in promoting disaster preparedness. Strengthening resilience to climate-related hazards is an urgent target of Goal 13 of the Sustainable Development Goals. Preparing for a disaster such as stockpiling of emergency supplies or having a family evacuation plan can substantially minimize loss and damages from natural hazards. However, the levels of household disaster preparedness are often low even in disaster-prone areas. Focusing on determinants of personal disaster preparedness, this paper investigates: (1) pathways through which education enhances preparedness; and (2) the interplay between education and experience in shaping preparedness actions. Data analysis is based on face-to-face surveys of adults aged 15 years in Thailand (N = 1,310) and the Philippines (N = 889, female only). Controlling for socio-demographic and contextual characteristics, we find that formal education raises the propensity to prepare against disasters. Using the KHB method to further decompose the education effects, we find that the effect of education on disaster preparedness is mainly mediated through social capital and disaster risk perception in Thailand whereas there is no evidence that education is mediated through observable channels in the Philippines. This suggests that the underlying mechanisms explaining the education effects are highly context-specific. Controlling for the interplay between education and disaster experience, we show that education raises disaster preparedness only for those households that have not been affected by a disaster in the past. Education improves abstract reasoning and anticipation skills such that the better educated undertake preventive measures without needing to first experience the harmful event and then learn later. In line with recent efforts of various UN agencies in promoting education for sustainable development, this study provides a solid empirical evidence showing positive externalities of education in disaster risk reduction. 2017TheAuthors.PublishedbyElsevierLtd.This is an open access article under theCCBY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).",
"title": ""
},
{
"docid": "79910e1dadf52be1b278d2e57d9bdb9e",
"text": "Information Visualization systems have traditionally followed a one-size-fits-all model, typically ignoring an individual user's needs, abilities and preferences. However, recent research has indicated that visualization performance could be improved by adapting aspects of the visualization to each individual user. To this end, this paper presents research aimed at supporting the design of novel user-adaptive visualization systems. In particular, we discuss results on using information on user eye gaze patterns while interacting with a given visualization to predict the user's visualization tasks, as well as user cognitive abilities including perceptual speed, visual working memory, and verbal working memory. We show that such predictions are significantly better than a baseline classifier even during the early stages of visualization usage. These findings are discussed in view of designing visualization systems that can adapt to each individual user in real-time.",
"title": ""
},
{
"docid": "fed3d74e2ba9883f868395e4abd8160b",
"text": "Complications with garment sizing and poor fit inconvenience many consumers who become dissatisfied with such provision on the high street. It is evident that human measurement and classification of the human body based on size and shape are precedent to accurate clothing fit and therefore fundamental to production and consumption. With advancement in technology, automated 3D body scanners designed to capture the shape and size of a human body in seconds and further produce its true-to-scale 3D body model have been developed. The use of data generated is extensive; and include anthropometric dimensions and morphology for the creation of avatars and mannequins. This technology is currently viewed as the frontier in solving fit problems, for instance by generating accurate data for the development of size charts, enabling a pragmatic approach to the offer of mass customisation and also facilitating virtual model fit trials that enhance online clothing shopping experiences. Consumers have become savvier than ever and as the demand for well-fitted garments is increasing, 3D body scanning technology is being viewed as a significant bridge between craftsmanship and computer-aided design technologies. Currently being explored by academic research and not as yet widely implemented across retail sectors, it is expected to facilitate consumer satisfaction and reduce commercial waste due to ‘ill-fit’ returns. There is therefore a vital need to authenticate procedures and establish systems for practice. This paper seeks to assess the application of one such technology to human measurement for clothing provision and tests procedures for its implementation. The methodology presents a case study approach involving the use of one such stateof-the-art technology in the acquisition of measurement data at a metropolitan university in the UK, and advises on the application of the 3D body scanner in research and sampling activities.",
"title": ""
},
{
"docid": "617e0aece2a082947b7e7eadd12f280a",
"text": "Segment routing is a new proposed routing mechanism for simplified and flexible path control in IP/MPLS networks. It builds on existing network routing and connection management protocols and one of its important features is the automatic rerouting of connections upon failure. Re-routing can be done with available restoration mechanisms including IGP-based rerouting and fast reroute with loop-free alternates. This is particularly attractive for use in Software Defined Networks (SDN) because the central controller need only be involved at connection set-up time and failures are handled automatically in a distributed manner. A significant challenge in restoration optimization in segment routed networks is the centralized determination of connections primary paths so as to enable the best sharing of restoration bandwidth over non-simultaneous network failures. We formulate this problem as a linear programming problem and develop an efficient primal-dual algorithm for the solution. We also develop a simple randomized rounding scheme for cases when there are additional constraints on segment routing. We demonstrate the significant capacity benefits achievable from this optimized restoration with segment routing.",
"title": ""
},
{
"docid": "e83622a6c195b63f9a20306af8aade18",
"text": "BACKGROUND\nPelvic floor muscle training is the most commonly recommended physical therapy treatment for women with stress leakage of urine. It is also used in the treatment of women with mixed incontinence, and less commonly for urge incontinence. Adjuncts, such as biofeedback or electrical stimulation, are also commonly used with pelvic floor muscle training. The content of pelvic floor muscle training programmes is highly variable.\n\n\nOBJECTIVES\nTo determine the effects of pelvic floor muscle training for women with symptoms or urodynamic diagnoses of stress, urge and mixed incontinence, in comparison to no treatment or other treatment options.\n\n\nSEARCH STRATEGY\nSearch strategy: We searched the Cochrane Incontinence Group trials register (May 2000), Medline (1980 to 1998), Embase (1980 to 1998), the database of the Dutch National Institute of Allied Health Professions (to 1998), the database of the Cochrane Rehabilitation and Related Therapies Field (to 1998), Physiotherapy Index (to 1998) and the reference lists of relevant articles. We handsearched the proceedings of the International Continence Society (1980 to 2000). We contacted investigators in the field to locate studies. Date of the most recent searches: May 2000.\n\n\nSELECTION CRITERIA\nRandomised trials in women with symptoms or urodynamic diagnoses of stress, urge or mixed incontinence that included pelvic floor muscle training in at least one arm of the trial.\n\n\nDATA COLLECTION AND ANALYSIS\nTwo reviewers assessed all trials for inclusion/exclusion and methodological quality. Data were extracted by the lead reviewer onto a standard form and cross checked by another. Disagreements were resolved by discussion. Data were processed as described in the Cochrane Handbook. Sensitivity analysis on the basis of diagnosis was planned and undertaken where appropriate.\n\n\nMAIN RESULTS\nForty-three trials met the inclusion criteria. The primary or only reference for 15 of these was a conference abstract. The pelvic floor muscle training programs, and comparison interventions, varied markedly. Outcome measures differed between trials, and methods of data reporting varied, making the data difficult to combine. Many of the trials were small. Allocation concealment was adequate in five trials, and nine trials used assessors masked to group allocation. Thirteen trials reported that there were no losses to follow up, seven trials had dropout rates of less than 10%, but in the remaining trials the proportion of dropouts ranged from 12% to 41%. Pelvic floor muscle training was better than no treatment or placebo treatments for women with stress or mixed incontinence. 'Intensive' appeared to be better than 'standard' pelvic floor muscle training. PFMT may be more effective than some types of electrical stimulation but there were problems in combining the data from these trials. There is insufficient evidence to determine if pelvic floor muscle training is better or worse than other treatments. The effect of adding pelvic floor muscle training to other treatments (e.g. electrical stimulation, behavioural training) is not clear due to the limited amount of evidence available. Evidence of the effect of adding other adjunctive treatments to PFMT (e.g. vaginal cones, intravaginal resistance) is equally limited. The effectiveness of biofeedback assisted PFMT is not clear, but on the basis of the evidence available there did not appear to be any benefit over PFMT alone at post treatment assessment. Long-term outcomes of pelvic floor muscle training are unclear. Side effects of pelvic floor muscle training were uncommon and reversible. A number of the formal comparisons should be viewed with caution due to statistical heterogeneity, lack of statistical independence, and the possibility of spurious confidence intervals in some instances.\n\n\nREVIEWER'S CONCLUSIONS\nPelvic floor muscle training appeared to be an effective treatment for adult women with stress or mixed incontinence. Pelvic floor muscle training was better than no treatment or placebo treatments. The limitations of the evidence available mean that is difficult to judge if pelvic floor muscle training was better or worse than other treatments. Most trials to date have studied the effect of treatment in younger, premenopausal women. The role of pelvic floor muscle training for women with urge incontinence alone remains unclear. Many of the trials were small with poor reporting of allocation concealment and masking of outcome assessors. In addition there was a lack of consistency in the choice and reporting of outcome measures that made data difficult to combine. Methodological problems limit the confidence that can be placed in the findings of the review. Further, large, high quality trials are necessary.",
"title": ""
},
{
"docid": "c682e6d5423987dea072625e626a2146",
"text": "In this work, a solution for clustering and tracking obstacles in the area covered by a LIDAR sensor is presented. It is based on a combination of simple artificial intelligence techniques and it is conceived as an initial version of a detection and tracking system for objects of any shape that an autonomous vehicle might find in its surroundings. The proposed solution divides the problem into three consecutive phases: 1) segmentation, 2) fragmentation detection and clustering and 3) tracking. The work done has been tested with real world LIDAR scan samples taken from an instrumented vehicle.",
"title": ""
},
{
"docid": "f35d164bd1b19f984b10468c41f149e3",
"text": "Recent technological advancements have led to a deluge of data from distinctive domains (e.g., health care and scientific sensors, user-generated data, Internet and financial companies, and supply chain systems) over the past two decades. The term big data was coined to capture the meaning of this emerging trend. In addition to its sheer volume, big data also exhibits other unique characteristics as compared with traditional data. For instance, big data is commonly unstructured and require more real-time analysis. This development calls for new system architectures for data acquisition, transmission, storage, and large-scale data processing mechanisms. In this paper, we present a literature survey and system tutorial for big data analytics platforms, aiming to provide an overall picture for nonexpert readers and instill a do-it-yourself spirit for advanced audiences to customize their own big-data solutions. First, we present the definition of big data and discuss big data challenges. Next, we present a systematic framework to decompose big data systems into four sequential modules, namely data generation, data acquisition, data storage, and data analytics. These four modules form a big data value chain. Following that, we present a detailed survey of numerous approaches and mechanisms from research and industry communities. In addition, we present the prevalent Hadoop framework for addressing big data challenges. Finally, we outline several evaluation benchmarks and potential research directions for big data systems.",
"title": ""
},
{
"docid": "cc9686bac7de957afe52906763799554",
"text": "A key issue in software evolution analysis is the identification of particular changes that occur across several versions of a program. We present change distilling, a tree differencing algorithm for fine-grained source code change extraction. For that, we have improved the existing algorithm by Chawathe et al. for extracting changes in hierarchically structured data. Our algorithm extracts changes by finding both a match between the nodes of the compared two abstract syntax trees and a minimum edit script that can transform one tree into the other given the computed matching. As a result, we can identify fine-grained change types between program versions according to our taxonomy of source code changes. We evaluated our change distilling algorithm with a benchmark that we developed, which consists of 1,064 manually classified changes in 219 revisions of eight methods from three different open source projects. We achieved significant improvements in extracting types of source code changes: Our algorithm approximates the minimum edit script 45 percent better than the original change extraction approach by Chawathe et al. We are able to find all occurring changes and almost reach the minimum conforming edit script, that is, we reach a mean absolute percentage error of 34 percent, compared to the 79 percent reached by the original algorithm. The paper describes both our change distilling algorithm and the results of our evolution.",
"title": ""
},
{
"docid": "04cb7a7dec3a17fdd55a25f8729f7175",
"text": "In this paper we present the growing hierarchical self-organizing map . This dynamically growing neural network model evolves into a hierarchical structure according to the requirements of the input data during an unsupervised training process. We demonstrate the benefits of this novel neural network model by organizing a real-world document collection according to their similarities.",
"title": ""
},
{
"docid": "6d77484b5d95df8c0908afe6e2088f06",
"text": "Neuroplasticity has replaced the formerly held position that the brain is a physiologically static organ. By actively being mindful and partaking in cognitive exercises, the brain is able to improve its functions by growing new neurons and forming new connections between existing neurons [11]. Founded in 2011 and guided by its advisory board of neuroscientists, psychologists, medical doctors and researchers, NeuroGym effectively utilizes the natural neuroplasticity of the brain to create commercially available products based on available science.",
"title": ""
},
{
"docid": "2ae76fff668bc448e841a27cb951f046",
"text": "We present efficient algorithms for the problem of contextual bandits with i.i.d. covariates, an arbitrary sequence of rewards, and an arbitrary class of policies. Our algorithm BISTRO requires d calls to the empirical risk minimization (ERM) oracle per round, where d is the number of actions. The method uses unlabeled data to make the problem computationally simple. When the ERM problem itself is computationally hard, we extend the approach by employing multiplicative approximation algorithms for the ERM. The integrality gap of the relaxation only enters in the regret bound rather than the benchmark. Finally, we show that the adversarial version of the contextual bandit problem is learnable (and efficient) whenever the full-information supervised online learning problem has a non-trivial regret guarantee (and efficient).",
"title": ""
},
{
"docid": "4820b3bfcf8c75011f5f5e1345be39c6",
"text": "In this paper we introduce visual phrases, complex visual composites like “a person riding a horse”. Visual phrases often display significantly reduced visual complexity compared to their component objects, because the appearance of those objects can change profoundly when they participate in relations. We introduce a dataset suitable for phrasal recognition that uses familiar PASCAL object categories, and demonstrate significant experimental gains resulting from exploiting visual phrases. We show that a visual phrase detector significantly outperforms a baseline which detects component objects and reasons about relations, even though visual phrase training sets tend to be smaller than those for objects. We argue that any multi-class detection system must decode detector outputs to produce final results; this is usually done with non-maximum suppression. We describe a novel decoding procedure that can account accurately for local context without solving difficult inference problems. We show this decoding procedure outperforms the state of the art. Finally, we show that decoding a combination of phrasal and object detectors produces real improvements in detector results.",
"title": ""
},
{
"docid": "35adbc66c3b98543471bbe47cb71e00d",
"text": "Because of their demonstrated capabilities in attaining high rates of advance in civil tunnel construction, the hard rock mining industry has always shown a major interest in the use of TBMs for mine development, primarily for development of entries, as well as ventilation, haulage and production drifts. The successful application of TBM technology to mining depends on the selection of the most suitable equipment and cutting tools for the rock and ground conditions to be encountered. In addition to geotechnical investigations and required rock testing, cutterhead design optimization is an integral part of the machine selection to ensure a successful application of the machines in a specific underground mine environment. This paper presents and discusses selected case histories of TBM applications in mining, the lessons learned, the process of laboratory testing together with machine selection and performance estimation methods.",
"title": ""
},
{
"docid": "36bdb668b97c77496cdb66c045c58495",
"text": "OBJECTIVE\nThe purpose of the present study was to examine the prevalence of fast-food purchases for family meals and the associations with sociodemographic variables, dietary intake, home food environment, and weight status in adolescents and their parents.\n\n\nDESIGN\nThis study is a cross-sectional evaluation of parent interviews and adolescent surveys from Project EAT (Eating Among Teens).\n\n\nSUBJECTS\nSubjects included 902 middle-school and high-school adolescents (53% female, 47% male) and their parents (89% female, 11% male). The adolescent population was ethnically diverse: 29% white, 24% black, 21% Asian American, 14% Hispanic and 12% other.\n\n\nRESULTS\nResults showed that parents who reported purchasing fast food for family meals at least 3 times per week were significantly more likely than parents who reported purchasing fewer fast-food family meals to report the availability of soda pop and chips in the home. Adolescents in homes with fewer than 3 fast-food family meals per week were significantly more likely than adolescents in homes with more fast-food family meals to report having vegetables and milk served with meals at home. Fast-food purchases for family meals were positively associated with the intake of fast foods and salty snack foods for both parents and adolescents; and weight status among parents. Fast-food purchases for family meals were negatively associated with parental vegetable intake.\n\n\nCONCLUSIONS\nFast-food purchases may be helpful for busy families, but families need to be educated on the effects of fast food for family meals and how to choose healthier, convenient family meals.",
"title": ""
},
{
"docid": "742c0b15f6a466bfb4e5130b49f79e64",
"text": "There has been much interest in unsupervised learning of hierarchical generative models such as deep belief networks (DBNs); however, scaling such models to full-sized, high-dimensional images remains a difficult problem. To address this problem, we present the convolutional deep belief network, a hierarchical generative model that scales to realistic image sizes. This model is translation-invariant and supports efficient bottom-up and top-down probabilistic inference. Key to our approach is probabilistic max-pooling, a novel technique that shrinks the representations of higher layers in a probabilistically sound way. Our experiments show that the algorithm learns useful high-level visual features, such as object parts, from unlabeled images of objects and natural scenes. We demonstrate excellent performance on several visual recognition tasks and show that our model can perform hierarchical (bottom-up and top-down) inference over full-sized images.",
"title": ""
},
{
"docid": "47c4a6e37c0185c06a8726a501d8dc9d",
"text": "We present an overview of recently developed data-driven tools for safety analysis of autonomous vehicles and advanced driver assist systems. The core algorithms combine model-based, hybrid system reachability analysis with sensitivity analysis of components with unknown or inaccessible models. We illustrate the applicability of this approach with a new case study of emergency braking systems in scenarios with two or three vehicles. This problem is representative of the most common type of rear-end crashes, which is relevant for safety analysis of automatic emergency braking (AEB) and forward collision avoidance systems. We show that our verification tool can effectively prove the safety of certain scenarios (specified by several parameters like braking profiles, initial velocities, uncertainties in position and reaction times), and also compute the severity of accidents for unsafe scenarios. Through hundreds of verification experiments, we quantified the safety envelope of the system across relevant parameters. These results show that the approach is promising for design, debugging and certification. We also show how the reachability analysis can be combined with statistical information about the parameters, to assess the risk-level of the control system, which in turn is essential, for example, for determining Automotive Safety Integrity Levels (ASIL) for the ISO26262 standard.",
"title": ""
},
{
"docid": "bb715c6ef783e4e6d179dde74bb04035",
"text": "This paper presents the design of a 1 GHz Delay-Locked Loop (DLL) with embedded phase interpolation. The DLL was designed in a 0.13µm SiGe BiCMOS process and provides a measured single-tap phase range of 50ps (18°) with an average and worst-case phase resolution of 1.36ps (0.49°) and 5ps (1.8°), respectively. This translates to beamsteering resolutions of < 3.5mm in free space when integrated into mm-wave imagers that utilize time-domain beamforming. The DLL has an average output rms-jitter (across all interpolation steps) of 860fs. The DLL consumes 33 mW of power and occupies an area of 0.185mm2.",
"title": ""
}
] | scidocsrr |
e6aec168a0bbe2d4a24e748b979b78b4 | Metaphor Clusters , Metaphor Chains : Analyzing the Multifunctionality of Metaphor in Text | [
{
"docid": "52f82d83f27ad19978088158420527c6",
"text": "This paper discusses some principles of critical discourse analysis, such as the explicit sociopolitical stance of discourse analysts, and a focus on dominance relations by elite groups and institutions as they are being enacted, legitimated or otherwise reproduced by text and talk. One of the crucial elements of this analysis of the relations between power and discourse is the patterns of access to (public) discourse for different social groups. Theoretically it is shown that in order to be able to relate power and discourse in an explicit way, we need the cognitive interface of models. knowledge, attitudes and ideologies and other social representations of the social mind, which also relate the individual and the social, and the microand the macro-levels of social structure. Finally, the argument is illustrated with an analysis of parliamentary debates about ethnic affairs.",
"title": ""
}
] | [
{
"docid": "58c488555240ded980033111a9657be4",
"text": "BACKGROUND\nThe management of opioid-induced constipation (OIC) is often complicated by the fact that clinical measures of constipation do not always correlate with patient perception. As the discomfort associated with OIC can lead to poor compliance with the opioid treatment, a shift in focus towards patient assessment is often advocated.\n\n\nSCOPE\nThe Bowel Function Index * (BFI) is a new patient-assessment scale that has been developed and validated specifically for OIC. It is a physician-administered, easy-to-use scale made up of three items (ease of defecation, feeling of incomplete bowel evacuation, and personal judgement of constipation). An extensive analysis has been performed in order to validate the BFI as reliable, stable, clinically valid, and responsive to change in patients with OIC, with a 12-point change in score constituting a clinically relevant change in constipation.\n\n\nFINDINGS\nThe results of the validation analysis were based on major clinical trials and have been further supported by data from a large open-label study and a pharmaco-epidemiological study, in which the BFI was used effectively to assess OIC in a large population of patients treated with opioids. Although other patient self-report scales exist, the BFI offers several unique advantages. First, by being physician-administered, the BFI minimizes reading and comprehension difficulties; second, by offering general and open-ended questions which capture patient perspective, the BFI is likely to detect most patients suffering from OIC; third, by being short and easy-to-use, it places little burden on the patient, thereby increasing the likelihood of gathering accurate information.\n\n\nCONCLUSION\nAltogether, the available data suggest that the BFI will be useful in clinical trials and in daily practice.",
"title": ""
},
{
"docid": "f0db74061a2befca317f9333a0712ab9",
"text": "This paper tries to give a gentle introduction to deep learning in medical image processing, proceeding from theoretical foundations to applications. We first discuss general reasons for the popularity of deep learning, including several major breakthroughs in computer science. Next, we start reviewing the fundamental basics of the perceptron and neural networks, along with some fundamental theory that is often omitted. Doing so allows us to understand the reasons for the rise of deep learning in many application domains. Obviously medical image processing is one of these areas which has been largely affected by this rapid progress, in particular in image detection and recognition, image segmentation, image registration, and computer-aided diagnosis. There are also recent trends in physical simulation, modeling, and reconstruction that have led to astonishing results. Yet, some of these approaches neglect prior knowledge and hence bear the risk of producing implausible results. These apparent weaknesses highlight current limitations of deep ()learning. However, we also briefly discuss promising approaches that might be able to resolve these problems in the future.",
"title": ""
},
{
"docid": "40ad6bf9f233b58e13cf6a709daba2ca",
"text": "While syntactic dependency annotations concentrate on the surface or functional structure of a sentence, semantic dependency annotations aim to capture betweenword relationships that are more closely related to the meaning of a sentence, using graph-structured representations. We extend the LSTM-based syntactic parser of Dozat and Manning (2017) to train on and generate these graph structures. The resulting system on its own achieves stateof-the-art performance, beating the previous, substantially more complex stateof-the-art system by 1.9% labeled F1. Adding linguistically richer input representations pushes the margin even higher, allowing us to beat it by 2.6% labeled F1.",
"title": ""
},
{
"docid": "3e25691aaf82d03ab61cc3b45baa6420",
"text": "The use of deceptive techniques in user-generated video portals is ubiquitous. Unscrupulous uploaders deliberately mislabel video descriptors aiming at increasing their views and subsequently their ad revenue. This problem, usually referred to as \"clickbait,\" may severely undermine user experience. In this work, we study the clickbait problem on YouTube by collecting metadata for 206k videos. To address it, we devise a deep learning model based on variational autoencoders that supports the diverse modalities of data that videos include. The proposed model relies on a limited amount of manually labeled data to classify a large corpus of unlabeled data. Our evaluation indicates that the proposed model offers improved performance when compared to other conventional models. Our analysis of the collected data indicates that YouTube recommendation engine does not take into account clickbait. Thus, it is susceptible to recommending misleading videos to users.",
"title": ""
},
{
"docid": "add72d66c626f1a4df3e0820c629c75f",
"text": "Cybersecurity is a complex and dynamic area where multiple actors act against each other through computer networks largely without any commonly accepted rules of engagement. Well-managed cybersecurity operations need a clear terminology to describe threats, attacks and their origins. In addition, cybersecurity tools and technologies need semantic models to be able to automatically identify threats and to predict and detect attacks. This paper reviews terminology and models of cybersecurity operations, and proposes approaches for semantic modelling of cybersecurity threats and attacks.",
"title": ""
},
{
"docid": "e14d4405a6da0cd4f1ee1beaeeed0fba",
"text": "Source code search plays an important role in software maintenance. The effectiveness of source code search not only relies on the search technique, but also on the quality of the query. In practice, software systems are large, thus it is difficult for a developer to format an accurate query to express what really in her/his mind, especially when the maintainer and the original developer are not the same person. When a query performs poorly, it has to be reformulated. But the words used in a query may be different from those that have similar semantics in the source code, i.e., the synonyms, which will affect the accuracy of code search results. To address this issue, we propose an approach that extends a query with synonyms generated from WordNet. Our approach extracts natural language phrases from source code identifiers, matches expanded queries with these phrases, and sorts the search results. It allows developers to explore word usage in a piece of software, helps them quickly identify relevant program elements for investigation or quickly recognize alternative words for query reformulation. Our initial empirical study on search tasks performed on the JavaScript/ECMAScript interpreter and compiler, Rhino, shows that the synonyms used to expand the queries help recommend good alternative queries. Our approach also improves the precision and recall of Conquer, a state-of-the-art query expansion/reformulation technique, by 5% and 8% respectively.",
"title": ""
},
{
"docid": "c95e58c054855c60b16db4816c626ecb",
"text": "Markerless tracking of human pose is a hard yet relevant problem. In this paper, we derive an efficient filtering algorithm for tracking human pose using a stream of monocular depth images. The key idea is to combine an accurate generative model — which is achievable in this setting using programmable graphics hardware — with a discriminative model that provides data-driven evidence about body part locations. In each filter iteration, we apply a form of local model-based search that exploits the nature of the kinematic chain. As fast movements and occlusion can disrupt the local search, we utilize a set of discriminatively trained patch classifiers to detect body parts. We describe a novel algorithm for propagating this noisy evidence about body part locations up the kinematic chain using the un-scented transform. The resulting distribution of body configurations allows us to reinitialize the model-based search. We provide extensive experimental results on 28 real-world sequences using automatic ground-truth annotations from a commercial motion capture system.",
"title": ""
},
{
"docid": "3a322129019eed67686018404366fe0b",
"text": "Scientists and casual users need better ways to query RDF databases or Linked Open Data. Using the SPARQL query language requires not only mastering its syntax and semantics but also understanding the RDF data model, the ontology used, and URIs for entities of interest. Natural language query systems are a powerful approach, but current techniques are brittle in addressing the ambiguity and complexity of natural language and require expensive labor to supply the extensive domain knowledge they need. We introduce a compromise in which users give a graphical \"skeleton\" for a query and annotates it with freely chosen words, phrases and entity names. We describe a framework for interpreting these \"schema-agnostic queries\" over open domain RDF data that automatically translates them to SPARQL queries. The framework uses semantic textual similarity to find mapping candidates and uses statistical approaches to learn domain knowledge for disambiguation, thus avoiding expensive human efforts required by natural language interface systems. We demonstrate the feasibility of the approach with an implementation that performs well in an evaluation on DBpedia data.",
"title": ""
},
{
"docid": "d1b46a2dd14cc225c5e53bef4ba2d774",
"text": "In this project, we developed a deep learning system applied to human retina images for medical diagnostic decision support. The retina images were provided by EyePACS (Eyepacs, LLC). These images were used in the framework of a Kaggle contest (Kaggle INC, 2017), whose purpose to identify diabetic retinopathy signs through an automatic detection system. Using as inspiration one of the solutions proposed in the contest, we implemented a model that successfully detects diabetic retinopathy from retina images. After a carefully designed preprocessing, the images were used as input to a deep convolutional neural network (CNN). The CNN performed a feature extraction process followed by a classification stage, which allowed the system to differentiate between healthy and ill patients using five categories. Our model was able to identify diabetic retinopathy in the patients with an agreement rate of 76.73% with respect to the medical expert's labels for the test data.",
"title": ""
},
{
"docid": "495be81dda82d3e4d90a34b6716acf39",
"text": "Botnets such as Conficker and Torpig utilize high entropy domains for fluxing and evasion. Bots may query a large number of domains, some of which may fail. In this paper, we present techniques where the failed domain queries (NXDOMAIN) may be utilized for: (i) Speeding up the present detection strategies which rely only on successful DNS domains. (ii) Detecting Command and Control (C&C) server addresses through features such as temporal correlation and information entropy of both successful and failed domains. We apply our technique to a Tier-1 ISP dataset obtained from South Asia, and a campus DNS trace, and thus validate our methods by detecting Conficker botnet IPs and other anomalies with a false positive rate as low as 0.02%. Our technique can be applied at the edge of an autonomous system for real-time detection.",
"title": ""
},
{
"docid": "1bc13bb6f4f2598a2271240bc2963250",
"text": "A complex nature of big data resources demands new methods for structuring especially for textual content. WordNet is a good knowledge source for comprehensive abstraction of natural language as its good implementations exist for many languages. Since WordNet embeds natural language in the form of a complex network, a transformation mechanism WordNet2Vec is proposed in the paper. It creates vectors for each word from WordNet. These vectors encapsulate general position role of a given word towards all other words in the natural language. Any list or set of such vectors contains knowledge about the context of its component within the whole language. Such word representation can be easily applied to many analytic tasks like classification or clustering. The usefulness of the WordNet2Vec method was demonstrated in sentiment analysis, i.e. classification with transfer learning for the real Amazon opinion textual dataset.",
"title": ""
},
{
"docid": "4952d426d0f2aed1daea234595dcd901",
"text": "Clustering analysis is a primary method for data mining. Density clustering has such advantages as: its clusters are easy to understand and it does not limit itself to shapes of clusters. But existing density-based algorithms have trouble in finding out all the meaningful clusters for datasets with varied densities. This paper introduces a new algorithm called VDBSCAN for the purpose of varied-density datasets analysis. The basic idea of VDBSCAN is that, before adopting traditional DBSCAN algorithm, some methods are used to select several values of parameter Eps for different densities according to a k-dist plot. With different values of Eps, it is possible to find out clusters with varied densities simultaneity. For each value of Eps, DBSCAN algorithm is adopted in order to make sure that all the clusters with respect to corresponding density are clustered. And for the next process, the points that have been clustered are ignored, which avoids marking both denser areas and sparser ones as one cluster. Finally, a synthetic database with 2-dimension data is used for demonstration, and experiments show that VDBSCAN is efficient in successfully clustering uneven datasets.",
"title": ""
},
{
"docid": "fbbf7c30f7ebcd2b9bbc9cc7877309b1",
"text": "People detection is essential in a lot of different systems. Many applications nowadays tend to require people detection to achieve certain tasks. These applications come under many disciplines, such as robotics, ergonomics, biomechanics, gaming and automotive industries. This wide range of applications makes human body detection an active area of research. With the release of depth sensors or RGB-D cameras such as Micosoft Kinect, this area of research became more active, specially with their affordable price. Human body detection requires the adaptation of many scenarios and situations. Various conditions such as occlusions, background cluttering and props attached to the human body require training on custom built datasets. In this paper we present an approach to prepare training datasets to detect and track human body with attached props. The proposed approach uses rigid body physics simulation to create and animate different props attached to the human body. Three scenarios are implemented. In the first scenario the prop is closely attached to the human body, such as a person carrying a backpack. In the second scenario, the prop is slightly attached to the human body, such as a person carrying a briefcase. In the third scenario the prop is not attached to the human body, such as a person dragging a trolley bag. Our approach gives results with accuracy of 93% in identifying both the human body parts and the attached prop in all the three scenarios.",
"title": ""
},
{
"docid": "e1809a71403ee675197ef5a23945053f",
"text": "Working memory (WM) capacity is the ability to retain and manipulate information during a short period of time. This ability underlies complex reasoning and has generally been regarded as a fixed trait of the individual. Children with attention deficit hyperactivity disorder (ADHD) represent one group of subjects with a WM deficit, attributed to an impairment of the frontal lobe. In the present study, we used a new training paradigm with intensive and adaptive training of WM tasks and evaluated the effect of training with a double blind, placebo controlled design. Training significantly enhanced performance on the trained WM tasks. More importantly, the training significantly improved performance on a nontrained visuo-spatial WM task and on Raven's Progressive Matrices, which is a nonverbal complex reasoning task. In addition, motor activity--as measured by the number of head movements during a computerized test--was significantly reduced in the treatment group. A second experiment showed that similar training-induced improvements on cognitive tasks are also possible in young adults without ADHD. These results demonstrate that performance on WM tasks can be significantly improved by training, and that the training effect also generalizes to nontrained tasks requiring WM. Training improved performance on tasks related to prefrontal functioning and had also a significant effect on motor activity in children with ADHD. The results thus suggest that WM training potentially could be of clinical use for ameliorating the symptoms in ADHD.",
"title": ""
},
{
"docid": "f1b3831db9900a2f573b76113cd4068c",
"text": "Digital signature has been widely employed in wireless mobile networks to ensure the authenticity of messages and identity of nodes. A paramount concern in signature verification is reducing the verification delay to ensure the network QoS. To address this issue, researchers have proposed the batch cryptography technology. However, most of the existing works focus on designing batch verification algorithms without sufficiently considering the impact of invalid signatures. The performance of batch verification could dramatically drop, if there are verification failures caused by invalid signatures. In this paper, we propose a Game-theory-based Batch Identification Model (GBIM) for wireless mobile networks, enabling nodes to find invalid signatures with the optimal delay under heterogeneous and dynamic attack scenarios. Specifically, we design an incomplete information game model between a verifier and its attackers, and prove the existence of Nash Equilibrium, to select the dominant algorithm for identifying invalid signatures. Moreover, we propose an auto-match protocol to optimize the identification algorithm selection, when the attack strategies can be estimated based on history information. Comprehensive simulation results demonstrate that GBIM can identify invalid signatures more efficiently than existing algorithms.",
"title": ""
},
{
"docid": "023285cbd5d356266831fc0e8c176d4f",
"text": "The two authorsLakoff, a linguist and Nunez, a psychologistpurport to introduce a new field of study, i.e. \"mathematical idea analysis\", with this book. By \"mathematical idea analysis\", they mean to give a scientifically plausible account of mathematical concepts using the apparatus of cognitive science. This approach is meant to be a contribution to academics and possibly education as it helps to illuminate how we cognitise mathematical concepts, which are supposedly undecipherable and abstruse to laymen. The analysis of mathematical ideas, the authors claim, cannot be done within mathematics, for even metamathematicsrecursive theory, model theory, set theory, higherorder logic still requires mathematical idea analysis in itself! Formalism, by its very nature, voids symbols of their meanings and thus cognition is required to imbue meaning. Thus, there is a need for this new field, in which the authors, if successful, would become pioneers.",
"title": ""
},
{
"docid": "205e03f589758316987e3eaacee13430",
"text": "Motivated by the technology evolutions and the corresponding changes in user-consumer behavioral patterns, this study applies a Location Based Services (LBS) environmental determinants’ integrated theoretical framework by investigating its role on classifying, profiling and predicting user-consumer behavior. For that purpose, a laboratory LBS application was developed and tested with 110 subjects within the context of a field trial setting in the entertainment industry. Users are clustered into two main types having the “physical” and the “social density” determinants to best discriminate between the resulting clusters. Also, the two clusters differ in terms of their spatial and verbal ability and attitude towards the LBS environment. Similarly, attitude is predicted by the “location”, the “device” and the “mobile connection” LBS environmental determinants for the “walkers in place” (cluster #1) and by all LBS environmental determinants (i.e. those determinants of cluster #1 plus the “digital” and the “social environment” ones) for the “walkers in space” (cluster #2). Finally, the attitude of both clusters’ participants towards the LBS environment affects their behavioral intentions towards using LBS applications, with limited, however, predicting power observed in this relationship.",
"title": ""
},
{
"docid": "fde2aefec80624ff4bc21d055ffbe27b",
"text": "Object detector with region proposal networks such as Fast/Faster R-CNN [1, 2] have shown the state-of-the art performance on several benchmarks. However, they have limited success for detecting small objects. We argue the limitation is related to insufficient performance of Fast R-CNN block in Faster R-CNN. In this paper, we propose a refining block for Fast R-CNN. We further merge the block and Faster R-CNN into a single network (RF-RCNN). The RF-RCNN was applied on plate and human detection in RoadView image that consists of high resolution street images (over 30M pixels). As a result, the RF-RCNN showed great improvement over the Faster-RCNN.",
"title": ""
},
{
"docid": "9c4e381959ff612102d57b43f792f431",
"text": "Air quality monitoring has attracted a lot of attention from governments, academia and industry, especially for PM2.5 due to its significant impact on our respiratory systems. In this paper, we present the design, implementation, and evaluation of Mosaic, a low cost urban PM2.5 monitoring system based on mobile sensing. In Mosaic, a small number of air quality monitoring nodes are deployed on city buses to measure air quality. Current low-cost particle sensors based on light-scattering, however, are vulnerable to airflow disturbance on moving vehicles. In order to address this problem, we build our air quality monitoring nodes, Mosaic-Nodes, with a novel constructive airflow-disturbance design based on a carefully tuned airflow structure and a GPS-assisted filtering method. Further, the buses used for system deployment are selected by a novel algorithm which achieves both high coverage and low computation overhead. The collected sensor data is also used to calculate the PM2.5 of locations without direct measurements by an existing inference model. We apply the Mosaic system in a testing urban area which includes more than 70 point-of-interests. Results show that the Mosaic system can accurately obtain the urban air quality with high coverage and low cost.",
"title": ""
},
{
"docid": "f12931426173073fcbde9a2fe101dfcb",
"text": "In this letter, a novel compact electromagnetic band-gap (EBG) structure constructed by etching a complementary split ring resonator (CSRR) on the patch of a conventional mushroom-type EBG (CMT-EBG) is proposed. The first bandgap is defined in all directions in the surface structure. Compared to the CMT-EBG structure, the CSRR-based EBG presents a 28% size reduction in the start frequency of the first bandgap. However, asymmetrical frames of the CSRR-based EBG result in different properties at X and Y-directions. Another two tunable bandgaps in Y-direction are observed. Thus, the proposed EBG can be used for multi-band applications, such as dual/triple-band antennas. The EBGs have been constructed and measured.",
"title": ""
}
] | scidocsrr |
1a0cf2df8115efde02aff34cc50b31a8 | "Snapchat is more personal": An exploratory study on Snapchat behaviors and young adult interpersonal relationships | [
{
"docid": "bb709a5fd20c517769312787b82911b8",
"text": "Over the past decade, technology has become increasingly important in the lives of adolescents. As a group, adolescents are heavy users of newer electronic communication forms such as instant messaging, e-mail, and text messaging, as well as communication-oriented Internet sites such as blogs, social networking, and sites for sharing photos and videos. Kaveri Subrahmanyam and Patricia Greenfield examine adolescents' relationships with friends, romantic partners, strangers, and their families in the context of their online communication activities. The authors show that adolescents are using these communication tools primarily to reinforce existing relationships, both with friends and romantic partners. More and more they are integrating these tools into their \"offline\" worlds, using, for example, social networking sites to get more information about new entrants into their offline world. Subrahmanyam and Greenfield note that adolescents' online interactions with strangers, while not as common now as during the early years of the Internet, may have benefits, such as relieving social anxiety, as well as costs, such as sexual predation. Likewise, the authors demonstrate that online content itself can be both positive and negative. Although teens find valuable support and information on websites, they can also encounter racism and hate messages. Electronic communication may also be reinforcing peer communication at the expense of communication with parents, who may not be knowledgeable enough about their children's online activities on sites such as the enormously popular MySpace. Although the Internet was once hailed as the savior of education, the authors say that schools today are trying to control the harmful and distracting uses of electronic media while children are at school. The challenge for schools is to eliminate the negative uses of the Internet and cell phones in educational settings while preserving their significant contributions to education and social connection.",
"title": ""
}
] | [
{
"docid": "0a6a170d3ebec3ded7c596d768f9ce85",
"text": "This paper presents the method of our submission for THUMOS15 action recognition challenge. We propose a new action recognition system by exploiting very deep twostream ConvNets and Fisher vector representation of iDT features. Specifically, we utilize those successful very deep architectures in images such as GoogLeNet and VGGNet to design the two-stream ConvNets. From our experiments, we see that deeper architectures obtain higher performance for spatial nets. However, for temporal net, deeper architectures could not yield better recognition accuracy. We analyze that the UCF101 dataset is relatively very small and it is very hard to train such deep networks on the current action datasets. Compared with traditional iDT features, our implemented two-stream ConvNets significantly outperform them. We further combine the recognition scores of both two-stream ConvNets and iDT features, and achieve 68% mAP value on the validation dataset of THUMOS15.",
"title": ""
},
{
"docid": "d157e462a13515132e73888101d48ab6",
"text": "This paper describes the development of a fuzzy gain scheduling scheme of PID controllers for process control. Fuzzy rules and reasoning are utilized on-line to determine the controller parameters based on the error signal and its first difference. Simulation results demonstrate that better control performance can be achieved in comparison with ZieglerNichols controllers and Kitamori’s PID controllers.",
"title": ""
},
{
"docid": "ff75699519c0df47220624db263b483a",
"text": "We present BeThere, a proof-of-concept system designed to explore 3D input for mobile collaborative interactions. With BeThere, we explore 3D gestures and spatial input which allow remote users to perform a variety of virtual interactions in a local user's physical environment. Our system is completely self-contained and uses depth sensors to track the location of a user's fingers as well as to capture the 3D shape of objects in front of the sensor. We illustrate the unique capabilities of our system through a series of interactions that allow users to control and manipulate 3D virtual content. We also provide qualitative feedback from a preliminary user study which confirmed that users can complete a shared collaborative task using our system.",
"title": ""
},
{
"docid": "8b0a90d4f31caffb997aced79c59e50c",
"text": "Visual SLAM systems aim to estimate the motion of a moving camera together with the geometric structure and appearance of the world being observed. To the extent that this is possible using only an image stream, the core problem that must be solved by any practical visual SLAM system is that of obtaining correspondence throughout the images captured. Modern visual SLAM pipelines commonly obtain correspondence by using sparse feature matching techniques and construct maps using a composition of point, line or other simple geometric primitives. The resulting sparse feature map representations provide sparsely furnished, incomplete reconstructions of the observed scene. Related techniques from multiple view stereo (MVS) achieve high quality dense reconstruction by obtaining dense correspondences over calibrated image sequences. Despite the usefulness of the resulting dense models, these techniques have been of limited use in visual SLAM systems. The computational complexity of estimating dense surface geometry has been a practical barrier to its use in real-time SLAM. Furthermore, MVS algorithms have typically required a fixed length, calibrated image sequence to be available throughout the optimisation — a condition fundamentally at odds with the online nature of SLAM. With the availability of massively-parallel commodity computing hardware, we demonstrate new algorithms that achieve high quality incremental dense reconstruction within online visual SLAM. The result is a live dense reconstruction (LDR) of scenes that makes possible numerous applications that can utilise online surface modelling, for instance: planning robot interactions with unknown objects, augmented reality with characters that interact with the scene, or providing enhanced data for object recognition. The core of this thesis goes beyond LDR to demonstrate fully dense visual SLAM. We replace the sparse feature map representation with an incrementally updated, non-parametric, dense surface model. By enabling real-time dense depth map estimation through novel short baseline MVS, we can continuously update the scene model and further leverage its predictive capabilities to achieve robust camera pose estimation with direct whole image alignment. We demonstrate the capabilities of dense visual SLAM using a single moving passive camera, and also when real-time surface measurements are provided by a commodity depth camera. The results demonstrate state-of-the-art, pick-up-and-play 3D reconstruction and camera tracking systems useful in many real world scenarios. Acknowledgements There are key individuals who have provided me with all the support and tools that a student who sets out on an adventure could want. Here, I wish to acknowledge those friends and colleagues, that by providing technical advice or much needed fortitude, helped bring this work to life. Prof. Andrew Davison’s robot vision lab provides a unique research experience amongst computer vision labs in the world. First and foremost, I thank my supervisor Andy for giving me the chance to be part of that experience. His brilliant guidance and support of my growth as a researcher are well matched by his enthusiasm for my work. This is made most clear by his fostering the joy of giving live demonstrations of work in progress. His complete faith in my ability drove me on and gave me license to develop new ideas and build bridges to research areas that we knew little about. Under his guidance I’ve been given every possible opportunity to develop my research interests, and this thesis would not be possible without him. My appreciation for Prof. Murray Shanahan’s insights and spirit began with our first conversation. Like ripples from a stone cast into a pond, the presence of his ideas and depth of knowledge instantly propagated through my mind. His enthusiasm and capacity to discuss any topic, old or new to him, and his ability to bring ideas together across the worlds of science and philosophy, showed me an openness to thought that I continue to try to emulate. I am grateful to Murray for securing a generous scholarship for me in the Department of Computing and for providing a home away from home in his cognitive robotics lab. I am indebted to Prof. Owen Holland who introduced me to the world of research at the University of Essex. Owen showed me a first glimpse of the breadth of ideas in robotics, AI, cognition and beyond. I thank Owen for introducing me to the idea of continuing in academia for a doctoral degree and for introducing me to Murray. I have learned much with many friends and colleagues at Imperial College, but there are three who have been instrumental. I thank Steven Lovegrove, Ankur Handa and Renato Salas-Moreno who travelled with me on countless trips into the unknown, sometimes to chase a small concept but more often than not in pursuit of the bigger picture we all wanted to see. They indulged me with months of exploration, collaboration and fun, leading to us understand ideas and techniques that were once out of reach. Together, we were able to learn much more. Thank you Hauke Strasdatt, Luis Pizarro, Jan Jachnick, Andreas Fidjeland and members of the robot vision and cognitive robotics labs for brilliant discussions and for sharing the",
"title": ""
},
{
"docid": "db54908608579efd067853fed5d3e4e8",
"text": "The detection of moving objects from stationary cameras is usually approached by background subtraction, i.e. by constructing and maintaining an up-to-date model of the background and detecting moving objects as those that deviate from such a model. We adopt a previously proposed approach to background subtraction based on self-organization through artificial neural networks, that has been shown to well cope with several of the well known issues for background maintenance. Here, we propose a spatial coherence variant to such approach to enhance robustness against false detections and formulate a fuzzy model to deal with decision problems typically arising when crisp settings are involved. We show through experimental results and comparisons that higher accuracy values can be reached for color video sequences that represent typical situations critical for moving object detection.",
"title": ""
},
{
"docid": "4c1b42e12fd4f19870b5fc9e2f9a5f07",
"text": "Similar to face-to-face communication in daily life, more and more evidence suggests that human emotions also spread in online social media through virtual interactions. However, the mechanism underlying the emotion contagion, like whether different feelings spread unlikely or how the spread is coupled with the social network, is rarely investigated. Indeed, due to the costly expense and spatio-temporal limitations, it is challenging for conventional questionnaires or controlled experiments. While given the instinct of collecting natural affective responses of massive connected individuals, online social media offer an ideal proxy to tackle this issue from the perspective of computational social science. In this paper, based on the analysis of millions of tweets in Weibo, a Twitter-like service in China, we surprisingly find that anger is more contagious than joy, indicating that it can sparkle more angry follow-up tweets; and anger prefers weaker ties than joy for the dissemination in social network, indicating that it can penetrate different communities and break local traps by more sharings between strangers. Through a simple diffusion model, it is unraveled that easier contagion and weaker ties function cooperatively in speeding up anger’s spread, which is further testified by the diffusion of realistic bursty events with different dominant emotions. To our best knowledge, for the first time we quantificationally provide the long-term evidence to disclose the difference between joy and anger in dissemination mechanism and our findings would shed lights on personal anger management in human communication and collective outrage control in cyber space.",
"title": ""
},
{
"docid": "cc6cf6557a8be12d8d3a4550163ac0a9",
"text": "In this study, different S/D contacting options for lateral NWFET devices are benchmarked at 7nm node dimensions and beyond. Comparison is done at both DC and ring oscillator levels. It is demonstrated that implementing a direct contact to a fin made of Si/SiGe super-lattice results in 13% performance improvement. Also, we conclude that the integration of internal spacers between the NWs is a must for lateral NWFETs in order to reduce device parasitic capacitance.",
"title": ""
},
{
"docid": "728bc76467b7f4ddf7c8c368cdf2d44b",
"text": "SQL is the de facto language for manipulating relational data. Though powerful, many users find it difficult to write SQL queries due to highly expressive constructs. \n While using the programming-by-example paradigm to help users write SQL queries is an attractive proposition, as evidenced by online help forums such as Stack Overflow, developing techniques for synthesizing SQL queries from given input-output (I/O) examples has been difficult, due to the large space of SQL queries as a result of its rich set of operators. \n \n In this paper, we present a new scalable and efficient algorithm for synthesizing SQL queries based on I/O examples. The key innovation of our algorithm is development of a language for abstract queries, i.e., queries with uninstantiated operators, that can be used to express a large space of SQL queries efficiently. Using abstract queries to represent the search space nicely decomposes the synthesis problem into two tasks: 1) searching for abstract queries that can potentially satisfy the given I/O examples, and 2) instantiating the found abstract queries and ranking the results. \n \n We have implemented this algorithm in a new tool called Scythe and evaluated it using 193 benchmarks collected from Stack Overflow. Our evaluation shows that Scythe can efficiently solve 74% of the benchmarks, most in just a few seconds, and the queries range from simple ones involving a single selection to complex queries with 6 nested subqueires.",
"title": ""
},
{
"docid": "53d4995e474fb897fb6f10cef54c894f",
"text": "The measurement of different target parameters using radar systems has been an active research area for the last decades. Particularly target angle measurement is a very demanding topic, because obtaining good measurement results often goes hand in hand with extensive hardware effort. Especially for sensors used in the mass market, e.g. in automotive applications like adaptive cruise control this may be prohibitive. Therefore we address target localization using a compact frequency-modulated continuous-wave (FMCW) radar sensor. The angular measurement results are improved compared to standard beamforming methods using an adaptive beamforming approach. This approach will be applied to the FMCW principle in a way that allows the use of well known methods for the determination of other target parameters like range or velocity. The applicability of the developed theory will be shown on different measurement scenarios using a 24-GHz prototype radar system.",
"title": ""
},
{
"docid": "f9119710fb15af38bc823e25eec5653b",
"text": "The emergence of knowledge-based economies has placed an importance on effective management of knowledge. The effective management of knowledge has been described as a critical ingredient for organisation seeking to ensure sustainable strategic competitive advantage. This paper reviews literature in the area of knowledge management to bring out the importance of knowledge management in organisation. The paper is able to demonstrate that knowledge management is a key driver of organisational performance and a critical tool for organisational survival, competitiveness and profitability. Therefore creating, managing, sharing and utilizing knowledge effectively is vital for organisations to take full advantage of the value of knowledge. The paper also contributes that, in order for organisations to manage knowledge effectively, attention must be paid on three key components people, processes and technology. In essence, to ensure organisation’s success, the focus should be to connect people, processes, and technology for the purpose of leveraging knowledge.",
"title": ""
},
{
"docid": "0801dc8a870053ba36c0db9d25314cfb",
"text": "Crowdsourcing is a new emerging distributed computing and business model on the backdrop of Internet blossoming. With the development of crowdsourcing systems, the data size of crowdsourcers, contractors and tasks grows rapidly. The worker quality evaluation based on big data analysis technology has become a critical challenge. This paper first proposes a general worker quality evaluation algorithm that is applied to any critical tasks such as tagging, matching, filtering, categorization and many other emerging applications, without wasting resources. Second, we realize the evaluation algorithm in the Hadoop platform using the MapReduce parallel programming model. Finally, to effectively verify the accuracy and the effectiveness of the algorithm in a wide variety of big data scenarios, we conduct a series of experiments. The experimental results demonstrate that the proposed algorithm is accurate and effective. It has high computing performance and horizontal scalability. And it is suitable for large-scale worker quality evaluations in a big data environment.",
"title": ""
},
{
"docid": "88e7cbdb4704320cd40b2e0b566c0e42",
"text": "UNLABELLED\nSince 2009, catfish farming in the southeastern United States has been severely impacted by a highly virulent and clonal population of Aeromonas hydrophila causing motile Aeromonas septicemia (MAS) in catfish. The possible origin of this newly emerged highly virulent A. hydrophila strain is unknown. In this study, we show using whole-genome sequencing and comparative genomics that A. hydrophila isolates from diseased grass carp in China and catfish in the United States have highly similar genomes. Our phylogenomic analyses suggest that U.S. catfish isolates emerged from A. hydrophila populations of Asian origin. Furthermore, we identified an A. hydrophila strain isolated in 2004 from a diseased catfish in Mississippi, prior to the onset of the major epidemic outbreaks in Alabama starting in 2009, with genomic characteristics that are intermediate between those of the Asian and Alabama fish isolates. Investigation of A. hydrophila strain virulence demonstrated that the isolate from the U.S. catfish epidemic is significantly more virulent to both channel catfish and grass carp than is the Chinese carp isolate. This study implicates the importation of fish or fishery products into the United States as the source of highly virulent A. hydrophila that has caused severe epidemic outbreaks in United States-farmed catfish and further demonstrates the potential for invasive animal species to disseminate bacterial pathogens worldwide.\n\n\nIMPORTANCE\nCatfish aquaculture farming in the southeastern United States has been severely affected by the emergence of virulent Aeromonas hydrophila responsible for epidemic disease outbreaks, resulting in the death of over 10 million pounds of catfish. Because the origin of this newly emerged A. hydrophila strain is unknown, this study used a comparative genomics approach to conduct a phylogenomic analysis of A. hydrophila isolates obtained from the United States and Asia. Our results suggest that the virulent isolates from United States-farmed catfish have a recent common ancestor with A. hydrophila isolates from diseased Asian carp. We have also observed that an Asian carp isolate, like recent U.S. catfish isolates, is virulent in catfish. The results from this study suggest that the highly virulent U.S. epidemic isolates emerged from an Asian source and provide another example of the threat that invasive species pose in the dissemination of bacterial pathogens.",
"title": ""
},
{
"docid": "63a9ff660f9d6192c1633f5fca0bc28c",
"text": "The natural world provides numerous cases for inspiration in engineering design. Biological organisms, phenomena, and strategies, which we refer to as biological systems, provide a rich set of analogies. These systems provide insight into sustainable and adaptable design and offer engineers billions of years of valuable experience, which can be used to inspire engineering innovation. This research presents a general method for functionally representing biological systems through systematic design techniques, leading to the conceptualization of biologically inspired engineering designs. Functional representation and abstraction techniques are used to translate biological systems into an engineering context. The goal is to make the biological information accessible to engineering designers who possess varying levels of biological knowledge but have a common understanding of engineering design. Creative or novel engineering designs may then be discovered through connections made between biology and engineering. To assist with making connections between the two domains concept generation techniques that use biological information, engineering knowledge, and automatic concept generation software are employed. Two concept generation approaches are presented that use a biological model to discover corresponding engineering components that mimic the biological system and use a repository of engineering and biological information to discover which biological components inspire functional solutions to fulfill engineering requirements. Discussion includes general guidelines for modeling biological systems at varying levels of fidelity, advantages, limitations, and applications of this research. The modeling methodology and the first approach for concept generation are illustrated by a continuous example of lichen.",
"title": ""
},
{
"docid": "ad33994b26dad74e6983c860c0986504",
"text": "Accurate software effort estimation has been a challenge for many software practitioners and project managers. Underestimation leads to disruption in the project's estimated cost and delivery. On the other hand, overestimation causes outbidding and financial losses in business. Many software estimation models exist; however, none have been proven to be the best in all situations. In this paper, a decision tree forest (DTF) model is compared to a traditional decision tree (DT) model, as well as a multiple linear regression model (MLR). The evaluation was conducted using ISBSG and Desharnais industrial datasets. Results show that the DTF model is competitive and can be used as an alternative in software effort prediction.",
"title": ""
},
{
"docid": "2bdfa392f14724fa1e349943e173e802",
"text": "Article history: Received 28 September 2008 Received in revised form 14 May 2009 Accepted 2 August 2009",
"title": ""
},
{
"docid": "ff20e5cd554cd628eba07776fa9a5853",
"text": "We describe our early experience in applying our console log mining techniques [19, 20] to logs from production Google systems with thousands of nodes. This data set is five orders of magnitude in size and contains almost 20 times as many messages types as the Hadoop data set we used in [19]. It also has many properties that are unique to large scale production deployments (e.g., the system stays on for several months and multiple versions of the software can run concurrently). Our early experience shows that our techniques, including source code based log parsing, state and sequence based feature creation and problem detection, work well on this production data set. We also discuss our experience in using our log parser to assist the log sanitization.",
"title": ""
},
{
"docid": "1b6c6f7a24d1e44bce19cfb38b32e023",
"text": "The purpose of this study was to explore the ways in which audiences build parasocial relationships with media characters via reality TV and social media, and its implications for celebrity endorsement and purchase intentions. Using an online survey, this study collected 401 responses from the Korean Wave fans in Singapore. The results showed that reality TV viewing and SNS use to interact with media characters were positively associated with parasocial relationships between media characters and viewers. Parasocial relationships, in turn, were positively associated with the viewers' perception of endorser and brand credibility, and purchase intention of the brand endorsed by favorite media characters. The results also indicated that self-disclosure played an important role in forming parasocial relationships and in mediating the effectiveness of celebrity endorsement. This study specifies the links between an emerging media genre, a communication technology, and audiences' interaction with the mediated world.",
"title": ""
},
{
"docid": "3a41bcb297b991d155626af5fdbf7e92",
"text": "In this study, we compared the performance limits of building codes and assessed whether these limits could be applied to wide beams. We performed a parametric study, investigating the longitudinal reinforcement ratio, beam width, steel class, and type and spacing of the transverse reinforcement. We obtained the following results from these analyses: Increasing the longitudinal reinforcement ratio reduced the deformation limit corresponding to code-based performance limits. Changing the confinement properties significantly affected the TEC 2007 and ASCE/SEI 41 limits. The performance limits defined by EC8 and ASCE/SEI 41 had similar corresponding plastic deformations, lower than those corresponding to the TEC 2007 strain-based damage limits. The results show that assessing the performance of wide beams by using the performance limits from different codes could produce contradictory results.",
"title": ""
},
{
"docid": "5be572ea448bfe40654956112cecd4e1",
"text": "BACKGROUND\nBeta blockers reduce mortality in patients who have chronic heart failure, systolic dysfunction, and are on background treatment with diuretics and angiotensin-converting enzyme inhibitors. We aimed to compare the effects of carvedilol and metoprolol on clinical outcome.\n\n\nMETHODS\nIn a multicentre, double-blind, and randomised parallel group trial, we assigned 1511 patients with chronic heart failure to treatment with carvedilol (target dose 25 mg twice daily) and 1518 to metoprolol (metoprolol tartrate, target dose 50 mg twice daily). Patients were required to have chronic heart failure (NYHA II-IV), previous admission for a cardiovascular reason, an ejection fraction of less than 0.35, and to have been treated optimally with diuretics and angiotensin-converting enzyme inhibitors unless not tolerated. The primary endpoints were all-cause mortality and the composite endpoint of all-cause mortality or all-cause admission. Analysis was done by intention to treat.\n\n\nFINDINGS\nThe mean study duration was 58 months (SD 6). The mean ejection fraction was 0.26 (0.07) and the mean age 62 years (11). The all-cause mortality was 34% (512 of 1511) for carvedilol and 40% (600 of 1518) for metoprolol (hazard ratio 0.83 [95% CI 0.74-0.93], p=0.0017). The reduction of all-cause mortality was consistent across predefined subgroups. The composite endpoint of mortality or all-cause admission occurred in 1116 (74%) of 1511 on carvedilol and in 1160 (76%) of 1518 on metoprolol (0.94 [0.86-1.02], p=0.122). Incidence of side-effects and drug withdrawals did not differ by much between the two study groups.\n\n\nINTERPRETATION\nOur results suggest that carvedilol extends survival compared with metoprolol.",
"title": ""
},
{
"docid": "924dbc783bf8743a28c2cd4563d50de9",
"text": "This paper studies the off-policy evaluation problem, where one aims to estimate the value of a target policy based on a sample of observations collected by another policy. We first consider the multi-armed bandit case, establish a minimax risk lower bound, and analyze the risk of two standard estimators. It is shown, and verified in simulation, that one is minimax optimal up to a constant, while another can be arbitrarily worse, despite its empirical success and popularity. The results are applied to related problems in contextual bandits and fixed-horizon Markov decision processes, and are also related to semi-supervised learning.",
"title": ""
}
] | scidocsrr |
c6131eb0d21e09ce97f2d0d5e32881df | Automatic Scene Inference for 3D Object Compositing | [
{
"docid": "b4ab47d8ec52d7a8e989bfc9d6c0d173",
"text": "In this paper, we consider the problem of recovering the spatial layout of indoor scenes from monocular images. The presence of clutter is a major problem for existing single-view 3D reconstruction algorithms, most of which rely on finding the ground-wall boundary. In most rooms, this boundary is partially or entirely occluded. We gain robustness to clutter by modeling the global room space with a parameteric 3D “box” and by iteratively localizing clutter and refitting the box. To fit the box, we introduce a structured learning algorithm that chooses the set of parameters to minimize error, based on global perspective cues. On a dataset of 308 images, we demonstrate the ability of our algorithm to recover spatial layout in cluttered rooms and show several examples of estimated free space.",
"title": ""
},
{
"docid": "2a56585a288405b9adc7d0844980b8bf",
"text": "In this paper we propose the first exact solution to the problem of estimating the 3D room layout from a single image. This problem is typically formulated as inference in a Markov random field, where potentials count image features (e.g ., geometric context, orientation maps, lines in accordance with vanishing points) in each face of the layout. We present a novel branch and bound approach which splits the label space in terms of candidate sets of 3D layouts, and efficiently bounds the potentials in these sets by restricting the contribution of each individual face. We employ integral geometry in order to evaluate these bounds in constant time, and as a consequence, we not only obtain the exact solution, but also in less time than approximate inference tools such as message-passing. We demonstrate the effectiveness of our approach in two benchmarks and show that our bounds are tight, and only a few evaluations are necessary.",
"title": ""
}
] | [
{
"docid": "4709a4e1165abb5d0018b74495218fc7",
"text": "Network monitoring guides network operators in understanding the current behavior of a network. Therefore, accurate and efficient monitoring is vital to ensure that the network operates according to the intended behavior and then to troubleshoot any deviations. However, the current practice of network-monitoring largely depends on manual operations, and thus enterprises spend a significant portion of their budgets on the workforce that monitor their networks. We analyze present network-monitoring technologies, identify open problems, and suggest future directions. In particular, our findings are based on two different analyses. The first analysis assesses how well present technologies integrate with the entire cycle of network-management operations: design, deployment, and monitoring. Network operators first design network configurations, given a set of requirements, then they deploy the new design, and finally they verify it by continuously monitoring the network’s behavior. One of our observations is that the efficiency of this cycle can be greatly improved by automated deployment of pre-designed configurations, in response to changes in monitored network behavior. Our second analysis focuses on network-monitoring technologies and group issues in these technologies into five categories. Such grouping leads to the identification of major problem groups in network monitoring, e.g., efficient management of increasing amounts of measurements for storage, analysis, and presentation. We argue that continuous effort is needed in improving network-monitoring since the presented problems will become even more serious in the future, as networks grow in size and carry more data. 2014 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "dde4300fb4f29b5ee15bb5e2ef8fe44f",
"text": "In this paper, we propose a static scheduling algorithm for allocating task graphs to fullyconnected multiprocessors. We discuss six recently reported scheduling algorithms and show that they possess one drawback or the other which can lead to poor performance. The proposed algorithm, which is called the Dynamic Critical-Path (DCP) scheduling algorithm, is different from the previously proposed algorithms in a number of ways. First, it determines the critical path of the task graph and selects the next node to be scheduled in a dynamic fashion. Second, it rearranges the schedule on each processor dynamically in the sense that the positions of the nodes in the partial schedules are not fixed until all nodes have been considered. Third, it selects a suitable processor for a node by looking ahead the potential start times of the remaining nodes on that processor, and schedules relatively less important nodes to the processors already in use. A global as well as a pair-wise comparison is carried out for all seven algorithms under various scheduling conditions. The DCP algorithm outperforms the previous algorithms by a considerable margin. Despite having a number of new features, the DCP algorithm has admissible time complexity, is economical in terms of the number of processors used and is suitable for a wide range of graph structures.",
"title": ""
},
{
"docid": "f8984d660f39c66b3bd484ec766fa509",
"text": "The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may lead them to failing to appropriately change people’s behaviour. Past and current efforts to improve information-security practices and promote a sustainable society have not had the desired impact. It is important therefore to critically reflect on the challenges involved in improving information-security behaviours for citizens, consumers and employees. In particular, our work considers these challenges from a Psychology perspective, as we believe that understanding how people perceive risks is critical to creating effective awareness campaigns. Changing behaviour requires more than providing information about risks and reactive behaviours – firstly, people must be able to understand and apply the advice, and secondly, they must be motivated and willing to do so – and the latter requires changes to attitudes and intentions. These antecedents of behaviour change are identified in several psychological models of behaviour. We review the suitability of persuasion techniques, including the widely used ‘fear appeals’. From this range of literature, we extract essential components for an awareness campaign as well as factors which can lead to a campaign’s success or failure. Finally, we present examples of existing awareness campaigns in different cultures (the UK and Africa) and reflect on these.",
"title": ""
},
{
"docid": "ef5c44f6895178c8727272dbb74b5df2",
"text": "We present a systematic analysis of existing multi-domain learning approaches with respect to two questions. First, many multidomain learning algorithms resemble ensemble learning algorithms. (1) Are multi-domain learning improvements the result of ensemble learning effects? Second, these algorithms are traditionally evaluated in a balanced class label setting, although in practice many multidomain settings have domain-specific class label biases. When multi-domain learning is applied to these settings, (2) are multidomain methods improving because they capture domain-specific class biases? An understanding of these two issues presents a clearer idea about where the field has had success in multi-domain learning, and it suggests some important open questions for improving beyond the current state of the art.",
"title": ""
},
{
"docid": "f942a0bcda6a9b3f6605cd6263ac0b5c",
"text": "In nose surgery, carved or crushed cartilage used as a graft has some disadvantages, chiefly that it may be perceptible through the nasal skin after tissue resolution is complete. To overcome these problems and to obtain a smoother surface, the authors initiated the use of Surgicel-wrapped diced cartilage. This innovative technique has been used by the authors on 2365 patients over the past 10 years: in 165 patients with traumatic nasal deformity, in 350 patients with postrhinoplasty deformity, and in 1850 patients during primary rhinoplasty. The highlights of the surgical procedure include harvested cartilage (septal, alar, conchal, and sometimes costal) cut in pieces of 0.5 to 1 mm using a no. 11 blade. The fine-textured cartilage mass is then wrapped in one layer of Surgicel and moistened with an antibiotic (rifamycin). The graft is then molded into a cylindrical form and inserted under the dorsal nasal skin. In the lateral wall and tip of the nose, some overcorrection is performed depending on the type of deformity. When the mucosal stitching is complete, this graft can be externally molded, like plasticine, under the dorsal skin. In cases of mild-to-moderate nasal depression, septal and conchal cartilages are used in the same manner to augment the nasal dorsum with consistently effective and durable results. In cases with more severe defects of the nose, costal cartilage is necessary to correct both the length of the nose and the projection of the columella. In patients with recurrent deviation of the nasal bridge, this technique provided a simple solution to the problem. After overexcision of the dorsal part of deviated septal cartilage and insertion of Surgicel-wrapped diced cartilage, a straight nose was obtained in all patients with no recurrence (follow-up of 1 to 10 years). The technique also proved to be highly effective in primary rhinoplasties to camouflage bone irregularities after hump removal in patients with thin nasal skin and/or in cases when excessive hump removal was performed. As a complication, in six patients early postoperative swelling was more than usual. In 16 patients, overcorrection was persistent owing to fibrosis, and in 11 patients resorption was excessive beyond the expected amount. A histologic evaluation was possible in 16 patients, 3, 6, and 12 months postoperatively, by removing thin slices of excess cartilage from the dorsum of the nose during touch-up surgery. This graft showed a mosaic-type alignment of graft cartilage with fibrous tissue connection among the fragments. In conclusion, this type of graft is very easy to apply, because a plasticine-like material is obtained that can be molded with the fingers, giving a smooth surface with desirable form and long-lasting results in all cases. The favorable results obtained by this technique have led the authors to use Surgicel-wrapped diced cartilage routinely in all types of rhinoplasty.",
"title": ""
},
{
"docid": "a20efb7b9f80f37a177855180783e7d9",
"text": "Considered is a knapsack with integer volume Fand which is capable of holding K different classes of objects. An object from class k has integer volume bk, k = 1, . . ., K . Objects arrive randomly to the knapsack; interarrivals are exponential with mean depending on the state of the system. The sojourn time of an object has a general classdependent distribution. An object in the knapsack from class k accrues revenue at a rate rk. The problem is to find a control policy in order to acceptlreject the arriving objects as a function of the current state in order to maximize the average revenue. Optimization is carried out over the class of coordinate convex policies. For the case of K = 2, we show for a wide range of parameters that the optimal control is of the threshold type. In the case of Poisson arrivals and of knapsack and object volumes being integer multiples of each other, it is shown that the optimal policy is always of the double-threshold type. An O(F) algorithm to determine the revenue of threshold policies is also given. For the general case of K classes, we consider the problem of finding the optimal static control where for each class a portion of the knapsack is dedicated. An efficient finite-stage dynamic programming algorithm for locating the optimal static control is presented. Furthermore, variants of the optimal static control which allow some sharing among classes are also discussed.",
"title": ""
},
{
"docid": "4eff2dc30d4b0031dec8be5dda3157d8",
"text": "We introduce a scheme for molecular simulations, the deep potential molecular dynamics (DPMD) method, based on a many-body potential and interatomic forces generated by a carefully crafted deep neural network trained with ab initio data. The neural network model preserves all the natural symmetries in the problem. It is first-principles based in the sense that there are no ad hoc components aside from the network model. We show that the proposed scheme provides an efficient and accurate protocol in a variety of systems, including bulk materials and molecules. In all these cases, DPMD gives results that are essentially indistinguishable from the original data, at a cost that scales linearly with system size.",
"title": ""
},
{
"docid": "77278e6ba57e82c88f66bd9155b43a50",
"text": "Up to the time when a huge corruption scandal, popularly labeled tangentopoli”(bribe city), brought down the political establishment that had ruled Italy for several decades, that country had reported one of the largest shares of capital spending in GDP among the OECD countries. After the scandal broke out and several prominent individuals were sent to jail, or even committed suicide, capital spending fell sharply. The fall seems to have been caused by a reduction in the number of capital projects being undertaken and, perhaps more importantly, by a sharp fall in the costs of the projects still undertaken. Information released by Transparency International (TI) reports that, within the space of two or three years, in the city of Milan, the city where the scandal broke out in the first place, the cost of city rail links fell by 52 percent, the cost of one kilometer of subway fell by 57 percent, and the budget for the new airport terminal was reduced by 59 percent to reflect the lower construction costs. Although one must be aware of the logical fallacy of post hoc, ergo propter hoc, the connection between the two events is too strong to be attributed to a coincidence. In fact, this paper takes the view that it could not have been a coincidence.",
"title": ""
},
{
"docid": "76f6a4f44af78fae2960375f8c750878",
"text": "Recently in tandem with the spread of portable devices for reading electronic books, devices for digitizing paper books, called book scanners, are developed to meet the increased demand for digitizing privately owned books. However, conventional book scanners still have complex components to mechanically turn pages and to rectify the acquired images that are inevitably distorted by the curvy book surface. Here, we present the multi-scale mechanism that turns pages electronically using electroadhesive force generated by a micro-scale structure. Its another advantage is that perspective correction of image processing is applicable to readily reconstruct the distorted images of pages. Specifically, to turn one page at a time not two pages, we employ a micro-scale structure to generate near-field electroadhesive force that decays rapidly and accordingly attracts objects within tens of micrometers. We analyze geometrical parameters of the micro-scale structure to improve the decay characteristics. We find that the decay characteristics of electroadhesive force definitely depends upon the geometrical period of the micro-scale structure, while its magnitude depends on a variety of parameters. Based on this observation, we propose a novel electrode configuration with improved decay characteristics. Dynamical stability and kinematic requirements are also examined to successfully introduce near-field electroadhesive force into our digitizing process.",
"title": ""
},
{
"docid": "f0d17b259b699bc7fb7e8f525ec64db0",
"text": "Developing Intelligent Systems involves artificial intelligence approaches including artificial neural networks. Here, we present a tutorial of Deep Neural Networks (DNNs), and some insights about the origin of the term “deep”; references to deep learning are also given. Restricted Boltzmann Machines, which are the core of DNNs, are discussed in detail. An example of a simple two-layer network, performing unsupervised learning for unlabeled data, is shown. Deep Belief Networks (DBNs), which are used to build networks with more than two layers, are also described. Moreover, examples for supervised learning with DNNs performing simple prediction and classification tasks, are presented and explained. This tutorial includes two intelligent pattern recognition applications: handwritten digits (benchmark known as MNIST) and speech recognition.",
"title": ""
},
{
"docid": "4958f0fbdf29085cabef3591a1c05c51",
"text": "Network Function Virtualization (NFV) is a new networking paradigm where network functions are executed on commodity servers located in small cloud nodes distributed across the network, and where software defined mechanisms are used to control the network flows. This paradigm is a major turning point in the evolution of networking, as it introduces high expectations for enhanced economical network services, as well as major technical challenges. In this paper, we address one of the main technical challenges in this domain: the actual placement of the virtual functions within the physical network. This placement has a critical impact on the performance of the network, as well as on its reliability and operation cost. We perform a thorough study of the NFV location problem, show that it introduces a new type of optimization problems, and provide near optimal approximation algorithms guaranteeing a placement with theoretically proven performance. The performance of the solution is evaluated with respect to two measures: the distance cost between the clients and the virtual functions by which they are served, as well as the setup costs of these functions. We provide bi-criteria solutions reaching constant approximation factors with respect to the overall performance, and adhering to the capacity constraints of the networking infrastructure by a constant factor as well. Finally, using extensive simulations, we show that the proposed algorithms perform well in many realistic scenarios.",
"title": ""
},
{
"docid": "2cbb2af6ed4ef193aad77c2f696a45c5",
"text": "Consider mutli-goal tasks that involve static environments and dynamic goals. Examples of such tasks, such as goaldirected navigation and pick-and-place in robotics, abound. Two types of Reinforcement Learning (RL) algorithms are used for such tasks: model-free or model-based. Each of these approaches has limitations. Model-free RL struggles to transfer learned information when the goal location changes, but achieves high asymptotic accuracy in single goal tasks. Model-based RL can transfer learned information to new goal locations by retaining the explicitly learned state-dynamics, but is limited by the fact that small errors in modelling these dynamics accumulate over long-term planning. In this work, we improve upon the limitations of model-free RL in multigoal domains. We do this by adapting the Floyd-Warshall algorithm for RL and call the adaptation Floyd-Warshall RL (FWRL). The proposed algorithm learns a goal-conditioned action-value function by constraining the value of the optimal path between any two states to be greater than or equal to the value of paths via intermediary states. Experimentally, we show that FWRL is more sample-efficient and learns higher reward strategies in multi-goal tasks as compared to Q-learning, model-based RL and other relevant baselines in a tabular domain.",
"title": ""
},
{
"docid": "b6b9e1eaf17f6cdbc9c060e467021811",
"text": "Tumour-associated viruses produce antigens that, on the face of it, are ideal targets for immunotherapy. Unfortunately, these viruses are experts at avoiding or subverting the host immune response. Cervical-cancer-associated human papillomavirus (HPV) has a battery of immune-evasion mechanisms at its disposal that could confound attempts at HPV-directed immunotherapy. Other virally associated human cancers might prove similarly refractive to immuno-intervention unless we learn how to circumvent their strategies for immune evasion.",
"title": ""
},
{
"docid": "29626105b7d6dad21162230296deef9a",
"text": "A quasi-Z-source inverter (qZSI) could achieve buck/boost conversion as well as dc to ac inversion in a single-stage topology, which reduces the structure cost when compared to a traditional two-stage inverter. Specifically, the buck/boost conversion was accomplished via shoot-through state which took place across all phase legs of the inverter. In this paper, instead of using traditional dual-loop-based proportional integral (PI)-P controller, a type 2 based closed-loop voltage controller with novel dc-link voltage reference algorithm was proposed to fulfill the dc-link voltage tracking control of a single-phase qZSI regardless of any loading conditions, without the need of inner inductor current loop. A dc–ac boost inverter with similar circuit parameters as a qZSI was used to verify the flexibility of the proposed controller. The dynamic and transient performances of the proposed controller were investigated to evaluate its superiority against the aforementioned conventional controller. The integrated proposed controller and qZSI topology was then employed in static synchronous compensator application to perform reactive power compensation at the point of common coupling. The effectiveness of the proposed approach was verified through both simulation and experimental studies.",
"title": ""
},
{
"docid": "2c7fe5484b2184564d71a03f19188251",
"text": "This paper focuses on running scans in a main memory data processing system at \"bare metal\" speed. Essentially, this means that the system must aim to process data at or near the speed of the processor (the fastest component in most system configurations). Scans are common in main memory data processing environments, and with the state-of-the-art techniques it still takes many cycles per input tuple to apply simple predicates on a single column of a table. In this paper, we propose a technique called BitWeaving that exploits the parallelism available at the bit level in modern processors. BitWeaving operates on multiple bits of data in a single cycle, processing bits from different columns in each cycle. Thus, bits from a batch of tuples are processed in each cycle, allowing BitWeaving to drop the cycles per column to below one in some case. BitWeaving comes in two flavors: BitWeaving/V which looks like a columnar organization but at the bit level, and BitWeaving/H which packs bits horizontally. In this paper we also develop the arithmetic framework that is needed to evaluate predicates using these BitWeaving organizations. Our experimental results show that both these methods produce significant performance benefits over the existing state-of-the-art methods, and in some cases produce over an order of magnitude in performance improvement.",
"title": ""
},
{
"docid": "ddb804eec29ebb8d7f0c80223184305a",
"text": "Near Field Communication (NFC) enables physically proximate devices to communicate over very short ranges in a peer-to-peer manner without incurring complex network configuration overheads. However, adoption of NFC-enabled applications has been stymied by the low levels of penetration of NFC hardware. In this paper, we address the challenge of enabling NFC-like capability on the existing base of mobile phones. To this end, we develop Dhwani, a novel, acoustics-based NFC system that uses the microphone and speakers on mobile phones, thus eliminating the need for any specialized NFC hardware. A key feature of Dhwani is the JamSecure technique, which uses self-jamming coupled with self-interference cancellation at the receiver, to provide an information-theoretically secure communication channel between the devices. Our current implementation of Dhwani achieves data rates of up to 2.4 Kbps, which is sufficient for most existing NFC applications.",
"title": ""
},
{
"docid": "343c1607a4f8df8a8202adb26f9959ed",
"text": "This investigation examined the measurement properties of the Three Domains of Disgust Scale (TDDS). Principal components analysis in Study 1 (n = 206) revealed three factors of Pathogen, Sexual, and Moral Disgust that demonstrated excellent reliability, including test-retest over 12 weeks. Confirmatory factor analyses in Study 2 (n = 406) supported the three factors. Supportive evidence for the validity of the Pathogen and Sexual Disgust subscales was found in Study 1 and Study 2 with strong associations with disgust/contamination and weak associations with negative affect. However, the validity of the Moral Disgust subscale was limited. Study 3 (n = 200) showed that the TDDS subscales differentially related to personality traits. Study 4 (n = 47) provided evidence for the validity of the TDDS subscales in relation to multiple indices of disgust/contamination aversion in a select sample. Study 5 (n = 70) further highlighted limitations of the Moral Disgust subscale given the lack of a theoretically consistent association with moral attitudes. Lastly, Study 6 (n = 178) showed that responses on the Moral Disgust scale were more intense when anger was the response option compared with when disgust was the response option. The implications of these findings for the assessment of disgust are discussed.",
"title": ""
},
{
"docid": "cbdae65bf67066b6606bf72234918c06",
"text": "Computer animated characters have recently gained popularity in many applications, including web pages, computer games, movies, and various human computer interface designs. In order to make these animated characters lively and convincing, they require sophisticated facial expressions and motions. Traditionally, these animations are produced entirely by skilled artists. Although the quality of manually produced animation remains the best, this process is slow and costly. Motion capture performance of actors and actresses is one technique that attempts to speed up this process. One problem with this technique is that the captured motion data can not be edited easily. In recent years, statistical techniques have been used to address this problem by learning the mapping between audio speech and facial motion. New facial motion can be synthesized for novel audio data by reusing the motion capture data. However, since facial expressions are not modeled in these approaches, the resulting facial animation is realistic, yet expressionless. This thesis takes an expressionless talking face and creates an expressive facial animation. This process consists of three parts: expression synthesis, blendshape retargeting, and head motion synthesis. Expression synthesis uses a factorization model to describe the interaction between facial expression and speech content underlying each particular facial appearance. A new facial expression can be applied to novel input video, while retaining the same speech content. Blendshape retargeting maps facial expressions onto a 3D face model using the framework of blendshape interpolation. Three methods of sampling the keyshapes, or the prototype shapes, from data are evaluated. In addition, the generality of blendshape retargeting is demonstrated in three different domains. Head motion synthesis uses audio pitch contours to derive",
"title": ""
},
{
"docid": "90c99c40bfecf75534be0c09d955a207",
"text": "Massive Open Online Courses (MOOCs) have been playing a pivotal role among the latest e-learning initiative and obtain widespread popularity in many universities. But the low course completion rate and the high midway dropout rate of students have puzzled some researchers and designers of MOOCs. Therefore, it is important to explore the factors affecting students’ continuance intention to use MOOCs. This study integrates task-technology fit which can explain how the characteristics of task and technology affect the outcome of technology utilization into expectationconfirmation model to analyze the factors influencing students’ keeping using MOOCs and the relationships of constructs in the model, then it will also extend our understandings of continuance intention about MOOCs. We analyze and study 234 respondents, and results reveal that perceived usefulness, satisfaction and task-technology fit are important precedents of the intention to continue using MOOCs. Researchers and designers of MOOCs may obtain further insight in continuance intention about MOOCs.",
"title": ""
},
{
"docid": "acefbbb42607f2d478a16448644bd6e6",
"text": "The time complexity of incremental structure from motion (SfM) is often known as O(n^4) with respect to the number of cameras. As bundle adjustment (BA) being significantly improved recently by preconditioned conjugate gradient (PCG), it is worth revisiting how fast incremental SfM is. We introduce a novel BA strategy that provides good balance between speed and accuracy. Through algorithm analysis and extensive experiments, we show that incremental SfM requires only O(n) time on many major steps including BA. Our method maintains high accuracy by regularly re-triangulating the feature matches that initially fail to triangulate. We test our algorithm on large photo collections and long video sequences with various settings, and show that our method offers state of the art performance for large-scale reconstructions. The presented algorithm is available as part of VisualSFM at http://homes.cs.washington.edu/~ccwu/vsfm/.",
"title": ""
}
] | scidocsrr |
376bfe9f5ee3773a8181c7b3fac2890d | A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks | [
{
"docid": "56a8d24e4335841cf488373e79cdeaef",
"text": "Weather forecasting is a canonical predictive challenge that has depended primarily on model-based methods. We explore new directions with forecasting weather as a data-intensive challenge that involves inferences across space and time. We study specifically the power of making predictions via a hybrid approach that combines discriminatively trained predictive models with a deep neural network that models the joint statistics of a set of weather-related variables. We show how the base model can be enhanced with spatial interpolation that uses learned long-range spatial dependencies. We also derive an efficient learning and inference procedure that allows for large scale optimization of the model parameters. We evaluate the methods with experiments on real-world meteorological data that highlight the promise of the approach.",
"title": ""
}
] | [
{
"docid": "8a6c3614d35b21a3e6c077d20309a0bd",
"text": "A multitude of different probabilistic programming languages exists today, all extending a traditional programming language with primitives to support modeling of complex, structured probability distributions. Each of these languages employs its own probabilistic primitives, and comes with a particular syntax, semantics and inference procedure. This makes it hard to understand the underlying programming concepts and appreciate the differences between the different languages. To obtain a better understanding of probabilistic programming, we identify a number of core programming concepts underlying the primitives used by various probabilistic languages, discuss the execution mechanisms that they require and use these to position and survey state-of-the-art probabilistic languages and their implementation. While doing so, we focus on probabilistic extensions of logic programming languages such as Prolog, which have been considered for over 20 years.",
"title": ""
},
{
"docid": "7ec12c0bf639c76393954baae196a941",
"text": "Honeynets have now become a standard part of security measures within the organization. Their purpose is to protect critical information systems and information; this is complemented by acquisition of information about the network threats, attackers and attacks. It is very important to consider issues affecting the deployment and usage of the honeypots and honeynets. This paper discusses the legal issues of honeynets considering their generations. Paper focuses on legal issues of core elements of honeynets, especially data control, data capture and data collection. Paper also draws attention on the issues pertaining to privacy and liability. The analysis of legal issues is based on EU law and it is supplemented by a review of the research literature, related to legal aspects of honeypots and honeynets.",
"title": ""
},
{
"docid": "706e2131c7ebcde981e140241420116f",
"text": "Most commonly used distributed machine learning systems are either synchronous or centralized asynchronous. Synchronous algorithms like AllReduceSGD perform poorly in a heterogeneous environment, while asynchronous algorithms using a parameter server suffer from 1) communication bottleneck at parameter servers when workers are many, and 2) significantly worse convergence when the traffic to parameter server is congested. Can we design an algorithm that is robust in a heterogeneous environment, while being communication efficient and maintaining the best-possible convergence rate? In this paper, we propose an asynchronous decentralized stochastic gradient decent algorithm (AD-PSGD) satisfying all above expectations. Our theoretical analysis shows AD-PSGD converges at the optimal O(1/ √ K) rate as SGD and has linear speedup w.r.t. number of workers. Empirically, ADPSGD outperforms the best of decentralized parallel SGD (D-PSGD), asynchronous parallel SGD (APSGD), and standard data parallel SGD (AllReduceSGD), often by orders of magnitude in a heterogeneous environment. When training ResNet-50 on ImageNet with up to 128 GPUs, AD-PSGD converges (w.r.t epochs) similarly to the AllReduce-SGD, but each epoch can be up to 4-8× faster than its synchronous counterparts in a network-sharing HPC environment.",
"title": ""
},
{
"docid": "8d2d1f1a1f8e6bca488579ed35fead00",
"text": "Failure Mode and Effects Analysis (FMEA) is a well-known technique for evaluating the effects of potential failure modes of components of a system. It is a crucial reliability and safety engineering activity for critical systems requiring systematic inductive reasoning from postulated component failures. We present an approach based on SysML and Prolog to support the tasks of an FMEA analyst. SysML block diagrams of the system under analysis are annotated with valid and error states of components and of their input flows, as well as with the logical conditions that may determine erroneous outputs. From the annotated model, a Prolog knowledge base is automatically built, transparently to the analyst. This can then be queried, e.g., to obtain the flows' and blocks' states that lead to system failures, or to trace the propagation of faults. The approach is suited for integration in modern model-driven system design processes. We describe a proof-of-concept implementation based on the Papyrus modeling tool under Eclipse, and show a demo example.",
"title": ""
},
{
"docid": "e5c602d9996109ea713eba551a9bf94b",
"text": "Several focus measures were studied in this paper as the measures of image clarity, in the field of multi-focus image fusion. All these focus measures are defined in the spatial domain and can be implemented in real-time fusion systems with fast response and robustness. This paper proposed a method to assess focus measures according to focus measures’ capability of distinguishing focused image blocks from defocused image blocks. Experiments were conducted on several sets of images and results show that sum-modified-Laplacian (SML) can provide better performance than other focus measures, when the execution time is not included in the evaluation. 2006 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "47fb3483c8f4a5c0284fec3d3a309c09",
"text": "The Knowledge Base Population (KBP) track at the Text Analysis Conference 2010 marks the second year of this important information extraction evaluation. This paper describes the design and implementation of LCC’s systems which participated in the tasks of Entity Linking, Slot Filling, and the new task of Surprise Slot Filling. For the entity linking task, our top score was achieved through a robust context modeling approach which incorporates topical evidence. For slot filling, we used the output of the entity linking system together with a combination of different types of relation extractors. For surprise slot filling, our customizable extraction system was extremely useful due to the time sensitive nature of the task.",
"title": ""
},
{
"docid": "ac02caa1c12ea9d883cf6599f60902c6",
"text": "Biometrics already form a significant component of current and emerging identification technologies. Biometrics systems aim to determine or verify the identity of an individual from their behavioral and/or biological characteristics. Despite significant progress, some biometric systems fail to meet the multitude of stringent security and robustness requirements to support their deployment in some practical scenarios. Among current concerns are vulnerabilities to spoofing?persons who masquerade as others to gain illegitimate accesses to protected data, services, or facilities. While the study of spoofing, or rather antispoofing, has attracted growing interest in recent years, the problem is far from being solved and will require far greater attention in the coming years. This tutorial article presents an introduction to spoofing and antispoofing research. It describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofing and countermeasures, and outlines research priorities for the future.",
"title": ""
},
{
"docid": "8552f08b2c98bcf201f623e95073f9e3",
"text": "The power sensitivity of passive Radio Frequency Identification (RFID) tags heavily affects the read reliability and range. Inventory tracking systems rely heavily on strong read reliability while animal tracking in large fields rely heavily on long read range. Power Optimized Waveforms (POWs) provide a solution to improving both read reliability and read range by increasing RFID tag RF to DC power conversion efficiency. This paper presents a survey of the increases and decreases to read range of common RFID tags from Alien and Impinj with Higgs, Higgs 2, Higgs 3, Monza 3, and Monza 4 RFICs. In addition, POWs are explained in detail with examples and methods of integration into a reader.",
"title": ""
},
{
"docid": "175eef49732b11de4c9542663fc9e93f",
"text": "In this paper we outline a method of procedurally generating maps using Markov Chains. Our method attempts to learn what makes a “good” map from a set of given human-authored maps, and then uses those learned patterns to generate new maps. We present an empirical evaluation using the game Super Mario Bros., showing encouraging results.",
"title": ""
},
{
"docid": "4b854c1c1ed2ece94e88b7300b1395fa",
"text": "Spam web pages intend to achieve higher-than-deserved ranking by various techniques. While human experts could easily identify spam web pages, the manual evaluating process of a large number of pages is still time consuming and cost consuming. To assist manual evaluation, we propose an algorithm to assign spam values to web pages and semi-automatically select potential spam web pages. We first manually select a small set of spam pages as seeds. Then, based on the link structure of the web, the initial R-SpamRank values assigned to the seed pages propagate through links and distribute among the whole web page set. After sorting the pages according to their R-SpamRank values, the pages with high values are selected. Our experiments and analyses show that the algorithm is highly successful in identifying spam pages, which gains a precision of 99.1% in the top 10,000 web pages with the highest R-SpamRank values.",
"title": ""
},
{
"docid": "ce2e955ef4fba68411cafab52d206b52",
"text": "Voice-enabled user interfaces have become a popular means of interaction with various kinds of applications and services. In addition to more traditional interaction paradigms such as keyword search, voice interaction can be a convenient means of communication for many groups of users. Amazon Alexa has become a valuable tool for building custom voice-enabled applications. In this demo paper we describe how we use Amazon Alexa technologies to build a Semantic Web applications able to answer factual questions using the Wikidata knowledge graph. We describe how the Amazon Alexa voice interface allows the user to communicate with the metaphactory knowledge graph management platform and a reusable procedure for producing the Alexa application configuration from semantic data in an automated way.",
"title": ""
},
{
"docid": "dc259f1208eac95817d067b9cd13fa7c",
"text": "This paper introduces a novel approach to texture synthesis based on generative adversarial networks (GAN) (Goodfellow et al., 2014). We extend the structure of the input noise distribution by constructing tensors with different types of dimensions. We call this technique Periodic Spatial GAN (PSGAN). The PSGAN has several novel abilities which surpass the current state of the art in texture synthesis. First, we can learn multiple textures from datasets of one or more complex large images. Second, we show that the image generation with PSGANs has properties of a texture manifold: we can smoothly interpolate between samples in the structured noise space and generate novel samples, which lie perceptually between the textures of the original dataset. In addition, we can also accurately learn periodical textures. We make multiple experiments which show that PSGANs can flexibly handle diverse texture and image data sources. Our method is highly scalable and it can generate output images of arbitrary large size.",
"title": ""
},
{
"docid": "00fb9b734170743d958a79f12c4d529c",
"text": "Loneliness and perceived social support were examined in 39 adolescent boys with autism spectrum disorders (ASD) by means of a self-labeling loneliness measure, the UCLA Loneliness Scale (third version), and the Social Support Scale for Children. Twenty-one percent of the boys with ASD described themselves as often or always feeling lonely. Compared with 199 boys from regular schools in a national probability study, ASD was strongly associated with often or always feeling lonely (OR: 7.08, p < .0005), as well as with a higher degree of loneliness (F(1,229) = 11.1, p < .005). Perceived social support from classmates, parents, and a close friend correlated negatively with loneliness in ASD. The study, therefore, indicates a high occurrence of loneliness among adolescent boys with ASD and points at perceived social support as an important protective factor.",
"title": ""
},
{
"docid": "7f52960fb76c3c697ef66ffee91b13ee",
"text": "The aim of this work was to explore the feasibility of combining hot melt extrusion (HME) with 3D printing (3DP) technology, with a view to producing different shaped tablets which would be otherwise difficult to produce using traditional methods. A filament extruder was used to obtain approx. 4% paracetamol loaded filaments of polyvinyl alcohol with characteristics suitable for use in fused-deposition modelling 3DP. Five different tablet geometries were successfully 3D-printed-cube, pyramid, cylinder, sphere and torus. The printing process did not affect the stability of the drug. Drug release from the tablets was not dependent on the surface area but instead on surface area to volume ratio, indicating the influence that geometrical shape has on drug release. An erosion-mediated process controlled drug release. This work has demonstrated the potential of 3DP to manufacture tablet shapes of different geometries, many of which would be challenging to manufacture by powder compaction.",
"title": ""
},
{
"docid": "ce098e1e022235a2c322a231bff8da6c",
"text": "In recent years, due to the development of three-dimensional scanning technology, the opportunities for real objects to be three-dimensionally measured, taken into the PC as point cloud data, and used for various contents are increasing. However, the point cloud data obtained by three-dimensional scanning has many problems such as data loss due to occlusion or the material of the object to be measured, and occurrence of noise. Therefore, it is necessary to edit the point cloud data obtained by scanning. Particularly, since the point cloud data obtained by scanning contains many data missing, it takes much time to fill holes. Therefore, we propose a method to automatically filling hole obtained by three-dimensional scanning. In our method, a surface is generated from a point in the vicinity of a hole, and a hole region is filled by generating a point sequence on the surface. This method is suitable for processing to fill a large number of holes because point sequence interpolation can be performed automatically for hole regions without requiring user input.",
"title": ""
},
{
"docid": "dd9d776dbc470945154d460921005204",
"text": "The Ant Colony System (ACS) is, next to Ant Colony Optimization (ACO) and the MAX-MIN Ant System (MMAS), one of the most efficient metaheuristic algorithms inspired by the behavior of ants. In this article we present three novel parallel versions of the ACS for the graphics processing units (GPUs). To the best of our knowledge, this is the first such work on the ACS which shares many key elements of the ACO and the MMAS, but differences in the process of building solutions and updating the pheromone trails make obtaining an efficient parallel version for the GPUs a difficult task. The proposed parallel versions of the ACS differ mainly in their implementations of the pheromone memory. The first two use the standard pheromone matrix, and the third uses a novel selective pheromone memory. Computational experiments conducted on several Travelling Salesman Problem (TSP) instances of sizes ranging from 198 to 2392 cities showed that the parallel ACS on Nvidia Kepler GK104 GPU (1536 CUDA cores) is able to obtain a speedup up to 24.29x vs the sequential ACS running on a single core of Intel Xeon E5-2670 CPU. The parallel ACS with the selective pheromone memory achieved speedups up to 16.85x, but in most cases the obtained solutions were of significantly better quality than for the sequential ACS.",
"title": ""
},
{
"docid": "ff6a487e49d1fed033ad082ad7cd0524",
"text": "We present a novel technique for shadow removal based on an information theoretic approach to intrinsic image analysis. Our key observation is that any illumination change in the scene tends to increase the entropy of observed texture intensities. Similarly, the presence of texture in the scene increases the entropy of the illumination function. Consequently, we formulate the separation of an image into texture and illumination components as minimization of entropies of each component. We employ a non-parametric kernel-based quadratic entropy formulation, and present an efficient multi-scale iterative optimization algorithm for minimization of the resulting energy functional. Our technique may be employed either fully automatically, using a proposed learning based method for automatic initialization, or alternatively with small amount of user interaction. As we demonstrate, our method is particularly suitable for aerial images, which consist of either distinctive texture patterns, e.g. building facades, or soft shadows with large diffuse regions, e.g. cloud shadows.",
"title": ""
},
{
"docid": "d2e6aa2ab48cdd1907f3f373e0627fa8",
"text": "We address the issue of speeding up the training of convolutional networks. Here we study a distributed method adapted to stochastic gradient descent (SGD). The parallel optimization setup uses several threads, each applying individual gradient descents on a local variable. We propose a new way to share information between different threads inspired by gossip algorithms and showing good consensus convergence properties. Our method called GoSGD has the advantage to be fully asynchronous and decentralized. We compared our method to the recent EASGD in [17] on CIFAR-10 show encouraging results.",
"title": ""
},
{
"docid": "055660c14bbfa430703ce8b1294a0a75",
"text": "String data is ubiquitous, and its management has taken on particular importance in the past few years. Approximate queries are very important on string data especially for more complex queries involving joins. This is due, for example, to the prevalence of typographical errors in data, and multiple conventions for recording attributes such as name and address. Commercial databases do not support approximate string joins directly, and it is a challenge to implement this functionality efficiently with user-defined functions (UDFs). In this paper, we develop a technique for building approximate string join capabilities on top of commercial databases by exploiting facilities already available in them. At the core, our technique relies on matching short substrings of length , called -grams, and taking into account both positions of individual matches and the total number of such matches. Our approach applies to both approximate full string matching and approximate substring matching, with a variety of possible edit distance functions. The approximate string match predicate, with a suitable edit distance threshold, can be mapped into a vanilla relational expression and optimized by conventional relational optimizers. We demonstrate experimentally the benefits of our technique over the direct use of UDFs, using commercial database systems and real data. To study the I/O and CPU behavior of approximate string join algorithms with variations in edit distance and -gram length, we also describe detailed experiments based on a prototype implementation. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the VLDB copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Very Large Data Base Endowment. To copy otherwise, or to republish, requires a fee and/or special permission from the Endowment. Proceedings of the 27th VLDB Conference, Roma, Italy, 2001",
"title": ""
},
{
"docid": "1c3c5c01fbcb3a07274b49b8df0f2963",
"text": "E D P R Demand forecasts play a crucial role for supply chain management. The future demand for a certain product is the basis for the respective replenishment systems. Several forecasting techniques have been developed, each one with its particular advantages and disadvantages compared to other approaches. This motivates the development of hybrid systems combining different techniques and their respective strengths. In this paper, we present a hybrid intelligent system combining Autoregressive Integrated Moving Average (ARIMA) models and neural networks for demand forecasting. We show improvements in forecasting accuracy and propose a replenishment system for a Chilean supermarket, which leads simultaneously to fewer sales failures and lower inventory levels than the previous solution. # 2005 Published by Elsevier B.V.",
"title": ""
}
] | scidocsrr |
8b060257984083b9ec2e0d334ca5bbdf | SGM-Nets: Semi-Global Matching with Neural Networks | [
{
"docid": "4421a42fc5589a9b91215b68e1575a3f",
"text": "We present a method for extracting depth information from a rectified image pair. Our approach focuses on the first stage of many stereo algorithms: the matching cost computation. We approach the problem by learning a similarity measure on small image patches using a convolutional neural network. Training is carried out in a supervised manner by constructing a binary classification data set with examples of similar and dissimilar pairs of patches. We examine two network architectures for this task: one tuned for speed, the other for accuracy. The output of the convolutional neural network is used to initialize the stereo matching cost. A series of post-processing steps follow: cross-based cost aggregation, semiglobal matching, a left-right consistency check, subpixel enhancement, a median filter, and a bilateral filter. We evaluate our method on the KITTI 2012, KITTI 2015, and Middlebury stereo data sets and show that it outperforms other approaches on all three data sets.",
"title": ""
},
{
"docid": "8b002f094c6979f718426f46766b122b",
"text": "Recent developments in smartphones create an ideal platform for robotics and computer vision applications: they are small, powerful, embedded devices with low-power mobile CPUs. However, though the computational power of smartphones has increased substantially in recent years, they are still not capable of performing intense computer vision tasks in real time, at high frame rates and low latency. We present a combination of FPGA and mobile CPU to overcome the computational and latency limitations of mobile CPUs alone. With the FPGA as an additional layer between the image sensor and CPU, the system is capable of accelerating computer vision algorithms to real-time performance. Low latency calculation allows for direct usage within control loops of mobile robots. A stereo camera setup with disparity estimation based on the semi global matching algorithm is implemented as an accelerated example application. The system calculates dense disparity images with 752×480 pixels resolution at 60 frames per second. The overall latency of the disparity estimation is less than 2 milliseconds. The system is suitable for any mobile robot application due to its light weight and low power consumption.",
"title": ""
},
{
"docid": "c94e5133c083193227b26a9fb35a1fbd",
"text": "Modern computer vision algorithms typically require expensive data acquisition and accurate manual labeling. In this work, we instead leverage the recent progress in computer graphics to generate fully labeled, dynamic, and photo-realistic proxy virtual worlds. We propose an efficient real-to-virtual world cloning method, and validate our approach by building and publicly releasing a new video dataset, called \"Virtual KITTI\", automatically labeled with accurate ground truth for object detection, tracking, scene and instance segmentation, depth, and optical flow. We provide quantitative experimental evidence suggesting that (i) modern deep learning algorithms pre-trained on real data behave similarly in real and virtual worlds, and (ii) pre-training on virtual data improves performance. As the gap between real and virtual worlds is small, virtual worlds enable measuring the impact of various weather and imaging conditions on recognition performance, all other things being equal. We show these factors may affect drastically otherwise high-performing deep models for tracking.",
"title": ""
}
] | [
{
"docid": "d1b79ace26173ebe954bca25a06c5e34",
"text": "Recent proposals for deterministic database system designs argue that deterministic database systems facilitate replication since the same input can be independently sent to two different replicas without concern for replica divergence. In addition, they argue that determinism yields performance benefits due to (1) the introduction of deadlock avoidance techniques, (2) the reduction (or elimination) of distributed commit protocols, and (3) light-weight locking. However, these performance benefits are not universally applicable, and there exist several disadvantages of determinism, including (1) the additional overhead of processing transactions for which it is not known in advance what data will be accessed, (2) an inability to abort transactions arbitrarily (e.g., in the case of database or partition overload), and (3) the increased latency required by a preprocessing layer that ensures that the same input is sent to every replica. This paper presents a thorough experimental study that carefully investigates both the advantages and disadvantages of determinism, in order to give a database user a more complete understanding of which database to use for a given database workload and cluster configuration.",
"title": ""
},
{
"docid": "99ab45ae1bde4f830c4145f7d1b715f6",
"text": "The automatic test case generation is the principal issue of the software testing activity. Dynamic symbolic execution appears to be a promising approach to this matter as it has been shown to be quite powerful in producing the sought tests. Despite its power, it has only been effectively applied to the entry level criteria of the structural criteria hierarchy such as branch testing. In this paper an extension of this technique is proposed in order to effectively generate test data based on mutation testing. The proposed approach conjoins program transformation and dynamic symbolic execution techniques in order to successfully automate the test generation process. The propositions made in this paper have been incorporated into an automated framework for producing mutation based test cases. Its evaluation on a set of benchmark programs suggests that it is able to produce tests capable of killing most of the non equivalent introduced mutants. The same study also provides some evidence that by employing efficient heuristics it can be possible to perform mutation with reasonable resources.",
"title": ""
},
{
"docid": "5ce6bac4ec1f916c1ebab9da09816c0e",
"text": "High-performance parallel computing architectures are increasingly based on multi-core processors. While current commercially available processors are at 8 and 16 cores, technological and power constraints are limiting the performance growth of the cores and are resulting in architectures with much higher core counts, such as the experimental many-core Intel Single-chip Cloud Computer (SCC) platform. These trends are presenting new sets of challenges to HPC applications including programming complexity and the need for extreme energy efficiency.\n In this paper, we first investigate the power behavior of scientific Partitioned Global Address Space (PGAS) application kernels on the SCC platform, and explore opportunities and challenges for power management within the PGAS framework. Results obtained via empirical evaluation of Unified Parallel C (UPC) applications on the SCC platform under different constraints, show that, for specific operations, the potential for energy savings in PGAS is large; and power/performance trade-offs can be effectively managed using a cross-layer approach. We investigate cross-layer power management using PGAS language extensions and runtime mechanisms that manipulate power/performance tradeoffs. Specifically, we present the design, implementation and evaluation of such a middleware for application-aware cross-layer power management of UPC applications on the SCC platform. Finally, based on our observations, we provide a set of insights that can be used to support similar power management for PGAS applications on other many-core platforms.",
"title": ""
},
{
"docid": "f85547bb47571bd86b3ece7ae583cba0",
"text": "In this paper, a novel start-up circuit with a simple topology and low stand-by power during under voltage lockout (UVLO) mode is proposed for SMPS (switching mode power supplies) application. The proposed start-up circuit is designed using only a few MOSFETs, LDMOSs, and one JFET based on the analysis of the existing start-up circuits to address the power consumption and input voltage range issues of the conventional start-up. Simulated results using 0.35um BCDMOS process demonstrate that the leakage current of the proposed circuit is less than 1uA after UVLO signal turns on. Setting time is less than 1ms when the load current changes from 10mA to 20mA and vice versa",
"title": ""
},
{
"docid": "2db49e1c2020875f2453d4b614fd2116",
"text": "Text Categorization (TC), also known as Text Classification, is the task of automatically classifying a set of text documents into different categories from a predefined set. If a document belongs to exactly one of the categories, it is a single-label classification task; otherwise, it is a multi-label classification task. TC uses several tools from Information Retrieval (IR) and Machine Learning (ML) and has received much attention in the last years from both researchers in the academia and industry developers. In this paper, we first categorize the documents using KNN based machine learning approach and then return the most relevant documents.",
"title": ""
},
{
"docid": "2f201cd1fe90e0cd3182c672110ce96d",
"text": "BACKGROUND\nFor many years, high dose radiation therapy was the standard treatment for patients with locally or regionally advanced non-small-cell lung cancer (NSCLC), despite a 5-year survival rate of only 3%-10% following such therapy. From May 1984 through May 1987, the Cancer and Leukemia Group B (CALGB) conducted a randomized trial that showed that induction chemotherapy before radiation therapy improved survival during the first 3 years of follow-up.\n\n\nPURPOSE\nThis report provides data for 7 years of follow-up of patients enrolled in the CALGB trial.\n\n\nMETHODS\nThe patient population consisted of individuals who had clinical or surgical stage III, histologically documented NSCLC; a CALGB performance status of 0-1; less than 5% loss of body weight in the 3 months preceding diagnosis; and radiographically visible disease. Patients were randomly assigned to receive either 1) cisplatin (100 mg/m2 body surface area intravenously on days 1 and 29) and vinblastine (5 mg/m2 body surface area intravenously weekly on days 1, 8, 15, 22, and 29) followed by radiation therapy with 6000 cGy given in 30 fractions beginning on day 50 (CT-RT group) or 2) radiation therapy with 6000 cGy alone beginning on day 1 (RT group) for a maximum duration of 6-7 weeks. Patients were evaluated for tumor regression if they had measurable or evaluable disease and were monitored for toxic effects, disease progression, and date of death.\n\n\nRESULTS\nThere were 78 eligible patients randomly assigned to the CT-RT group and 77 randomly assigned to the RT group. Both groups were similar in terms of sex, age, histologic cell type, performance status, substage of disease, and whether staging had been clinical or surgical. All patients had measurable or evaluable disease at the time of random assignment to treatment groups. Both groups received a similar quantity and quality of radiation therapy. As previously reported, the rate of tumor response, as determined radiographically, was 56% for the CT-RT group and 43% for the RT group (P = .092). After more than 7 years of follow-up, the median survival remains greater for the CT-RT group (13.7 months) than for the RT group (9.6 months) (P = .012) as ascertained by the logrank test (two-sided). The percentages of patients surviving after years 1 through 7 were 54, 26, 24, 19, 17, 13, and 13 for the CT-RT group and 40, 13, 10, 7, 6, 6, and 6 for the RT group.\n\n\nCONCLUSIONS\nLong-term follow-up confirms that patients with stage III NSCLC who receive 5 weeks of chemotherapy with cisplatin and vinblastine before radiation therapy have a 4.1-month increase in median survival. The use of sequential chemotherapy-radiotherapy increases the projected proportion of 5-year survivors by a factor of 2.8 compared with that of radiotherapy alone. However, inasmuch as 80%-85% of such patients still die within 5 years and because treatment failure occurs both in the irradiated field and at distant sites in patients receiving either sequential chemotherapy-radiotherapy or radiotherapy alone, the need for further improvements in both the local and systemic treatment of this disease persists.",
"title": ""
},
{
"docid": "d859fb8570c91206708b7b2b8f5eedcb",
"text": "In this article, we describe a method for overlaying arbitrary texture image onto surface of T-shirt worn by a user. In this method, the texture image is previously divided into a number of patches. On the T-shirt, markers are printed at the positions corresponding to the vertices of the patches. The markers on the surface of the T-shirt are tracked in the motion image taken by a camera. The texture image is warped according to the tracked positions of the markers, which is overlaid onto the captured image. This article presents experimental results with the pilot system of virtual clothing implemented based on the proposed method.",
"title": ""
},
{
"docid": "0efe3ccc1c45121c5167d3792a7fcd25",
"text": "This paper addresses the motion planning problem while considering Human-Robot Interaction (HRI) constraints. The proposed planner generates collision-free paths that are acceptable and legible to the human. The method extends our previous work on human-aware path planning to cluttered environments. A randomized cost-based exploration method provides an initial path that is relevant with respect to HRI and workspace constraints. The quality of the path is further improved with a local path-optimization method. Simulation results on mobile manipulators in the presence of humans demonstrate the overall efficacy of the approach.",
"title": ""
},
{
"docid": "1e176f66a29b6bd3dfce649da1a4db9d",
"text": "In just a few years, crowdsourcing markets like Mechanical Turk have become the dominant mechanism for for building \"gold standard\" datasets in areas of computer science ranging from natural language processing to audio transcription. The assumption behind this sea change - an assumption that is central to the approaches taken in hundreds of research projects - is that crowdsourced markets can accurately replicate the judgments of the general population for knowledge-oriented tasks. Focusing on the important domain of semantic relatedness algorithms and leveraging Clark's theory of common ground as a framework, we demonstrate that this assumption can be highly problematic. Using 7,921 semantic relatedness judgements from 72 scholars and 39 crowdworkers, we show that crowdworkers on Mechanical Turk produce significantly different semantic relatedness gold standard judgements than people from other communities. We also show that algorithms that perform well against Mechanical Turk gold standard datasets do significantly worse when evaluated against other communities' gold standards. Our results call into question the broad use of Mechanical Turk for the development of gold standard datasets and demonstrate the importance of understanding these datasets from a human-centered point-of-view. More generally, our findings problematize the notion that a universal gold standard dataset exists for all knowledge tasks.",
"title": ""
},
{
"docid": "ccc4b8f75e39488068293540aeb508e2",
"text": "We present a novel approach to sketching 2D curves with minimally varying curvature as piecewise clothoids. A stable and efficient algorithm fits a sketched piecewise linear curve using a number of clothoid segments with G2 continuity based on a specified error tolerance. Further, adjacent clothoid segments can be locally blended to result in a G3 curve with curvature that predominantly varies linearly with arc length. We also handle intended sharp corners or G1 discontinuities, as independent rotations of clothoid pieces. Our formulation is ideally suited to conceptual design applications where aesthetic fairness of the sketched curve takes precedence over the precise interpolation of geometric constraints. We show the effectiveness of our results within a system for sketch-based road and robot-vehicle path design, where clothoids are already widely used.",
"title": ""
},
{
"docid": "d3b0957b31f47620c0fa8e65a1cc086a",
"text": "In this paper, we propose series of algorithms for detecting change points in time-series data based on subspace identification, meaning a geometric approach for estimating linear state-space models behind time-series data. Our algorithms are derived from the principle that the subspace spanned by the columns of an observability matrix and the one spanned by the subsequences of time-series data are approximately equivalent. In this paper, we derive a batch-type algorithm applicable to ordinary time-series data, i.e. consisting of only output series, and then introduce the online version of the algorithm and the extension to be available with input-output time-series data. We illustrate the effectiveness of our algorithms with comparative experiments using some artificial and real datasets.",
"title": ""
},
{
"docid": "234804b51e137cb213998a6d00f2db14",
"text": "Linear Dynamical Systems (LDSs) are the fundamental tools for encoding spatio-temporal data in various disciplines. To enhance the performance of LDSs, in this paper, we address the challenging issue of performing sparse coding on the space of LDSs, where both data and dictionary atoms are LDSs. Rather than approximate the extended observability with a finite-order matrix, we represent the space of LDSs by an infinite Grassmannian consisting of the orthonormalized extended observability subspaces. Via a homeomorphic mapping, such Grassmannian is embedded into the space of symmetric matrices, where a tractable objective function can be derived for sparse coding. Then, we propose an efficient method to learn the system parameters of the dictionary atoms explicitly, by imposing the symmetric constraint to the transition matrices of the data and dictionary systems. Moreover, we combine the state covariance into the algorithm formulation, thus further promoting the performance of the models with symmetric transition matrices. Comparative experimental evaluations reveal the superior performance of proposed methods on various tasks including video classification and tactile recognition.",
"title": ""
},
{
"docid": "e13874aa8c3fe19bb2a176fd3a039887",
"text": "As a typical deep learning model, Convolutional Neural Network (CNN) has shown excellent ability in solving complex classification problems. To apply CNN models in mobile ends and wearable devices, a fully pipelined hardware architecture adopting a Row Processing Tree (RPT) structure with small memory resource consumption between convolutional layers is proposed. A modified Row Stationary (RS) dataflow is implemented to evaluate the RPT architecture. Under the the same work frequency requirement for these two architectures, the experimental results show that the RPT architecture reduces 91% on-chip memory and 75% DRAM bandwidth compared with the modified RS dataflow, but the throughput of the modified RS dataflow is 3 times higher than the our proposed RPT architecture. The RPT architecture can achieve 121fps at 100MHZ while processing a CNN including 4 convolutional layers.",
"title": ""
},
{
"docid": "08b8c184ff2230b0df2c0f9b4e3f7840",
"text": "We present an augmented reality magic mirror for teaching anatomy. The system uses a depth camera to track the pose of a user standing in front of a large display. A volume visualization of a CT dataset is augmented onto the user, creating the illusion that the user can look into his body. Using gestures, different slices from the CT and a photographic dataset can be selected for visualization. In addition, the system can show 3D models of organs, text information and images about anatomy. For interaction with this data we present a new interaction metaphor that makes use of the depth camera. The visibility of hands and body is modified based on the distance to a virtual interaction plane. This helps the user to understand the spatial relations between his body and the virtual interaction plane.",
"title": ""
},
{
"docid": "dcf038090e8423d4919fd0260635c8c4",
"text": "Automatic extraction of liver and tumor from CT volumes is a challenging task due to their heterogeneous and diffusive shapes. Recently, 2D and 3D deep convolutional neural networks have become popular in medical image segmentation tasks because of the utilization of large labeled datasets to learn hierarchical features. However, 3D networks have some drawbacks due to their high cost on computational resources. In this paper, we propose a 3D hybrid residual attention-aware segmentation method, named RA-UNet, to precisely extract the liver volume of interests (VOI) and segment tumors from the liver VOI. The proposed network has a basic architecture as a 3D U-Net which extracts contextual information combining lowlevel feature maps with high-level ones. Attention modules are stacked so that the attention-aware features change adaptively as the network goes “very deep” and this is made possible by residual learning. This is the first work that an attention residual mechanism is used to process medical volumetric images. We evaluated our framework on the public MICCAI 2017 Liver Tumor Segmentation dataset and the 3DIRCADb dataset. The results show that our architecture outperforms other state-ofthe-art methods. We also extend our RA-UNet to brain tumor segmentation on the BraTS2018 and BraTS2017 datasets, and the results indicate that RA-UNet achieves good performance on a brain tumor segmentation task as well.",
"title": ""
},
{
"docid": "b52fb324287ec47860e189062f961ad8",
"text": "In this paper we reexamine the place and role of stable model semantics in logic programming and contrast it with a least Herbrand model approach to Horn programs. We demonstrate that inherent features of stable model semantics naturally lead to a logic programming system that offers an interesting alternative to more traditional logic programming styles of Horn logic programming, stratified logic programming and logic programming with well-founded semantics. The proposed approach is based on the interpretation of program clauses as constraints. In this setting programs do not describe a single intended model, but a family of stable models. These stable models encode solutions to the constraint satisfaction problem described by the program. Our approach imposes restrictions on the syntax of logic programs. In particular, function symbols are eliminated from the language. We argue that the resulting logic programming system is well-attuned to problems in the class NP, has a well-defined domain of applications, and an emerging methodology of programming. We point out that what makes the whole approach viable is recent progress in implementations of algorithms to compute stable models of propositional logic programs.",
"title": ""
},
{
"docid": "b5923306d14f598d90f69183032af9ee",
"text": "This paper introduces a base station antenna system as a future cellular technology. The base station antenna system is the key to achieving high-speed data transmission. It is particularly important to improve the frequency reuse factor as one of the roles of a base station. Furthermore, in order to solve the interference problem due to the same frequency being used by the macro cell and the small cell, the author focuses on beam and null control using an AAS (Active Antenna System) and elucidates their effects through area simulations and field tests. The results showed that AAS can improve the SINR (signal to interference-plusnoise ratio) of the small cell area inside macro cells. The paper shows that cell quality performance can be improved by incorporating the AAS into a cellular base station as its antenna system for beyond 4G radio access technology including the 5G cellular system. key words: active antenna system, null, cellular, base station antenna, small cell",
"title": ""
},
{
"docid": "2aa8fc5844bae48f2eaef834909591c0",
"text": "It is well established that a lack of social support constitutes a major risk factor for morbidity and mortality, comparable to risk factors such as smoking, obesity, and high blood pressure. Although it has been hypothesized that social support may benefit health by reducing physiological reactivity to stressors, the mechanisms underlying this process remain unclear. Moreover, to date, no studies have investigated the neurocognitive mechanisms that translate experiences of social support into the health outcomes that follow. To investigate these processes, thirty participants completed three tasks in which daily social support, neurocognitive reactivity to a social stressor, and neuroendocrine responses to a social stressor were assessed. Individuals who interacted regularly with supportive individuals across a 10-day period showed diminished cortisol reactivity to a social stressor. Moreover, greater social support and diminished cortisol responses were associated with diminished activity in the dorsal anterior cingulate cortex (dACC) and Brodmann's area (BA) 8, regions previously associated with the distress of social separation. Lastly, individual differences in dACC and BA 8 reactivity mediated the relationship between high daily social support and low cortisol reactivity, such that supported individuals showed reduced neurocognitive reactivity to social stressors, which in turn was associated with reduced neuroendocrine stress responses. This study is the first to investigate the neural underpinnings of the social support-health relationship and provides evidence that social support may ultimately benefit health by diminishing neural and physiological reactivity to social stressors.",
"title": ""
},
{
"docid": "44272dd2c30ada5b63cc6244c194c43f",
"text": "This paper proposes a method to achieve fast and fluid human-robot interaction by estimating the progress of the movement of the human. The method allows the progress, also referred to as the phase of the movement, to be estimated even when observations of the human are partial and occluded; a problem typically found when using motion capture systems in cluttered environments. By leveraging on the framework of Interaction Probabilistic Movement Primitives (ProMPs), phase estimation makes it possible to classify the human action, and to generate a corresponding robot trajectory before the human finishes his/her movement. The method is therefore suited for semiautonomous robots acting as assistants and coworkers. Since observations may be sparse, our method is based on computing the probability of different phase candidates to find the phase that best aligns the Interaction ProMP with the current observations. The method is fundamentally different from approaches based on Dynamic Time Warping (DTW) that must rely on a consistent stream of measurements at runtime. The phase estimation algorithm can be seamlessly integrated into Interaction ProMPs such that robot trajectory coordination, phase estimation, and action recognition can all be achieved in a single probabilistic framework. We evaluated the method using a 7-DoF lightweight robot arm equipped with a 5-finger hand in single and multi-task collaborative experiments. We compare the accuracy achieved by phase estimation with our previous method based on DTW.",
"title": ""
},
{
"docid": "e5b2857bfe745468453ef9dabbf5c527",
"text": "We assume that a high-dimensional datum, like an image, is a compositional expression of a set of properties, with a complicated non-linear relationship between the datum and its properties. This paper proposes a factorial mixture prior for capturing latent properties, thereby adding structured compositionality to deep generative models. The prior treats a latent vector as belonging to Cartesian product of subspaces, each of which is quantized separately with a Gaussian mixture model. Some mixture components can be set to represent properties as observed random variables whenever labeled properties are present. Through a combination of stochastic variational inference and gradient descent, a method for learning how to infer discrete properties in an unsupervised or semi-supervised way is outlined and empirically evaluated.",
"title": ""
}
] | scidocsrr |
eefe7afe1ccb4fd18d014b7c2be8d1e4 | Learning scrum by doing real-life projects | [
{
"docid": "8d8e7c9777f02c6a4a131f21a66ee870",
"text": "Teaching agile practices is becoming a priority in Software engineering curricula as a result of the increasing use of agile methods (AMs) such as Scrum in the software industry. Limitations in time, scope, and facilities within academic contexts hinder students’ hands-on experience in the use of professional AMs. To enhance students’ exposure to Scrum, we have developed Virtual Scrum, an educational virtual world that simulates a Scrum-based team room through virtual elements such as blackboards, a Web browser, document viewers, charts, and a calendar. A preliminary version of Virtual Scrum was tested with a group of 45 students running a capstone project with and without Virtual Scrum support. Students’ feedback showed that Virtual Scrum is a viable and effective tool to implement the different elements in a Scrum team room and to perform activities throughout the Scrum process. 2013 Wiley Periodicals, Inc. Comput Appl Eng Educ 23:147–156, 2015; View this article online at wileyonlinelibrary.com/journal/cae; DOI 10.1002/cae.21588",
"title": ""
}
] | [
{
"docid": "df125587d0529bafa1be721801a67f77",
"text": "This paper describes a self-aligned SiGe heterojunction bipolar transistor (HBT) based on a standard double-polysilicon architecture and nonselective epitaxial growth (i.e. DPSA-NSEG). Emitter-base self-alignment is realized by polysilicon reflow in a hydrogen ambient after emitter window patterning. The fabricated self-aligned SiGe HBTs, with emitter widths of 0.3-0.4 μm, exhibit 20% lower base resistance and 15% higher maximum oscillation frequency fmax than non-self-aligned reference devices. The minimum noise figure of a Ku-band low-noise amplifier is reduced from 0.9 to 0.8 dB by emitter-base self-alignment.",
"title": ""
},
{
"docid": "1f15775000a1837cfc168a91c4c1a2ae",
"text": "In the recent aging society, studies on health care services have been actively conducted to provide quality services to medical consumers in wire and wireless environments. However, there are some problems in these health care services due to the lack of personalized service and the uniformed way in services. For solving these issues, studies on customized services in medical markets have been processed. However, because a diet recommendation service is only focused on the personal disease information, it is difficult to provide specific customized services to users. This study provides a customized diet recommendation service for preventing and managing coronary heart disease in health care services. This service provides a customized diet to customers by considering the basic information, vital sign, family history of diseases, food preferences according to seasons and intakes for the customers who are concerning about the coronary heart disease. The users who receive this service can use a customized diet service differed from the conventional service and that supports continuous services and helps changes in customers living habits.",
"title": ""
},
{
"docid": "05fe74d25c84e46b8044faca8a350a2f",
"text": "BACKGROUND\nAn observational study was conducted in 12 European countries by the European Federation of Clinical Chemistry and Laboratory Medicine Working Group for the Preanalytical Phase (EFLM WG-PRE) to assess the level of compliance with the CLSI H3-A6 guidelines.\n\n\nMETHODS\nA structured checklist including 29 items was created to assess the compliance of European phlebotomy procedures with the CLSI H3-A6 guideline. A risk occurrence chart of individual phlebotomy steps was created from the observed error frequency and severity of harm of each guideline key issue. The severity of errors occurring during phlebotomy was graded using the risk occurrence chart.\n\n\nRESULTS\nTwelve European countries participated with a median of 33 (18-36) audits per country, and a total of 336 audits. The median error rate for the total phlebotomy procedure was 26.9 % (10.6-43.8), indicating a low overall compliance with the recommended CLSI guideline. Patient identification and test tube labelling were identified as the key guideline issues with the highest combination of probability and potential risk of harm. Administrative staff did not adhere to patient identification procedures during phlebotomy, whereas physicians did not adhere to test tube labelling policy.\n\n\nCONCLUSIONS\nThe level of compliance of phlebotomy procedures with the CLSI H3-A6 guidelines in 12 European countries was found to be unacceptably low. The most critical steps in need of immediate attention in the investigated countries are patient identification and tube labelling.",
"title": ""
},
{
"docid": "17c8766c5fcc9b6e0d228719291dcea5",
"text": "In this study we examined the social behaviors of 4- to 12-year-old children with autism spectrum disorders (ASD; N = 24) during three tradic interactions with an adult confederate and an interaction partner, where the interaction partner varied randomly among (1) another adult human, (2) a touchscreen computer game, and (3) a social dinosaur robot. Children spoke more in general, and directed more speech to the adult confederate, when the interaction partner was a robot, as compared to a human or computer game interaction partner. Children spoke as much to the robot as to the adult interaction partner. This study provides the largest demonstration of social human-robot interaction in children with autism to date. Our findings suggest that social robots may be developed into useful tools for social skills and communication therapies, specifically by embedding social interaction into intrinsic reinforcers and motivators.",
"title": ""
},
{
"docid": "86d4296be61308ec93920d2d84f0694f",
"text": "by Jian Xu Our world produces massive data every day; they exist in diverse forms, from pairwise data and matrix to time series and trajectories. Meanwhile, we have access to the versatile toolkit of network analysis. Networks also have different forms; from simple networks to higher-order network, each representation has different capabilities in carrying information. For researchers who want to leverage the power of the network toolkit, and apply it beyond networks data to sequential data, diffusion data, and many more, the question is: how to represent big data and networks? This dissertation makes a first step to answering the question. It proposes the higherorder network, which is a critical piece for representing higher-order interaction data; it introduces a scalable algorithm for building the network, and visualization tools for interactive exploration. Finally, it presents broad applications of the higher-order network in the real-world. Dedicated to those who strive to be better persons.",
"title": ""
},
{
"docid": "682921e4e2f000384fdcb9dc6fbaa61a",
"text": "The use of Cloud Computing for computation offloading in the robotics area has become a field of interest today. The aim of this work is to demonstrate the viability of cloud offloading in a low level and intensive computing task: a vision-based navigation assistance of a service mobile robot. In order to do so, a prototype, running over a ROS-based mobile robot (Erratic by Videre Design LLC) is presented. The information extracted from on-board stereo cameras will be used by a private cloud platform consisting of five bare-metal nodes with AMD Phenom 965 × 4 CPU, with the cloud middleware Openstack Havana. The actual task is the shared control of the robot teleoperation, that is, the smooth filtering of the teleoperated commands with the detected obstacles to prevent collisions. All the possible offloading models for this case are presented and analyzed. Several performance results using different communication technologies and offloading models are explained as well. In addition to this, a real navigation case in a domestic circuit was done. The tests demonstrate that offloading computation to the Cloud improves the performance and navigation results with respect to the case where all processing is done by the robot.",
"title": ""
},
{
"docid": "9a05c95de1484df50a5540b31df1a010",
"text": "Resumen. Este trabajo trata sobre un sistema de monitoreo remoto a través de una pantalla inteligente para sensores de temperatura y corriente utilizando una red híbrida CAN−ZIGBEE. El CAN bus es usado como medio de transmisión de datos a corta distancia mientras que Zigbee es empleado para que cada nodo de la red pueda interactuar de manera inalámbrica con el nodo principal. De esta manera la red híbrida combina las ventajas de cada protocolo de comunicación para intercambiar datos. El sistema cuenta con cuatro nodos, dos son CAN y reciben la información de los sensores y el resto son Zigbee. Estos nodos están a cargo de transmitir la información de un nodo CAN de manera inalámbrica y desplegarla en una pantalla inteligente.",
"title": ""
},
{
"docid": "5086a13a84d3de2d5c340c5808e03e53",
"text": "The unstructured scenario, the extraction of significant features, the imprecision of sensors along with the impossibility of using GPS signals are some of the challenges encountered in underwater environments. Given this adverse context, the Simultaneous Localization and Mapping techniques (SLAM) attempt to localize the robot in an efficient way in an unknown underwater environment while, at the same time, generate a representative model of the environment. In this paper, we focus on key topics related to SLAM applications in underwater environments. Moreover, a review of major studies in the literature and proposed solutions for addressing the problem are presented. Given the limitations of probabilistic approaches, a new alternative based on a bio-inspired model is highlighted.",
"title": ""
},
{
"docid": "d7cb103c0dd2e7c8395438950f83da3f",
"text": "We address the effects of packaging on performance, reliability and cost of photonic devices. For silicon photonics we address some specific packaging aspects. Finally we propose an approach for integration of photonics and ASICs.",
"title": ""
},
{
"docid": "fe3775919e0a88dcabdc98bd8c34e6b8",
"text": "In this work, we study the 1-bit convolutional neural networks (CNNs), of which both the weights and activations are binary. While being efficient, the classification accuracy of the current 1-bit CNNs is much worse compared to their counterpart real-valued CNN models on the large-scale dataset, like ImageNet. To minimize the performance gap between the 1-bit and real-valued CNN models, we propose a novel model, dubbed Bi-Real net, which connects the real activations (after the 1-bit convolution and/or BatchNorm layer, before the sign function) to activations of the consecutive block, through an identity shortcut. Consequently, compared to the standard 1-bit CNN, the representational capability of the Bi-Real net is significantly enhanced and the additional cost on computation is negligible. Moreover, we develop a specific training algorithm including three technical novelties for 1bit CNNs. Firstly, we derive a tight approximation to the derivative of the non-differentiable sign function with respect to activation. Secondly, we propose a magnitude-aware gradient with respect to the weight for updating the weight parameters. Thirdly, we pre-train the real-valued CNN model with a clip function, rather than the ReLU function, to better initialize the Bi-Real net. Experiments on ImageNet show that the Bi-Real net with the proposed training algorithm achieves 56.4% and 62.2% top-1 accuracy with 18 layers and 34 layers, respectively. Compared to the state-of-the-arts (e.g., XNOR Net), Bi-Real net achieves up to 10% higher top-1 accuracy with more memory saving and lower computational cost. 4",
"title": ""
},
{
"docid": "5635f52c3e02fd9e9ea54c9ea1ff0329",
"text": "As a digital version of word-of-mouth, online review has become a major information source for consumers and has very important implications for a wide range of management activities. While some researchers focus their studies on the impact of online product review on sales, an important assumption remains unexamined, that is, can online product review reveal the true quality of the product? To test the validity of this key assumption, this paper first empirically tests the underlying distribution of online reviews with data from Amazon. The results show that 53% of the products have a bimodal and non-normal distribution. For these products, the average score does not necessarily reveal the product's true quality and may provide misleading recommendations. Then this paper derives an analytical model to explain when the mean can serve as a valid representation of a product's true quality, and discusses its implication on marketing practices.",
"title": ""
},
{
"docid": "e4c2fcc09b86dc9509a8763e7293cfe9",
"text": "This paperinvestigatesthe useof particle (sub-word) -grams for languagemodelling. One linguistics-basedand two datadriven algorithmsare presentedand evaluatedin termsof perplexity for RussianandEnglish. Interpolatingword trigramand particle6-grammodelsgivesup to a 7.5%perplexity reduction over thebaselinewordtrigrammodelfor Russian.Latticerescor ing experimentsarealsoperformedon1997DARPA Hub4evaluationlatticeswheretheinterpolatedmodelgivesa 0.4%absolute reductionin worderrorrateoverthebaselinewordtrigrammodel.",
"title": ""
},
{
"docid": "fe2ef685733bae2737faa04e8a10087d",
"text": "Federal health agencies are currently developing regulatory strategies for Artificial Intelligence based medical products. Regulatory regimes need to account for the new risks and benefits that come with modern AI, along with safety concerns and potential for continual autonomous learning that makes AI non-static and dramatically different than the drugs and products that agencies are used to regulating. Currently, the U.S. Food and Drug Administration (FDA) and other regulatory agencies treat AI-enabled products as medical devices. Alternatively, we propose that AI regulation in the medical domain can analogously adopt aspects of the models used to regulate medical providers.",
"title": ""
},
{
"docid": "c17e6363762e0e9683b51c0704d43fa7",
"text": "Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.",
"title": ""
},
{
"docid": "845190bc7aa800405358d9a7c5b38504",
"text": "We describe a sparse Bayesian regression method for recovering 3D human body motion directly from silhouettes extracted from monocular video sequences. No detailed body shape model is needed, and realism is ensured by training on real human motion capture data. The tracker estimates 3D body pose by using Relevance Vector Machine regression to combine a learned autoregressive dynamical model with robust shape descriptors extracted automatically from image silhouettes. We studied several different combination methods, the most effective being to learn a nonlinear observation-update correction based on joint regression with respect to the predicted state and the observations. We demonstrate the method on a 54-parameter full body pose model, both quantitatively using motion capture based test sequences, and qualitatively on a test video sequence.",
"title": ""
},
{
"docid": "8a2586b1059534c5a23bac9c1cc59906",
"text": "The web contains a wealth of product reviews, but sifting through them is a daunting task. Ideally, an opinion mining tool would process a set of search results for a given item, generating a list of product attributes (quality, features, etc.) and aggregating opinions about each of them (poor, mixed, good). We begin by identifying the unique properties of this problem and develop a method for automatically distinguishing between positive and negative reviews. Our classifier draws on information retrieval techniques for feature extraction and scoring, and the results for various metrics and heuristics vary depending on the testing situation. The best methods work as well as or better than traditional machine learning. When operating on individual sentences collected from web searches, performance is limited due to noise and ambiguity. But in the context of a complete web-based tool and aided by a simple method for grouping sentences into attributes, the results are qualitatively quite useful.",
"title": ""
},
{
"docid": "186d9fc899fdd92c7e74615a2a054a03",
"text": "In this paper, we propose an illumination-robust face recognition system via local directional pattern images. Usually, local pattern descriptors including local binary pattern and local directional pattern have been used in the field of the face recognition and facial expression recognition, since local pattern descriptors have important properties to be robust against the illumination changes and computational simplicity. Thus, this paper represents the face recognition approach that employs the local directional pattern descriptor and twodimensional principal analysis algorithms to achieve enhanced recognition accuracy. In particular, we propose a novel methodology that utilizes the transformed image obtained from local directional pattern descriptor as the direct input image of two-dimensional principal analysis algorithms, unlike that most of previous works employed the local pattern descriptors to acquire the histogram features. The performance evaluation of proposed system was performed using well-known approaches such as principal component analysis and Gabor-wavelets based on local binary pattern, and publicly available databases including the Yale B database and the CMU-PIE database were employed. Through experimental results, the proposed system showed the best recognition accuracy compared to different approaches, and we confirmed the effectiveness of the proposed method under varying lighting conditions.",
"title": ""
},
{
"docid": "64ac8a4b315656bfb6a5e73f3072347f",
"text": "Understanding the flow characteristic in fishways is crucial for efficient fish migration. Flow characteristic measurements can generally provide quantitative information of velocity distributions in such passages; Particle Image Velocimetry (PIV) has become one of the most versatile techniques to disclose flow fields in general and in fishways, in particular. This paper firstly gives an overview of fish migration along with fish ladders and then the application of PIV measurements on the fish migration process. The overview shows that the quantitative and detailed turbulent flow information in fish ladders obtained by PIV is critical for analyzing turbulent properties and validating numerical results.",
"title": ""
},
{
"docid": "fff6fe0a87a750e83745428b630149d2",
"text": "From 1960 through 1987, 89 patients with stage I (44 patients) or II (45 patients) vaginal carcinoma (excluding melanomas) were treated primarily at the Mayo Clinic. Treatment consisted of surgery alone in 52 patients, surgery plus radiation in 14, and radiation alone in 23. The median duration of follow-up was 4.4 years. The 5-year survival (Kaplan-Meier method) was 82% for patients with stage I disease and 53% for those with stage II disease (p = 0.009). Analysis of survival according to treatment did not show statistically significant differences. This report is consistent with previous studies showing that stage is an important prognostic factor and that treatment can be individualized, including surgical treatment for primary early-stage vaginal cancer.",
"title": ""
},
{
"docid": "dbafea1fbab901ff5a53f752f3bfb4b8",
"text": "Three studies were conducted to test the hypothesis that high trait aggressive individuals are more affected by violent media than are low trait aggressive individuals. In Study 1, participants read film descriptions and then chose a film to watch. High trait aggressive individuals were more likely to choose a violent film to watch than were low trait aggressive individuals. In Study 2, participants reported their mood before and after the showing of a violet or nonviolent videotape. High trait aggressive individuals felt more angry after viewing the violent videotape than did low trait aggressive individuals. In Study 3, participants first viewed either a violent or a nonviolent videotape and then competed with an \"opponent\" on a reaction time task in which the loser received a blast of unpleasant noise. Videotape violence was more likely to increase aggression in high trait aggressive individuals than in low trait aggressive individuals.",
"title": ""
}
] | scidocsrr |
047e00e7538272aee2095920e129dbe8 | Random Walks for Text Semantic Similarity | [
{
"docid": "a12769e78530516b382fbc18fe4ec052",
"text": "Roget’s Thesaurus has not been sufficiently appreciated in Natural Language Processing. We show that Roget's and WordNet are birds of a feather. In a few typical tests, we compare how the two resources help measure semantic similarity. One of the benchmarks is Miller and Charles’ list of 30 noun pairs to which human judges had assigned similarity measures. We correlate these measures with those computed by several NLP systems. The 30 pairs can be traced back to Rubenstein and Goodenough’s 65 pairs, which we have also studied. Our Roget’sbased system gets correlations of .878 for the smaller and .818 for the larger list of noun pairs; this is quite close to the .885 that Resnik obtained when he employed humans to replicate the Miller and Charles experiment. We further evaluate our measure by using Roget’s and WordNet to answer 80 TOEFL, 50 ESL and 300 Reader’s Digest questions: the correct synonym must be selected amongst a group of four words. Our system gets 78.75%, 82.00% and 74.33% of the questions respectively, better than any published results.",
"title": ""
},
{
"docid": "d8056ee6b9d1eed4bc25e302c737780c",
"text": "This survey reviews the research related to PageRank computing. Components of a PageRank vector serve as authority weights for Web pages independent of their textual content, solely based on the hyperlink structure of the Web. PageRank is typically used as a Web Search ranking component. This defines the importance of the model and the data structures that underly PageRank processing. Computing even a single PageRank is a difficult computational task. Computing many PageRanks is a much more complex challenge. Recently, significant effort has been invested in building sets of personalized PageRank vectors. PageRank is also used in many diverse applications other than ranking. Below we are interested in the theoretical foundations of the PageRank formulation, in accelerating of PageRank computing, in the effects of particular aspects of Web graph structure on optimal organization of computations, and in PageRank stability. We also review alternative models that lead to authority indices similar to PageRank and the role of such indices in applications other than Web Search. We also discuss link-based search personalization and outline some aspects of PageRank infrastructure from associated measures of convergence to link preprocessing. Content",
"title": ""
}
] | [
{
"docid": "4d08bbbe59654c1e1140faebcc33701e",
"text": "Muenke Syndrome (FGFR3-Related Craniosynostosis): Expansion of the Phenotype and Review of the Literature Emily S. Doherty, Felicitas Lacbawan, Donald W. Hadley, Carmen Brewer, Christopher Zalewski, H. Jeff Kim, Beth Solomon, Kenneth Rosenbaum, Demetrio L. Domingo, Thomas C. Hart, Brian P. Brooks, LaDonna Immken, R. Brian Lowry, Virginia Kimonis, Alan L. Shanske, Fernanda Sarquis Jehee, Maria Rita Passos Bueno, Carol Knightly, Donna McDonald-McGinn, Elaine H. Zackai, and Maximilian Muenke* National Human Genome Research Institute, National Institutes of Health, Bethesda, Maryland National Institute on Deafness and Other Communication Disorders, National Institutes of Health, Bethesda, Maryland Warren Grant Magnuson Clinical Center, National Institutes of Health, Bethesda, Maryland Children’s National Medical Center, Washington, District of Columbia National Institute of Dental and Craniofacial Research, National Institutes of Health, Bethesda, Maryland National Eye Institute, National Institutes of Health, Bethesda, Maryland Specially for Children, Austin, Texas Department of Medical Genetics, Alberta Children’s Hospital and University of Calgary, Calgary, Alberta, Canada Children’s Hospital Boston, Boston, Massachusetts Children’s Hospital Montefiore, Bronx, New York University of São Paulo, São Paulo, Brazil The Children’s Hospital of Philadelphia, Philadelphia, Pennsylvania Carilion Clinic, Roanoke, Virginia",
"title": ""
},
{
"docid": "2c2942905010e71cda5f8b0f41cf2dd0",
"text": "1 Focus and anaphoric destressing Consider a pronunciation of (1) with prominence on the capitalized noun phrases. In terms of a relational notion of prominence, the subject NP she] is prominent within the clause S she beats me], and NP Sue] is prominent within the clause S Sue beats me]. This prosody seems to have the pragmatic function of putting the two clauses into opposition, with prominences indicating where they diier, and prosodic reduction of the remaining parts indicating where the clauses are invariant. (1) She beats me more often than Sue beats me Car84], Roc86] and Roo92] propose theories of focus interpretation which formalize the idea just outlined. Under my assumptions, the prominences are the correlates of a syntactic focus features on the two prominent NPs, written as F subscripts. Further, the grammatical representation of (1) includes operators which interpret the focus features at the level of the minimal dominating S nodes. In the logical form below, each focus feature is interpreted by an operator written .",
"title": ""
},
{
"docid": "6bbff9d65a0e80fcbf0a6f840266accf",
"text": "This paper presents a complete methodology for the design of AC permanent magnet motors for electric vehicle traction. Electromagnetic, thermal and mechanical performance aspects are considered and modern CAD tools are utilised throughout the methodology. A 36 slot 10 pole interior permanent magnet design example is used throughout the analysis.",
"title": ""
},
{
"docid": "b6cd09d268aa8e140bef9fc7890538c3",
"text": "XML is quickly becoming the de facto standard for data exchange over the Internet. This is creating a new set of data management requirements involving XML, such as the need to store and query XML documents. Researchers have proposed using relational database systems to satisfy these requirements by devising ways to \"shred\" XML documents into relations, and translate XML queries into SQL queries over these relations. However, a key issue with such an approach, which has largely been ignored in the research literature, is how (and whether) the ordered XML data model can be efficiently supported by the unordered relational data model. This paper shows that XML's ordered data model can indeed be efficiently supported by a relational database system. This is accomplished by encoding order as a data value. We propose three order encoding methods that can be used to represent XML order in the relational data model, and also propose algorithms for translating ordered XPath expressions into SQL using these encoding methods. Finally, we report the results of an experimental study that investigates the performance of the proposed order encoding methods on a workload of ordered XML queries and updates.",
"title": ""
},
{
"docid": "888de1004e212e1271758ac35ff9807d",
"text": "We present the design and implementation of iVoLVER, a tool that allows users to create visualizations without textual programming. iVoLVER is designed to enable flexible acquisition of many types of data (text, colors, shapes, quantities, dates) from multiple source types (bitmap charts, webpages, photographs, SVGs, CSV files) and, within the same canvas, supports transformation of that data through simple widgets to construct interactive animated visuals. Aside from the tool, which is web-based and designed for pen and touch, we contribute the design of the interactive visual language and widgets for extraction, transformation, and representation of data. We demonstrate the flexibility and expressive power of the tool through a set of scenarios, and discuss some of the challenges encountered and how the tool fits within the current infovis tool landscape.",
"title": ""
},
{
"docid": "fae60b86d98a809f876117526106719d",
"text": "Big Data security analysis is commonly used for the analysis of large volume security data from an organisational perspective, requiring powerful IT infrastructure and expensive data analysis tools. Therefore, it can be considered to be inaccessible to the vast majority of desktop users and is difficult to apply to their rapidly growing data sets for security analysis. A number of commercial companies offer a desktop-oriented big data security analysis solution; however, most of them are prohibitive to ordinary desktop users with respect to cost and IT processing power. This paper presents an intuitive and inexpensive big data security analysis approach using Computational Intelligence (CI) techniques for Windows desktop users, where the combination of Windows batch programming, EmEditor and R are used for the security analysis. The simulation is performed on a real dataset with more than 10 million observations, which are collected from Windows Firewall logs to demonstrate how a desktop user can gain insight into their abundant and untouched data and extract useful information to prevent their system from current and future security threats. This CI-based big data security analysis approach can also be extended to other types of security logs such as event logs, application logs and web logs.",
"title": ""
},
{
"docid": "62686423e15ef0cac3a3bbe8f33e3367",
"text": "Most of the existing deep learning-based methods for 3D hand and human pose estimation from a single depth map are based on a common framework that takes a 2D depth map and directly regresses the 3D coordinates of keypoints, such as hand or human body joints, via 2D convolutional neural networks (CNNs). The first weakness of this approach is the presence of perspective distortion in the 2D depth map. While the depth map is intrinsically 3D data, many previous methods treat depth maps as 2D images that can distort the shape of the actual object through projection from 3D to 2D space. This compels the network to perform perspective distortion-invariant estimation. The second weakness of the conventional approach is that directly regressing 3D coordinates from a 2D image is a highly nonlinear mapping, which causes difficulty in the learning procedure. To overcome these weaknesses, we firstly cast the 3D hand and human pose estimation problem from a single depth map into a voxel-to-voxel prediction that uses a 3D voxelized grid and estimates the per-voxel likelihood for each keypoint. We design our model as a 3D CNN that provides accurate estimates while running in real-time. Our system outperforms previous methods in almost all publicly available 3D hand and human pose estimation datasets and placed first in the HANDS 2017 frame-based 3D hand pose estimation challenge. The code is available in1.",
"title": ""
},
{
"docid": "2f54746f666befe19af1391f1d90aca8",
"text": "The Internet of Things has drawn lots of research attention as the growing number of devices connected to the Internet. Long Term Evolution-Advanced (LTE-A) is a promising technology for wireless communication and it's also promising for IoT. The main challenge of incorporating IoT devices into LTE-A is a large number of IoT devices attempting to access the network in a short period which will greatly reduce the network performance. In order to improve the network utilization, we adopted a hierarchy architecture using a gateway for connecting the devices to the eNB and proposed a multiclass resource allocation algorithm for LTE based IoT communication. Simulation results show that the proposed algorithm can provide good performance both on data rate and latency for different QoS applications both in saturated and unsaturated environment.",
"title": ""
},
{
"docid": "dc94e340ceb76a0c9fda47bac4be9920",
"text": "Mobile health (mHealth) apps are an ideal tool for monitoring and tracking long-term health conditions; they are becoming incredibly popular despite posing risks to personal data privacy and security. In this paper, we propose a testing method for Android mHealth apps which is designed using a threat analysis, considering possible attack scenarios and vulnerabilities specific to the domain. To demonstrate the method, we have applied it to apps for managing hypertension and diabetes, discovering a number of serious vulnerabilities in the most popular applications. Here we summarise the results of that case study, and discuss the experience of using a testing method dedicated to the domain, rather than out-of-the-box Android security testing methods. We hope that details presented here will help design further, more automated, mHealth security testing tools and methods.",
"title": ""
},
{
"docid": "a83931702879dc41a3d7007ac4c32716",
"text": "We propose a query-based generative model for solving both tasks of question generation (QG) and question answering (QA). The model follows the classic encoderdecoder framework. The encoder takes a passage and a query as input then performs query understanding by matching the query with the passage from multiple perspectives. The decoder is an attention-based Long Short Term Memory (LSTM) model with copy and coverage mechanisms. In the QG task, a question is generated from the system given the passage and the target answer, whereas in the QA task, the answer is generated given the question and the passage. During the training stage, we leverage a policy-gradient reinforcement learning algorithm to overcome exposure bias, a major problem resulted from sequence learning with cross-entropy loss. For the QG task, our experiments show higher performances than the state-of-the-art results. When used as additional training data, the automatically generated questions even improve the performance of a strong extractive QA system. In addition, our model shows better performance than the state-of-the-art baselines of the generative QA task.",
"title": ""
},
{
"docid": "d75d453181293c92ec9bab800029e366",
"text": "For a majority of applications implemented today, the Intermediate Bus Architecture (IBA) has been the preferred power architecture. This power architecture has led to the development of the isolated, semi-regulated DC/DC converter known as the Intermediate Bus Converter (IBC). Fixed ratio Bus Converters that employ a new power topology known as the Sine Amplitude Converter (SAC) offer dramatic improvements in power density, noise reduction, and efficiency over the existing IBC products. As electronic systems continue to trend toward lower voltages with higher currents and as the speed of contemporary loads - such as state-of-the-art processors and memory - continues to increase, the power systems designer is challenged to provide small, cost effective and efficient solutions that offer the requisite performance. Traditional power architectures cannot, in the long run, provide the required performance. Vicor's Factorized Power Architecture (FPA), and the implementation of V·I Chips, provides a revolutionary new and optimal power conversion solution that addresses the challenge in every respect. The technology behind these power conversion engines used in the IBC and V·I Chips is analyzed and contextualized in a system perspective.",
"title": ""
},
{
"docid": "eade87f676c023cd3024226b48131ffb",
"text": "Finding the dense regions of a graph and relations among them is a fundamental task in network analysis. Nucleus decomposition is a principled framework of algorithms that generalizes the k-core and k-truss decompositions. It can leverage the higher-order structures to locate the dense subgraphs with hierarchical relations. Computation of the nucleus decomposition is performed in multiple steps, known as the peeling process, and it requires global information about the graph at any time. This prevents the scalable parallelization of the computation. Also, it is not possible to compute approximate and fast results by the peeling process, because it does not produce the densest regions until the algorithm is complete. In a previous work, Lu et al. proposed to iteratively compute the h-indices of vertex degrees to obtain the core numbers and prove that the convergence is obtained after a finite number of iterations. In this work, we generalize the iterative h-index computation for any nucleus decomposition and prove convergence bounds. We present a framework of local algorithms to obtain the exact and approximate nucleus decompositions. Our algorithms are pleasingly parallel and can provide approximations to explore time and quality trade-offs. Our shared-memory implementation verifies the efficiency, scalability, and effectiveness of our algorithms on real-world networks. In particular, using 24 threads, we obtain up to 4.04x and 7.98x speedups for k-truss and (3, 4) nucleus decompositions.",
"title": ""
},
{
"docid": "0344917c6b44b85946313957a329bc9c",
"text": "Recently, Haas and Hellerstein proposed the hash ripple join algorithm in the context of online aggregation. Although the algorithm rapidly gives a good estimate for many join-aggregate problem instances, the convergence can be slow if the number of tuples that satisfy the join predicate is small or if there are many groups in the output. Furthermore, if memory overflows (for example, because the user allows the algorithm to run to completion for an exact answer), the algorithm degenerates to block ripple join and performance suffers. In this paper, we build on the work of Haas and Hellerstein and propose a new algorithm that (a) combines parallelism with sampling to speed convergence, and (b) maintains good performance in the presence of memory overflow. Results from a prototype implementation in a parallel DBMS show that its rate of convergence scales with the number of processors, and that when allowed to run to completion, even in the presence of memory overflow, it is competitive with the traditional parallel hybrid hash join algorithm.",
"title": ""
},
{
"docid": "7965e8074a84c64c971e22995caaab6b",
"text": "Mechanical details as well as electrical models of FDR (frequency domain reflectometry) sensors for the measurement of the complex dielectric permittivity of porous materials are presented. The sensors are formed from two stainless steel parallel waveguides of various lengths. Using the data from VNA (vector network analyzer) with the connected FDR sensor and selected models of the applied sensor it was possible obtain the frequency spectrum of dielectric permittivity from 10 to 500 MHz of reference liquids and soil samples of various moisture and salinity. The performance of the analyzed sensors were compared with TDR (time domain reflectometry) ones of similar mechanical construction.",
"title": ""
},
{
"docid": "5fbb54e63158066198cdf59e1a8e9194",
"text": "In this paper, we present results of a study of the data rate fairness among nodes within a LoRaWAN cell. Since LoRa/LoRaWAN supports various data rates, we firstly derive the fairest ratios of deploying each data rate within a cell for a fair collision probability. LoRa/LoRaWan, like other frequency modulation based radio interfaces, exhibits the capture effect in which only the stronger signal of colliding signals will be extracted. This leads to unfairness, where far nodes or nodes experiencing higher attenuation are less likely to see their packets received correctly. Therefore, we secondly develop a transmission power control algorithm to balance the received signal powers from all nodes regardless of their distances from the gateway for a fair data extraction. Simulations show that our approach achieves higher fairness in data rate than the state-of-art in almost all network configurations.",
"title": ""
},
{
"docid": "5b984d57ad0940838b703eadd7c733b3",
"text": "Neural sequence generation is commonly approached by using maximumlikelihood (ML) estimation or reinforcement learning (RL). However, it is known that they have their own shortcomings; ML presents training/testing discrepancy, whereas RL suffers from sample inefficiency. We point out that it is difficult to resolve all of the shortcomings simultaneously because of a tradeoff between ML and RL. In order to counteract these problems, we propose an objective function for sequence generation using α-divergence, which leads to an ML-RL integrated method that exploits better parts of ML and RL. We demonstrate that the proposed objective function generalizes ML and RL objective functions because it includes both as its special cases (ML corresponds to α→ 0 and RL to α→ 1). We provide a proposition stating that the difference between the RL objective function and the proposed one monotonically decreases with increasing α. Experimental results on machine translation tasks show that minimizing the proposed objective function achieves better sequence generation performance than ML-based methods.",
"title": ""
},
{
"docid": "549d486d6ff362bc016c6ce449e29dc9",
"text": "Aging is very often associated with magnesium (Mg) deficit. Total plasma magnesium concentrations are remarkably constant in healthy subjects throughout life, while total body Mg and Mg in the intracellular compartment tend to decrease with age. Dietary Mg deficiencies are common in the elderly population. Other frequent causes of Mg deficits in the elderly include reduced Mg intestinal absorption, reduced Mg bone stores, and excess urinary loss. Secondary Mg deficit in aging may result from different conditions and diseases often observed in the elderly (i.e. insulin resistance and/or type 2 diabetes mellitus) and drugs (i.e. use of hypermagnesuric diuretics). Chronic Mg deficits have been linked to an increased risk of numerous preclinical and clinical outcomes, mostly observed in the elderly population, including hypertension, stroke, atherosclerosis, ischemic heart disease, cardiac arrhythmias, glucose intolerance, insulin resistance, type 2 diabetes mellitus, endothelial dysfunction, vascular remodeling, alterations in lipid metabolism, platelet aggregation/thrombosis, inflammation, oxidative stress, cardiovascular mortality, asthma, chronic fatigue, as well as depression and other neuropsychiatric disorders. Both aging and Mg deficiency have been associated to excessive production of oxygen-derived free radicals and low-grade inflammation. Chronic inflammation and oxidative stress are also present in several age-related diseases, such as many vascular and metabolic conditions, as well as frailty, muscle loss and sarcopenia, and altered immune responses, among others. Mg deficit associated to aging may be at least one of the pathophysiological links that may help to explain the interactions between inflammation and oxidative stress with the aging process and many age-related diseases.",
"title": ""
},
{
"docid": "7a8a98b91680cbc63594cd898c3052c8",
"text": "Policy-based access control is a technology that achieves separation of concerns through evaluating an externalized policy at each access attempt. While this approach has been well-established for request-response applications, it is not supported for database queries of data-driven applications, especially for attribute-based policies. In particular, search operations for such applications involve poor scalability with regard to the data set size for this approach, because they are influenced by dynamic runtime conditions. This paper proposes a scalable application-level middleware solution that performs runtime injection of the appropriate rules into the original search query, so that the result set of the search includes only items to which the subject is entitled. Our evaluation shows that our method scales far better than current state of practice approach that supports policy-based access control.",
"title": ""
},
{
"docid": "93e5ed1d67fe3d20c7b0177539e509c4",
"text": "Business models that rely on social media and user-generated content have shifted from the more traditional business model, where value for the organization is derived from the one-way delivery of products and/or services, to the provision of intangible value based on user engagement. This research builds a model that hypothesizes that the user experiences from social interactions among users, operationalized as personalization, transparency, access to social resources, critical mass of social acquaintances, and risk, as well as with the technical features of the social media platform, operationalized as the completeness, flexibility, integration, and evolvability, influence user engagement and subsequent usage behavior. Using survey responses from 408 social media users, findings suggest that both social and technical factors impact user engagement and ultimately usage with additional direct impacts on usage by perceptions of the critical mass of social acquaintances and risk. KEywORdS Social Interactions, Social Media, Social Networking, Technical Features, Use, User Engagement, User Experience",
"title": ""
}
] | scidocsrr |
edead75f0fb381d0cd84f0b640fcfa07 | A Variational Autoencoding Approach for Inducing Cross-lingual Word Embeddings | [
{
"docid": "9aa18b930fd24da1ba056cc94b64ecf4",
"text": "Recent work in learning bilingual representations tend to tailor towards achieving good performance on bilingual tasks, most often the crosslingual document classification (CLDC) evaluation, but to the detriment of preserving clustering structures of word representations monolingually. In this work, we propose a joint model to learn word representations from scratch that utilizes both the context coocurrence information through the monolingual component and the meaning equivalent signals from the bilingual constraint. Specifically, we extend the recently popular skipgram model to learn high quality bilingual representations efficiently. Our learned embeddings achieve a new state-of-the-art accuracy of 80.3 for the German to English CLDC task and a highly competitive performance of 90.7 for the other classification direction. At the same time, our models outperform best embeddings from past bilingual representation work by a large margin in the monolingual word similarity evaluation.1",
"title": ""
},
{
"docid": "4b983214cbc0bf42ee8d04ebf8a31fa8",
"text": "We introduce BilBOWA (“Bilingual Bag-of-Words without Alignments”), a simple and computationally-efficient model for learning bilingual distributed representations of words which can scale to large datasets and does not require wordaligned training data. Instead it trains directly on monolingual data and extracts a bilingual signal from a smaller set of raw text sentence-aligned data. This is achieved using a novel sampled bag-of-words cross-lingual objective, which is used to regularize two noise-contrastive language models for efficient crosslingual feature learning. We show that bilingual embeddings learned using the proposed model outperforms state-of-the-art methods on a cross-lingual document classification task as well as a lexical translation task on the WMT11 data. Our code will be made available as part of the open-source word2vec toolkit.",
"title": ""
}
] | [
{
"docid": "dbbe37de5f3a36ced26f32f3f25780a4",
"text": "The paper presents a short overview of the state of the art for grid tied PV inverters at low and medium power level (1..100 kW), mainly intended for rooftop applications. The inverters are categorized according to the configuration of the PV system, the configuration of the conversion stages within the inverter and whether they use transformers or not [1], [3]. After the introduction of the state of the art of inverters for PV systems with and without transformers, the paper focuses on some known problems and challenges for transformerless inverters. Topologies without transformers have big advantages like low weight, volume and cost. In addition they often reach higher efficiencies than topologies with transformers. Therefore they are important for future developments.",
"title": ""
},
{
"docid": "77946858c15b525f5b48499dea2fa1c4",
"text": "Porphyrias are a group of metabolic disorders in which there are defects in the normal pathway for the biosynthesis of heme, the critical prosthetic group for numerous hemoproteins. The clinical manifestations of the porphyrias can be highly varied, and patients may present to general physicians and be referred to a wide variety of subspecialists because of these manifestations. However, two major clinical forms are represented by the so-called \"acute\" porphyrias, in which patients suffer recurrent bouts of pain, especially pain in the abdomen, and the \"cutaneous\" porphyrias, in which patients have painful skin lesions. Knowledge of the factors chiefly responsible for regulating the rate of synthesis of heme has helped to explain how drugs and other factors may cause porphyria. Knowledge of the physical and chemical properties of porphyrins also forms an important part of the foundation for understanding the clinical manifestations of these diseases. Thus, the porphyrias can best be understood after reviewing the chemical properties of porphyrins and heme and the control of their biosynthesis.",
"title": ""
},
{
"docid": "f0285873e91d0470e8fbd8ce4430742f",
"text": "Copying an element from a photo and pasting it into a painting is a challenging task. Applying photo compositing techniques in this context yields subpar results that look like a collage — and existing painterly stylization algorithms, which are global, perform poorly when applied locally. We address these issues with a dedicated algorithm that carefully determines the local statistics to be transferred. We ensure both spatial and inter-scale statistical consistency and demonstrate that both aspects are key to generating quality results. To cope with the diversity of abstraction levels and types of paintings, we introduce a technique to adjust the parameters of the transfer depending on the painting. We show that our algorithm produces significantly better results than photo compositing or global stylization techniques and that it enables creative painterly edits that would be otherwise difficult to achieve. CCS Concepts •Computing methodologies → Image processing;",
"title": ""
},
{
"docid": "5f351dc1334f43ce1c80a1e78581d0f9",
"text": "Based on keypoints extracted as salient image patches, an image can be described as a \"bag of visual words\" and this representation has been used in scene classification. The choice of dimension, selection, and weighting of visual words in this representation is crucial to the classification performance but has not been thoroughly studied in previous work. Given the analogy between this representation and the bag-of-words representation of text documents, we apply techniques used in text categorization, including term weighting, stop word removal, feature selection, to generate image representations that differ in the dimension, selection, and weighting of visual words. The impact of these representation choices to scene classification is studied through extensive experiments on the TRECVID and PASCAL collection. This study provides an empirical basis for designing visual-word representations that are likely to produce superior classification performance.",
"title": ""
},
{
"docid": "f73aa7b8c83ef5bac895eca913418088",
"text": "This paper describes an underwater walking robotic system being developed under the name AQUA, the goals of the AQUA project, the overall hardware and software design, the basic hardware and sensor packages that have been developed, and some initial experiments. The robot is based on the RHex hexapod robot and uses a suite of sensing technologies, primarily based on computer vision and INS, to allow it to navigate and map clear shallow-water environments. The sensor-based navigation and mapping algorithms are based on the use of both artificial floating visual and acoustic landmarks as well as on naturally occurring underwater landmarks and trinocular stereo.",
"title": ""
},
{
"docid": "04b961d5ec0c60f0d6e7eccaded62172",
"text": "Hand rehabilitation after stroke is essential for restoring functional independent lifestyles. After stroke, patients often have flexor hypertonia, making it difficult to open their hand for functional grasp. The development and initial testing of a passive hand rehabilitation device is discussed. The device, Hand Spring Operated Movement Enhancer (HandSOME), assists with opening the patient's hand using a series of bungee cords that apply extension torques to the finger joints that compensate for the flexor hypertonia. This results in significant increase in range of motion and functional use when wearing HandSOME, even in severely impaired subjects. Device design, calibration, and range of motion are described as well as functional and usability testing with stroke subjects.",
"title": ""
},
{
"docid": "5756059a72bf280bd69398ed06a0b8eb",
"text": "Unity3D has become a popular, freely available 3D game engine for design and construction of virtual environments. Unfortunately, the few options that currently exist for adapting Unity3D to distributed immersive tiled or projection-based VR display systems rely on closed commercial products. Uni-CAVE aims to solve this problem by creating a freely-available and easy to use Unity3D extension package for cluster-based VR display systems. This extension provides support for head and device tracking, stereo rendering and display synchronization. Furthermore, Uni-CAVE enables configuration within the Unity environment enabling researchers to get quickly up and running.",
"title": ""
},
{
"docid": "f2fdd2f5a945d48c323ae6eb3311d1d0",
"text": "Distributed computing systems such as clouds continue to evolve to support various types of scientific applications, especially scientific workflows, with dependable, consistent, pervasive, and inexpensive access to geographically-distributed computational capabilities. Scheduling multiple workflows on distributed computing systems like Infrastructure-as-a-Service (IaaS) clouds is well recognized as a fundamental NP-complete problem that is critical to meeting various types of Quality-of-Service (QoS) requirements. In this paper, we propose a multiobjective optimization workflow scheduling approach based on dynamic game-theoretic model aiming at reducing workflow make-spans, reducing total cost, and maximizing system fairness in terms of workload distribution among heterogeneous cloud virtual machines (VMs). We conduct extensive case studies as well based on various well-known scientific workflow templates and real-world third-party commercial IaaS clouds. Experimental results clearly suggest that our proposed approach outperform traditional ones by achieving lower workflow make-spans, lower cost, and better system fairness.",
"title": ""
},
{
"docid": "c05f2a6df3d58c5a18e0087556c8067e",
"text": "Child maltreatment is a major social problem. This paper focuses on measuring the relationship between child maltreatment and crime using data from the National Longitudinal Study of Adolescent Health (Add Health). We focus on crime because it is one of the most costly potential outcomes of maltreatment. Our work addresses two main limitations of the existing literature on child maltreatment. First, we use a large national sample, and investigate different types of maltreatment in a unified framework. Second, we pay careful attention to controlling for possible confounders using a variety of statistical methods that make differing assumptions. The results suggest that maltreatment greatly increases the probability of engaging in crime and that the probability increases with the experience of multiple forms of maltreatment.",
"title": ""
},
{
"docid": "2ec768f19fc39d392ffb86ae59497004",
"text": "Recently, adversarial erasing for weakly-supervised object attention has been deeply studied due to its capability in localizing integral object regions. However, such a strategy raises one key problem that attention regions will gradually expand to non-object regions as training iterations continue, which significantly decreases the quality of the produced attention maps. To tackle such an issue as well as promote the quality of object attention, we introduce a simple yet effective SelfErasing Network (SeeNet) to prohibit attentions from spreading to unexpected background regions. In particular, SeeNet leverages two self-erasing strategies to encourage networks to use reliable object and background cues for learning to attention. In this way, integral object regions can be effectively highlighted without including much more background regions. To test the quality of the generated attention maps, we employ the mined object regions as heuristic cues for learning semantic segmentation models. Experiments on Pascal VOC well demonstrate the superiority of our SeeNet over other state-of-the-art methods.",
"title": ""
},
{
"docid": "7381d61eea849ecdf74c962042d0c5ff",
"text": "Unmanned aerial vehicle (UAV) synthetic aperture radar (SAR) is very important for battlefield awareness. For SAR systems mounted on a UAV, the motion errors can be considerably high due to atmospheric turbulence and aircraft properties, such as its small size, which makes motion compensation (MOCO) in UAV SAR more urgent than other SAR systems. In this paper, based on 3-D motion error analysis, a novel 3-D MOCO method is proposed. The main idea is to extract necessary motion parameters, i.e., forward velocity and displacement in line-of-sight direction, from radar raw data, based on an instantaneous Doppler rate estimate. Experimental results show that the proposed method is suitable for low- or medium-altitude UAV SAR systems equipped with a low-accuracy inertial navigation system.",
"title": ""
},
{
"docid": "bdeed19259194f7868cf82429d042fab",
"text": "It is critical in many applications to understand what features are important for a model, and why individual predictions were made. For tree ensemble methods these questions are usually answered by attributing importance values to input features, either globally or for a single prediction. Here we show that current feature attribution methods are inconsistent, which means changing the model to rely more on a given feature can actually decrease the importance assigned to that feature. To address this problem we develop fast exact solutions for SHAP (SHapley Additive exPlanation) values, which were recently shown to be the unique additive feature attribution method based on conditional expectations that is both consistent and locally accurate. We integrate these improvements into the latest version of XGBoost, demonstrate the inconsistencies of current methods, and show how using SHAP values results in significantly improved supervised clustering performance. Feature importance values are a key part of understanding widely used models such as gradient boosting trees and random forests. We believe our work improves on the state-of-the-art in important ways, and so impacts any current user of tree ensemble methods.",
"title": ""
},
{
"docid": "387ee0569e05564f639326b6ce3e51f5",
"text": "Many decisions in the lives of animals and humans require a fine balance between the exploration of different options and the exploitation of their rewards. Do you buy the advertised car, or do you testdrive different models? Do you continue feeding from the current patch of flowers, or do you fly off to another one? Do you marry your current partner, or try your luck with someone else? The balance required in these situations is commonly referred to as the exploration-exploitation tradeoff. It features prominently in a wide range of research traditions, including learning, foraging, and decisionmaking literatures. Here, we integrate findings from these and other often-isolated literatures in order to gain a better understanding of the possible tradeoffs between exploration and exploitation, and we propose new theoretical insights that might guide future research. Specifically, we explore how potential tradeoffs depend on (1) the conceptualization of exploration and exploitation; (2) the influencing environmental, social, and individual factors; (3) the scale at which exploration and exploitation are considered; (4) the relationship and types of transitions between the two behaviors; and (5) the goals of the decision maker. We conclude that exploration and exploitation are best conceptualized as points on a continuum, and that the extent to which an agent’s behavior can be interpreted as exploratory or exploitative depends upon the level of abstraction at which it is",
"title": ""
},
{
"docid": "9ca6c0bd65ca0f56b07f4b1cc9fd7a29",
"text": "In the last decades, Natural Language Processing (NLP) has obtained a high level of success. Interactions between NLP and Serious Games have started and some of them already include NLP techniques. The objectives of this paper are twofold: on the one hand, providing a simple framework to enable analysis of potential uses of NLP in Serious Games and, on the other hand, applying the NLP framework to existing Serious Games and giving an overview of the use of NLP in pedagogical Serious Games. In this paper we present 11 serious games exploiting NLP techniques. We present them systematically, according to the following structure: first, we highlight possible uses of NLP techniques in Serious Games, second, we describe the type of NLP implemented in the each specific Serious Game and, third, we provide a link to possible purposes of use for the different actors interacting in the Serious Game.",
"title": ""
},
{
"docid": "212e9306654141360a7d240a30af5c4a",
"text": "In this paper, we introduce a stereo vision based CNN tracker for a person following robot. The tracker is able to track a person in real-time using an online convolutional neural network. Our approach enables the robot to follow a target under challenging situations such as occlusions, appearance changes, pose changes, crouching, illumination changes or people wearing the same clothes in different environments. The robot follows the target around corners even when it is momentarily unseen by estimating and replicating the local path of the target. We build an extensive dataset for person following robots under challenging situations. We evaluate the proposed system quantitatively by comparing our tracking approach with existing real-time tracking algorithms.",
"title": ""
},
{
"docid": "ff8f72d7afb43513c7a7a6b041a13040",
"text": "The paper first discusses the reasons why simplified solutions for the mechanical structure of fingers in robotic hands should be considered a worthy design goal. After a brief discussion about the mechanical solutions proposed so far for robotic fingers, a different design approach is proposed. It considers finger structures made of rigid links connected by flexural hinges, with joint actuation obtained by means of flexures that can be guided inside each finger according to different patterns. A simplified model of one of these structures is then presented, together with preliminary results of simulation, in order to evaluate the feasibility of the concept. Examples of technological implementation are finally presented and the perspective and problems of application are briefly discussed.",
"title": ""
},
{
"docid": "3fda6dfa4aa7973725baa1dd9dc7f542",
"text": "This paper presents a novel cognitive management architecture developed within the H2020 CogNet project to manage 5G networks. We also present the instantiation of this architecture for two Operator use cases, namely ‘SLA enforcement’ and ‘Mobile Quality Predictor’. The SLA enforcement use case tackles the SLA management with machine learning techniques, precisely, LSTM (Long Short Term Memory). The second use case, Mobile Quality Predictor, proposes a framework using machine learning to enable an accurate bandwidth prediction for each mobile subscriber in real-time. A problem statement, stakeholders, an instantiation of the cognitive management architecture, a related work as well as an evaluation results are presented for each use case.",
"title": ""
},
{
"docid": "55778c26f221163f20bf298e2933ddd1",
"text": "Malicious scripts are an important computer infection threat vector. Our analysis reveals that the two most prevalent types of malicious scripts include JavaScript and VBScript. The percentage of detected JavaScript attacks are on the rise. To address these threats, we investigate two deep recurrent models, LaMP (LSTM and Max Pooling) and CPoLS (Convoluted Partitioning of Long Sequences), which process JavaScript and VBScript as byte sequences. Lower layers capture the sequential nature of these byte sequences while higher layers classify the resulting embedding as malicious or benign. Unlike previously proposed solutions, our models are trained in an end-to-end fashion allowing discriminative training even for the sequential processing layers. Evaluating these models on a large corpus of 296,274 JavaScript files indicates that the best performing LaMP model has a 65.9% true positive rate (TPR) at a false positive rate (FPR) of 1.0%. Similarly, the best CPoLS model has a TPR of 45.3% at an FPR of 1.0%. LaMP and CPoLS yield a TPR of 69.3% and 67.9%, respectively, at an FPR of 1.0% on a collection of 240,504 VBScript files.",
"title": ""
},
{
"docid": "70710daefe747da7d341577947b6b8ff",
"text": "This paper describes an automated lane centering/changing control algorithm that was developed at General Motors Research and Development. Over the past few decades, there have been numerous studies in the autonomous vehicle motion control. These studies typically focused on improving the control accuracy of the autonomous driving vehicles. In addition to the control accuracy, driver/passenger comfort is also an important performance measure of the system. As an extension of authors' prior study, this paper further considers vehicle motion control to provide driver/passenger comfort based on the adjustment of the lane change maneuvering time in various traffic situations. While defining the driver/passenger comfort level is a human factor study topic, this paper proposes a framework to integrate the motion smoothness into the existing lane centering/changing control problem. The proposed algorithm is capable of providing smooth and aggressive lane change maneuvers according to traffic situation and driver preference. Several simulation results as well as on-road vehicle test results confirm the effectiveness of the proposed algorithm.",
"title": ""
},
{
"docid": "8f54f2c6e9736a63ea4a99f89090e0a2",
"text": "This article demonstrates how documents prepared in hypertext or word processor format can be saved in portable document format (PDF). These files are self-contained documents that that have the same appearance on screen and in print, regardless of what kind of computer or printer are used, and regardless of what software package was originally used to for their creation. PDF files are compressed documents, invariably smaller than the original files, hence allowing rapid dissemination and download.",
"title": ""
}
] | scidocsrr |
078810b4649430321135b1a4c16dde44 | SentiBench - a benchmark comparison of state-of-the-practice sentiment analysis methods | [
{
"docid": "cfbf63d92dfafe4ac0243acdff6cf562",
"text": "In this paper we present a linguistic resource for the lexical representation of affective knowledge. This resource (named W ORDNETAFFECT) was developed starting from W ORDNET, through a selection and tagging of a subset of synsets representing the affective",
"title": ""
}
] | [
{
"docid": "c7db01ee84fc2d5f6e7861bfc1705027",
"text": "Markov Random Fields (MRFs), a formulation widely used in generative image modeling, have long been plagued by the lack of expressive power. This issue is primarily due to the fact that conventional MRFs formulations tend to use simplistic factors to capture local patterns. In this paper, we move beyond such limitations, and propose a novel MRF model that uses fully-connected neurons to express the complex interactions among pixels. Through theoretical analysis, we reveal an inherent connection between this model and recurrent neural networks, and thereon derive an approximated feed-forward network that couples multiple RNNs along opposite directions. This formulation combines the expressive power of deep neural networks and the cyclic dependency structure of MRF in a unified model, bringing the modeling capability to a new level. The feed-forward approximation also allows it to be efficiently learned from data. Experimental results on a variety of low-level vision tasks show notable improvement over state-of-the-arts.",
"title": ""
},
{
"docid": "68bb5cb195c910e0a52c81a42a9e141c",
"text": "With advances in brain-computer interface (BCI) research, a portable few- or single-channel BCI system has become necessary. Most recent BCI studies have demonstrated that the common spatial pattern (CSP) algorithm is a powerful tool in extracting features for multiple-class motor imagery. However, since the CSP algorithm requires multi-channel information, it is not suitable for a few- or single-channel system. In this study, we applied a short-time Fourier transform to decompose a single-channel electroencephalography signal into the time-frequency domain and construct multi-channel information. Using the reconstructed data, the CSP was combined with a support vector machine to obtain high classification accuracies from channels of both the sensorimotor and forehead areas. These results suggest that motor imagery can be detected with a single channel not only from the traditional sensorimotor area but also from the forehead area.",
"title": ""
},
{
"docid": "02bc71435bd53d8331e3ad2b30588c6d",
"text": "Voting with cryptographic auditing, sometimes called open-audit voting, has remained, for the most part, a theoretical endeavor. In spite of dozens of fascinating protocols and recent ground-breaking advances in the field, there exist only a handful of specialized implementations that few people have experienced directly. As a result, the benefits of cryptographically audited elections have remained elusive. We present Helios, the first web-based, open-audit voting system. Helios is publicly accessible today: anyone can create and run an election, and any willing observer can audit the entire process. Helios is ideal for online software communities, local clubs, student government, and other environments where trustworthy, secretballot elections are required but coercion is not a serious concern. With Helios, we hope to expose many to the power of open-audit elections.",
"title": ""
},
{
"docid": "941e570d74435332641f9d4f63c403ff",
"text": "Taniguchi defines City Logistics as “the process of totally optimising the logistics and transport activities by private companies in urban areas while considering the traffic environment, traffic congestion and energy consumption within the framework of a market economy”. The distribution of goods based on road services in urban areas contribute to traffic congestion, generates environmental impacts and in some cases incurs in high logistics costs. On the other hand the various stakeholders involved in the applications may have possibly conflicting objectives. Industrial firms, shippers, freight carriers, have individually established to meet consumer demands looking to maximize the company effectiveness and as a consequence from a social point of view the resulting logistics system is inefficient from the point of view of the social costs and environmental impacts. As a consequence the design and evaluation of City Logistics applications requires an integrated framework in which all components could work together. Therefore City Logistics models must be models that, further than including the main components of City Logistics applications, as vehicle routing and fleet management models, should be able of including also the dynamic aspects of the underlying road network, namely if ICT applications are taken into account. Some of the methodological proposals made so far are based on an integration of vehicle routing models and, dynamic traffic simulation models that emulate the actual traffic conditions providing at each time interval the estimates of the current travel times, queues, etc. on each link of the road network, that is, the information that will be used by the logistic model (i.e. a fleet management system identifying in real-time the positions of each vehicle in the fleet and its operational conditions type of load, available capacity, etc. – to determine the optimal dynamic routing and scheduling of the vehicle.",
"title": ""
},
{
"docid": "54f691d51aeaea18f2f7830e36af820f",
"text": "The Internet of Things (IoT) many be thought of as the availability of physical objects, or devices, on the Internet [1]. Given such an arrangement it is possible to access sensor data and control actuators remotely. Furthermore such data may be combined with data from other sources - e.g. with data that is contained in the Web - or operated on by cloud based services to create applications far richer than can be provided by isolated embedded systems [2,3]. This is the vision of the Internet of Things. We present a cloud-compatible open source controller and an extensible API, hereafter referred to as `IoTCloud', which enables developers to create scalable high performance IoT and sensor-centric applications. The IoTCloud software is written in Java and built on popular open source packages such as Apache Active MQ [4] and JBoss Netty [5]. We present an overview of the IoT Cloud architecture and describe its developer API. Next we introduce the FutureGrid - a geographically distributed and heterogeneous cloud test-bed [6,7] - used in our experiments. Our preliminary results indicate that a distributed cloud infrastructure like the FutureGrid coupled with our flexible IoTCloud framework is an environment suitable for the study and development of IoT and sensor-centric applications. We also report on our initial study of certain measured characteristics of an IoTCloud application running on the FutureGrid. We conclude by inviting interested parties to use the IoTCloud to create their own IoT applications or contribute to its further development.",
"title": ""
},
{
"docid": "ef349469e33119c3b3291693842d0039",
"text": "This paper focuses an novel approach on the prediction of Voltage-Current(V-I) characteristics of a Photovoltaic panel under varying weather conditions and also the modelling of hourly cloudless solar radiation to provide the insolation on a PV module of any orientation, located at any site. The empirical model developed in this study uses standard specifications together with actual solar radiation and cell temperature. This proposed work develops a Matlab-Simulink block to generate solar radiation at any location and for any time of the year. A new model for Current-Voltage (I-V) characteristics and Maximum Power operation of a Photovoltaic (PV) module is also presented which aims to model the effect on I-V and P-V curves of varying climatic conditions. Moreover, this model has been implemented using the Matlab-Simulink and is used to investigate the effect of meteorological conditions on the performance of a PV module generator. Thus the combined model of cloudless solar radiation and the photovoltaic module provide a tool that may be loaded in the library for analysis purpose. It is found that the predicted solar radiation strongly agrees with the experimental data.",
"title": ""
},
{
"docid": "1ee063329b62404e22d73a4f5996332d",
"text": "High-rate data communication over a multipath wireless channel often requires that the channel response be known at the receiver. Training-based methods, which probe the channel in time, frequency, and space with known signals and reconstruct the channel response from the output signals, are most commonly used to accomplish this task. Traditional training-based channel estimation methods, typically comprising linear reconstruction techniques, are known to be optimal for rich multipath channels. However, physical arguments and growing experimental evidence suggest that many wireless channels encountered in practice tend to exhibit a sparse multipath structure that gets pronounced as the signal space dimension gets large (e.g., due to large bandwidth or large number of antennas). In this paper, we formalize the notion of multipath sparsity and present a new approach to estimating sparse (or effectively sparse) multipath channels that is based on some of the recent advances in the theory of compressed sensing. In particular, it is shown in the paper that the proposed approach, which is termed as compressed channel sensing (CCS), can potentially achieve a target reconstruction error using far less energy and, in many instances, latency and bandwidth than that dictated by the traditional least-squares-based training methods.",
"title": ""
},
{
"docid": "6f66fa7c7c3b9fd455fa99f43bdb8ee4",
"text": "We consider the problem of selecting, from among the arms of a stochastic n-armed bandit, a subset of size m of those arms with the highest expected rewards, based on efficiently sampling the arms. This “subset selection” problem finds application in a variety of areas. In the authors’ previous work (Kalyanakrishnan & Stone, 2010), this problem is framed under a PAC setting (denoted “Explore-m”), and corresponding sampling algorithms are analyzed. Whereas the formal analysis therein is restricted to the worst case sample complexity of algorithms, in this paper, we design and analyze an algorithm (“LUCB”) with improved expected sample complexity. Interestingly LUCB bears a close resemblance to the wellknown UCB algorithm for regret minimization. The expected sample complexity bound we show for LUCB is novel even for singlearm selection (Explore-1). We also give a lower bound on the worst case sample complexity of PAC algorithms for Explore-m.",
"title": ""
},
{
"docid": "4dc2f37a8e4aa1a5968233e2d7b0f12b",
"text": "Massive amounts of fake news and conspiratorial content have spread over social media before and after the 2016 US Presidential Elections despite intense fact-checking efforts. How do the spread of misinformation and fact-checking compete? What are the structural and dynamic characteristics of the core of the misinformation diffusion network, and who are its main purveyors? How to reduce the overall amount of misinformation? To explore these questions we built Hoaxy, an open platform that enables large-scale, systematic studies of how misinformation and fact-checking spread and compete on Twitter. Hoaxy captures public tweets that include links to articles from low-credibility and fact-checking sources. We perform k-core decomposition on a diffusion network obtained from two million retweets produced by several hundred thousand accounts over the six months before the election. As we move from the periphery to the core of the network, fact-checking nearly disappears, while social bots proliferate. The number of users in the main core reaches equilibrium around the time of the election, with limited churn and increasingly dense connections. We conclude by quantifying how effectively the network can be disrupted by penalizing the most central nodes. These findings provide a first look at the anatomy of a massive online misinformation diffusion network.",
"title": ""
},
{
"docid": "7e5e3309063053636f8cdcb64c70f413",
"text": "The variability in the service level agreements (SLAs) of cloud providers prompted us to ask the question how do the SLAs compare and how should the SLAs be defined for future cloud services. We break down a cloud SLA into easy to understand components and use it to compare SLAs of public cloud providers. Our study indicates that none of the surveyed cloud providers offer any performance guarantees for compute services and leave SLA violation detection to the customer. We then provide guidance on how SLAs should be defined for future cloud services.",
"title": ""
},
{
"docid": "06003e7812d2fdd8ef71b0bd40af9753",
"text": "Social service professionals are more frequently identifying children who witness adult domestic violence as victims of that abuse. This article expands common definitions of how children witness violence, and adult domestic violence in particular. Over 80 research papers were reviewed and a variety of behavioral, emotional, cognitive and physical functioning problems among children were found to be associated with exposure to domestic violence. Factors that appear to mediate the impact of witnessing violence, such as child gender, age, and time since last exposure to violence are identified. Concerns about research methodology are also raised. CHILDREN’S WITNESSING OF ADULT DOMESTIC VIOLENCE Many people have suggested that family violence – at least to the degree it is observed today – is a recent phenomenon. Yet violence between intimates has long been a part of family life. It has been described repeatedly in religious and historical documents across many centuries, dating as far back as the Roman Empire (Davidson, 1977; Dobash & Dobash, 1979). Some have also argued that current levels of family violence reflect a break-down in the moral structure of the family (see Levine, 1986). This too is unlikely. Rather, as Gordon (1988) suggests, the “ebb-and-flow pattern of concern about family violence...suggests that its incidence has not changed as much as its visibility” (p. 2). Children who witness violence between adults in their homes are only the most recent victims to become visible. These children have been called the “silent,” “forgotten,” and “unintended” victims of adult-to-adult domestic violence (Elbow, 1982; Groves et al., 1993; Rosenbaum & O’Leary, 1981). Studies of archived case records from social service and governmental agencies provide ample evidence that violence has long occurred at levels similar to those measured today and that children are frequently present during violence incidents (Edleson, 1991; Gordon, 1988; Peterson, 1991; Pleck, 1987).",
"title": ""
},
{
"docid": "16fb241da0ca43b3cc2769332bebff97",
"text": "The safety of meat has been at the forefront of societal concerns in recent years, and indications exist that challenges to meat safety will continue in the future. Major meat safety issues and related challenges include the need to control traditional as well as \"new,\" \"emerging,\" or \"evolving\" pathogenic microorganisms, which may be of increased virulence and low infectious doses, or of resistance to antibiotics or food related stresses. Other microbial pathogen related concerns include cross-contamination of other foods and water with enteric pathogens of animal origin, meat animal manure treatment and disposal issues, foodborne illness surveillance and food attribution activities, and potential use of food safety programs at the farm. Other issues and challenges include food additives and chemical residues, animal identification and traceability issues, the safety and quality of organic and natural products, the need for and development of improved and rapid testing and pathogen detection methodologies for laboratory and field use, regulatory and inspection harmonization issues at the national and international level, determination of responsibilities for zoonotic diseases between animal health and regulatory public health agencies, establishment of risk assessment based food safety objectives, and complete and routine implementation of HACCP at the production and processing level on the basis of food handler training and consumer education. Viral pathogens will continue to be of concern at food service, bacterial pathogens such as Escherichia coli O157:H7, Salmonella and Campylobacter will continue affecting the safety of raw meat and poultry, while Listeria monocytogenes will be of concern in ready-to-eat processed products. These challenges become more important due to changes in animal production, product processing and distribution; increased international trade; changing consumer needs and increased preference for minimally processed products; increased worldwide meat consumption; higher numbers of consumers at-risk for infection; and, increased interest, awareness and scrutiny by consumers, news media, and consumer activist groups. Issues such as bovine sponginform encephalopathy will continue to be of interest mostly as a target for eradication, while viral agents affecting food animals, such as avian influenza, will always need attention for prevention or containment.",
"title": ""
},
{
"docid": "9bc7adc6c73f63924ad4002522bfff6d",
"text": "Recently, detecting abnormal events in surveillance videos has become one of the most important tasks of video analysis. There is a huge demand in developing fast and accurate abnormal event detection approach. However, traditional pixel-domain approaches are time-consuming and require fully decoding of the bit streams. On the other hand, the compression format may provide useful information to solve the challenge: compared to raw pixels, the advantage of the compression format is that it already contains some valuable clues for video analysis. In this work, we focus on anomaly detection in traffic video with the information provided in the HEVC compressed domain. There are mainly two contributions. The first is that we propose a novel feature namely motion energy intensity (MEI) to represent the motion intensity within coding unit, based on the MV fields, bit allocations and partitions of coding units in the HEVC compressed domain, which can provide energy and motion information of the LCU. The second contribution is that we have proposed an anomaly detection model based on the MEI. Furthermore, this approach can also serve as preprocess for pixel domain detection algorithms, by labeling suspicious part of the video which are likely to be abnormities. Figure 1 shows the flowchart of the proposed algorithm. Experimental results show that the proposed approach can obtain rather high detecting accuracy with very little overhead. The processing speed for detection is as fast as 1200 fps on 480x360 video. When served as a preprocess approach, the pixel-domain methods may also benefit with up to 50% time reduction.",
"title": ""
},
{
"docid": "aeb262217c4c9493b474476af6399721",
"text": "Classification is used to find out in which group each data instance is related within a given dataset. It is used for classifying data into different classes according to some constrains. Several major kinds of classification algorithms including C4.5, ID3, k-nearest neighbor classifier, Naive Bayes, SVM, and ANN are used for classification. Generally a classification technique follows three approaches Statistical, Machine Learning and Neural Network for classification. While considering these approaches this paper provides an inclusive survey of different classification algorithms and their features and limitations. key words: C4.5, ID3, ANN, Naive Bayes, SVM, k-nearest neighbour.",
"title": ""
},
{
"docid": "fe715d2094119291f5c13fb0d08cace5",
"text": "The Echinacea species are native to the Atlantic drainage area of the United States of America and Canada. They have been introduced as cultivated medicinal plants in Europe. Echinacea purpurea, E. angustifolia and E. pallida are the species most often used medicinally due to their immune-stimulating properties. This review is focused on morphological and anatomical characteristics of E. purpurea, E. angustifolia, E. pallida, because various species are often misidentified and specimens are often confused in the medicinal plant market.",
"title": ""
},
{
"docid": "6b809840c94534dacfec05d5fbd94180",
"text": "Disk schedulers in current operating systems are generally work-conserving, i.e., they schedule a request as soon as the previous request has finished. Such schedulers often require multiple outstanding requests from each process to meet system-level goals of performance and quality of service. Unfortunately, many common applications issue disk read requests in a synchronous manner, interspersing successive requests with short periods of computation. The scheduler chooses the next request too early; this induces deceptive idleness, a condition where the scheduler incorrectly assumes that the last request issuing process has no further requests, and becomes forced to switch to a request from another process.We propose the anticipatory disk scheduling framework to solve this problem in a simple, general and transparent way, based on the non-work-conserving scheduling discipline. Our FreeBSD implementation is observed to yield large benefits on a range of microbenchmarks and real workloads. The Apache webserver delivers between 29% and 71% more throughput on a disk-intensive workload. The Andrew filesystem benchmark runs faster by 8%, due to a speedup of 54% in its read-intensive phase. Variants of the TPC-B database benchmark exhibit improvements between 2% and 60%. Proportional-share schedulers are seen to achieve their contracts accurately and efficiently.",
"title": ""
},
{
"docid": "aeaae00768283aaded98858ba482aa5c",
"text": "In the early 1990s, computer scientists became motivated by the idea of rendering human-computer interactions more humanlike and natural for their users in order to both address complaints that technologies impose a mechanical (sometimes even anti-social) aesthetic to their everyday environment, and also investigate innovative ways to manage system-environment complexity. With the recent development of the field of Social Robotics and particularly HumanRobot Interaction, the integration of intentional emotional mechanisms in a system’s control architecture becomes inevitable. Unfortunately, this presents significant issues that must be addressed for a successful emotional artificial system to be developed. This paper provides an additional dimension to documented arguments for and against the introduction of emotions into artificial systems by highlighting some fundamental paradoxes, mistakes, and proposes guidelines for how to develop successful affective intelligent social machines.",
"title": ""
},
{
"docid": "734638df47b05b425b0dcaaab11d886e",
"text": "Satisfying the needs of users of online video streaming services requires not only to manage the network Quality of Service (QoS), but also to address the user's Quality of Experience (QoE) expectations. While QoS factors reflect the status of individual networks, they do not comprehensively capture the end-to-end features affecting the quality delivered to the user. In this situation, QoE management is the better option. However, traditionally used QoE management models require human interaction and have stringent requirements in terms of time and complexity. Thus, they fail to achieve successful performance in terms of real-timeliness, accuracy, scalability and adaptability. This dissertation work investigates new methods to bring QoE management to the level required by the real-time management of video services. In this paper, we highlight our main contributions. First, with the aim to perform a combined network-service assessment, we designed an experimental methodology able to map network QoS onto service QoE. Our methodology is meant to provide service and network providers with the means to pinpoint the working boundaries of their video-sets and to predict the effect of network policies on perception. Second, we developed a generic machine learning framework that allows deriving accurate predictive No Reference (NR) assessment metrics, based on simplistic NR QoE methods, that are functionally and computationally viable for real-time QoE evaluation. The tools, methods and conclusions derived from this dissertation conform a solid contribution to QoE management of video streaming services, opening new venues for further research.",
"title": ""
},
{
"docid": "48f2e91304f7e4dbec5e5cc1f509d38e",
"text": "This paper presents on-going research to define the basic models and architecture patterns for federated access control in heterogeneous (multi-provider) multi-cloud and inter-cloud environment. The proposed research contributes to the further definition of Intercloud Federation Framework (ICFF) which is a part of the general Intercloud Architecture Framework (ICAF) proposed by authors in earlier works. ICFF attempts to address the interoperability and integration issues in provisioning on-demand multi-provider multi-domain heterogeneous cloud infrastructure services. The paper describes the major inter-cloud federation scenarios that in general involve two types of federations: customer-side federation that includes federation between cloud based services and customer campus or enterprise infrastructure, and provider-side federation that is created by a group of cloud providers to outsource or broker their resources when provisioning services to customers. The proposed federated access control model uses Federated Identity Management (FIDM) model that can be also supported by the trusted third party entities such as Cloud Service Broker (CSB) and/or trust broker to establish dynamic trust relations between entities without previously existing trust. The research analyses different federated identity management scenarios, defines the basic architecture patterns and the main components of the distributed federated multi-domain Authentication and Authorisation infrastructure.",
"title": ""
},
{
"docid": "30007880e4759e76831b8b714456df73",
"text": "Graph classification is becoming increasingly popular due to the rapidly rising applications involving data with structural dependency. The wide spread of the graph applications and the inherent complex relationships between graph objects have made the labels of the graph data expensive and/or difficult to obtain, especially for applications involving dynamic changing graph records. While labeled graphs are limited, the copious amounts of unlabeled graphs are often easy to obtain with trivial efforts. In this paper, we propose a framework to build a stream based graph classification model by combining both labeled and unlabeled graphs. Our method, called gSLU, employs an ensemble based framework to partition graph streams into a number of graph chunks each containing some labeled and unlabeled graphs. For each individual chunk, we propose a minimum-redundancy subgraph feature selection module to select a set of informative subgraph features to build a classifier. To tackle the concept drifting in graph streams, an instance level weighting mechanism is used to dynamically adjust the instance weight, through which the subgraph feature selection can emphasize on difficult graph samples. The classifiers built from different graph chunks form an ensemble for graph stream classification. Experiments on real-world graph streams demonstrate clear benefits of using minimum-redundancy subgraph features to build accurate classifiers. By employing instance level weighting, our graph ensemble model can effectively adapt to the concept drifting in the graph stream for classification.",
"title": ""
}
] | scidocsrr |
14243abce801c0d4bdea19e0cc1bae07 | Bias in OLAP Queries: Detection, Explanation, and Removal | [
{
"docid": "8b6e2ef05f59868363beaa9b810a8d36",
"text": "Causal inference from observational data is a subject of active research and development in statistics and computer science. Many statistical software packages have been developed for this purpose. However, these toolkits do not scale to large datasets. We propose and demonstrate ZaliQL: a SQL-based framework for drawing causal inference from observational data. ZaliQL supports the state-of-the-art methods for causal inference and runs at scale within PostgreSQL database system. In addition, we built a visual interface to wrap around ZaliQL. In our demonstration, we will use this GUI to show a live investigation of the causal effect of different weather conditions on flight delays.",
"title": ""
},
{
"docid": "ec6c62f25c987446522b49840c4242d7",
"text": "Have you ever been in a sauna? If yes, according to our recent survey conducted on Amazon Mechanical Turk, people who go to saunas are more likely to know that Mike Stonebraker is not a character in “The Simpsons”. While this result clearly makes no sense, recently proposed tools to automatically suggest visualizations, correlations, or perform visual data exploration, significantly increase the chance that a user makes a false discovery like this one. In this paper, we first show how current tools mislead users to consider random fluctuations as significant discoveries. We then describe our vision and early results for QUDE, a new system for automatically controlling the various risk factors during the data exploration process.",
"title": ""
}
] | [
{
"docid": "074fd9d0c7bd9e5f31beb77c140f61d0",
"text": "In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand, are crucial determinants of central identity concerns. We develop a taxonomy of situations to reflect the different concerns and motives that come into play as a result of threats to personal and group identity and degree of commitment to the group. We specify for each cell in this taxonomy how these issues of self and social identity impinge upon a broad variety of responses at the perceptual, affective, and behavioral level.",
"title": ""
},
{
"docid": "552276c35889e4cf0492b164a58e25c5",
"text": "the numbers of the botnet attacks are increasing day by day and the detection of botnet spreading in the network has become very challenging. Bots are having specific characteristics in comparison of normal malware as they are controlled by the remote master server and usually don’t show their behavior like normal malware until they don’t receive any command from their master server. Most of time bot malware are inactive, hence it is very difficult to detect. Further the detection or tracking of the network of theses bots requires an infrastructure that should be able to collect the data from a diverse range of data sources and correlate the data to bring the bigger picture in view.In this paper, we are sharing our experience of botnet detection in the private network as well as in public zone by deploying the nepenthes honeypots. The automated framework for malware collection using nepenthes and analysis using antivirus scan are discussed. The experimental results of botnet detection by enabling nepenthes honeypots in network are shown. Also we saw that existing known bots in our network can be detected.",
"title": ""
},
{
"docid": "30eb03eca06dcc006a28b5e00431d9ed",
"text": "We present for the first time a μW-power convolutional neural network for seizure detection running on a low-power microcontroller. On a dataset of 22 patients a median sensitivity of 100% is achieved. With a false positive rate of 20.7 fp/h and a short detection delay of 3.4 s it is suitable for the application in an implantable closed-loop device.",
"title": ""
},
{
"docid": "6c857ae5ce9db878c7ecd4263604874e",
"text": "In the investigations of chaos in dynamical systems a major role is played by symbolic dynamics, i.e. the description of the system by a shift on a symbol space via conjugation. We examine whether any kind of noise can strengthen the stochastic behaviour of chaotic systems dramatically and what the consequences for the symbolic description are. This leads to the introduction of random subshifts of nite type which are appropriate for the description of quite general dynamical systems evolving under the innuence of noise and showing internal stochastic features. We investigate some of the ergodic and stochastic properties of these shifts and show situations when they behave dynamically like the common shifts. In particular we want to present examples where such random shift systems appear as symbolic descriptions.",
"title": ""
},
{
"docid": "8220c4e04fd0871442564fa65938e436",
"text": "Cyber-Physical Systems (CPSs) represent systems where computations are tightly coupled with the physical world, meaning that physical data is the core component that drives computation. Industrial automation systems, wireless sensor networks, mobile robots and vehicular networks are just a sample of cyber-physical systems. Typically, CPSs have limited computation and storage capabilities due to their tiny size and being embedded into larger systems. With the emergence of cloud computing and the Internetof-Things (IoT), there are several new opportunities for these CPSs to extend their capabilities by taking advantage of the cloud resources in different ways. In this survey paper, we present an overview of research effort s on the integration of cyber-physical systems with cloud computing and categorize them into three areas: (1) remote brain, (2) big data manipulation, (3) and virtualization. In particular, we focus on three major CPSs namely mobile robots, wireless sensor networks and vehicular networks. © 2016 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "eda242b58e5ed2a2736cb7cccc73220e",
"text": "This paper presents an interactive hybrid recommendation system that generates item predictions from multiple social and semantic web resources, such as Wikipedia, Facebook, and Twitter. The system employs hybrid techniques from traditional recommender system literature, in addition to a novel interactive interface which serves to explain the recommendation process and elicit preferences from the end user. We present an evaluation that compares different interactive and non-interactive hybrid strategies for computing recommendations across diverse social and semantic web APIs. Results of the study indicate that explanation and interaction with a visual representation of the hybrid system increase user satisfaction and relevance of predicted content.",
"title": ""
},
{
"docid": "ebf31b75aad0eb366959243ab8160131",
"text": "Angiogenesis, the growth of new blood vessels from pre-existing vessels, represents an excellent therapeutic target for the treatment of wound healing and cardiovascular disease. Herein, we report that LPLI (low-power laser irradiation) activates ERK/Sp1 (extracellular signal-regulated kinase/specificity protein 1) pathway to promote VEGF expression and vascular endothelial cell proliferation. We demonstrate for the first time that LPLI enhances DNA-binding and transactivation activity of Sp1 on VEGF promoter in vascular endothelial cells. Moreover, Sp1-regulated transcription is in an ERK-dependent manner. Activated ERK by LPLI translocates from cytoplasm to nuclear and leads to increasing interaction with Sp1, triggering a progressive phosphorylation of Sp1 on Thr453 and Thr739, resulting in the upregulation of VEGF expression. Furthermore, selective inhibition of Sp1 by mithramycin-A or shRNA suppresses the promotion effect of LPLI on cell cycle progression and proliferation, which is also significantly abolished by inhibition of ERK activity. These findings highlight the important roles of ERK/Sp1 pathway in angiogenesis, supplying potential strategy for angiogenesis-related diseases with LPLI treatment.",
"title": ""
},
{
"docid": "aaba5dc8efc9b6a62255139965b6f98d",
"text": "The interaction of an autonomous mobile robot with the real world critically depends on the robots morphology and on its environment. Building a model of these aspects is extremely complex, making simulation insu cient for accurate validation of control algorithms. If simulation environments are often very e cient, the tools for experimenting with real robots are often inadequate. The traditional programming languages and tools seldom provide enought support for realtime experiments, thus hindering the understanding of the control algorithms and making the experimentation complex and time-consuming. A miniature robot is presented: it has a cylindrical shape measuring 55 mm in diameter and 30 mm in height. Due to its small size, experiments can be performed quickly and cost-e ectively in a small working area. Small peripherals can be designed and connected to the basic module and can take advantage of a versatile communication scheme. A serial-link is provided to run control algorithms on a workstation during debugging, thereby giving the user the opportunity of employing all available graphical tools. Once debugged, the algorithm can be downloaded to the robot and run on its own processor. Experimentation with groups of robots is hardly possible with commercially available hardware. The size and the price of the described robot open the way to cost-e ective investigations into collective behaviour. This aspect of research drives the design of the robot described in this paper. Experiments with some twenty units are planned for the near future.",
"title": ""
},
{
"docid": "7240d65e0bc849a569d840a461157b2c",
"text": "Deep convolutional neutral networks have achieved great success on image recognition tasks. Yet, it is non-trivial to transfer the state-of-the-art image recognition networks to videos as per-frame evaluation is too slow and unaffordable. We present deep feature flow, a fast and accurate framework for video recognition. It runs the expensive convolutional sub-network only on sparse key frames and propagates their deep feature maps to other frames via a flow field. It achieves significant speedup as flow computation is relatively fast. The end-to-end training of the whole architecture significantly boosts the recognition accuracy. Deep feature flow is flexible and general. It is validated on two recent large scale video datasets. It makes a large step towards practical video recognition. Code would be released.",
"title": ""
},
{
"docid": "ef39209e61597136d5a954c70fcecbfe",
"text": "We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of code-based security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security Modules or the BSD MAC Framework) and intertwines them with the particular requirements and challenges from the design of Android's software stack. ASF provides a novel security API that supports authors of Android security extensions in developing their modules. This overcomes the current unsatisfactory situation to provide security solutions as separate patches to the Android software stack or to embed them into Android's mainline codebase. This system security extensibility is of particular benefit for enterprise or government solutions that require deployment of advanced security models, not supported by vanilla Android. We present a prototypical implementation of ASF and demonstrate its effectiveness and efficiency by modularizing different security models from related work, such as dynamic permissions, inlined reference monitoring, and type enforcement.",
"title": ""
},
{
"docid": "18969bed489bb9fa7196634a8086449e",
"text": "A speech recognition model is proposed in which the transformation from an input speech signal into a sequence of phonemes is carried out largely through an active or feedback process. In this process, patterns are generated internally in the analyzer according to an adaptable sequence of instructions until a best match with the input signal is obtained. Details of the process are given, and the areas where further research is needed are indicated.",
"title": ""
},
{
"docid": "79844bc05388cc1436bb5388e88f6daa",
"text": "The growing number of Unmanned Aerial Vehicles (UAVs) is considerable in the last decades. Many flight test scenarios, including single and multi-vehicle formation flights, are demonstrated using different control algorithms with different test platforms. In this paper, we present a brief literature review on the development and key issues of current researches in the field of Fault-Tolerant Control (FTC) applied to UAVs. It consists of various intelligent or hierarchical control architectures for a single vehicle or a group of UAVs in order to provide potential solutions for tolerance to the faults, failures or damages in relevant to UAV components during flight. Among various UAV test-bed structures, a sample of every class of UAVs, including single-rotor, quadrotor, and fixed-wing types, are selected and briefly illustrated. Also, a short description of terms, definitions, and classifications of fault-tolerant control systems (FTCS) is presented before the main contents of review.",
"title": ""
},
{
"docid": "0bd981ea6d38817b560383f48fdfb729",
"text": "Lightweight wheelchairs are characterized by their low cost and limited range of adjustment. Our study evaluated three different folding lightweight wheelchair models using the American National Standards Institute/Rehabilitation Engineering Society of North America (ANSI/RESNA) standards to see whether quality had improved since the previous data were reported. On the basis of reports of increasing breakdown rates in the community, we hypothesized that the quality of these wheelchairs had declined. Seven of the nine wheelchairs tested failed to pass the multidrum test durability requirements. An average of 194,502 +/- 172,668 equivalent cycles was completed, which is similar to the previous test results and far below the 400,000 minimum required to pass the ANSI/RESNA requirements. This was also significantly worse than the test results for aluminum ultralight folding wheelchairs. Overall, our results uncovered some disturbing issues with these wheelchairs and suggest that manufacturers should put more effort into this category to improve quality. To improve the durability of lightweight wheelchairs, we suggested that stronger regulations be developed that require wheelchairs to be tested by independent and certified test laboratories. We also proposed a wheelchair rating system based on the National Highway Transportation Safety Administration vehicle crash ratings to assist clinicians and end users when comparing the durability of different wheelchairs.",
"title": ""
},
{
"docid": "b5a349b6d805c2b5afac86bfe22050df",
"text": "By setting apart the two functions of a support vector machine: separation of points by a nonlinear surface in the original space of patterns, and maximizing the distance between separating planes in a higher dimensional space, we are able to deene indeenite, possibly discontinuous, kernels, not necessarily inner product ones, that generate highly nonlin-ear separating surfaces. Maximizing the distance between the separating planes in the higher dimensional space is surrogated by support vector suppression, which is achieved by minimizing any desired norm of support vector multipliers. The norm may be one induced by the separation kernel if it happens to be positive deenite, or a Euclidean or a polyhe-dral norm. The latter norm leads to a linear program whereas the former norms lead to convex quadratic programs, all with an arbitrary separation kernel. A standard support vector machine can be recovered by using the same kernel for separation and support vector suppression. On a simple test example, all models perform equally well when a positive deenite kernel is used. When a negative deenite kernel is used, we are unable to solve the nonconvex quadratic program associated with a conventional support vector machine, while all other proposed models remain convex and easily generate a surface that separates all given points.",
"title": ""
},
{
"docid": "655302a1df16af206ab8341a710d9e90",
"text": "Researchers in both machine translation (e.g., Brown et al., 1990) and bilingual lexicography (e.g., Klavans and Tzoukermann, 1990) have recently become interested in studying bilingual corpora, bodies of text such as the Canadian Hansards (parliamentary proceedings) which are available in multiple languages (such as French and English). One useful step is to align the sentences, that is, to identify correspondences between sentences in one language and sentences in the other language. This paper will describe a method and a program (align) for aligning sentences based on a simple statistical model of character lengths. The program uses the fact that longer sentences in one language tend to be translated into longer sentences in the other language, and that shorter sentences tend to be translated into shorter sentences. A probabilistic score is assigned to each proposed correspondence of sentences, based on the scaled difference of lengths of the two sentences (in characters) and the variance of this difference. This probabilistic score is used in a dynamic programming framework to find the maximum likelihood alignment of sentences. It is remarkable that such a simple approach works as well as it does. An evaluation was performed based on a trilingual corpus of economic reports issued by the Union Bank of Switzerland (UBS) in English, French and German. The method correctly aligned all but 4% of the sentences. Moreover, it is possible to extract a large subcorpus which has a much smaller error rate. By selecting the best scoring 80% of the alignments, the error rate is reduced from 4% to 0.7%. There were more errors on the English-French subcorpus than on the English-German subcorpus, showing that error rates will depend on the corpus considered, however, both were small enough to hope that the method will be useful for many language pairs. To further research on bilingual corpora, a much larger sample of Canadian Hansards (approximately 90 million words, half in English and and half in French) has been aligned with the align program and will be available through the Data Collection Initiative of the Association for Computational Linguistics (ACL/DCI). In addition, in order to facilitate replication of the align program, an appendix is provided with detailed c-code of the more difficult core of the align program.",
"title": ""
},
{
"docid": "c8cb32e37aa01b712c7e6921800fbe60",
"text": "Risky families are characterized by conflict and aggression and by relationships that are cold, unsupportive, and neglectful. These family characteristics create vulnerabilities and/or interact with genetically based vulnerabilities in offspring that produce disruptions in psychosocial functioning (specifically emotion processing and social competence), disruptions in stress-responsive biological regulatory systems, including sympathetic-adrenomedullary and hypothalamic-pituitary-adrenocortical functioning, and poor health behaviors, especially substance abuse. This integrated biobehavioral profile leads to consequent accumulating risk for mental health disorders, major chronic diseases, and early mortality. We conclude that childhood family environments represent vital links for understanding mental and physical health across the life span.",
"title": ""
},
{
"docid": "b4d85eae82415b0a8dcd5e9f6eadbc6f",
"text": "We compared the effects of children’s reading of an educational electronic storybook on their emergent literacy with those of being read the same story in its printed version by an adult. We investigated 128 5to 6-year-old kindergarteners; 64 children from each of two socio-economic status (SES) groups: low (LSES) and middle (MSES). In each group, children were randomly assigned to one of three subgroups. The two intervention groups included three book reading sessions each; children in one group individually read the electronic book; in the second group, the children were read the same printed book by an adult; children in the third group, which served as a control, received the regular kindergarten programme. Preand post-intervention emergent literacy measures included vocabulary, word recognition and phonological awareness. Compared with the control group, the children’s vocabulary scores in both intervention groups improved following reading activity. Children from both interventions groups and both SES groups showed a similarly good level of story comprehension. In both SES groups, compared with the control group, children’s phonological awareness and word recognition did not improve following both reading interventions. Implications for future research and for education are discussed.",
"title": ""
},
{
"docid": "2dbc68492e54d61446dac7880db71fdd",
"text": "Supervised deep learning methods have shown promising results for the task of monocular depth estimation; but acquiring ground truth is costly, and prone to noise as well as inaccuracies. While synthetic datasets have been used to circumvent above problems, the resultant models do not generalize well to natural scenes due to the inherent domain shift. Recent adversarial approaches for domain adaption have performed well in mitigating the differences between the source and target domains. But these methods are mostly limited to a classification setup and do not scale well for fully-convolutional architectures. In this work, we propose AdaDepth - an unsupervised domain adaptation strategy for the pixel-wise regression task of monocular depth estimation. The proposed approach is devoid of above limitations through a) adversarial learning and b) explicit imposition of content consistency on the adapted target representation. Our unsupervised approach performs competitively with other established approaches on depth estimation tasks and achieves state-of-the-art results in a semi-supervised setting.",
"title": ""
},
{
"docid": "72839a67032eba63246dd2bdf5799f75",
"text": "We use a supervised multi-spike learning algorithm for spiking neural networks (SNNs) with temporal encoding to simulate the learning mechanism of biological neurons in which the SNN output spike trains are encoded by firing times. We first analyze why existing gradient-descent-based learning methods for SNNs have difficulty in achieving multi-spike learning. We then propose a new multi-spike learning method for SNNs based on gradient descent that solves the problems of error function construction and interference among multiple output spikes during learning. The method could be widely applied to single spiking neurons to learn desired output spike trains and to multilayer SNNs to solve classification problems. By overcoming learning interference among multiple spikes, our method has high learning accuracy when there are a relatively large number of output spikes in need of learning. We also develop an output encoding strategy with respect to multiple spikes for classification problems. This effectively improves the classification accuracy of multi-spike learning compared to that of single-spike learning.",
"title": ""
},
{
"docid": "6b3ac9bc7aa64c1d4329e4705225e369",
"text": "Apps supporting social networking in proximity are gaining momentum as they enable to both augment face-to-face interaction with a digital channel (e.g. classroom interaction systems) and augment digital interaction by providing a local real life feeling to it (e.g. nearby friends app in Facebook). Such apps effectively provide a cyber-physical space interweaving digital and face-to-face interaction. Currently such applications are mainly relying on Internet connection to the cloud, which makes them inaccessible in parts of the world with scarce Internet connection. Since many of their interactions happen locally, they could theoretically rely on Mobile Networking in Proximity (MNP), where data could be exchanged among devices without the need to rely on the availability of an Internet connection. Unfortunately, there is a lack of off-the-shelf programing support for MNP. This paper addresses this issue and presents Padoc, a middleware for social networking in proximity that provides multi-hop MNP support when cloud connection is unavailable. Furthermore the paper evaluates three MNP message diffusion strategies and presents Heya a novel classroom interaction app running on iOS devices as a proof-of-concept built on top of Padoc.",
"title": ""
}
] | scidocsrr |
f51af67d9df8e757e944da109fe53a9c | Exploring the Usability of Video Game Heuristics for Pervasive Game Development in Smart Home Environments | [
{
"docid": "bdadf0088654060b3f1c749ead0eea6e",
"text": "This article gives an introduction and overview of the field of pervasive gaming, an emerging genre in which traditional, real-world games are augmented with computing functionality, or, depending on the perspective, purely virtual computer entertainment is brought back to the real world.The field of pervasive games is diverse in the approaches and technologies used to create new and exciting gaming experiences that profit by the blend of real and virtual game elements. We explicitly look at the pervasive gaming sub-genres of smart toys, affective games, tabletop games, location-aware games, and augmented reality games, and discuss them in terms of their benefits and critical issues, as well as the relevant technology base.",
"title": ""
}
] | [
{
"docid": "62fa4f8712a4fcc1a3a2b6148bd3589b",
"text": "In this paper we discuss the development and application of a large formal ontology to the semantic web. The Suggested Upper Merged Ontology (SUMO) (Niles & Pease, 2001) (SUMO, 2002) is a “starter document” in the IEEE Standard Upper Ontology effort. This upper ontology is extremely broad in scope and can serve as a semantic foundation for search, interoperation, and communication on the semantic web.",
"title": ""
},
{
"docid": "f1e36a749d456326faeda90bc744b70d",
"text": "In this paper, we propose epitomic variational autoencoder (eVAE), a probabilistic generative model of high dimensional data. eVAE is composed of a number of sparse variational autoencoders called ‘epitome’ such that each epitome partially shares its encoder-decoder architecture with other epitomes in the composition. We show that the proposed model greatly overcomes the common problem in variational autoencoders (VAE) of model over-pruning. We substantiate that eVAE is efficient in using its model capacity and generalizes better than VAE, by presenting qualitative and quantitative results on MNIST and TFD datasets.",
"title": ""
},
{
"docid": "6c270eaa2b9b9a0e140e0d8879f5d383",
"text": "More than 75% of hospital-acquired or nosocomial urinary tract infections are initiated by urinary catheters, which are used during the treatment of 15-25% of hospitalized patients. Among other purposes, urinary catheters are primarily used for draining urine after surgeries and for urinary incontinence. During catheter-associated urinary tract infections, bacteria travel up to the bladder and cause infection. A major cause of catheter-associated urinary tract infection is attributed to the use of non-ideal materials in the fabrication of urinary catheters. Such materials allow for the colonization of microorganisms, leading to bacteriuria and infection, depending on the severity of symptoms. The ideal urinary catheter is made out of materials that are biocompatible, antimicrobial, and antifouling. Although an abundance of research has been conducted over the last forty-five years on the subject, the ideal biomaterial, especially for long-term catheterization of more than a month, has yet to be developed. The aim of this review is to highlight the recent advances (over the past 10years) in developing antimicrobial materials for urinary catheters and to outline future requirements and prospects that guide catheter materials selection and design.\n\n\nSTATEMENT OF SIGNIFICANCE\nThis review article intends to provide an expansive insight into the various antimicrobial agents currently being researched for urinary catheter coatings. According to CDC, approximately 75% of urinary tract infections are caused by urinary catheters and 15-25% of hospitalized patients undergo catheterization. In addition to these alarming statistics, the increasing cost and health related complications associated with catheter associated UTIs make the research for antimicrobial urinary catheter coatings even more pertinent. This review provides a comprehensive summary of the history, the latest progress in development of the coatings and a brief conjecture on what the future entails for each of the antimicrobial agents discussed.",
"title": ""
},
{
"docid": "eee51fc5cd3bee512b01193fa396e19a",
"text": "Croston’s method is a widely used to predict inventory demand when it is inter mittent. However, it is an ad hoc method with no properly formulated underlying stochastic model. In this paper, we explore possible models underlying Croston’s method and three related methods, and we show that any underlying model will be inconsistent with the prop erties of intermittent demand data. However, we find that the point forecasts and prediction intervals based on such underlying models may still be useful. [JEL: C53, C22, C51]",
"title": ""
},
{
"docid": "9698bfe078a32244169cbe50a04ebb00",
"text": "Maximum power point tracking (MPPT) controllers play an important role in photovoltaic systems. They maximize the output power of a PV array for a given set of conditions. This paper presents an overview of the different MPPT techniques. Each technique is evaluated on its ability to detect multiple maxima, convergence speed, ease of implementation, efficiency over a wide output power range, and cost of implementation. The perturbation and observation (P & O), and incremental conductance (IC) algorithms are widely used techniques, with many variants and optimization techniques reported. For this reason, this paper evaluates the performance of these two common approaches from a dynamic and steady state perspective.",
"title": ""
},
{
"docid": "f7c52b0076e306dff0823a38cbf103bb",
"text": "A processor architecture attempts to compromise between the needs of programs hosted on the architecture and the performance attainable in implementing the architecture. The needs of programs are most accurately reflected by the dynamic use of the instruction set as the target for a high level language compiler. In VLSI, the issue of implementation of an instruction set architecture is significant in determining the features of the architecture. Recent processor architectures have focused on two major trends: large microcoded instruction sets and simplified, or reduced, instruction sets. The attractiveness of these two approaches is affected by the choice of a single-chip implementation. The two different styles require different tradeoffs to attain an implementation in silicon with a reasonable area. The two styles consume the chip area for different purposes, thus achieving performance by different strategies. In a VLSI implementation of an architecture, many problems can arise from the base technology and its limitations. Although circuit design techniques can help alleviate many of these problems, the architects must be aware of these limitations and understand their implications at the instruction set level.",
"title": ""
},
{
"docid": "e897ab9c0f9f850582fbcb172aa8b904",
"text": "Facial expression recognition is in general a challenging problem, especially in the presence of weak expression. Most recently, deep neural networks have been emerging as a powerful tool for expression recognition. However, due to the lack of training samples, existing deep network-based methods cannot fully capture the critical and subtle details of weak expression, resulting in unsatisfactory results. In this paper, we propose Deeper Cascaded Peak-piloted Network (DCPN) for weak expression recognition. The technique of DCPN has three main aspects: (1) Peak-piloted feature transformation, which utilizes the peak expression (easy samples) to supervise the non-peak expression (hard samples) of the same type and subject; (2) the back-propagation algorithm is specially designed such that the intermediate-layer feature maps of non-peak expression are close to those of the corresponding peak expression; and (3) an novel integration training method, cascaded fine-tune, is proposed to prevent the network from overfitting. Experimental results on two popular facial expression databases, CK$$+$$ + and Oulu-CASIA, show the superiority of the proposed DCPN over state-of-the-art methods.",
"title": ""
},
{
"docid": "c7251ce24e8fd6cf1fd0261d54b0ba76",
"text": "Today there is considerable interest for making use of the latest technological advancements for several healthcare applications. However, there are several challenges for making use of different technologies for healthcare applications. In particular, there is a need to ensure that the healthcare related services receive priority during events, such as legitimate failures of devices, congestion, and attacks in the networks. In this paper, we discuss some of the requirements for making use of technology for healthcare applications and propose techniques for secure monitoring of patients with wandering behavior in a hospital or elderly care environment. One of the aims of our work is to use technology for secure monitoring of patients with wandering behavior to keep them away from danger, or detect if the behavior of the patient violates the policies of the hospital, or even violates privacy policies of other patients. Our approach makes use of software defined networking (SDN), Wireless LAN (WLAN), and wearable devices for the patients. Our approach incurs low cost since WLAN is widely deployed. However, there are some challenges for making use of WLAN for monitoring dementia patients, since it is primarily used for accessing the Internet and its open nature is vulnerable to different types of security attacks. Hence we make use of SDN to solve some of these challenges and provide priority for the monitoring services. We have developed a security application for an SDN controller that can be used to enforce fine granular policies for communication between the hosts, real time location tracking of the patients, and deal with attacks on the hospital networks. The policy-based security enforcement helps to differentiate healthcare related traffic from other traffic and provide priority to the healthcare traffic. The real time location tracking detects wandering by patients and if necessary can raise alarms to the staff. The attack detection component makes use of attack signatures and behavior-based intrusion detection to deal with attacks on hospital networks. We will also present the prototype implementation of our model using ONOS SDN controller and OpenFlow Access Points.",
"title": ""
},
{
"docid": "3dbf5b2b03f90667d5602f3121c526fb",
"text": "In order to identify the parasitic diseases, this paper propose the automatic identification of Human Parasite Eggs to eight different species : Ascaris, Uncinarias, Trichuris, Dyphillobothrium-Pacificum, Taenia-Solium, Fasciola Hepetica and Enterobius-Vermicularis from their microscopic images based on Multitexton Histogram - MTH using new structures of textons. This proposed system includes two stages. In first stage, a feature extraction mechanism that is based on MTH descriptor retrieving the relationships between textons. In second stage, an CBIR system has been implemented in orden to detect their correct species of helminths. Finally, simulation results show overall success rates of 94,78% in the detection.",
"title": ""
},
{
"docid": "cb408e52b5e96669e08f70888b11b3e3",
"text": "Centrality is one of the most studied concepts in social network analysis. There is a huge literature regarding centrality measures, as ways to identify the most relevant users in a social network. The challenge is to find measures that can be computed efficiently, and that can be able to classify the users according to relevance criteria as close as possible to reality. We address this problem in the context of the Twitter network, an online social networking service with millions of users and an impressive flow of messages that are published and spread daily by interactions between users. Twitter has different types of users, but the greatest utility lies in finding the most influential ones. The purpose of this article is to collect and classify the different Twitter influence measures that exist so far in literature. These measures are very diverse. Some are based on simple metrics provided by the Twitter API, while others are based on complex mathematical models. Several measures are based on the PageRank algorithm, traditionally used to rank the websites on the Internet. Some others consider the timeline of publication, others the content of the messages, some are focused on specific topics, and others try to make predictions. We consider all these aspects, and some additional ones. Furthermore, we include measures of activity and popularity, the traditional mechanisms to correlate measures, and some important aspects of computational complexity for this particular context.",
"title": ""
},
{
"docid": "3eeacf0fb315910975e5ff0ffc4fe800",
"text": "Social networks are rich in various kinds of contents such as text and multimedia. The ability to apply text mining algorithms effectively in the context of text data is critical for a wide variety of applications. Social networks require text mining algorithms for a wide variety of applications such as keyword search, classi cation, and clustering. While search and classi cation are well known applications for a wide variety of scenarios, social networks have a much richer structure both in terms of text and links. Much of the work in the area uses either purely the text content or purely the linkage structure. However, many recent algorithms use a combination of linkage and content information for mining purposes. In many cases, it turns out that the use of a combination of linkage and content information provides much more effective results than a system which is based purely on either of the two. This paper provides a survey of such algorithms, and the advantages observed by using such algorithms in different scenarios. We also present avenues for future research in this area.",
"title": ""
},
{
"docid": "b5205513c021eabf6798c568759799f6",
"text": "Fillers belong to the most frequently used beautifying products. They are generally well tolerated, but any one of them may occasionally produce adverse side effects. Adverse effects usually last as long as the filler is in the skin, which means that short-lived fillers have short-term side effects and permanent fillers may induce life-long adverse effects. The main goal is to prevent them, however, this is not always possible. Utmost care has to be given to the prevention of infections and the injection technique has to be perfect. Treatment of adverse effects is often with hyaluronidase or steroid injections and in some cases together with 5-fluorouracil plus allopurinol orally. Histological examination of biopsy specimens often helps to identify the responsible filler allowing a specific treatment to be adapted.",
"title": ""
},
{
"docid": "3c89e7c5fdd2269ffb17adcaec237d6c",
"text": "Numerical simulation of quantum systems is crucial to further our understanding of natural phenomena. Many systems of key interest and importance, in areas such as superconducting materials and quantum chemistry, are thought to be described by models which we cannot solve with sufficient accuracy, neither analytically nor numerically with classical computers. Using a quantum computer to simulate such quantum systems has been viewed as a key application of quantum computation from the very beginning of the field in the 1980s. Moreover, useful results beyond the reach of classical computation are expected to be accessible with fewer than a hundred qubits, making quantum simulation potentially one of the earliest practical applications of quantum computers. In this paper we survey the theoretical and experimental development of quantum simulation using quantum computers, from the first ideas to the intense research efforts currently underway.",
"title": ""
},
{
"docid": "29fa75e49d4179072ec25b8aab6b48e2",
"text": "We describe the design, development, and API for two discourse parsers for Rhetorical Structure Theory. The two parsers use the same underlying framework, but one uses features that rely on dependency syntax, produced by a fast shift-reduce parser, whereas the other uses a richer feature space, including both constituentand dependency-syntax and coreference information, produced by the Stanford CoreNLP toolkit. Both parsers obtain state-of-the-art performance, and use a very simple API consisting of, minimally, two lines of Scala code. We accompany this code with a visualization library that runs the two parsers in parallel, and displays the two generated discourse trees side by side, which provides an intuitive way of comparing the two parsers.",
"title": ""
},
{
"docid": "8e3b73204d1d62337c4b2aabdbaa8973",
"text": "The goal of this paper is to analyze the geometric properties of deep neural network classifiers in the input space. We specifically study the topology of classification regions created by deep networks, as well as their associated decision boundary. Through a systematic empirical investigation, we show that state-of-the-art deep nets learn connected classification regions, and that the decision boundary in the vicinity of datapoints is flat along most directions. We further draw an essential connection between two seemingly unrelated properties of deep networks: their sensitivity to additive perturbations in the inputs, and the curvature of their decision boundary. The directions where the decision boundary is curved in fact characterize the directions to which the classifier is the most vulnerable. We finally leverage a fundamental asymmetry in the curvature of the decision boundary of deep nets, and propose a method to discriminate between original images, and images perturbed with small adversarial examples. We show the effectiveness of this purely geometric approach for detecting small adversarial perturbations in images, and for recovering the labels of perturbed images.",
"title": ""
},
{
"docid": "7e7d6eac8e70bbdd008209aeb21c5e10",
"text": "Recent research on Internet traffic classification has produced a number of approaches for distinguishing types of traffic. However, a rigorous comparison of such proposed algorithms still remains a challenge, since every proposal considers a different benchmark for its experimental evaluation. A lack of clear consensus on an objective and cientific way for comparing results has made researchers uncertain of fundamental as well as relative contributions and limitations of each proposal. In response to the growing necessity for an objective method of comparing traffic classifiers and to shed light on scientifically grounded traffic classification research, we introduce an Internet traffic classification benchmark tool, NeTraMark. Based on six design guidelines (Comparability, Reproducibility, Efficiency, Extensibility, Synergy, and Flexibility/Ease-of-use), NeTraMark is the first Internet traffic lassification benchmark where eleven different state-of-the-art traffic classifiers are integrated. NeTraMark allows researchers and practitioners to easily extend it with new classification algorithms and compare them with other built-in classifiers, in terms of three categories of performance metrics: per-whole-trace flow accuracy, per-application flow accuracy, and computational performance.",
"title": ""
},
{
"docid": "f59ed11cd56f48e7ff25e5ad21d27ded",
"text": "Recent research has begun to focus on the factors that cause people to respond to phishing attacks as well as affect user behavior on social networks. This study examines the correlation between the Big Five personality traits and email phishing response. Another aspect examined is how these factors relate to users' tendency to share information and protect their privacy on Facebook (which is one of the most popular social networking sites).\n This research shows that when using a prize phishing email, neuroticism is the factor most correlated to responding to this email, in addition to a gender-based difference in the response. This study also found that people who score high on the openness factor tend to both post more information on Facebook as well as have less strict privacy settings, which may cause them to be susceptible to privacy attacks. In addition, this work detected no correlation between the participants estimate of being vulnerable to phishing attacks and actually being phished, which suggests susceptibility to phishing is not due to lack of awareness of the phishing risks and that real-time response to phishing is hard to predict in advance by online users.\n The goal of this study is to better understand the traits that contribute to online vulnerability, for the purpose of developing customized user interfaces and secure awareness education, designed to increase users' privacy and security in the future.",
"title": ""
},
{
"docid": "85e51ac7980deac92e140d0965a35708",
"text": "Ensuring that autonomous systems work ethically is both complex and difficult. However, the idea of having an additional ‘governor’ that assesses options the system has, and prunes them to select the most ethical choices is well understood. Recent work has produced such a governor consisting of a ‘consequence engine’ that assesses the likely future outcomes of actions then applies a Safety/Ethical logic to select actions. Although this is appealing, it is impossible to be certain that the most ethical options are actually taken. In this paper we extend and apply a well-known agent verification approach to our consequence engine, allowing us to verify the correctness of its ethical decision-making.",
"title": ""
},
{
"docid": "88505b670f71895ccc9d61e6b501a1b2",
"text": "We have been promoting a project of musculoskeletal humanoids. The project aims at the long-term goal of human-symbiotic robots as well as the mid-term goal of necessary design and control concepts for musculoskeletal robots. This paper presents the concepts and aim of the project and also shows the outline of our latest results about development of new musculoskeletal humanoid Kojiro, which is the succeeding version of our previous Kotaro.",
"title": ""
},
{
"docid": "dd085dce8ff78ed1843639f8dd3e04d1",
"text": "This article presents a new framework for synthesizing motion of a virtual character in response to the actions performed by a user-controlled character in real time. In particular, the proposed method can handle scenes in which the characters are closely interacting with each other such as those in partner dancing and fighting. In such interactions, coordinating the virtual characters with the human player automatically is extremely difficult because the system has to predict the intention of the player character. In addition, the style variations from different users affect the accuracy in recognizing the movements of the player character when determining the responses of the virtual character. To solve these problems, our framework makes use of the spatial relationship-based representation of the body parts called interaction mesh, which has been proven effective for motion adaptation. The method is computationally efficient, enabling real-time character control for interactive applications. We demonstrate its effectiveness and versatility in synthesizing a wide variety of motions with close interactions.",
"title": ""
}
] | scidocsrr |
1a132ff410557e71ec7ce25803086021 | BER estimation from EVM for QPSK and 16-QAM coherent optical systems | [
{
"docid": "baf9e931df45d010c44083973d1281fd",
"text": "Error vector magnitude (EVM) is one of the widely accepted figure of merits used to evaluate the quality of communication systems. In the literature, EVM has been related to signal-to-noise ratio (SNR) for data-aided receivers, where preamble sequences or pilots are used to measure the EVM, or under the assumption of high SNR values. In this paper, this relation is examined for nondata-aided receivers and is shown to perform poorly, especially for low SNR values or high modulation orders. The EVM for nondata-aided receivers is then evaluated and its value is related to the SNR for quadrature amplitude modulation (QAM) and pulse amplitude modulation (PAM) signals over additive white Gaussian noise (AWGN) channels and Rayleigh fading channels, and for systems with IQ imbalances. The results show that derived equations can be used to reliably estimate SNR values using EVM measurements that are made based on detected data symbols. Thus, presented work can be quite useful for measurement devices such as vector signal analyzers (VSA), where EVM measurements are readily available.",
"title": ""
}
] | [
{
"docid": "06fb91a00e75d7dfd6be198092f41e62",
"text": "INTRODUCTION We describe indications and surgical technique for dividing the stapedius and tensor tympani tendons during middle ear surgery. Middle ear muscle reflexes involve contraction of the tensor tympani muscle (TTM) and stapedius muscle (SM) to increase impedance of the middle ear, and may shield the inner ear from loud, continuous nonimpact noise. Sectioning SM and TTM tendons has been advocated for a number of conditions, including improving access to anterior epitympanic (supratubal) recess, releasing a medialized malleus during tympanoplasty and ossiculoplasty, tensor or stapedial myoclonus, reflexive vertigo, and Meniere disease.",
"title": ""
},
{
"docid": "e498e5f0b1174e465dbef8747545f5a7",
"text": "We propose a novel architecture for k-shot classification on the Omniglot dataset. Building on prototypical networks, we extend their architecture to what we call Gaussian prototypical networks. Prototypical networks learn a map between images and embedding vectors, and use their clustering for classification. In our model, a part of the encoder output is interpreted as a confidence region estimate about the embedding point, and expressed as a Gaussian covariance matrix. Our network then constructs a direction and class dependent distance metric on the embedding space, using uncertainties of individual data points as weights. We show that Gaussian prototypical networks are a preferred architecture over vanilla prototypical networks with an equivalent number of parameters. We report state-ofthe-art performance in 1-shot and 5-shot classification both in 5-way and 20-way regime (for 5-shot 5-way, we are comparable to previous state-of-the-art) on the Omniglot dataset. We explore artificially down-sampling a fraction of images in the training set, which improves our performance even further. We therefore hypothesize that Gaussian prototypical networks might perform better in less homogeneous, noisier datasets, which are commonplace in real world applications.",
"title": ""
},
{
"docid": "9677d364752d50160557bd8e9dfa0dfb",
"text": "a Junior Research Group of Primate Sexual Selection, Department of Reproductive Biology, German Primate Center Courant Research Center ‘Evolution of Social Behavior’, Georg-August-Universität, Germany c Junior Research Group of Primate Kin Selection, Department of Primatology, Max-Planck-Institute for Evolutionary Anthropology, Germany d Institute of Biology, Faculty of Bioscience, Pharmacy and Psychology, University of Leipzig, Germany e Faculty of Veterinary Medicine, Bogor Agricultural University, Indonesia",
"title": ""
},
{
"docid": "78a1ebceb57a90a15357390127c443b7",
"text": "In this paper we present a clean, yet effective, model for word sense disambiguation. Our approach leverage a bidirectional long short-term memory network which is shared between all words. This enables the model to share statistical strength and to scale well with vocabulary size. The model is trained end-to-end, directly from the raw text to sense labels, and makes effective use of word order. We evaluate our approach on two standard datasets, using identical hyperparameter settings, which are in turn tuned on a third set of held out data. We employ no external resources (e.g. knowledge graphs, part-of-speech tagging, etc), language specific features, or hand crafted rules, but still achieve statistically equivalent results to the best state-of-the-art systems, that employ no such limitations.",
"title": ""
},
{
"docid": "3ac89f0f4573510942996ae66ef8184c",
"text": "Deep convolutional neural networks have been successfully applied to image classification tasks. When these same networks have been applied to image retrieval, the assumption has been made that the last layers would give the best performance, as they do in classification. We show that for instance-level image retrieval, lower layers often perform better than the last layers in convolutional neural networks. We present an approach for extracting convolutional features from different layers of the networks, and adopt VLAD encoding to encode features into a single vector for each image. We investigate the effect of different layers and scales of input images on the performance of convolutional features using the recent deep networks OxfordNet and GoogLeNet. Experiments demonstrate that intermediate layers or higher layers with finer scales produce better results for image retrieval, compared to the last layer. When using compressed 128-D VLAD descriptors, our method obtains state-of-the-art results and outperforms other VLAD and CNN based approaches on two out of three test datasets. Our work provides guidance for transferring deep networks trained on image classification to image retrieval tasks.",
"title": ""
},
{
"docid": "0f29172ecf0ed3dfd775c3fa43db4127",
"text": "Reusing software through copying and pasting is a continuous plague in software development despite the fact that it creates serious maintenance problems. Various techniques have been proposed to find duplicated redundant code (also known as software clones). A recent study has compared these techniques and shown that token-based clone detection based on suffix trees is extremely fast but yields clone candidates that are often no syntactic units. Current techniques based on abstract syntax trees-on the other hand-find syntactic clones but are considerably less efficient. This paper describes how we can make use of suffix trees to find clones in abstract syntax trees. This new approach is able to find syntactic clones in linear time and space. The paper reports the results of several large case studies in which we empirically compare the new technique to other techniques using the Bellon benchmark for clone detectors",
"title": ""
},
{
"docid": "2059db0707ffc28fd62b7387ba6d09ae",
"text": "Embedded quantization is a mechanism employed by many lossy image codecs to progressively refine the distortion of a (transformed) image. Currently, the most common approach to do so in the context of wavelet-based image coding is to couple uniform scalar deadzone quantization (USDQ) with bitplane coding (BPC). USDQ+BPC is convenient for its practicality and has proved to achieve competitive coding performance. But the quantizer established by this scheme does not allow major variations. This paper introduces a multistage quantization scheme named general embedded quantization (GEQ) that provides more flexibility to the quantizer. GEQ schemes can be devised for specific decoding rates achieving optimal coding performance. Practical approaches of GEQ schemes achieve coding performance similar to that of USDQ+BPC while requiring fewer quantization stages. The performance achieved by GEQ is evaluated in this paper through experimental results carried out in the framework of modern image coding systems.",
"title": ""
},
{
"docid": "ff8dec3914e16ae7da8801fe67421760",
"text": "A hypothesized need to form and maintain strong, stable interpersonal relationships is evaluated in light of the empirical literature. The need is for frequent, nonaversive interactions within an ongoing relational bond. Consistent with the belongingness hypothesis, people form social attachments readily under most conditions and resist the dissolution of existing bonds. Belongingness appears to have multiple and strong effects on emotional patterns and on cognitive processes. Lack of attachments is linked to a variety of ill effects on health, adjustment, and well-being. Other evidence, such as that concerning satiation, substitution, and behavioral consequences, is likewise consistent with the hypothesized motivation. Several seeming counterexamples turned out not to disconfirm the hypothesis. Existing evidence supports the hypothesis that the need to belong is a powerful, fundamental, and extremely pervasive motivation.",
"title": ""
},
{
"docid": "cc8cab769752154114d4d499b3e6f974",
"text": "The quality of a biosensing system relies on the interfacial properties where bioactive species are immobilized. The design of the surface includes both the immobilization of the bioreceptor itself and the overall chemical preparation of the transducer surface. Hence, the sensitivity and specificity of such devices are directly related to the accessibility and activity of the immobilized molecules. The inertness of the surface that limits the nonspecific adsorption sets the background noise of the sensor. The specifications of the biosensor (signal-to-noise ratio) depend largely on the surface chemistry and preparation process of the biointerface. Lastly, a robust interface improves the stability and the reliability of biosensors. This chapter reports in detail the main surface coupling strategies spanning from random immobilization of native biospecies to uniform and oriented immobilization of site-specific modified biomolecules. The immobilization of receptors on various shapes of solid support is then introduced. Detection systems sensitive to surface phenomena require immobilization as very thin layers (two-dimensional biofunctionalization), whereas other detection systems accept thicker layers (threedimensional biofunctionalization) such as porous materials of high specific area that lead to large increase of signal detection. This didactical overview introduces each step of the biofunctionalization with respect to the diversity of biological molecules, their accessibility and resistance to nonspecific adsorption at interfaces.",
"title": ""
},
{
"docid": "356a2c0b4837cf3d001068d43cb2b633",
"text": "A design is described of a broadband circularly-polarized (CP) slot antenna. A conventional annular-ring slot antenna is first analyzed, and it is found that two adjacent CP modes can be simultaneously excited through the proximity coupling of an L-shaped feed line. By tuning the dimensions of this L-shaped feed line, the two CP modes can be coupled together and a broad CP bandwidth is thus formed. The design method is also valid when the inner circular patch of the annular-ring slot antenna is vertically raised from the ground plane. In this case, the original band-limited ring slot antenna is converted into a wide-band structure that is composed of a circular wide slot and a parasitic patch, and consequently the CP bandwidth is further enhanced. For the patch-loaded wide slot antenna, its key parameters are investigated to show how to couple the two CP modes and achieve impedance matching. The effects of the distance between the parasitic patch and wide slot on the CP bandwidth and antenna gain are also presented and discussed in details.",
"title": ""
},
{
"docid": "82bc0095cfe6470ed1a0173ba43043fb",
"text": "Property rights theory has common antecedents with contractual theories of the firm such as transaction costs and agency theories, and is yet distinct from these theories. We illustrate fundamental theoretical principles derived from these three theories by analyzing the business case of oil field unitization. Theoretical principles and application of theory to oil field unitization are each summarized. From this, it is possible to see how property rights theory is well suited to explain business situations where inefficient economic outcomes persist. Additionally, property rights theory forges new theoretical connections with other branches of organizational economics, in particular, resource-based theory. Copyright # 2005 John Wiley & Sons, Ltd.",
"title": ""
},
{
"docid": "90cafc449ebe112a022715f7b6845ba9",
"text": "Deep neural nets have caused a revolution in many classification tasks. A related ongoing revolution—also theoretically not understood—concerns their ability to serve as generative models for complicated types of data such as images and texts. These models are trained using ideas like variational autoencoders and Generative Adversarial Networks. We take a first cut at explaining the expressivity of multilayer nets by giving a sufficient criterion for a function to be approximable by a neural network with n hidden layers. A key ingredient is Barron’s Theorem [Bar93], which gives a Fourier criterion for approximability of a function by a neural network with 1 hidden layer. We show that a composition of n functions which satisfy certain Fourier conditions (“Barron functions”) can be approximated by a n+ 1layer neural network. For probability distributions, this translates into a criterion for a probability distribution to be approximable in Wasserstein distance—a natural metric on probability distributions—by a neural network applied to a fixed base distribution (e.g., multivariate gaussian). Building up recent lower bound work, we also give an example function that shows that composition of Barron functions is more expressive than Barron functions alone.",
"title": ""
},
{
"docid": "2175ec8bccfafe0e577c0793d87349e7",
"text": "Modern dog breeding has given rise to more than 400 breeds differing both in morphology and behaviour. Traditionally, kennel clubs have utilized an artificial category system based on the morphological similarity and historical function of each dog breed. Behavioural comparisons at the breed-group level produced ambiguous results as to whether the historical function still has an influence on the breed-typical behaviour. Recent genetic studies have uncovered genetic relatedness between dog breeds, which can be independent from their historical function and may offer an alternative explanation of behavioural differences among breeds. This exploratory study aimed to investigate the behaviour profiles of 98 breeds, and the behavioural differences among conventional breed groups based on historical utility and among genetic breed clusters. Owners of 5733 dogs (98 breeds) filled out an online questionnaire in German. Breed trait scores on trainability, boldness, calmness and dog sociability were calculated by averaging the scores of all individuals of the breed. Breeds were ranked on the four traits and a cluster analysis was performed to explore behavioural similarity between breeds. We found that two of the behaviour traits (trainability and boldness) significantly differed both among the conventional and the genetic breed groups. Using the conventional classification we revealed that Herding dogs were more trainable than Hounds, Working dogs, Toy dogs and Non-sporting dogs; Sporting dogs were also more trainable than Nonsporting dogs. In parallel, Terriers were bolder than Hounds and Herding dogs. Regarding genetic relatedness, breeds with ancient Asian or African origin (Ancient breeds) were less trainable than breeds in the Herding/sighthound cluster and the Hunting breeds. Breeds in the Mastiff/terrier cluster were bolder than the Ancient breeds, the breeds in the Herding/sighthound cluster and the Hunting breeds. Six breed clusters were created on the basis of behavioural similarity. All the conventional and genetic groups had representatives in at least three of these clusters. Thus, the behavioural breed clusters showed poor correspondence to both the functional and genetic categorisation, which may reflect the effect of recent selective processes. Behavioural breed clusters can provide a more reliable characterization of the breeds’ current typical behaviour. © 2011 Elsevier B.V. All rights reserved. ∗ Corresponding author. Tel.: +36 1 3812179; fax: +36 1 3812180. E-mail addresses: borbala.turcsan@gmail.com (B. Turcsán), kubinyie@gmail.com (E. Kubinyi), amiklosi62@gmail.com (Á. Miklósi).",
"title": ""
},
{
"docid": "07fc203735e9da22e0dc49c4a1153db0",
"text": "The implementation, diffusion and adoption of e-government in the public sector has been a topic that has been debated by the research community for some time. In particular, the limited adoption of e-government services is attributed to factors such as the heterogeneity of users, lack of user-orientation, the limited transformation of public sector and the mismatch between expectations and supply. In this editorial, we review theories and factors impacting implementation, diffusion and adoption of e-government. Most theories used in prior research follow mainstream information systems concepts, which can be criticized for not taking into account e-government specific characteristics. The authors argue that there is a need for e-government specific theories and methodologies that address the idiosyncratic nature of e-government as the well-known information systems concepts that are primarily developed for business contexts are not equipped to encapsulate the complexities surrounding e-government. Aspects like accountability, digital divide, legislation, public governance, institutional complexity and citizens' needs are challenging issues that have to be taken into account in e-government theory and practices. As such, in this editorial we argue that e-government should develop as an own strand of research, while information systems theories and concepts should not be neglected.",
"title": ""
},
{
"docid": "71fe8a71c2855499834b2f6a60b2a759",
"text": "The pomegranate, Punica granatum L., is an ancient, mystical, unique fruit borne on a small, long-living tree cultivated throughout the Mediterranean region, as far north as the Himalayas, in Southeast Asia, and in California and Arizona in the United States. In addition to its ancient historical uses, pomegranate is used in several systems of medicine for a variety of ailments. The synergistic action of the pomegranate constituents appears to be superior to that of single constituents. In the past decade, numerous studies on the antioxidant, anticarcinogenic, and anti-inflammatory properties of pomegranate constituents have been published, focusing on treatment and prevention of cancer, cardiovascular disease, diabetes, dental conditions, erectile dysfunction, bacterial infections and antibiotic resistance, and ultraviolet radiation-induced skin damage. Other potential applications include infant brain ischemia, male infertility, Alzheimer's disease, arthritis, and obesity.",
"title": ""
},
{
"docid": "66a4aa1e96596221729611add5390daf",
"text": "Table characteristics vary widely. Consequently, a great variety of computational approaches have been applied to table recognition. In this survey, the table recognition literature is presented as an interaction of table models, observations, transformations, and inferences. A table model defines the physical and logical structure of tables; the model is used to detect tables and to analyze and decompose the detected tables. Observations perform feature measurements and data lookup, transformations alter or restructure data, and inferences generate and test hypotheses. This presentation clarifies both the decisions made by a table recognizer and the assumptions and inferencing techniques that underlie these decisions.",
"title": ""
},
{
"docid": "592a3f8b0d0781acd89c0102d1cd2a4e",
"text": "A novel, compact X-shaped slotted square-patch antenna is proposed for circularly polarized (CP) radiation. A cross-strip is embedded along the X-shaped slot for a novel proximity-fed technique to produce CP radiation in the UHF band. In the proposed design, two pairs of T-shaped slots are etched orthogonally on the square patch, connected to the center of the X-shaped slot for CP radiation and antenna size reduction. Proper adjustment of the length and coupling gap of the cross-strip will excite two orthogonal modes with 90 ° phase difference for good CP radiation. Simulated and measured results indicate that the proposed structure can achieve circular polarization. A measured impedance bandwidth (VSWR ≤ 2) of about 3.0% (909-937 MHz) and a 3-dB axial-ratio (AR) bandwidth of about 1.3% (917-929 MHz) were obtained.",
"title": ""
},
{
"docid": "69d16861f969b2aaaa6658a754268786",
"text": "In this paper, we introduce a bilinear composition loss function to address the problem of image dehazing. Previous methods in image dehazing use a two-stage approach which first estimate the transmission map followed by clear image estimation. The drawback of a two-stage method is that it tends to boost local image artifacts such as noise, aliasing and blocking. This is especially the case for heavy haze images captured with a low quality device. Our method is based on convolutional neural networks. Unique in our method is the bilinear composition loss function which directly model the correlations between transmission map, clear image, and atmospheric light. This allows errors to be back-propagated to each sub-network concurrently, while maintaining the composition constraint to avoid overfitting of each sub-network. We evaluate the effectiveness of our proposed method using both synthetic and real world examples. Extensive experiments show that our method outperfoms state-of-the-art methods especially for haze images with severe noise level and compressions.",
"title": ""
},
{
"docid": "97b7d2dbb06b083b807a4f153e8a711e",
"text": "Hyperspectral imaging sensors are becoming increasingly popular in robotics applications such as agriculture and mining, and allow per-pixel thematic classification of materials in a scene based on their unique spectral signatures. Recently, convolutional neural networks have shown remarkable performance for classification tasks, but require substantial amounts of labelled training data. This data must sufficiently cover the variability expected to be encountered in the environment. For hyperspectral data, one of the main variations encountered outdoors is due to incident illumination, which can change in spectral shape and intensity depending on the scene geometry. For example, regions occluded from the sun have a lower intensity and their incident irradiance skewed towards shorter wavelengths. In this work, a data augmentation strategy based on relighting is used during training of a hyperspectral convolutional neural network. It allows training to occur in the outdoor environment given only a small labelled region, which does not need to sufficiently represent the geometric variability of the entire scene. This is important for applications where obtaining large amounts of training data is labourious, hazardous or difficult, such as labelling pixels within shadows. Radiometric normalisation approaches for preprocessing the hyperspectral data are analysed and it is shown that methods based on the raw pixel data are sufficient to be used as input for the classifier. This removes the need for external hardware such as calibration boards, which can restrict the application of hyperspectral sensors in robotics applications. Experiments to evaluate the classification system are carried out on two datasets captured from a field-based platform.",
"title": ""
},
{
"docid": "d372c1fba12412dac5dc850baf3267b9",
"text": "Smart grid is an intelligent power network featured by its two-way flows of electricity and information. With an integrated communication infrastructure, smart grid manages the operation of all connected components to provide reliable and sustainable electricity supplies. Many advanced communication technologies have been identified for their applications in different domains of smart grid networks. This paper focuses on wireless communication networking technologies for smart grid neighborhood area networks (NANs). In particular, we aim to offer a comprehensive survey to address various important issues on implementation of smart grid NANs, including network topology, gateway deployment, routing algorithms, and security. We will identify four major challenges for the implementation of NANs, including timeliness management, security assurance, compatibility design, and cognitive spectrum access, based on which the future research directions are suggested.",
"title": ""
}
] | scidocsrr |
4c45393f8d80acbf4b4bc8630255ea0e | Compositional Verification for Autonomous Systems with Deep Learning Components | [
{
"docid": "ed9e22167d3e9e695f67e208b891b698",
"text": "ÐIn k-means clustering, we are given a set of n data points in d-dimensional space R and an integer k and the problem is to determine a set of k points in R, called centers, so as to minimize the mean squared distance from each data point to its nearest center. A popular heuristic for k-means clustering is Lloyd's algorithm. In this paper, we present a simple and efficient implementation of Lloyd's k-means clustering algorithm, which we call the filtering algorithm. This algorithm is easy to implement, requiring a kd-tree as the only major data structure. We establish the practical efficiency of the filtering algorithm in two ways. First, we present a data-sensitive analysis of the algorithm's running time, which shows that the algorithm runs faster as the separation between clusters increases. Second, we present a number of empirical studies both on synthetically generated data and on real data sets from applications in color quantization, data compression, and image segmentation. Index TermsÐPattern recognition, machine learning, data mining, k-means clustering, nearest-neighbor searching, k-d tree, computational geometry, knowledge discovery.",
"title": ""
},
{
"docid": "17611b0521b69ad2b22eeadc10d6d793",
"text": "Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neural networks are vulnerable to adversarial examples: given an input x and any target classification t, it is possible to find a new input x' that is similar to x but classified as t. This makes it difficult to apply neural networks in security-critical areas. Defensive distillation is a recently proposed approach that can take an arbitrary neural network, and increase its robustness, reducing the success rate of current attacks' ability to find adversarial examples from 95% to 0.5%.In this paper, we demonstrate that defensive distillation does not significantly increase the robustness of neural networks by introducing three new attack algorithms that are successful on both distilled and undistilled neural networks with 100% probability. Our attacks are tailored to three distance metrics used previously in the literature, and when compared to previous adversarial example generation algorithms, our attacks are often much more effective (and never worse). Furthermore, we propose using high-confidence adversarial examples in a simple transferability test we show can also be used to break defensive distillation. We hope our attacks will be used as a benchmark in future defense attempts to create neural networks that resist adversarial examples.",
"title": ""
},
{
"docid": "01ed1959250874c55bd32d472461718f",
"text": "Deep neural networks have become widely used, obtaining remarkable results in domains such as computer vision, speech recognition, natural language processing, audio recognition, social network filtering, machine translation, and bio-informatics, where they have produced results comparable to human experts. However, these networks can be easily “fooled” by adversarial perturbations: minimal changes to correctly-classified inputs, that cause the network to misclassify them. This phenomenon represents a concern for both safety and security, but it is currently unclear how to measure a network’s robustness against such perturbations. Existing techniques are limited to checking robustness around a few individual input points, providing only very limited guarantees. We propose a novel approach for automatically identifying safe regions of the input space, within which the network is robust against adversarial perturbations. The approach is data-guided, relying on clustering to identify well-defined geometric regions as candidate safe regions. We then utilize verification techniques to confirm that these regions are safe or to provide counter-examples showing that they are not safe. We also introduce the notion of targeted robustness which, for a given target label and region, ensures that a NN does not map any input in the region to the target label. We evaluated our technique on the MNIST dataset and on a neural network implementation of a controller for the next-generation Airborne Collision Avoidance System for unmanned aircraft (ACAS Xu). For these networks, our approach identified multiple regions which were completely safe as well as some which were only safe for specific labels. It also discovered several adversarial perturbations of interest.",
"title": ""
},
{
"docid": "11a69c06f21e505b3e05384536108325",
"text": "Most existing machine learning classifiers are highly vulnerable to adversarial examples. An adversarial example is a sample of input data which has been modified very slightly in a way that is intended to cause a machine learning classifier to misclassify it. In many cases, these modifications can be so subtle that a human observer does not even notice the modification at all, yet the classifier still makes a mistake. Adversarial examples pose security concerns because they could be used to perform an attack on machine learning systems, even if the adversary has no access to the underlying model. Up to now, all previous work have assumed a threat model in which the adversary can feed data directly into the machine learning classifier. This is not always the case for systems operating in the physical world, for example those which are using signals from cameras and other sensors as an input. This paper shows that even in such physical world scenarios, machine learning systems are vulnerable to adversarial examples. We demonstrate this by feeding adversarial images obtained from cell-phone camera to an ImageNet Inception classifier and measuring the classification accuracy of the system. We find that a large fraction of adversarial examples are classified incorrectly even when perceived through the camera.",
"title": ""
}
] | [
{
"docid": "cc6b9165f395e832a396d59c85f482cc",
"text": "Vision-based automatic counting of people has widespread applications in intelligent transportation systems, security, and logistics. However, there is currently no large-scale public dataset for benchmarking approaches on this problem. This work fills this gap by introducing the first real-world RGBD People Counting DataSet (PCDS) containing over 4, 500 videos recorded at the entrance doors of buses in normal and cluttered conditions. It also proposes an efficient method for counting people in real-world cluttered scenes related to public transportations using depth videos. The proposed method computes a point cloud from the depth video frame and re-projects it onto the ground plane to normalize the depth information. The resulting depth image is analyzed for identifying potential human heads. The human head proposals are meticulously refined using a 3D human model. The proposals in each frame of the continuous video stream are tracked to trace their trajectories. The trajectories are again refined to ascertain reliable counting. People are eventually counted by accumulating the head trajectories leaving the scene. To enable effective head and trajectory identification, we also propose two different compound features. A thorough evaluation on PCDS demonstrates that our technique is able to count people in cluttered scenes with high accuracy at 45 fps on a 1.7 GHz processor, and hence it can be deployed for effective real-time people counting for intelligent transportation systems.",
"title": ""
},
{
"docid": "708fbc1eff4d96da2f3adaa403db3090",
"text": "We propose a new system for generating art. The system generates art by looking at art and learning about style; and becomes creative by increasing the arousal potential of the generated art by deviating from the learned styles. We build over Generative Adversarial Networks (GAN), which have shown the ability to learn to generate novel images simulating a given distribution. We argue that such networks are limited in their ability to generate creative products in their original design. We propose modifications to its objective to make it capable of generating creative art by maximizing deviation from established styles and minimizing deviation from art distribution. We conducted experiments to compare the response of human subjects to the generated art with their response to art created by artists. The results show that human subjects could not distinguish art generated by the proposed system from art generated by contemporary artists and shown in top art",
"title": ""
},
{
"docid": "9cebb39b2eb340a21c4f64c1bb42217e",
"text": "Text characters and strings in natural scene can provide valuable information for many applications. Extracting text directly from natural scene images or videos is a challenging task because of diverse text patterns and variant background interferences. This paper proposes a method of scene text recognition from detected text regions. In text detection, our previously proposed algorithms are applied to obtain text regions from scene image. First, we design a discriminative character descriptor by combining several state-of-the-art feature detectors and descriptors. Second, we model character structure at each character class by designing stroke configuration maps. Our algorithm design is compatible with the application of scene text extraction in smart mobile devices. An Android-based demo system is developed to show the effectiveness of our proposed method on scene text information extraction from nearby objects. The demo system also provides us some insight into algorithm design and performance improvement of scene text extraction. The evaluation results on benchmark data sets demonstrate that our proposed scheme of text recognition is comparable with the best existing methods.",
"title": ""
},
{
"docid": "f569131096d56336fa3ed547c05c2be4",
"text": "Providing high quality recommendations is important for e-commerce systems to assist users in making effective selection decisions from a plethora of choices. Collaborative filtering is a widely accepted technique to generate recommendations based on the ratings of like-minded users. However, it suffers from several inherent issues such as data sparsity and cold start. To address these problems, we propose a novel method called ''Merge'' to incorporate social trust information (i.e., trusted neighbors explicitly specified by users) in providing recommendations. Specifically, ratings of a user's trusted neighbors are merged to complement and represent the preferences of the user and to find other users with similar preferences (i.e., similar users). In addition, the quality of merged ratings is measured by the confidence considering the number of ratings and the ratio of conflicts between positive and negative opinions. Further, the rating confidence is incorporated into the computation of user similarity. The prediction for a given item is generated by aggregating the ratings of similar users. Experimental results based on three real-world data sets demonstrate that our method outperforms other counterparts both in terms of accuracy and coverage. The emergence of Web 2.0 applications has greatly changed users' styles of online activities from searching and browsing to interacting and sharing [6,40]. The available choices grow up exponentially, and make it challenge for users to find useful information which is well-known as the information overload problem. Recommender systems are designed and heavily used in modern e-commerce applications to cope with this problem, i.e., to provide users with high quality, personalized recommendations , and to help them find items (e.g., books, movies, news, music, etc.) of interest from a plethora of available choices. Collaborative filtering (CF) is one of the most well-known and commonly used techniques to generate recommendations [1,17]. The heuristic is that the items appreciated by those who have similar taste will also be in favor of by the active users (who desire recommendations). However, CF suffers from several inherent issues such as data sparsity and cold start. The former issue refers to the difficulty in finding sufficient and reliable similar users due to the fact that users in general only rate a small portion of items, while the latter refers to the dilemma that accurate recommendations are expected for the cold users who rate only a few items and thus whose preferences are hard to be inferred. To resolve these issues and model …",
"title": ""
},
{
"docid": "6cf2ffb0d541320b1ad04dc3b9e1c9a4",
"text": "Prediction of potential fraudulent activities may prevent both the stakeholders and the appropriate regulatory authorities of national or international level from being deceived. The objective difficulties on collecting adequate data that are obsessed by completeness affects the reliability of the most supervised Machine Learning methods. This work examines the effectiveness of forecasting fraudulent financial statements using semi-supervised classification techniques (SSC) that require just a few labeled examples for achieving robust learning behaviors mining useful data patterns from a larger pool of unlabeled examples. Based on data extracted from Greek firms, a number of comparisons between supervised and semi-supervised algorithms has been conducted. According to the produced results, the later algorithms are favored being examined over several scenarios of different Labeled Ratio (R) values.",
"title": ""
},
{
"docid": "8f47dc7401999924dba5cb3003194071",
"text": "Few types of signal streams are as ubiquitous as music. Here we consider the problem of extracting essential ingredients of music signals, such as well-defined global temporal structure in the form of nested periodicities (or meter). Can we construct an adaptive signal processing device that learns by example how to generate new instances of a given musical style? Because recurrent neural networks can in principle learn the temporal structure of a signal, they are good candidates for such a task. Unfortunately, music composed by standard recurrent neural networks (RNNs) often lacks global coherence. The reason for this failure seems to be that RNNs cannot keep track of temporally distant events that indicate global music structure. Long Short-Term Memory (LSTM) has succeeded in similar domains where other RNNs have failed, such as timing & counting and learning of context sensitive languages. In the current study we show that LSTM is also a good mechanism for learning to compose music. We present experimental results showing that LSTM successfully learns a form of blues music and is able to compose novel (and we believe pleasing) melodies in that style. Remarkably, once the network has found the relevant structure it does not drift from it: LSTM is able to play the blues with good timing and proper structure as long as one is willing to listen.",
"title": ""
},
{
"docid": "b6ae8a6fdd207686ae4c5108a4b77f1f",
"text": "Many IoT applications ingest and process time series data with emphasis on 5Vs (Volume, Velocity, Variety, Value and Veracity). To design and test such systems, it is desirable to have a high-performance traffic generator specifically designed for time series data, preferably using archived data to create a truly realistic workload. However, most existing traffic generator tools either are designed for generic network applications, or only produce synthetic data based on certain time series models. In addition, few have raised their performance bar to millions-packets-per-second level with minimum time violations. In this paper, we design, implement and evaluate a highly efficient and scalable time series traffic generator for IoT applications. Our traffic generator stands out in the following four aspects: 1) it generates time-conforming packets based on high-fidelity reproduction of archived time series data; 2) it leverages an open-source Linux Exokernel middleware and a customized userspace network subsystem; 3) it includes a scalable 10G network card driver and uses \"absolute\" zero-copy in stack processing; and 4) it has an efficient and scalable application-level software architecture and threading model. We have conducted extensive experiments on both a quad-core Intel workstation and a 20-core Intel server equipped with Intel X540 10G network cards and Samsung's NVMe SSDs. Compared with a stock Linux baseline and a traditional mmap-based file I/O approach, we observe that our traffic generator significantly outperforms other alternatives in terms of throughput (10X), scalability (3.6X) and time violations (46.2X).",
"title": ""
},
{
"docid": "bc388488c5695286fe7d7e56ac15fa94",
"text": "In this paper a new parking guiding and information system is described. The system assists the user to find the most suitable parking space based on his/her preferences and learned behavior. The system takes into account parameters such as driver's parking duration, arrival time, destination, type preference, cost preference, driving time, and walking distance as well as time-varying parking rules and pricing. Moreover, a prediction algorithm is proposed to forecast the parking availability for different parking locations for different times of the day based on the real-time parking information, and previous parking availability/occupancy data. A novel server structure is used to implement the system. Intelligent parking assist system reduces the searching time for parking spots in urban environments, and consequently leads to a reduction in air pollutions and traffic congestion. On-street parking meters, off-street parking garages, as well as free parking spaces are considered in our system.",
"title": ""
},
{
"docid": "eff903cb53fc7f7e9719a2372d517ab3",
"text": "The freshwater angelfishes (Pterophyllum) are South American cichlids that have become very popular among aquarists, yet scarce information on their culture and aquarium husbandry exists. We studied Pterophyllum scalare to analyze dietary effects on fecundity, growth, and survival of eggs and larvae during 135 days. Three diets were used: A) decapsulated cysts of Artemia, B) commercial dry fish food, and C) a mix diet of the rotifer Brachionus plicatilis and the cladoceran Daphnia magna. The initial larval density was 100 organisms in each 40 L aquarium. With diet A, larvae reached a maximum weight of 3.80 g, a total length of 6.3 cm, and a height of 5.8 cm; with diet B: 2.80 g, 4.81 cm, and 4.79 cm, and with diet C: 3.00 g, 5.15 cm, and 5.10 cm, respectively. Significant differences were observed between diet A, and diet B and C, but no significantly differences were observed between diets B and C. Fecundity varied from 234 to 1,082 eggs in 20 and 50 g females, respectively. Egg survival ranged from 87.4% up to 100%, and larvae survival (80 larvae/40 L aquarium) from 50% to 66.3% using diet B and A, respectively. Live food was better for growing fish than the commercial balanced food diet. Fecundity and survival are important factors in planning a good production of angelfish.",
"title": ""
},
{
"docid": "a4154317f6bb6af635edb1b2ef012d09",
"text": "The pulp industry in Taiwan discharges tons of wood waste and pulp sludge (i.e., wastewater-derived secondary sludge) per year. The mixture of these two bio-wastes, denoted as wood waste with pulp sludge (WPS), has been commonly converted to organic fertilizers for agriculture application or to soil conditioners. However, due to energy demand, the WPS can be utilized in a beneficial way to mitigate an energy shortage. This study elucidated the performance of applying torrefaction, a bio-waste to energy method, to transform the WPS into solid bio-fuel. Two batches of the tested WPS (i.e., WPS1 and WPS2) were generated from a virgin pulp factory in eastern Taiwan. The WPS1 and WPS2 samples contained a large amount of organics and had high heating values (HHV) on a dry-basis (HHD) of 18.30 and 15.72 MJ/kg, respectively, exhibiting a potential for their use as a solid bio-fuel. However, the wet WPS as received bears high water and volatile matter content and required de-watering, drying, and upgrading. After a 20 min torrefaction time (tT), the HHD of torrefied WPS1 (WPST1) can be enhanced to 27.49 MJ/kg at a torrefaction temperature (TT) of 573 K, while that of torrefied WPS2 (WPST2) increased to 19.74 MJ/kg at a TT of 593 K. The corresponding values of the energy densification ratio of torrefied solid bio-fuels of WPST1 and WPST2 can respectively rise to 1.50 and 1.25 times that of the raw bio-waste. The HHD of WPST1 of 27.49 MJ/kg is within the range of 24–35 MJ/kg for bituminous coal. In addition, the wet-basis HHV of WPST1 with an equilibrium moisture content of 5.91 wt % is 25.87 MJ/kg, which satisfies the Quality D coal specification of the Taiwan Power Co., requiring a value of above 20.92 MJ/kg.",
"title": ""
},
{
"docid": "6b6fd5bfbe1745a49ce497490cef949d",
"text": "This paper investigates optimal power allocation strategies over a bank of independent parallel Gaussian wiretap channels where a legitimate transmitter and a legitimate receiver communicate in the presence of an eavesdropper and an unfriendly jammer. In particular, we formulate a zero-sum power allocation game between the transmitter and the jammer where the payoff function is the secrecy rate. We characterize the optimal power allocation strategies as well as the Nash equilibrium in some asymptotic regimes. We also provide a set of results that cast further insight into the problem. Our scenario, which is applicable to current OFDM communications systems, demonstrates that transmitters that adapt to jammer experience much higher secrecy rates than non-adaptive transmitters.",
"title": ""
},
{
"docid": "fc3aeb32f617f7a186d41d56b559a2aa",
"text": "Existing neural relation extraction (NRE) models rely on distant supervision and suffer from wrong labeling problems. In this paper, we propose a novel adversarial training mechanism over instances for relation extraction to alleviate the noise issue. As compared with previous denoising methods, our proposed method can better discriminate those informative instances from noisy ones. Our method is also efficient and flexible to be applied to various NRE architectures. As shown in the experiments on a large-scale benchmark dataset in relation extraction, our denoising method can effectively filter out noisy instances and achieve significant improvements as compared with the state-of-theart models.",
"title": ""
},
{
"docid": "2181c4d52e721aab267057b8f271a9ee",
"text": "Recently, the widespread availability of consumer grade drones is responsible for the new concerns of air traffic control. This paper investigates the feasibility of drone detection by passive bistatic radar (PBR) system. Wuhan University has successfully developed a digitally multichannel PBR system, which is dedicated for the drone detection. Two typical trials with a cooperative drone have been designed to examine the system's capability of small drone detection. The agreement between experimental results and ground truth indicate the effectiveness of sensing and processing method, which verifies the practicability and prospects of drone detection by this digitally multichannel PBR system.",
"title": ""
},
{
"docid": "fb6494dcf01a927597ff784a3323e8c2",
"text": "Detection of defects in induction machine rotor bars for unassembled motors is required to evaluate machines considered for repair as well as fulfilling incremental quality assurance checks in the manufacture of new machines. Detection of rotor bar defects prior to motor assembly are critical in increasing repair efficiency and assuring the quality of newly manufactured machines. Many methods of detecting rotor bar defects in unassembled motors lack the sensitivity to find both major and minor defects in both cast and fabricated rotors along with additional deficiencies in quantifiable test results and arc-flash safety hazards. A process of direct magnetic field analysis can examine measurements from induced currents in a rotor separated from its stator yielding a high-resolution fingerprint of a rotor's magnetic field. This process identifies both major and minor rotor bar defects in a repeatable and quantifiable manner appropriate for numerical evaluation without arc-flash safety hazards.",
"title": ""
},
{
"docid": "935c404529b02cee2620e52f7a09b84d",
"text": "We introduce the Self-Adaptive Goal Generation Robust Intelligent Adaptive Curiosity (SAGG-RIAC) architecture as an intrinsically motivated goal exploration mechanism which allows active learning of inverse models in high-dimensional redundant robots. This allows a robot to efficiently and actively learn distributions of parameterized motor skills/policies that solve a corresponding distribution of parameterized tasks/goals. The architecture makes the robot sample actively novel parameterized tasks in the task space, based on a measure of competence progress, each of which triggers low-level goal-directed learning of the motor policy parameters that allow to solve it. For both learning and generalization, the system leverages regression techniques which allow to infer the motor policy parameters corresponding to a given novel parameterized task, and based on the previously learnt correspondences between policy and task parameters. We present experiments with high-dimensional continuous sensorimotor spaces in three different robotic setups: 1) learning the inverse kinematics in a highly-redundant robotic arm, 2) learning omnidirectional locomotion with motor primitives in a quadruped robot, 3) an arm learning to control a fishing rod with a flexible wire. We show that 1) exploration in the task space can be a lot faster than exploration in the actuator space for learning inverse models in redundant robots; 2) selecting goals maximizing competence progress creates developmental trajectories driving the robot to progressively focus on tasks of increasing complexity and is statistically significantly more efficient than selecting tasks randomly, as well as more efficient than different standard active motor babbling methods; 3) this architecture allows the robot to actively discover which parts of its task space it can learn to reach and which part it cannot.",
"title": ""
},
{
"docid": "7c8412c5a7c71fe76105983d3bf7e16d",
"text": "A novel wideband dual-cavity-backed circularly polarized (CP) crossed dipole antenna is presented in this letter. The exciter of the antenna comprises two classical orthogonal straight dipoles for a simple design. Dual-cavity structure is employed to achieve unidirectional radiation and improve the broadside gain. In particular, the rim edges of the cavity act as secondary radiators, which contribute to significantly enhance the overall CP performance of the antenna. The final design with an overall size of 0.57λ<sub>o</sub> × 0.57λ<sub>o</sub> × 0.24λ<sub>o</sub> where λ<sub>o</sub> is the free-space wavelength at the lowest CP operating frequency of 2.0 GHzb yields a measured –10 dB impedance bandwidth (BW) of 79.4% and 3 dB axial-ratio BW of 66.7%. The proposed antenna exhibits right-handed circular polarization with a maximum broadside gain of about 9.7 dBic.",
"title": ""
},
{
"docid": "90fe763855ca6c4fabe4f9d042d5c61a",
"text": "While learning models of intuitive physics is an increasingly active area of research, current approaches still fall short of natural intelligences in one important regard: they require external supervision, such as explicit access to physical states, at training and sometimes even at test times. Some authors have relaxed such requirements by supplementing the model with an handcrafted physical simulator. Still, the resulting methods are unable to automatically learn new complex environments and to understand physical interactions within them. In this work, we demonstrated for the first time learning such predictors directly from raw visual observations and without relying on simulators. We do so in two steps: first, we learn to track mechanically-salient objects in videos using causality and equivariance, two unsupervised learning principles that do not require auto-encoding. Second, we demonstrate that the extracted positions are sufficient to successfully train visual motion predictors that can take the underlying environment into account. We validate our predictors on synthetic datasets; then, we introduce a new dataset, ROLL4REAL, consisting of real objects rolling on complex terrains (pool table, elliptical bowl, and random height-field). We show that in all such cases it is possible to learn reliable extrapolators of the object trajectories from raw videos alone, without any form of external supervision and with no more prior knowledge than the choice of a convolutional neural network architecture.",
"title": ""
},
{
"docid": "ba0051fdc72efa78a7104587042cea64",
"text": "Open innovation breaks the original innovation border of organization and emphasizes the use of suppliers, customers, partners, and other internal and external innovative thinking and resources. How to effectively implement and manage open innovation has become a new business problem. Business ecosystem is the network system of value creation and co-evolution achieved by suppliers, users, partner, and other groups with self-organization mode. This study began with the risk analysis of open innovation implementation; then innovation process was embedded into business ecosystem structure; open innovation mode based on business ecosystem was proposed; business ecosystem based on open innovation was built according to influence degree of each innovative object. Study finds that both sides have a mutual promotion relationship, which provides a new analysis perspective for open innovation and business ecosystem; at the same time, it is also conducive to guiding the concrete practice of implementing open innovation.",
"title": ""
},
{
"docid": "f27391f29b44bfa9989146566a288b79",
"text": "An appealing feature of blockchain technology is smart contracts. A smart contract is executable code that runs on top of the blockchain to facilitate, execute and enforce an agreement between untrusted parties without the involvement of a trusted third party. In this paper, we conduct a systematic mapping study to collect all research that is relevant to smart contracts from a technical perspective. The aim of doing so is to identify current research topics and open challenges for future studies in smart contract research. We extract 24 papers from different scientific databases. The results show that about two thirds of the papers focus on identifying and tackling smart contract issues. Four key issues are identified, namely, codifying, security, privacy and performance issues. The rest of the papers focuses on smart contract applications or other smart contract related topics. Research gaps that need to be addressed in future studies are provided.",
"title": ""
}
] | scidocsrr |
82b68b01e41f85d2e2337d9dc5f4b877 | Waveform design and imaging method of MIMO ISAR based on orthogonal LFM signal | [
{
"docid": "18ee965b96c72dbbfc8ce833548a4f72",
"text": "With the inverse synthetic aperture radar (ISAR) imaging model, targets should move smoothly during the coherent processing interval (CPI). Since the CPI is quite long, fluctuations of a target's velocity and gesture will deteriorate image quality. This paper presents a multiple-input-multiple-output (MIMO)-ISAR imaging method by combining MIMO techniques and ISAR imaging theory. By using a special M-transmitter N-receiver linear array, a group of M orthogonal phase-code modulation signals with identical bandwidth and center frequency is transmitted. With a matched filter set, every target response corresponding to the orthogonal signals can be isolated at each receiving channel, and range compression is completed simultaneously. Based on phase center approximation theory, the minimum entropy criterion is used to rearrange the echo data after the target's velocity has been estimated, and then, the azimuth imaging will finally finish. The analysis of imaging and simulation results show that the minimum CPI of the MIMO-ISAR imaging method is 1/MN of the conventional ISAR imaging method under the same azimuth-resolution condition. It means that most flying targets can satisfy the condition that targets should move smoothly during CPI; therefore, the applicability and the quality of ISAR imaging will be improved.",
"title": ""
}
] | [
{
"docid": "1c960375b6cdebfbd65ea0124dcdce0f",
"text": "Parameterized unit tests extend the current industry practice of using closed unit tests defined as parameterless methods. Parameterized unit tests separate two concerns: 1) They specify the external behavior of the involved methods for all test arguments. 2) Test cases can be re-obtained as traditional closed unit tests by instantiating the parameterized unit tests. Symbolic execution and constraint solving can be used to automatically choose a minimal set of inputs that exercise a parameterized unit test with respect to possible code paths of the implementation. In addition, parameterized unit tests can be used as symbolic summaries which allows symbolic execution to scale for arbitrary abstraction levels. We have developed a prototype tool which computes test cases from parameterized unit tests. We report on its first use testing parts of the .NET base class library.",
"title": ""
},
{
"docid": "747df95d08e6e5b1802dacf4e84b6642",
"text": "One of the key requirement of many schemes is that of random numbers. Sequence of random numbers are used at several stages of a standard cryptographic protocol. A simple example is of a Vernam cipher, where a string of random numbers is added to massage string to generate the encrypted code. It is represented as C = M ⊕ K where M is the message, K is the key and C is the ciphertext. It has been mathematically shown that this simple scheme is unbreakable is key K as long as M and is used only once. For a good cryptosystem, the security of the cryptosystem is not be based on keeping the algorithm secret but solely on keeping the key secret. The quality and unpredictability of secret data is critical to securing communication by modern cryptographic techniques. Generation of such data for cryptographic purposes typically requires an unpredictable physical source of random data. In this manuscript, we present studies of three different methods for producing random number. We have tested them by studying its frequency, correlation as well as using the test suit from NIST.",
"title": ""
},
{
"docid": "0e4334595aeec579e8eb35b0e805282d",
"text": "In this paper, we present madmom, an open-source audio processing and music information retrieval (MIR) library written in Python. madmom features a concise, NumPy-compatible, object oriented design with simple calling conventions and sensible default values for all parameters, which facilitates fast prototyping of MIR applications. Prototypes can be seamlessly converted into callable processing pipelines through madmom's concept of Processors, callable objects that run transparently on multiple cores. Processors can also be serialised, saved, and re-run to allow results to be easily reproduced anywhere. Apart from low-level audio processing, madmom puts emphasis on musically meaningful high-level features. Many of these incorporate machine learning techniques and madmom provides a module that implements some methods commonly used in MIR such as hidden Markov models and neural networks. Additionally, madmom comes with several state-of-the-art MIR algorithms for onset detection, beat, downbeat and meter tracking, tempo estimation, and chord recognition. These can easily be incorporated into bigger MIR systems or run as stand-alone programs.",
"title": ""
},
{
"docid": "375c03e7b5f36239023def78678fe9bd",
"text": "This paper presents an extended version of GoalOriented Requirements Analysis Method called AGORA, where attribute values, e.g. contribution values and preference matrices, are added to goal graphs. An analyst attaches contribution values and preference values to edges and nodes of a goal graph respectively during the process for refining and decomposing the goals. The contribution value of an edge stands for the degree of the contribution of the sub-goal to the achievement of its parent goal, while the preference matrix of a goal represents the preference of the goal for each stakeholder. These values can help an analyst to choose and adopt a goal from the alternatives of the goals, to recognize the conflicts among the goals, and to analyze the impact of requirements changes. Furthermore the values on a goal graph and its structural characteristics allow the analyst to estimate the quality of the resulting requirements specification, such as correctness, unambiguity, completeness etc. The estimated quality values can suggest to him which goals should be improved and/or refined. In addition, we have applied AGORA to a user account system",
"title": ""
},
{
"docid": "dcd6effc28744aa875a37ad28ecc68e1",
"text": "The knowledge of transitions between regular, laminar or chaotic behaviors is essential to understand the underlying mechanisms behind complex systems. While several linear approaches are often insufficient to describe such processes, there are several nonlinear methods that, however, require rather long time observations. To overcome these difficulties, we propose measures of complexity based on vertical structures in recurrence plots and apply them to the logistic map as well as to heart-rate-variability data. For the logistic map these measures enable us not only to detect transitions between chaotic and periodic states, but also to identify laminar states, i.e., chaos-chaos transitions. The traditional recurrence quantification analysis fails to detect the latter transitions. Applying our measures to the heart-rate-variability data, we are able to detect and quantify the laminar phases before a life-threatening cardiac arrhythmia occurs thereby facilitating a prediction of such an event. Our findings could be of importance for the therapy of malignant cardiac arrhythmias.",
"title": ""
},
{
"docid": "9f6f22e320b91838c9be8f56d3f0564d",
"text": "We present an approach for ontology population from natural language English texts that extracts RDF triples according to FrameBase, a Semantic Web ontology derived from FrameNet. Processing is decoupled in two independently-tunable phases. First, text is processed by several NLP tasks, including Semantic Role Labeling (SRL), whose results are integrated in an RDF graph of mentions, i.e., snippets of text denoting some entity/fact. Then, the mention graph is processed with SPARQL-like rules using a specifically created mapping resource from NomBank/PropBank/FrameNet annotations to FrameBase concepts, producing a knowledge graph whose content is linked to DBpedia and organized around semantic frames, i.e., prototypical descriptions of events and situations. A single RDF/OWL representation is used where each triple is related to the mentions/tools it comes from. We implemented the approach in PIKES, an open source tool that combines two complementary SRL systems and provides a working online demo. We evaluated PIKES on a manually annotated gold standard, assessing precision/recall in (i) populating FrameBase ontology, and (ii) extracting semantic frames modeled after standard predicate models, for comparison with state-of-the-art tools for the Semantic Web. We also evaluated (iii) sampled precision and execution times on a large corpus of 110 K Wikipedia-like pages.",
"title": ""
},
{
"docid": "68c2b36ae2be6a0bc0a42cb8fcf284fe",
"text": "We present a data-driven shape model for reconstructing human body models from one or more 2D photos. One of the key tasks in reconstructing the 3D model from image data is shape recovery, a task done until now in utterly geometric way, in the domain of human body modeling. In contrast, we adopt a data-driven, parameterized deformable model that is acquired from a collection of range scans of real human body. The key idea is to complement the image-based reconstruction method by leveraging the quality shape and statistic information accumulated from multiple shapes of range-scanned people. In the presence of ambiguity either from the noise or missing views, our technique has a bias towards representing as much as possible the previously acquired ‘knowledge’ on the shape geometry. Texture coordinates are then generated by projecting the modified deformable model onto the front and back images. Our technique has shown to reconstruct successfully human body models from minimum number images, even from a single image input.",
"title": ""
},
{
"docid": "4179729bef0b37bb90d58395bb4dfd18",
"text": "A navigation mesh is a representation of a 2D or 3D virtual environment that enables path planning and crowd simulation for walking characters. Various state-of-the-art navigation meshes exist, but there is no standardized way of evaluating or comparing them. Each implementation is in a different state of maturity, has been tested on different hardware, uses different example environments, and may have been designed with a different application in mind.\n In this paper, we conduct the first comparative study of navigation meshes. First, we give general definitions of 2D and 3D environments and navigation meshes. Second, we propose theoretical properties by which navigation meshes can be classified. Third, we introduce metrics by which the quality of a navigation mesh implementation can be measured objectively. Finally, we use these metrics to compare various state-of-the-art navigation meshes in a range of 2D and 3D environments.\n We expect that this work will set a new standard for the evaluation of navigation meshes, that it will help developers choose an appropriate navigation mesh for their application, and that it will steer future research on navigation meshes in interesting directions.",
"title": ""
},
{
"docid": "28fcee5c28c2b3aae6f4761afb00ebc2",
"text": "The presence of sarcasm in text can hamper the performance of sentiment analysis. The challenge is to detect the existence of sarcasm in texts. This challenge is compounded when bilingual texts are considered, for example using Malay social media data. In this paper a feature extraction process is proposed to detect sarcasm using bilingual texts; more specifically public comments on economic related posts on Facebook. Four categories of feature that can be extracted using natural language processing are considered; lexical, pragmatic, prosodic and syntactic. We also investigated the use of idiosyncratic feature to capture the peculiar and odd comments found in a text. To determine the effectiveness of the proposed process, a non-linear Support Vector Machine was used to classify texts, in terms of the identified features, according to whether they included sarcastic content or not. The results obtained demonstrate that a combination of syntactic, pragmatic and prosodic features produced the best performance with an F-measure score of 0.852.",
"title": ""
},
{
"docid": "3cd565192b29593550032f695b61087c",
"text": "Forcing occurs when a magician influences the audience's decisions without their awareness. To investigate the mechanisms behind this effect, we examined several stimulus and personality predictors. In Study 1, a magician flipped through a deck of playing cards while participants were asked to choose one. Although the magician could influence the choice almost every time (98%), relatively few (9%) noticed this influence. In Study 2, participants observed rapid series of cards on a computer, with one target card shown longer than the rest. We expected people would tend to choose this card without noticing that it was shown longest. Both stimulus and personality factors predicted the choice of card, depending on whether the influence was noticed. These results show that combining real-world and laboratory research can be a powerful way to study magic and can provide new methods to study the feeling of free will.",
"title": ""
},
{
"docid": "0a2e59ab99b9666d8cf3fb31be9fa40c",
"text": "Behavioral targeting (BT) is a widely used technique for online advertising. It leverages information collected on an individual's web-browsing behavior, such as page views, search queries and ad clicks, to select the ads most relevant to user to display. With the proliferation of social networks, it is possible to relate the behavior of individuals and their social connections. Although the similarity among connected individuals are well established (i.e., homophily), it is still not clear whether and how we can leverage the activities of one's friends for behavioral targeting; whether forecasts derived from such social information are more accurate than standard behavioral targeting models. In this paper, we strive to answer these questions by evaluating the predictive power of social data across 60 consumer domains on a large online network of over 180 million users in a period of two and a half months. To our best knowledge, this is the most comprehensive study of social data in the context of behavioral targeting on such an unprecedented scale. Our analysis offers interesting insights into the value of social data for developing the next generation of targeting services.",
"title": ""
},
{
"docid": "6c2095e83fd7bc3b7bd5bd259d1ae9bb",
"text": "This paper basically deals with design of an IoT Smart Home System (IoTSHS) which can provide the remote control to smart home through mobile, infrared(IR) remote control as well as with PC/Laptop. The controller used to design the IoTSHS is WiFi based microcontroller. Temperature sensor is provided to indicate the room temperature and tell the user if it's needed to turn the AC ON or OFF. The designed IoTSHS need to be interfaced through switches or relays with the items under control through the power distribution box. When a signal is sent from IoTSHS, then the switches will connect or disconnect the item under control. The designed IoT smart home system can also provide remote controlling for the people who cannot use smart phone to control their appliances Thus, the designed IoTSHS can benefits the whole parts in the society by providing advanced remote controlling for the smart home. The designed IoTSHS is controlled through remote control which uses IR and WiFi. The IoTSHS is capable to connect to WiFi and have a web browser regardless to what kind of operating system it uses, to control the appliances. No application program is needed to purchase, download, or install. In WiFi controlling, the IoTSHS will give a secured Access Point (AP) with a particular service set identifier (SSID). The user will connect the device (e.g. mobile-phone or Laptop/PC) to this SSID with providing the password and then will open the browser and go to particular fixed link. This link will open an HTML web page which will allow the user to interface between the Mobile-Phone/Laptop/PC and the appliances. In addition, the IoTSHS may connect to the home router so that the user can control the appliances with keeping connection with home router. The proposed IoTSHS was designed, programmed, fabricated and tested with excellent results.",
"title": ""
},
{
"docid": "7669ed44cc1bada0cfaf28172738e6f5",
"text": "The widespread deployment of high-data-rate wireless connectivity was enabled by the adoption of the WiGig (802.11ad) standard, consequently placing a challenge on integrated Power Amplifiers (PAs). To comply with system requirements, the PA must cover bands from 57 to 66GHz and deliver up to 10dBm RF modulated power, while OFDM modulations up to 16 or 64QAM are supported, implying a large Peak-to-Average Power Ratio (PAPR).",
"title": ""
},
{
"docid": "b37fb73811110ec7a095e98df66f0ee0",
"text": "This paper looks into recent developments and research trends in collision avoidance/warning systems and automation of vehicle longitudinal/lateral control tasks. It is an attempt to provide a bigger picture of the very diverse, detailed and highly multidisciplinary research in this area. Based on diversely selected research, this paper explains the initiatives for automation in different levels of transportation system with a specific emphasis on the vehicle-level automation. Human factor studies and legal issues are analyzed as well as control algorithms. Drivers’ comfort and well being, increased safety, and increased highway capacity are among the most important initiatives counted for automation. However, sometimes these are contradictory requirements. Relying on an analytical survey of the published research, we will try to provide a more clear understanding of the impact of automation/warning systems on each of the above-mentioned factors. The discussion of sensory issues requires a dedicated paper due to its broad range and is not addressed in this paper.",
"title": ""
},
{
"docid": "8107340ac05353db18f1bb84a6e88a88",
"text": "Although many examples exist for shared neural representations of self and other, it is unknown how such shared representations interact with the rest of the brain. Furthermore, do high-level inference-based shared mentalizing representations interact with lower level embodied/simulation-based shared representations? We used functional neuroimaging (fMRI) and a functional connectivity approach to assess these questions during high-level inference-based mentalizing. Shared mentalizing representations in ventromedial prefrontal cortex, posterior cingulate/precuneus, and temporo-parietal junction (TPJ) all exhibited identical functional connectivity patterns during mentalizing of both self and other. Connectivity patterns were distributed across low-level embodied neural systems such as the frontal operculum/ventral premotor cortex, the anterior insula, the primary sensorimotor cortex, and the presupplementary motor area. These results demonstrate that identical neural circuits are implementing processes involved in mentalizing of both self and other and that the nature of such processes may be the integration of low-level embodied processes within higher level inference-based mentalizing.",
"title": ""
},
{
"docid": "c5eb252d17c2bec8ab168ca79ec11321",
"text": "Personalization is pervasive in the online space as it leads to higher efficiency and revenue by allowing the most relevant content to be served to each user. However, recent studies suggest that personalization methods can propagate societal or systemic biases and polarize opinions; this has led to calls for regulatory mechanisms and algorithms to combat bias and inequality. Algorithmically, bandit optimization has enjoyed great success in learning user preferences and personalizing content or feeds accordingly. We propose an algorithmic framework that allows for the possibility to control bias or discrimination in such bandit-based personalization. Our model allows for the specification of general fairness constraints on the sensitive types of the content that can be displayed to a user. The challenge, however, is to come up with a scalable and low regret algorithm for the constrained optimization problem that arises. Our main technical contribution is a provably fast and low-regret algorithm for the fairness-constrained bandit optimization problem. Our proofs crucially leverage the special structure of our problem. Experiments on synthetic and real-world data sets show that our algorithmic framework can control bias with only a minor loss to revenue. ∗A short version of this paper appeared in the FAT/ML 2017 workshop (https://arxiv.org/abs/1707.02260) 1 ar X iv :1 80 2. 08 67 4v 1 [ cs .L G ] 2 3 Fe b 20 18",
"title": ""
},
{
"docid": "4bbd172be9833ae46dc3cf54bdd82641",
"text": "Underwater communication systems have drawn the attention of the research community in the last 15 years. This growing interest can largely be attributed to new civil and military applications enabled by large-scale networks of underwater devices (e.g., underwater static sensors, unmanned autonomous vehicles (AUVs), and autonomous robots), which can retrieve information from the aquatic and marine environment, perform in-network processing on the extracted data, and transmit the collected information to remote locations. Currently underwater communication systems are inherently hardware-based and rely on closed and inflexible architectural design. This imposes significant challenges into adopting new underwater communication and networking technologies, prevent the provision of truly-differentiated services to highly diverse underwater applications, and induce great barriers to integrate heterogeneous underwater devices. Software Defined Networking, recognized as the next-generation networking paradigm, relies on the highly flexible, programmable, and virtualizable network architecture to dramatically improve network resource utilization, simplify network management, reduce operating cost, and promote innovation and evolution. In this paper, a software-defined architecture, namely SoftWater, is first introduced to facilitate the development of the next-generation underwater communication systems. More specifically, by exploiting the network function virtualization (NFV) and network virtualization concepts, SoftWater architecture can easily incorporate new underwater communication solutions, accordingly maximize the network capacity, can achieve the network robustness and energy efficiency, as well as can provide truly differentiated and scalable networking services. Consequently, the SoftWater architecture can simultaneously support a variety of different underwater applications, and can enable the interoperability of underwater devices from different manufacturers that operate on different underwater communication technologies based on acoustic, optical, or radio waves. Moreover, the essential network management tools of SoftWater are discussed, including reconfigurable multi-controller placement, hybrid in-band and out-of-band control traffic balancing, and utility-optimal network virtualization. Furthermore, the major benefits of ∗ Corresponding author. Tel.: +01404 934 9932. E-mail addresses: ian@ece.gatech.edu (I.F. Akyildiz), pu.wang@wichita.edu (P. Wang), slin88@gatech.edu (S.-C. Lin). http://dx.doi.org/10.1016/j.adhoc.2016.02.016 1570-8705/© 2016 Elsevier B.V. All rights reserved. Please cite this article as: I.F. Akyildiz et al., SoftWater: Software-defined networking for next-generation underwater communication systems, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.016 2 I.F. Akyildiz et al. / Ad Hoc Networks xxx (2016) xxx–xxx ARTICLE IN PRESS JID: ADHOC [m3Gdc; April 9, 2016;17:52 ] SoftWater architecture are demonstrated by introducing software-defined underwater networking solutions, including the throughput-optimal underwater routing, SDN-enhanced fault recovery, and software-defined underwater mobility management. The research challenges to realize the SoftWater are also discussed in detail. © 2016 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "a964f8aeb9d48c739716445adc58e98c",
"text": "A passive aeration composting study was undertaken to investigate the effects of aeration pipe orientation (PO) and perforation size (PS) on some physico-chemical properties of chicken litter (chicken manure + sawdust) during composting. The experimental set up was a two-factor completely randomised block design with two pipe orientations: horizontal (Ho) and vertical (Ve), and three perforation sizes: 15, 25 and 35 mm diameter. The properties monitored during composting were pile temperature, moisture content (MC), pH, electrical conductivity (EC), total carbon (C(T)), total nitrogen (N(T)) and total phosphorus (P(T)). Moisture level in the piles was periodically replenished to 60% for efficient microbial activities. The results of the study showed that optimum composting conditions (thermophilic temperatures and sanitation requirements) were attained in all the piles. During composting, both PO and PS significantly affected pile temperature, moisture level, pH, C(T) loss and P(T) gain. EC was only affected by PO while N(T) was affected by PS. Neither PO nor PS had a significant effect on the C:N ratio. A vertical pipe was effective for uniform air distribution, hence, uniform composting rate within the composting pile. The final values showed that PO of Ve and PS of 35 mm diameter resulted in the least loss in N(T). The PO of Ho was as effective as Ve in the conservation of C(T) and P(T). Similarly, the three PSs were equally effective in the conservation of C(T) and P(T). In conclusion, the combined effects of PO and PS showed that treatments Ve35 and Ve15 were the most effective in minimizing N(T) loss.",
"title": ""
},
{
"docid": "8e896b9006ecc82fcfa4f6905a3dc5ae",
"text": "In this paper, we present a generalized Wishart classifier derived from a non-Gaussian model for polarimetric synthetic aperture radar (PolSAR) data. Our starting point is to demonstrate that the scale mixture of Gaussian (SMoG) distribution model is suitable for modeling PolSAR data. We show that the distribution of the sample covariance matrix for the SMoG model is given as a generalization of the Wishart distribution and present this expression in integral form. We then derive the closed-form solution for one particular SMoG distribution, which is known as the multivariate K-distribution. Based on this new distribution for the sample covariance matrix, termed as the K -Wishart distribution, we propose a Bayesian classification scheme, which can be used in both supervised and unsupervised modes. To demonstrate the effect of including non-Gaussianity, we present a detailed comparison with the standard Wishart classifier using airborne EMISAR data.",
"title": ""
},
{
"docid": "0209627cd57745dc5c06dc5ff9723352",
"text": "The cloud computing provides on demand services over the Internet with the help of a large amount of virtual storage. The main features of cloud computing is that the user does not have any setup of expensive computing infrastructure and the cost of its services is less. In the recent years, cloud computing integrates with the industry and many other areas, which has been encouraging the researcher to research on new related technologies. Due to the availability of its services & scalability for computing processes individual users and organizations transfer their application, data and services to the cloud storage server. Regardless of its advantages, the transformation of local computing to remote computing has brought many security issues and challenges for both consumer and provider. Many cloud services are provided by the trusted third party which arises new security threats. The cloud provider provides its services through the Internet and uses many web technologies that arise new security issues. This paper discussed about the basic features of the cloud computing, security issues, threats and their solutions. Additionally, the paper describes several key topics related to the cloud, namely cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks. The paper also discusses a lot of open research issues related to the cloud security. Keywords—Cloud Computing, Cloud Framework, Cloud Security, Cloud Security Challenges, Cloud Security Issues",
"title": ""
}
] | scidocsrr |
a936526b6932b8c79b4eca960fca3b41 | Tracking Knowledge Proficiency of Students with Educational Priors | [
{
"docid": "7209596ad58da21211bfe0ceaaccc72b",
"text": "Knowledge tracing (KT)[1] has been used in various forms for adaptive computerized instruction for more than 40 years. However, despite its long history of application, it is difficult to use in domain model search procedures, has not been used to capture learning where multiple skills are needed to perform a single action, and has not been used to compute latencies of actions. On the other hand, existing models used for educational data mining (e.g. Learning Factors Analysis (LFA)[2]) and model search do not tend to allow the creation of a “model overlay” that traces predictions for individual students with individual skills so as to allow the adaptive instruction to automatically remediate performance. Because these limitations make the transition from model search to model application in adaptive instruction more difficult, this paper describes our work to modify an existing data mining model so that it can also be used to select practice adaptively. We compare this new adaptive data mining model (PFA, Performance Factors Analysis) with two versions of LFA and then compare PFA with standard KT.",
"title": ""
}
] | [
{
"docid": "1885ee33c09d943736b03895f41cea06",
"text": "Since the late 1990s, there has been a burst of research on robotic devices for poststroke rehabilitation. Robot-mediated therapy produced improvements on recovery of motor capacity; however, so far, the use of robots has not shown qualitative benefit over classical therapist-led training sessions, performed on the same quantity of movements. Multidegree-of-freedom robots, like the modern upper-limb exoskeletons, enable a distributed interaction on the whole assisted limb and can exploit a large amount of sensory feedback data, potentially providing new capabilities within standard rehabilitation sessions. Surprisingly, most publications in the field of exoskeletons focused only on mechatronic design of the devices, while little details were given to the control aspects. On the contrary, we believe a paramount aspect for robots potentiality lies on the control side. Therefore, the aim of this review is to provide a taxonomy of currently available control strategies for exoskeletons for neurorehabilitation, in order to formulate appropriate questions toward the development of innovative and improved control strategies.",
"title": ""
},
{
"docid": "7d35f3afeb9a8e1dc6f99e4d241273c7",
"text": "In this paper, we propose Motion Dense Sampling (MDS) for action recognition, which detects very informative interest points from video frames. MDS has three advantages compared to other existing methods. The first advantage is that MDS detects only interest points which belong to action regions of all regions of a video frame. The second one is that it can detect the constant number of points even when the size of action region in an image drastically changes. The Third one is that MDS enables to describe scale invariant features by computing sampling scale for each frame based on the size of action regions. Thus, our method detects much more informative interest points from videos unlike other methods. We also propose Category Clustering and Component Clustering, which generate the very effective codebook for action recognition. Experimental results show a significant improvement over existing methods on YouTube dataset. Our method achieves 87.5 % accuracy for video classification by using only one descriptor.",
"title": ""
},
{
"docid": "ba206d552bb33f853972e3f2e70484bc",
"text": "Presumptive stressful life event scale Dear Sir, in different demographic and clinical categories, which has not been attempted. I have read with considerable interest the article entitled, Presumptive stressful life events scale (PSLES)-a new stressful life events scale for use in India by Gurmeet Singh et al (April 1984 issue). I think it is a commendable effort to develop such a scale which would potentially be of use in our setting. However, the research raises several questions, which have not been dealt with in the' paper. The following are the questions or comments which ask for response from the authors: a) The mode of selection of 51 items is not mentioned. If taken arbitrarily they could suggest a bias. If selected from clinical experience, there could be a likelihood of certain events being missed. An ideal way would be to record various events from a number of persons (and patients) and then prepare a list of commonly occuring events. b) It is noteworthy that certain culture specific items as dowry, birth of daughter, etc. are included. Other relevant events as conflict with in-laws (not regarding dowry), refusal by match seeking team (difficulty in finding match for marriage) and lack of son, could be considered stressful in our setting. c) Total number of life events are a function of age, as has been mentioned in the review of literature also, hence age categorisation as under 35 and over 35 might neither be proper nor sufficient. The relationship of number of life events in different age groups would be interesting to note. d) Also, more interesting would be to examine the rank order of life events e) A briefened version would be more welcome. The authors should try to evolve a version of around about 25-30 items, which could be easily applied clinically or for research purposes. As can be seen, from items after serial number 30 (Table 4) many could be excluded. f) The cause and effect relationship is difficult to comment from the results given by the scale. As is known, 'stressfulness' of the event depends on an individuals perception of the event. That persons with higher neu-roticism scores report more events could partly be due to this. g) A minor point, Table 4 mentions Standard Deviations however S. D. has not been given for any item. Reply: I am grateful for the interest shown by Dr. Chaturvedi and his …",
"title": ""
},
{
"docid": "b53f683ead67e4bf7915545a8d1a2822",
"text": "Learning to learn is a powerful paradigm for enabling models to learn from data more effectively and efficiently. A popular approach to meta-learning is to train a recurrent model to read in a training dataset as input and output the parameters of a learned model, or output predictions for new test inputs. Alternatively, a more recent approach to meta-learning aims to acquire deep representations that can be effectively fine-tuned, via standard gradient descent, to new tasks. In this paper, we consider the meta-learning problem from the perspective of universality, formalizing the notion of learning algorithm approximation and comparing the expressive power of the aforementioned recurrent models to the more recent approaches that embed gradient descent into the meta-learner. In particular, we seek to answer the following question: does deep representation combined with standard gradient descent have sufficient capacity to approximate any learning algorithm? We find that this is indeed true, and further find, in our experiments, that gradient-based meta-learning consistently leads to learning strategies that generalize more widely compared to those represented by recurrent models.",
"title": ""
},
{
"docid": "7f4a26bbd2335079c97c7f5bb1961af2",
"text": "We describe a framework for multitask deep reinforcement learning guided by policy sketches. Sketches annotate tasks with sequences of named subtasks, providing information about high-level structural relationships among tasks but not how to implement them—specifically not providing the detailed guidance used by much previous work on learning policy abstractions for RL (e.g. intermediate rewards, subtask completion signals, or intrinsic motivations). To learn from sketches, we present a model that associates every subtask with a modular subpolicy, and jointly maximizes reward over full task-specific policies by tying parameters across shared subpolicies. Optimization is accomplished via a decoupled actor–critic training objective that facilitates learning common behaviors from multiple dissimilar reward functions. We evaluate the effectiveness of our approach in three environments featuring both discrete and continuous control, and with sparse rewards that can be obtained only after completing a number of high-level subgoals. Experiments show that using our approach to learn policies guided by sketches gives better performance than existing techniques for learning task-specific or shared policies, while naturally inducing a library of interpretable primitive behaviors that can be recombined to rapidly adapt to new tasks.",
"title": ""
},
{
"docid": "a5e7a1e5900dc7c8b5047efee6f1268e",
"text": "Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnerabilities are typically targeted by Google Hacking? What kind of vulnerabilities usually have a large victim population? What is the impact of Google Hacking and how easy to defend against Google Hacking?). In this paper, we conduct the first quantitative characterization study of Google Hacking. Starting from 997 Google Dorks used in Google Hacking, we collect a total of 305,485 potentially vulnerable websites, and 6,301 verified vulnerable websites. From these vulnerabilities and potentially vulnerable websites, we study the characteristics of vulnerabilities targeted by Google Hacking from different perspectives. We find that web-related CVE vulnerabilities may not fully reflect the tastes of Google Hacking. Our results show that only a few specially chosen vulnerabilities are exploited in Google Hacking. Specifically, attackers only target on certain categories of vulnerabilities and prefer vulnerabilities with high severity score but low attack complexity. Old vulnerabilities are also preferred in Google Hacking. To defend against the Google Hacking, simply modifying few keywords in web pages can defeat 65.5 % of Google Hacking attacks.",
"title": ""
},
{
"docid": "9297a6eaaf5ba6c1ebec8f96243d39ac",
"text": "Editor: T.M. Harrison Non-arc basalts of Archean and Proterozoic age have model primary magmas that exhibit mantle potential temperatures TP that increase from 1350 °C at the present to a maximum of ∼1500–1600 °C at 2.5–3.0 Ga. The overall trend of these temperatures converges smoothly to that of the present-day MORB source, supporting the interpretation that the non-arc basalts formed by the melting of hot ambient mantle, not mantle plumes, and that they can constrain the thermal history of the Earth. These petrological results are very similar to those predicted by thermal models characterized by a low Urey ratio and more sluggish mantle convection in the past. We infer that the mantle was warming in deep Archean–Hadean time because internal heating exceeded surface heat loss, and it has been cooling from 2.5 to 3.0 Ga to the present. Non-arc Precambrian basalts are likely to be similar to those that formed oceanic crust and erupted on continents. It is estimated that ∼25–35 km of oceanic crust formed in the ancient Earth by about 30% melting of hot ambient mantle. In contrast, komatiite parental magmas reveal TP that are higher than those of non-arc basalts, consistent with the hot plume model. However, the associated excess magmatism was minor and oceanic plateaus, if they existed, would have had subtle bathymetric variations, unlike those of Phanerozoic oceanic plateaus. Primary magmas of Precambrian ambient mantle had 18–24% MgO, and they left behind residues of harzburgite that are now found as xenoliths of cratonic mantle. We infer that primary basaltic partial melts having 10–13% MgO are a feature of Phanerozoic magmatism, not of the early Earth, which may be why modern-day analogs of oceanic crust have not been reported in Archean greenstone belts.",
"title": ""
},
{
"docid": "c619d692d9e8a262f85324f6e35471e6",
"text": "Affect conveys important implicit information in human communication. Having the capability to correctly express affect during human-machine conversations is one of the major milestones in artificial intelligence. In recent years, extensive research on open-domain neural conversational models has been conducted. However, embedding affect into such models is still under explored. In this paper, we propose an endto-end affect-rich open-domain neural conversational model that produces responses not only appropriate in syntax and semantics, but also with rich affect. Our model extends the Seq2Seq model and adopts VAD (Valence, Arousal and Dominance) affective notations to embed each word with affects. In addition, our model considers the effect of negators and intensifiers via a novel affective attention mechanism, which biases attention towards affect-rich words in input sentences. Lastly, we train our model with an affect-incorporated objective function to encourage the generation of affect-rich words in the output responses. Evaluations based on both perplexity and human evaluations show that our model outperforms the state-of-the-art baseline model of comparable size in producing natural and affect-rich responses. Introduction Affect is a psychological experience of feeling or emotion. As a vital part of human intelligence, having the capability to recognize, understand and express affect and emotions like human has been arguably one of the major milestones in artificial intelligence (Picard 1997). Open-domain conversational models aim to generate coherent and meaningful responses when given user input sentences. In recent years, neural network based generative conversational models relying on Sequence-to-Sequence network (Seq2Seq) (Sutskever, Vinyals, and Le 2014) have been widely adopted due to its success in neural machine translation. Seq2Seq based conversational models have the advantages of end-to-end training paradigm and unrestricted response space over conventional retrieval-based models. To make neural conversational models more engaging, various techniques have been proposed, such as using stochastic latent variable (Serban et al. 2017) to promote response diversity and encoding topic (Xing et al. 2017) into conversational models to produce more coherent responses. Copyright c © 2019, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. However, embedding affect into neural conversational models has been seldom explored, despite that it has many benefits such as improving user satisfaction (Callejas, Griol, and López-Cózar 2011), fewer breakdowns (Martinovski and Traum 2003), and more engaged conversations (Robison, McQuiggan, and Lester 2009). For real-world applications, Fitzpatrick, Darcy, and Vierhile (2017) developed a rule-based empathic chatbot to deliver cognitive behavior therapy to young adults with depression and anxiety, and obtained significant results on depression reduction. Despite of these benefits, there are a few challenges in the affect embedding in neural conversational models that existing approaches fail to address: (i) It is difficult to capture the emotion of a sentence, partly because negators and intensifiers often change its polarity and strength. Handling negators and intensifiers properly still remains as a challenge in sentiment analysis. (ii) It is difficult to embed emotions naturally in responses with correct grammar and semantics (Ghosh et al. 2017). In this paper, we propose an end-to-end single-turn opendomain neural conversational model to address the aforementioned challenges to produce responses that are natural and affect-rich. Our model extends Seq2Seq model with attention (Luong, Pham, and Manning 2015). We leverage an external corpus (Warriner, Kuperman, and Brysbaert 2013) to provide affect knowledge for each word in the Valence, Arousal and Dominance (VAD) dimensions (Mehrabian 1996). We then incorporate the affect knowledge into the embedding layer of our model. VAD notation has been widely used as a dimensional representation of human emotions in psychology and various computational models, e.g., (Wang, Tan, and Miao 2016; Tang et al. 2017). 2D plots of selected words with extreme VAD values are shown in Figure 1. To capture the effect of negators and intensifiers, we propose a novel biased attention mechanism that explicitly considers negators and intensifiers in attention computation. To maintain correct grammar and semantics, we train our Seq2Seq model with a weighted cross-entropy loss that encourages the generation of affect-rich words without degrading language fluency. Our main contributions are summarized as follows: • For the first time, we propose a novel affective attention mechanism to incorporate the effect of negators and intensifiers in conversation modeling. Our mechanism inar X iv :1 81 1. 07 07 8v 1 [ cs .C L ] 1 7 N ov 2 01 8",
"title": ""
},
{
"docid": "7882d2d18bc8a30a63e9fdb726c48ff1",
"text": "Flying ad-hoc networks (FANETs) are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs) represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR) and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.",
"title": ""
},
{
"docid": "40e0d6e93c426107cbefbdf3d4ca85b9",
"text": "H.264/MPEG-4 AVC is the latest international video coding standard. It was jointly developed by the Video Coding Experts Group (VCEG) of the ITU-T and the Moving Picture Experts Group (MPEG) of ISO/IEC. It uses state-of-the-art coding tools and provides enhanced coding efficiency for a wide range of applications, including video telephony, video conferencing, TV, storage (DVD and/or hard disk based, especially high-definition DVD), streaming video, digital video authoring, digital cinema, and many others. The work on a new set of extensions to this standard has recently been completed. These extensions, known as the Fidelity Range Extensions (FRExt), provide a number of enhanced capabilities relative to the base specification as approved in the Spring of 2003. In this paper, an overview of this standard is provided, including the highlights of the capabilities of the new FRExt features. Some comparisons with the existing MPEG-2 and MPEG-4 Part 2 standards are also provided.",
"title": ""
},
{
"docid": "45d6863e54b343d7a081e79c84b81e65",
"text": "In order to obtain optimal 3D structure and viewing parameter estimates, bundle adjustment is often used as the last step of feature-based structure and motion estimation algorithms. Bundle adjustment involves the formulation of a large scale, yet sparse minimization problem, which is traditionally solved using a sparse variant of the Levenberg-Marquardt optimization algorithm that avoids storing and operating on zero entries. This paper argues that considerable computational benefits can be gained by substituting the sparse Levenberg-Marquardt algorithm in the implementation of bundle adjustment with a sparse variant of Powell's dog leg non-linear least squares technique. Detailed comparative experimental results provide strong evidence supporting this claim",
"title": ""
},
{
"docid": "e9402a771cc761e7e6484c2be6bc2cce",
"text": "In this work, we present the Text Conditioned Auxiliary Classifier Generative Adversarial Network, (TAC-GAN) a text to image Generative Adversarial Network (GAN) for synthesizing images from their text descriptions. Former approaches have tried to condition the generative process on the textual data; but allying it to the usage of class information, known to diversify the generated samples and improve their structural coherence, has not been explored. We trained the presented TAC-GAN model on the Oxford102 dataset of flowers, and evaluated the discriminability of the generated images with Inception-Score, as well as their diversity using the Multi-Scale Structural Similarity Index (MS-SSIM). Our approach outperforms the stateof-the-art models, i.e., its inception score is 3.45, corresponding to a relative increase of 7.8% compared to the recently introduced StackGan. A comparison of the mean MS-SSIM scores of the training and generated samples per class shows that our approach is able to generate highly diverse images with an average MS-SSIM of 0.14 over all generated classes.",
"title": ""
},
{
"docid": "6c7284ca77809210601c213ee8a685bb",
"text": "Patients with non-small cell lung cancer (NSCLC) require careful staging at the time of diagnosis to determine prognosis and guide treatment recommendations. The seventh edition of the TNM Classification of Malignant Tumors is scheduled to be published in 2009 and the International Association for the Study of Lung Cancer (IASLC) created the Lung Cancer Staging Project (LCSP) to guide revisions to the current lung cancer staging system. These recommendations will be submitted to the American Joint Committee on Cancer (AJCC) and to the Union Internationale Contre le Cancer (UICC) for consideration in the upcoming edition of the staging manual. Data from over 100,000 patients with lung cancer were submitted for analysis and several modifications were suggested for the T descriptors and the M descriptors although the current N descriptors remain unchanged. These recommendations will further define homogeneous patient subsets with similar survival rates. More importantly, these revisions will help guide clinicians in making optimal, stage-specific, treatment recommendations.",
"title": ""
},
{
"docid": "0dbb5f492e6e2336abea6bf8ce6ee3cc",
"text": "This paper presents a Lie group setting for the problem of control of formations, as a natural outcome of the analysis of a planar two-vehicle formation control law. The vehicle trajectories are described using planar Frenet-Serret equations of motion, which capture the evolution of both the vehicle position and orientation for unit-speed motion subject to curvature (steering) control. The set of all possible (relative) equilibria for arbitrary G-invariant curvature controls is described (where G = SE(2) is a symmetry group for the control law). A generalization of the control law for n vehicles is presented, and the corresponding (relative) equilibria are characterized. Work is on-going to discover stability and convergence results for the n-vehicle problem. The practical motivation for this work is the problem of formation control for meter-scale UAVs; therefore, an implementation approach consistent with UAV payload constraints is also discussed.",
"title": ""
},
{
"docid": "263088de40b85afeb051244de4821a25",
"text": "Deep neural networks (DNN) are powerful models for many pattern recognition tasks, yet they tend to have many layers and many neurons resulting in a high computational complexity. This limits their application to high-performance computing platforms. In order to evaluate a trained DNN on a lower-performance computing platform like a mobile or embedded device, model reduction techniques which shrink the network size and reduce the number of parameters without considerable performance degradation performance are highly desirable. In this paper, we start with a trained fully connected DNN and show how to reduce the network complexity by a novel layerwise pruning method. We show that if some neurons are pruned and the remaining parameters (weights and biases) are adapted correspondingly to correct the errors introduced by pruning, the model reduction can be done almost without performance loss. The main contribution of our pruning method is a closed-form solution that only makes use of the first and second order moments of the layer outputs and, therefore, only needs unlabeled data. Using three benchmark datasets, we compare our pruning method with the low-rank approximation approach.",
"title": ""
},
{
"docid": "ca715288ff8af17697e65d8b3c9f01bf",
"text": "In the last five years, biologically inspired features (BIF) always held the state-of-the-art results for human age estimation from face images. Recently, researchers mainly put their focuses on the regression step after feature extraction, such as support vector regression (SVR), partial least squares (PLS), canonical correlation analysis (CCA) and so on. In this paper, we apply convolutional neural network (CNN) to the age estimation problem, which leads to a fully learned end-toend system can estimate age from image pixels directly. Compared with BIF, the proposed method has deeper structure and the parameters are learned instead of hand-crafted. The multi-scale analysis strategy is also introduced from traditional methods to the CNN, which improves the performance significantly. Furthermore, we train an efficient network in a multi-task way which can do age estimation, gender classification and ethnicity classification well simultaneously. The experiments on MORPH Album 2 illustrate the superiorities of the proposed multi-scale CNN over other state-of-the-art methods.",
"title": ""
},
{
"docid": "c04fc6682403d89e1fbca19787f7a118",
"text": "This paper presents a Compact Dual-Circularly Polarized Corrugated Horn with Integrated Septum Polarizer in the X-band. Usually such a complicated structure would be fabricated in parts and assembled together. However, exploiting the versatility afforded by Metal 3D-printing, a complete prototype is fabricated as a single part, enabling a compact design. Any variation due to mating tolerance of separate parts is eliminated. The prototype is designed to work from 9.5GHz to 10GHz. It has an impedance match of better than |S11|<−15dB and a gain about 13.4dBic at 9.75GHz. The efficiency is better than 95% in the operating band.",
"title": ""
},
{
"docid": "ec0d1addabab76d9c2bd044f0bfe3153",
"text": "Much of scientific progress stems from previously published findings, but searching through the vast sea of scientific publications is difficult. We often rely on metrics of scholarly authority to find the prominent authors but these authority indices do not differentiate authority based on research topics. We present Latent Topical-Authority Indexing (LTAI) for jointly modeling the topics, citations, and topical authority in a corpus of academic papers. Compared to previous models, LTAI differs in two main aspects. First, it explicitly models the generative process of the citations, rather than treating the citations as given. Second, it models each author’s influence on citations of a paper based on the topics of the cited papers, as well as the citing papers. We fit LTAI into four academic corpora: CORA, Arxiv Physics, PNAS, and Citeseer. We compare the performance of LTAI against various baselines, starting with the latent Dirichlet allocation, to the more advanced models including author-link topic model and dynamic author citation topic model. The results show that LTAI achieves improved accuracy over other similar models when predicting words, citations and authors of publications.",
"title": ""
},
{
"docid": "20b7da7c9f630f12b0ef86d92ed7aa0f",
"text": "In this paper, a Rectangular Dielectric Resonator Antenna (RDRA) with a modified feeding line is designed and investigated at 28GHz. The modified feed line is designed to excite the DR with relative permittivity of 10 which contributes to a wide bandwidth operation. The proposed single RDRA has been fabricated and mounted on a RT/Duroid 5880 (εr = 2.2 and tanδ = 0.0009) substrate. The optimized single element has been applied to array structure to improve the gain and achieve the required gain performance. The radiation pattern, impedance bandwidth and gain are simulated and measured accordingly. The number of elements and element spacing are studied for an optimum performance. The proposed antenna obtains a reflection coefficient response from 27.0GHz to 29.1GHz which cover the desired frequency band. This makes the proposed antenna achieve 2.1GHz impedance bandwidth and gain of 12.1 dB. Thus, it has potential for millimeter wave and 5G applications.",
"title": ""
},
{
"docid": "c3c4e6374ace436e22a09a5816be046f",
"text": "BACKGROUND Dermal fillers are increasingly being utilized for multiple cosmetic dermatology indications. The appeal of these products can be partly attributed to their strong safety profiles. Nevertheless, complications can sometimes occur. OBJECTIVE To summarize the complications associated with each available dermal filling agent, strategies to avoid them, and management options if they do arise. METHODS AND MATERIALS Complications with dermal fillers reported in peer-reviewed publications, prescribing information, and recent presentations at professional meetings were reviewed. Recommendations for avoiding and managing complications are provided, based on the literature review and the author's experience. RESULTS Inappropriate placement or superficial placement is one of the most frequent reasons for patient dissatisfaction. Due to the reversibility of hyaluronic acid, complications from these fillers can be easily corrected. Sensitivity to any of the currently approved FDA products is quite rare and can usually be managed with anti-inflammatory agents. Infection is quite uncommon as well and can usually be managed with either antibiotics or antivirals depending on the clinical features. The most concerning complication is cutaneous necrosis, and a protocol to treat the full spectrum of this process is reviewed. CONCLUSIONS Complications with dermal fillers are infrequent, and strategies to minimize their incidence and impact are easily deployed. Familiarity with each family of soft-tissue augmentation products, potential complications, and their management will optimize the use of these agents.",
"title": ""
}
] | scidocsrr |
914c5b76453bfb4b3073f07120a2308e | A Hybrid Approach for Predicting Aging-Related Failures of Software Systems | [
{
"docid": "05edf6dc5d4b9726773f56dafc620619",
"text": "Software systems running continuously for a long time tend to show degrading performance and an increasing failure occurrence rate, due to error conditions that accrue over time and eventually lead the system to failure. This phenomenon is usually referred to as \\textit{Software Aging}. Several long-running mission and safety critical applications have been reported to experience catastrophic aging-related failures. Software aging sources (i.e., aging-related bugs) may be hidden in several layers of a complex software system, ranging from the Operating System (OS) to the user application level. This paper presents a software aging analysis at the Operating System level, investigating software aging sources inside the Linux kernel. Linux is increasingly being employed in critical scenarios; this analysis intends to shed light on its behaviour from the aging perspective. The study is based on an experimental campaign designed to investigate the kernel internal behaviour over long running executions. By means of a kernel tracing tool specifically developed for this study, we collected relevant parameters of several kernel subsystems. Statistical analysis of collected data allowed us to confirm the presence of aging sources in Linux and to relate the observed aging dynamics to the monitored subsystems behaviour. The analysis output allowed us to infer potential sources of aging in the kernel subsystems.",
"title": ""
},
{
"docid": "a09248f7c017c532a3a0a580be14ba20",
"text": "In the past ten years, the software aging phenomenon has been systematically researched, and recognized by both academic, and industry communities as an important obstacle to achieving dependable software systems. One of its main effects is the depletion of operating system resources, causing system performance degradation or crash/hang failures in running applications. When conducting experimental studies to evaluate the operational reliability of systems suffering from software aging, long periods of runtime are required to observe system failures. Focusing on this problem, we present a systematic approach to accelerate the software aging manifestation to reduce the experimentation time, and to estimate the lifetime distribution of the investigated system. First, we introduce the concept of ¿aging factor¿ that offers a fine control of the aging effects at the experimental level. The aging factors are estimated via sensitivity analyses based on the statistical design of experiments. Aging factors are then used together with the method of accelerated degradation test to estimate the lifetime distribution of the system under test at various stress levels. This approach requires us to estimate a relationship model between stress levels and aging degradation. Such models are called stress-accelerated aging relationships. Finally, the estimated relationship models enable us to estimate the lifetime distribution under use condition. The proposed approach is used in estimating the lifetime distribution of a web server with software aging symptoms. The main result is the reduction of the experimental time by a factor close to 685 in comparison with experiments executed without the use of our technique.",
"title": ""
}
] | [
{
"docid": "63c815c9aa92acec6664c0865f1856e1",
"text": "We examined the role of kisspeptin and its receptor, the G-protein-coupled receptor GPR54, in governing the onset of puberty in the mouse. In the adult male and female mouse, kisspeptin (10-100 nM) evoked a remarkably potent, long-lasting depolarization of >90% of gonadotropin-releasing hormone (GnRH)-green fluorescent protein neurons in situ. In contrast, in juvenile [postnatal day 8 (P8) to P19] and prepubertal (P26-P33) male mice, kisspeptin activated only 27 and 44% of GnRH neurons, respectively. This developmental recruitment of GnRH neurons into a kisspeptin-responsive pool was paralleled by an increase in the ability of centrally administered kisspeptin to evoke luteinizing hormone secretion in vivo. To learn more about the mechanisms through which kisspeptin-GPR54 signaling at the GnRH neuron may change over postnatal development, we performed quantitative in situ hybridization for kisspeptin and GPR54 transcripts. Approximately 90% of GnRH neurons were found to express GPR54 mRNA in both juvenile and adult mice, without a detectable difference in the mRNA content between the age groups. In contrast, the expression of KiSS-1 mRNA increased dramatically across the transition from juvenile to adult life in the anteroventral periventricular nucleus (AVPV; p < 0.001). These results demonstrate that kisspeptin exerts a potent depolarizing effect on the excitability of almost all adult GnRH neurons and that the responsiveness of GnRH neurons to kisspeptin increases over postnatal development. Together, these observations suggest that activation of GnRH neurons by kisspeptin at puberty reflects a dual process involving an increase in kisspeptin input from the AVPV and a post-transcriptional change in GPR54 signaling within the GnRH neuron.",
"title": ""
},
{
"docid": "892661d87138d49aab2a54b7557a7021",
"text": "Semantic part localization can facilitate fine-grained categorization by explicitly isolating subtle appearance differences associated with specific object parts. Methods for pose-normalized representations have been proposed, but generally presume bounding box annotations at test time due to the difficulty of object detection. We propose a model for fine-grained categorization that overcomes these limitations by leveraging deep convolutional features computed on bottom-up region proposals. Our method learns whole-object and part detectors, enforces learned geometric constraints between them, and predicts a fine-grained category from a pose-normalized representation. Experiments on the CaltechUCSD bird dataset confirm that our method outperforms state-of-the-art fine-grained categorization methods in an end-to-end evaluation without requiring a bounding box at test time.",
"title": ""
},
{
"docid": "8140838d7ef17b3d6f6c042442de0f73",
"text": "The two vascular systems of our body are the blood and lymphatic vasculature. Our understanding of the cellular and molecular processes controlling the development of the lymphatic vasculature has progressed significantly in the last decade. In mammals, this is a stepwise process that starts in the embryonic veins, where lymphatic EC (LEC) progenitors are initially specified. The differentiation and maturation of these progenitors continues as they bud from the veins to produce scattered primitive lymph sacs, from which most of the lymphatic vasculature is derived. Here, we summarize our current understanding of the key steps leading to the formation of a functional lymphatic vasculature.",
"title": ""
},
{
"docid": "209d202fd4b0e2376894345e3806bb70",
"text": "Support vector data description (SVDD) is a useful method for outlier detection and has been applied to a variety of applications. However, in the existing optimization procedure of SVDD, there are some issues which may lead to improper usage of SVDD. Some of the issues might already be known in practice, but the theoretical discussion, justification and correction are still lacking. Given the wide use of SVDD, these issues inspire us to carefully study SVDD in the view of convex optimization. In particular, we derive the dual problem with strong duality, prove theorems to handle theoretical insufficiency in the literature of SVDD, investigate some novel extensions of SVDD, and come up with an implementation of training SVDD with theoretical guarantee.",
"title": ""
},
{
"docid": "090887c325fa3bf3ed928011f6b14c72",
"text": "R apid advances in electronic networks and computerbased information systems have given us enormous capabilities to process, store, and transmit digital data in most business sectors. This has transformed the way we conduct trade, deliver government services, and provide health care. Changes in communication and information technologies and particularly their confluence has raised a number of concerns connected with the protection of organizational information assets. Achieving consensus regarding safeguards for an information system, among different stakeholders in an organization, has become more difficult than solving many technical problems that might arise. This “Technical Opinion” focuses on understanding the nature of information security in the next millennium. Based on this understanding it suggests a set of principles that would help in managing information security in the future.",
"title": ""
},
{
"docid": "7a45ece991f142621016be6eb0241c29",
"text": "This study investigated the impact of information and communication technology on teaching and learning of physics. The respondents used for the study were one hundred and fifty-seven (157) physics students and two (2) physics teachers drawn randomly from two senior secondary schools from each of the five educational districts out of the six educational districts available in Lagos State. Three null hypotheses were postulated and tested at 0.05 level of significant. The instruments used for the study were information and communication technology impact on teaching and learning questionnaire (ICTIT LQ). The data collected were analyzed using simple percentage and chi-square. The research findings indicated that ICT have great impact on teaching and learning of physics. Also the introduction of ICT makes learning of physics so interesting for the students. Based on the findings suggestions and recommendations were made. INTRODUCTION Ever since ancient times people have devised various techniques for communicating their thoughts, needs and desires to others. In early civilized tines, people tend to congratulate in geographically localized cluster in which communication were adequately achieved through speech and written messages. As civilization spread over larger geographic al areas, a variety of long distance communication methods were tried such as smoke signals, carrier pigeons etc. one of the earliest known optical links, was the use of fire signal by Greeks in the eight century B.C. for sending alarms, calls for help, or announcement of certain events. However, because of environmental and technology limitation; it generally turned out to be faster and more efficient to send letter messages by courier over the road network. The discovery of telegraph by Samuel, F.B. Morse 1938 ushers in a new development in communication that is, the era of electrical telegraphy system were first encoded into strings of binary symbols, and were then manually transmitted and received. The development and implementation of communication systems employing electric signals became increasingly sophisticated leading in turn to the birth of telephone, radar and microwave links. Today, these communication systems have become an integral part of everyday life 'with circuits spanning the entire world carrying voice, text, pictures and many other types of information. As recent advances integrated circuits to technology have allowed computers to become recognized, less expensive and widely available, which make people to be more interested in connecting them to internet. Internet is a. computer system that allows millions of computer users around the world to exchange information with the use of the internet, which mad 3 communication easier and faster, many bodies have spring up to assist the use of this technology such as information services (MIS), management it information services (MIS), INFORMATION TECHNOLOGY (IT) and many others. Information technology (IT) is concerned with the use of technology in large organizations .In particular, IT deals with the use of electronic compute] s and computer soft ware to convert, store, protect process, transmit and retrieved information. For that reason, computer professionals are often called IT specialists or Business process consultants and the division of a company or university that deals with soft ware technology is often called the IT department. In United Kingdom education system, information technology was formally integrated into the school curriculum when the natural curriculum was devised. It was quickly realized that the work covered International Journal of Educational Research and Technology, Vol 1 [2] December 2010: 48 59",
"title": ""
},
{
"docid": "266b9bfde23fdfaedb35d293f7293c93",
"text": "We introduce a neural method for transfer learning between two (source and target) classification tasks or aspects over the same domain. Rather than training on target labels, we use a few keywords pertaining to source and target aspects indicating sentence relevance instead of document class labels. Documents are encoded by learning to embed and softly select relevant sentences in an aspect-dependent manner. A shared classifier is trained on the source encoded documents and labels, and applied to target encoded documents. We ensure transfer through aspect-adversarial training so that encoded documents are, as sets, aspect-invariant. Experimental results demonstrate that our approach outperforms different baselines and model variants on two datasets, yielding an improvement of 27% on a pathology dataset and 5% on a review dataset.",
"title": ""
},
{
"docid": "e4aecd0346609d2c372c8d354704358d",
"text": "The sharing of personal data has emerged as a popular activity over online social networking sites like Facebook. As a result, the issue of online social network privacy has received significant attention in both the research literature and the mainstream media. Our overarching goal is to improve defaults and provide better tools for managing privacy, but we are limited by the fact that the full extent of the privacy problem remains unknown; there is little quantification of the incidence of incorrect privacy settings or the difficulty users face when managing their privacy.\n In this paper, we focus on measuring the disparity between the desired and actual privacy settings, quantifying the magnitude of the problem of managing privacy. We deploy a survey, implemented as a Facebook application, to 200 Facebook users recruited via Amazon Mechanical Turk. We find that 36% of content remains shared with the default privacy settings. We also find that, overall, privacy settings match users' expectations only 37% of the time, and when incorrect, almost always expose content to more users than expected. Finally, we explore how our results have potential to assist users in selecting appropriate privacy settings by examining the user-created friend lists. We find that these have significant correlation with the social network, suggesting that information from the social network may be helpful in implementing new tools for managing privacy.",
"title": ""
},
{
"docid": "25c59d905fc75d82b9c7ee1e8a17291e",
"text": "The Path Ranking Algorithm (Lao and Cohen, 2010) is a general technique for performing link prediction in a graph. PRA has mainly been used for knowledge base completion (Lao et al., 2011; Gardner et al., 2013; Gardner et al., 2014), though the technique is applicable to any kind of link prediction task. To learn a prediction model for a particular edge type in a graph, PRA finds sequences of edge types (or paths) that frequently connect nodes that are instances of the edge type being predicted. PRA then uses those path types as features in a logistic regression model to infer missing edges in the graph. In this class project, we performed three separate experiments relating to different aspects of PRA: improving the efficiency of the algorithm, exploring the use of multiple languages in a knowledge base completion task, and using PRA-style features in sentencelevel prediction models. The first experiment looks at improving the efficiency and performance of link prediction in graphs by removing unnecessary steps from PRA. We introduce a simple technique that extracts features from the subgraph centered around a pair of nodes in the graph, and show that this method is an order of magnitude faster than PRA while giving significantly better performance. Additionally, this new model is more expressive than PRA, as it can handle arbitrary features extracted from the subgraphs, instead of only the relation sequences connecting the node pair. The new feature types we experimented with did not generally lead to better predictions, though further feature engineering may yield additional performance improvements. The second experiment we did with PRA extends recent work that performs knowledge base completion using a large parsed English corpus in conjunction with random walks over a knowledge base (Gardner et al., 2013; Gardner et al., 2014). This prior work showed significant performance gains when using the corpus along with the knowledge base, and even further gains by using abstract representations of the textual relations extracted from the corpus. In this experiment, we attempt to extend these results to a multilingual setting, with textual relations extracted from 10 different languages. We discuss the challenges that arise when dealing with data in languages for which parsers and entity linkers are not readily available, and show that previous techniques for obtaining abstract relation representations do not work in this setting. The final experiment takes a step towards a longstanding goal in artificial intelligence research: using a large collection of background knowledge to improve natural language understanding. We present a new technique for incorporating information from a knowledge base into sentence-level prediction tasks, and demonstrate its usefulness in one task in particular: relation extraction. We show that adding PRAstyle features generated from Freebase to an off-theshelf relation extraction model significantly improves its performance. This simple and general technique also outperforms prior work that learns knowledge base embeddings to improve prediction performance on the same task. In the remainder of this paper, we first give a brief introduction to the path ranking algorithm. Then we discuss each experiment in turn, with each section introducing the new methods, describing related work, and presenting experimental results.",
"title": ""
},
{
"docid": "837dd154df4971adaa4d1f397f546c20",
"text": "Public infrastructure systems provide many of the services that are critical to the health, functioning, and security of society. Many of these infrastructures, however, lack continuous physical sensor monitoring to be able to detect failure events or damage that has occurred to these systems. We propose the use of social sensor big data to detect these events. We focus on two main infrastructure systems, transportation and energy, and use data from Twitter streams to detect damage to bridges, highways, gas lines, and power infrastructure. Through a three-step filtering approach and assignment to geographical cells, we are able to filter out noise in this data to produce relevant geolocated tweets identifying failure events. Applying the strategy to real-world data, we demonstrate the ability of our approach to utilize social sensor big data to detect damage and failure events in these critical public infrastructures.",
"title": ""
},
{
"docid": "c01f4b10c9d29e66c9132928e36e15b4",
"text": "In shared autonomy, user input and robot autonomy are combined to control a robot to achieve a goal. Often, the robot does not know a priori which goal the user wants to achieve, and must both predict the user's intended goal, and assist in achieving that goal. We formulate the problem of shared autonomy as a Partially Observable Markov Decision Process with uncertainty over the user's goal. We utilize maximum entropy inverse optimal control to estimate a distribution over the user's goal based on the history of inputs. Ideally, the robot assists the user by solving for an action which minimizes the expected cost-to-go for the (unknown) goal. As solving the POMDP to select the optimal action is intractable, we use hindsight optimization to approximate the solution. In a user study, we compare our method to a standard predict-then-blend approach. We find that our method enables users to accomplish tasks more quickly while utilizing less input. However, when asked to rate each system, users were mixed in their assessment, citing a tradeoff between maintaining control authority and accomplishing tasks quickly.",
"title": ""
},
{
"docid": "2b266ebb64f14c3059938b34d72b8b19",
"text": "Preprocessing is an important task and critical step in information retrieval and text mining. The objective of this study is to analyze the effect of preprocessing methods in text classification on Turkish texts. We compiled two large datasets from Turkish newspapers using a crawler. On these compiled data sets and using two additional datasets, we perform a detailed analysis of preprocessing methods such as stemming, stopword filtering and word weighting for Turkish text classification on several different Turkish datasets. We report the results of extensive experiments.",
"title": ""
},
{
"docid": "a4aab340255c068137d3b3a1daaf97b5",
"text": "We present here SEMILAR, a SEMantic simILARity toolkit. SEMILAR implements a number of algorithms for assessing the semantic similarity between two texts. It is available as a Java library and as a Java standalone application offering GUI-based access to the implemented semantic similarity methods. Furthermore, it offers facilities for manual semantic similarity annotation by experts through its component SEMILAT (a SEMantic simILarity Annotation Tool).",
"title": ""
},
{
"docid": "40a87654ac33c46f948204fd5c7ef4c1",
"text": "We introduce a novel scheme to train binary convolutional neural networks (CNNs) – CNNs with weights and activations constrained to {-1,+1} at run-time. It has been known that using binary weights and activations drastically reduce memory size and accesses, and can replace arithmetic operations with more efficient bitwise operations, leading to much faster test-time inference and lower power consumption. However, previous works on binarizing CNNs usually result in severe prediction accuracy degradation. In this paper, we address this issue with two major innovations: (1) approximating full-precision weights with the linear combination of multiple binary weight bases; (2) employing multiple binary activations to alleviate information loss. The implementation of the resulting binary CNN, denoted as ABC-Net, is shown to achieve much closer performance to its full-precision counterpart, and even reach the comparable prediction accuracy on ImageNet and forest trail datasets, given adequate binary weight bases and activations.",
"title": ""
},
{
"docid": "de8633682653e9f979ec7a9177e461b4",
"text": "The increasingly widespread use of social network sites to expand and deepen one’s social connections is a relatively new but potentially important phenomenon that has implications for teaching and learning and teacher education in the 21st century. This paper surveys the educational research literature to examine: How such technologies are perceived and used by K-12 learners and teachers with what impacts on pedagogy or students' learning. Selected studies were summarized and categorized according to the four types introduced by Roblyer (2005) as studies most needed to move the educational technology field forward. These include studies that establish the technology’s effectiveness at improving student learning; investigate implementation strategies; monitor social impact; and report on common uses to shape the direction of the field. We found the most prevalent type of study conducted related to our focal topic was research on common uses. The least common type of study conducted was research that established the technology’s effectiveness at improving student learning. Implications for the design of future research and teacher education initiatives are discussed.",
"title": ""
},
{
"docid": "343c1607a4f8df8a8202adb26f9959ed",
"text": "This investigation examined the measurement properties of the Three Domains of Disgust Scale (TDDS). Principal components analysis in Study 1 (n = 206) revealed three factors of Pathogen, Sexual, and Moral Disgust that demonstrated excellent reliability, including test-retest over 12 weeks. Confirmatory factor analyses in Study 2 (n = 406) supported the three factors. Supportive evidence for the validity of the Pathogen and Sexual Disgust subscales was found in Study 1 and Study 2 with strong associations with disgust/contamination and weak associations with negative affect. However, the validity of the Moral Disgust subscale was limited. Study 3 (n = 200) showed that the TDDS subscales differentially related to personality traits. Study 4 (n = 47) provided evidence for the validity of the TDDS subscales in relation to multiple indices of disgust/contamination aversion in a select sample. Study 5 (n = 70) further highlighted limitations of the Moral Disgust subscale given the lack of a theoretically consistent association with moral attitudes. Lastly, Study 6 (n = 178) showed that responses on the Moral Disgust scale were more intense when anger was the response option compared with when disgust was the response option. The implications of these findings for the assessment of disgust are discussed.",
"title": ""
},
{
"docid": "6d961d27426084f96a795eb8bfac0f60",
"text": "The effects of cinnamaldehyde (CINN) on in vitro parameters of immunity and in vivo protection against avian coccidiosis were evaluated. In vitro stimulation of chicken spleen lymphocytes with CINN (25-400 ng/ml) induced greater cell proliferation compared with the medium control (P < 0·001). CINN activated cultured macrophages to produce higher levels of NO at 1·2-5·0 μg/ml (P < 0·001), inhibited the growth of chicken tumour cells at 0·6-2·5 μg/ml (P < 0·001) and reduced the viability of Eimeria tenella parasites at 10 and 100 μg/ml (P < 0·05 and P < 0·001, respectively), compared with media controls. In chickens fed a diet supplemented with CINN at 14·4 mg/kg, the levels of IL-1β, IL-6, IL-15 and interferon-γ transcripts in intestinal lymphocytes were 2- to 47-fold higher (P < 0·001) compared with chickens given a non-supplemented diet. To determine the effect of CINN diets on avian coccidiosis, chickens were fed diets supplemented with CINN at 14·4 mg/kg (E. maxima or E. tenella) or 125 mg/kg (E. acervulina) from hatch for 24 d, and orally infected with 2·0 × 10(4) sporulated oocysts at age 14 d. CINN-fed chickens showed 16·5 and 41·6 % increased body-weight gains between 0-9 d post-infection (DPI) with E. acervulina or E. maxima, reduced E. acervulina oocyst shedding between 5-9 DPI and increased E. tenella-stimulated parasite antibody responses at 9 DPI compared with controls.",
"title": ""
},
{
"docid": "96a0e29eb5a55f71bce6d51ce0fedc7d",
"text": "This article describes a new method for assessing the effect of a given film on viewers’ brain activity. Brain activity was measured using functional magnetic resonance imaging (fMRI) during free viewing of films, and inter-subject correlation analysis (ISC) was used to assess similarities in the spatiotemporal responses across viewers’ brains during movie watching. Our results demonstrate that some films can exert considerable control over brain activity and eye movements. However, this was not the case for all types of motion picture sequences, and the level of control over viewers’ brain activity differed as a function of movie content, editing, and directing style. We propose that ISC may be useful to film studies by providing a quantitative neuroscientific assessment of the impact of different styles of filmmaking on viewers’ brains, and a valuable method for the film industry to better assess its products. Finally, we suggest that this method brings together two separate and largely unrelated disciplines, cognitive neuroscience and film studies, and may open the way for a new interdisciplinary field of “neurocinematic” studies.",
"title": ""
},
{
"docid": "58873aa177cc69d13afa70c413af9efa",
"text": "In vitro drug metabolism studies, which are inexpensive and readily carried out, serve as an adequate screening mechanism to characterize drug metabolites, elucidate their pathways, and make suggestions for further in vivo testing. This publication is a sequel to part I in a series and aims at providing a general framework to guide designs and protocols of the in vitro drug metabolism studies considered good practice in an efficient manner such that it would help researchers avoid common pitfalls and misleading results. The in vitro models include hepatic and non-hepatic microsomes, cDNA-expressed recombinant human CYPs expressed in insect cells or human B lymphoblastoid, chemical P450 inhibitors, S9 fraction, hepatocytes and liver slices. Important conditions for conducting the in vitro drug metabolism studies using these models are stated, including relevant concentrations of enzymes, co-factors, inhibitors and test drugs; time of incubation and sampling in order to establish kinetics of reactions; appropriate control settings, buffer selection and method validation. Separate in vitro data should be logically integrated to explain results from animal and human studies and to provide insights into the nature and consequences of in vivo drug metabolism. This article offers technical information and data and addresses scientific rationales and practical skills related to in vitro evaluation of drug metabolism to meet regulatory requirements for drug development.",
"title": ""
},
{
"docid": "e4761bfc7c9b41881441928883660156",
"text": "This paper presents a digital low-dropout regulator (D-LDO) with a proposed transient-response boost technique, which enables the reduction of transient response time, as well as overshoot/undershoot, when the load current is abruptly drawn. The proposed D-LDO detects the deviation of the output voltage by overshoot/undershoot, and increases its loop gain, for the time that the deviation is beyond a limit. Once the output voltage is settled again, the loop gain is returned. With the D-LDO fabricated on an 110-nm CMOS technology, we measured its settling time and peak of undershoot, which were reduced by 60% and 72%, respectively, compared with and without the transient-response boost mode. Using the digital logic gates, the chip occupies a small area of 0.04 mm2, and it achieves a maximum current efficiency of 99.98%, by consuming the quiescent current of 15 μA at 0.7-V input voltage.",
"title": ""
}
] | scidocsrr |
da7675530762e5374a62d803c68b31f6 | When Will You Arrive? Estimating Travel Time Based on Deep Neural Networks | [
{
"docid": "a2891655fbb08c584c6efe07ee419fb7",
"text": "Forecasting the flow of crowds is of great importance to traffic management and public safety, and very challenging as it is affected by many complex factors, such as inter-region traffic, events, and weather. We propose a deep-learning-based approach, called ST-ResNet, to collectively forecast the inflow and outflow of crowds in each and every region of a city. We design an end-to-end structure of ST-ResNet based on unique properties of spatio-temporal data. More specifically, we employ the residual neural network framework to model the temporal closeness, period, and trend properties of crowd traffic. For each property, we design a branch of residual convolutional units, each of which models the spatial properties of crowd traffic. ST-ResNet learns to dynamically aggregate the output of the three residual neural networks based on data, assigning different weights to different branches and regions. The aggregation is further combined with external factors, such as weather and day of the week, to predict the final traffic of crowds in each and every region. Experiments on two types of crowd flows in Beijing and New York City (NYC) demonstrate that the proposed ST-ResNet outperforms six well-known methods.",
"title": ""
}
] | [
{
"docid": "de8661c2e63188464de6b345bfe3a908",
"text": "Modern computer games show potential not just for engaging and entertaining users, but also in promoting learning. Game designers employ a range of techniques to promote long-term user engagement and motivation. These techniques are increasingly being employed in so-called serious games, games that have nonentertainment purposes such as education or training. Although such games share the goal of AIED of promoting deep learner engagement with subject matter, the techniques employed are very different. Can AIED technologies complement and enhance serious game design techniques, or does good serious game design render AIED techniques superfluous? This paper explores these questions in the context of the Tactical Language Training System (TLTS), a program that supports rapid acquisition of foreign language and cultural skills. The TLTS combines game design principles and game development tools with learner modelling, pedagogical agents, and pedagogical dramas. Learners carry out missions in a simulated game world, interacting with non-player characters. A virtual aide assists the learners if they run into difficulties, and gives performance feedback in the context of preparatory exercises. Artificial intelligence plays a key role in controlling the behaviour of the non-player characters in the game; intelligent tutoring provides supplementary scaffolding.",
"title": ""
},
{
"docid": "aea24b4cbacdbe798c01996af2bf8a38",
"text": "Transient receptor potential vanilloid type 4 (TRPV4) is a calcium-permeable nonselective cation channel, originally described in 2000 by research teams led by Schultz (Nat Cell Biol 2: 695-702, 2000) and Liedtke (Cell 103: 525-535, 2000). TRPV4 is now recognized as being a polymodal ionotropic receptor that is activated by a disparate array of stimuli, ranging from hypotonicity to heat and acidic pH. Importantly, this ion channel is constitutively expressed and capable of spontaneous activity in the absence of agonist stimulation, which suggests that it serves important physiological functions, as does its widespread dissemination throughout the body and its capacity to interact with other proteins. Not surprisingly, therefore, it has emerged more recently that TRPV4 fulfills a great number of important physiological roles and that various disease states are attributable to the absence, or abnormal functioning, of this ion channel. Here, we review the known characteristics of this ion channel's structure, localization and function, including its activators, and examine its functional importance in health and disease.",
"title": ""
},
{
"docid": "f6e8c34656a40fd7b97c3e84d6ba8ebb",
"text": "We propose a novel approach to fully automatic lesion boundary detection in ultrasound breast images. The novelty of the proposed work lies in the complete automation of the manual process of initial Region-of-Interest (ROI) labeling and in the procedure adopted for the subsequent lesion boundary detection. Histogram equalization is initially used to preprocess the images followed by hybrid filtering and multifractal analysis stages. Subsequently, a single valued thresholding segmentation stage and a rule-based approach is used for the identification of the lesion ROI and the point of interest that is used as the seed-point. Next, starting from this point an Isotropic Gaussian function is applied on the inverted, original ultrasound image. The lesion area is then separated from the background by a thresholding segmentation stage and the initial boundary is detected via edge detection. Finally to further improve and refine the initial boundary, we make use of a state-of-the-art active contour method (i.e. gradient vector flow (GVF) snake model). We provide results that include judgments from expert radiologists on 360 ultrasound images proving that the final boundary detected by the proposed method is highly accurate. We compare the proposed method with two existing stateof-the-art methods, namely the radial gradient index filtering (RGI) technique of Drukker et. al. and the local mean technique proposed by Yap et. al., in proving the proposed method’s robustness and accuracy.",
"title": ""
},
{
"docid": "124a50c2e797ffe549e1591d5720acda",
"text": "Temporal information has useful features for recognizing facial expressions. However, to manually design useful features requires a lot of effort. In this paper, to reduce this effort, a deep learning technique, which is regarded as a tool to automatically extract useful features from raw data, is adopted. Our deep network is based on two different models. The first deep network extracts temporal appearance features from image sequences, while the other deep network extracts temporal geometry features from temporal facial landmark points. These two models are combined using a new integration method in order to boost the performance of the facial expression recognition. Through several experiments, we show that the two models cooperate with each other. As a result, we achieve superior performance to other state-of-the-art methods in the CK+ and Oulu-CASIA databases. Furthermore, we show that our new integration method gives more accurate results than traditional methods, such as a weighted summation and a feature concatenation method.",
"title": ""
},
{
"docid": "ed61f8946d674ed2823d2a861717775c",
"text": "This paper presents a 0.13μm SHA-less pipeline ADC with LMS calibration technique. The nonlinearity of the first three stages is calibrated with blind LMS algorithm. Opamps and switches are carefully considered and co-designed with the calibration system. Around 7LSB closed-loop nonlinearity of MDAC is achieved. Simulation shows the SNDR of the proposed ADC at 200MS/s sampling rate is 78dB with 3.13MHz input and 75dB with 83.13MHz input.",
"title": ""
},
{
"docid": "20e0c6d52a8973a8da4269705085016f",
"text": "The Great Barrier Reef (GBR) is a World Heritage Area and contains extensive areas of coral reef, seagrass meadows and fisheries resources. From adjacent catchments, numerous rivers discharge pollutants from agricultural, urban, mining and industrial activity. Pollutant sources have been identified and include suspended sediment from erosion in cattle grazing areas; nitrate from fertiliser application on crop lands; and herbicides from various land uses. The fate and effects of these pollutants in the receiving marine environment are relatively well understood. The Australian and Queensland Governments responded to the concerns of pollution of the GBR from catchment runoff with a plan to address this issue in 2003 (Reef Plan; updated 2009), incentive-based voluntary management initiatives in 2007 (Reef Rescue) and a State regulatory approach in 2009, the Reef Protection Package. This paper reviews new research relevant to the catchment to GBR continuum and evaluates the appropriateness of current management responses.",
"title": ""
},
{
"docid": "a03761cb260e132b4041d40b5a11137d",
"text": "Policy gradient is an efficient technique for improving a policy in a reinforcement learning setting. However, vanilla online variants are on-policy only and not able to take advantage of off-policy data. In this paper we describe a new technique that combines policy gradient with off-policy Q-learning, drawing experience from a replay buffer. This is motivated by making a connection between the fixed points of the regularized policy gradient algorithm and the Q-values. This connection allows us to estimate the Q-values from the action preferences of the policy, to which we apply Q-learning updates. We refer to the new technique as ‘PGQL’, for policy gradient and Q-learning. We also establish an equivalency between action-value fitting techniques and actor-critic algorithms, showing that regularized policy gradient techniques can be interpreted as advantage function learning algorithms. We conclude with some numerical examples that demonstrate improved data efficiency and stability of PGQL. In particular, we tested PGQL on the full suite of Atari games and achieved performance exceeding that of both asynchronous advantage actor-critic (A3C) and Q-learning.",
"title": ""
},
{
"docid": "53c5366ddb389e4b4822e5395e416380",
"text": "Information exchange in the just about any cluster of computer has to be more secure in the era of cloud computing and big data. Steganography helps to prevent illegal attention through covering the secret message in a number of digitally electronically representative media, without hurting the accessibility of secret message. Image steganography methods are recently been helpful to send any secret message in the protected image carrier to prevent threats and attacks whereas it does not give any kind of opportunity to hackers to find out the secret concept. Inside a steganographic system secrets information is embedded inside of a cover file, to ensure that no one will suspect that anything perhaps there is inside carrier. The cover file could be image, audio or video. To really make it safer, the secrets information might be encrypted embedded then, it will be decrypted in the receiver. In this paper, we are reviewing some digital image steganographic techniques depending on LSB (least significant bit) & LSB array concept.",
"title": ""
},
{
"docid": "fc63f044042826814cc761904b863967",
"text": "iv ABSTRACT Element Detection in Japanese Comic Book Panels Toshihiro Kuboi Comic books are a unique and increasingly popular form of entertainment combining visual and textual elements of communication. This work pertains to making comic books more accessible. Specifically, this paper explains how we detect elements such as speech bubbles present in Japanese comic book panels. Some applications of the work presented in this paper are automatic detection of text and its transformation into audio or into other languages. Automatic detection of elements can also allow reasoning and analysis at a deeper semantic level than what's possible today. Our approach uses an expert system and a machine learning system. The expert system process information from images and inspires feature sets which help train the machine learning system. The expert system detects speech bubbles based on heuristics. The machine learning system uses machine learning algorithms. Specifically, Naive Bayes, Maximum Entropy, and support vector machine are used to detect speech bubbles. The algorithms are trained in a fully-supervised way and a semi-supervised way. Both the expert system and the machine learning system achieved high accuracy. We are able to train the machine learning algorithms to detect speech bubbles just as accurately as the expert system. We also applied the same approach to eye detection of characters in the panels, and are able to detect majority of the eyes but with low precision. However, we are able to improve the performance of our eye detection system significantly by combining the SVM and either the Naive Bayes or the AdaBoost classifiers. v ACKNOWLEDGMENTS This thesis is inspired by Eriq Augustine's original project on the machine translation of Japanese comic books. I would like to thank Eriq for his guidance and assistance on the selection of this thesis topic.",
"title": ""
},
{
"docid": "ce294cb6467dd11f8bf61ab12783f4a2",
"text": "There is no such thing as too much of a good thing-at least when it comes to well written and comprehensive graduate level texts in any technical field that has been growing as fast as neural computing. In recent years there has been a proliferation of neural network related textbooks that ’attempt to give a broad, mathematically rigorous introduction to the theory and applications of the field for an audience of either professional engineers, graduate students, or both. Among the most notable and recent perhaps are the excellent texts by Haykin [l], Zurada [2], Kung [ 3 ] , and Hertz et. al. [4]. Add to this dozens of volumes of paper collections, and expositions from different perspectives (AI, physics, cognitive science, VLSI (very large scale integration), and parallel processing, etc.), as well as other textbooks, and you rapidly converge to the global minimum: so many books, so little time! If you are interested in learning about the underlying theory of neural computation, however, then perhaps alongside your perusal of the above texts you should also look at yet another one. Fundamentals of ArtiJcial Neural Networks emphasizes fundamental theoretical aspects of the computational capabilities and learning abilities of artificial neural networks (ANN’S). The book is intended for either first year graduate students in electrical or computer science and engineering, or practicing engineers and researchers in the field. It has evolved from a series of lecture notes of two courses on ANN’S taught by the author over the past six years at Wayne State University. Apart from the usual prerequisites of mathematical maturity (probability theory, differential equations, linear algebra, multivariate calculus), the reader is assumed to be familiar with system theory, the concept of a “state,” as well as Boolean algebra and switching theory basics. The author himself is a well-established researcher in the field, with dozens of papers to his credit. The book is well organized and presented, and a delight to read. Exercises at the end of each chapter (some 200) complement the text, and range in difficulty level from the very basic to mathematically or numerically challenging. About 700 relevant references are also provided at the end of the book. The book is centered on the idea of viewing ANN’S as nonlinear adaptive parallel computational models of varying degrees of complexity. Accordingly, the author starts out in Chapter 1 by an exposition of the computational capab es of the simplest models, namely linear and polynomial threshold gates. This is built upon basic concepts of switching theory. The discussion is then extended to the capacity and generalization ability of threshold gates via a proof of the function counting theorem. The treatment is coherent and mathematically rigorous Chapter 2 picks up from the discussion in Chapter 1 by considering networks of linear threshold gates (LTG’s) as well as neuronal units with nonlinear activation functions, and investigates their mapping capabilities. Important theoretical results on bounds on the number of functions realizable by a feedforward network of LTG’s, as",
"title": ""
},
{
"docid": "a76be3ebe7b169f3669243271d2474a6",
"text": "Sophisticated video processing effects require both image and geometry information. We explore the possibility to augment a video camera with a recent infrared time-of-flight depth camera, to capture high-resolution RGB and low-resolution, noisy depth at video frame rates. To turn such a setup into a practical RGBZ video camera, we develop efficient data filtering techniques that are tailored to the noise characteristics of IR depth cameras. We first remove typical artefacts in the RGBZ data and then apply an efficient spatiotemporal denoising and upsampling scheme. This allows us to record temporally coherent RGBZ videos at interactive frame rates and to use them to render a variety of effects in unprecedented quality. We show effects such as video relighting, geometry-based abstraction and stylisation, background segmentation and rendering in stereoscopic 3D.",
"title": ""
},
{
"docid": "a8ddaed8209d09998159014307233874",
"text": "Traditional image-based 3D reconstruction methods use multiple images to extract 3D geometry. However, it is not always possible to obtain such images, for example when reconstructing destroyed structures using existing photographs or paintings with proper perspective (figure 1), and reconstructing objects without actually visiting the site using images from the web or postcards (figure 2). Even when multiple images are possible, parts of the scene appear in only one image due to occlusions and/or lack of features to match between images. Methods for 3D reconstruction from a single image do exist (e.g. [1] and [2]). We present a new method that is more accurate and more flexible so that it can model a wider variety of sites and structures than existing methods. Using this approach, we reconstructed in 3D many destroyed structures using old photographs and paintings. Sites all over the world have been reconstructed from tourist pictures, web pages, and postcards.",
"title": ""
},
{
"docid": "6025fb8936761dcf3c6751545b430ec0",
"text": "Although many sentiment lexicons in different languages exist, most are not comprehensive. In a recent sentiment analysis application, we used a large Chinese sentiment lexicon and found that it missed a large number of sentiment words used in social media. This prompted us to make a new attempt to study sentiment lexicon expansion. This paper first formulates the problem as a PU learning problem. It then proposes a new PU learning method suitable for the problem based on a neural network. The results are further enhanced with a new dictionary lookup technique and a novel polarity classification algorithm. Experimental results show that the proposed approach greatly outperforms baseline methods.",
"title": ""
},
{
"docid": "081b09442d347a4a29d8cc3978079f79",
"text": "The major challenge in designing wireless sensor networks (WSNs) is the support of the functional, such as data latency, and the non-functional, such as data integrity, requirements while coping with the computation, energy and communication constraints. Careful node placement can be a very effective optimization means for achieving the desired design goals. In this paper, we report on the current state of the research on optimized node placement in WSNs. We highlight the issues, identify the various objectives and enumerate the different models and formulations. We categorize the placement strategies into static and dynamic depending on whether the optimization is performed at the time of deployment or while the network is operational, respectively. We further classify the published techniques based on the role that the node plays in the network and the primary performance objective considered. The paper also highlights open problems in this area of research.",
"title": ""
},
{
"docid": "8bc0edddcfac4aabb7fcf0fe4ed8035b",
"text": "Nowadays, there are many taxis traversing around the city searching for available passengers, but their hunts of passengers are not always efficient. To the dynamics of traffic and biased passenger distributions, current offline recommendations based on place of interests may not work well. In this paper, we define a new problem, global-optimal trajectory retrieving (GOTR), as finding a connected trajectory of high profit and high probability to pick up a passenger within a given time period in real-time. To tackle this challenging problem, we present a system, called HUNTS, based on the knowledge from both historical and online GPS data and business data. To achieve above objectives, first, we propose a dynamic scoring system to evaluate each road segment in different time periods by considering both picking-up rate and profit factors. Second, we introduce a novel method, called trajectory sewing, based on a heuristic method and the Skyline technique, to produce an approximate optimal trajectory in real-time. Our method produces a connected trajectory rather than several place of interests to avoid frequent next-hop queries. Third, to avoid congestion and other real-time traffic situations, we update the score of each road segment constantly via an online handler. Finally, we validate our system using a large-scale data of around 15,000 taxis in a large city in China, and compare the results with regular taxis' hunts and the state-of-the-art.",
"title": ""
},
{
"docid": "980ad058a2856048765f497683557386",
"text": "Hierarchical reinforcement learning (HRL) has recently shown promising advances on speeding up learning, improving the exploration, and discovering intertask transferable skills. Most recent works focus on HRL with two levels, i.e., a master policy manipulates subpolicies, which in turn manipulate primitive actions. However, HRL with multiple levels is usually needed in many real-world scenarios, whose ultimate goals are highly abstract, while their actions are very primitive. Therefore, in this paper, we propose a diversity-driven extensible HRL (DEHRL), where an extensible and scalable framework is built and learned levelwise to realize HRL with multiple levels. DEHRL follows a popular assumption: diverse subpolicies are useful, i.e., subpolicies are believed to be more useful if they are more diverse. However, existing implementations of this diversity assumption usually have their own drawbacks, which makes them inapplicable to HRL with multiple levels. Consequently, we further propose a novel diversity-driven solution to achieve this assumption in DEHRL. Experimental studies evaluate DEHRL with five baselines from four perspectives in two domains; the results show that DEHRL outperforms the state-of-the-art baselines in all four aspects.",
"title": ""
},
{
"docid": "16915e2da37f8cd6fa1ce3a4506223ff",
"text": "In recent years, significant progress has been made in solving challenging problems across various domains using deep reinforcement learning (RL). Reproducing existing work and accurately judging the improvements offered by novel methods is vital to sustaining this progress. Unfortunately, reproducing results for state-of-the-art deep RL methods is seldom straightforward. In particular, non-determinism in standard benchmark environments, combined with variance intrinsic to the methods, can make reported results tough to interpret. Without significance metrics and tighter standardization of experimental reporting, it is difficult to determine whether improvements over the prior state-of-the-art are meaningful. In this paper, we investigate challenges posed by reproducibility, proper experimental techniques, and reporting procedures. We illustrate the variability in reported metrics and results when comparing against common baselines and suggest guidelines to make future results in deep RL more reproducible. We aim to spur discussion about how to ensure continued progress in the field by minimizing wasted effort stemming from results that are non-reproducible and easily misinterpreted.",
"title": ""
}
] | scidocsrr |
e21329e559c2b6c9dc21e00741e38b8f | Lexicon-Based Methods for Sentiment Analysis | [
{
"docid": "77125ee1f92591489ee5d933710cc1f1",
"text": "Subjectivity in natural language refers to aspects of language used to express opinions, evaluations, and speculations. There are numerous natural language processing applications for which subjectivity analysis is relevant, including information extraction and text categorization. The goal of this work is learning subjective language from corpora. Clues of subjectivity are generated and tested, including low-frequency words, collocations, and adjectives and verbs identified using distributional similarity. The features are also examined working together in concert. The features, generated from different data sets using different procedures, exhibit consistency in performance in that they all do better and worse on the same data sets. In addition, this article shows that the density of subjectivity clues in the surrounding context strongly affects how likely it is that a word is subjective, and it provides the results of an annotation study assessing the subjectivity of sentences with high-density features. Finally, the clues are used to perform opinion piece recognition (a type of text categorization and genre detection) to demonstrate the utility of the knowledge acquired in this article.",
"title": ""
}
] | [
{
"docid": "cf8915016c6a6d6537fbd368238c81f3",
"text": "A 5-year-old boy was followed up with migratory spermatic cord and a perineal tumour at the paediatric department after birth. He was born by Caesarean section at 38 weeks in viviparity. Weight at birth was 3650 g. Although a meningocele in the sacral region was found by MRI, there were no symptoms in particular and no other deformity was found. When he was 4 years old, he presented to our department with the perinal tumour. On examination, a slender scrotum-like tumour covering the centre of the perineal lesion, along with inflammation and ulceration around the skin of the anus, was observed. Both testes and scrotums were observed in front of the tumour (Figure 1a). An excision of the tumour and Z-plasty of the perineal lesion were performed. The subcutaneous tissue consisted of adipose tissue-like lipoma and was resected along with the tumour (Figure 1b). A Z-plasty was carefully performed in order to maintain the lefteright symmetry of the",
"title": ""
},
{
"docid": "8ffd290907609be99ca25acee4fb2a87",
"text": "This paper introduces zero-shot dialog generation (ZSDG), as a step towards neural dialog systems that can instantly generalize to new situations with minimal data. ZSDG enables an end-to-end generative dialog system to generalize to a new domain for which only a domain description is provided and no training dialogs are available. Then a novel learning framework, Action Matching, is proposed. This algorithm can learn a cross-domain embedding space that models the semantics of dialog responses which, in turn, lets a neural dialog generation model generalize to new domains. We evaluate our methods on a new synthetic dialog dataset, and an existing human-human dialog dataset. Results show that our method has superior performance in learning dialog models that rapidly adapt their behavior to new domains and suggests promising future research.1",
"title": ""
},
{
"docid": "31e4adc5e6a43c8ae2e4ac163aae98c0",
"text": "To meet rapidly increasing data rate requirements in WLANs, one important technique adopted in 802.11ac is the channel bonding (CB) scheme that combines multiple 20MHz channels for a single transmission in 5GHz band. In order to effectively access channel after a series of contention operations, 802.11ac specifies two different CB operations: Dynamic Channel Bonding (DCB) and Static Channel Bonding (SCB). This paper proposes an optimal channel allocation algorithm to achieve maximal throughputs in DCB WLANs. Specifically, we first adopt a continuous-time Markov Chain (CTMC) model to analyze the equilibrium throughputs. Based on the throughput analysis, we then construct an integer nonlinear programming (INLP) model with the target of maximizing system throughputs. By solving the INLP model, we then propose an optimal channel allocation algorithm based on the Branch-and-Bound Method (BBM). Simulations show the proposed algorithm can achieve the maximal system throughput under various network settings. Importantly, it turns out that the maximal throughput performance can be achieved under the channel allocation scheme with the least overlapped channels among WLANs, which brings new insights into the design and optimization of future WLANs, especially for those adopting CB technique.",
"title": ""
},
{
"docid": "39d546e44a8c4133761d814c0e83595b",
"text": "After almost 30 years of promise tempered by setbacks, gene therapies are rapidly becoming a critical component of the therapeutic armamentarium for a variety of inherited and acquired human diseases. Gene therapies for inherited immune disorders, hemophilia, eye and neurodegenerative disorders, and lymphoid cancers recently progressed to approved drug status in the United States and Europe, or are anticipated to receive approval in the near future. In this Review, we discuss milestones in the development of gene therapies, focusing on direct in vivo administration of viral vectors and adoptive transfer of genetically engineered T cells or hematopoietic stem cells. We also discuss emerging genome editing technologies that should further advance the scope and efficacy of gene therapy approaches.",
"title": ""
},
{
"docid": "ff972f6c739f0cacf0848af8d75a43c6",
"text": "In this paper, we deal with channel estimation for orthogonal frequency-division multiplexing (OFDM) systems. The channels are assumed to be time-varying (TV) and approximated by a basis expansion model (BEM). Due to the time-variation, the resulting channel matrix in the frequency domain is no longer diagonal, but approximately banded. Based on this observation, we propose novel channel estimators to combat both the noise and the out-of-band interference. In addition, the effect of a receiver window on channel estimation is also studied. Our claims are supported by simulation results, which are obtained considering Jakes' channels with fairly high Doppler spreads",
"title": ""
},
{
"docid": "9a4844cd2cc1d167bcb376bc7a3a0328",
"text": "BACKGROUND\nData on the potential behavioral effects of music therapy in autism are scarce.\n\n\nOBJECTIVE\nThe aim of this study was to investigate whether a musical training program based on interactive music therapy sessions could enhance the behavioral profile and the musical skills of young adults affected by severe autism.\n\n\nMETHODOLOGY\nYoung adults (N = 8) with severe (Childhood Autism Rating Scale >30) autism took part in a total of 52 weekly active music therapy sessions lasting 60 minutes. Each session consisted of a wide range of different musical activities including singing, piano playing, and drumming. Clinical rating scales included the Clinical Global Impression (CGI) scale and the Brief Psychiatric Rating Scale (BPRS). Musical skills-including singing a short or long melody, playing the C scale on a keyboard, music absorption, rhythm reproduction, and execution of complex rhythmic patterns-were rated on a 5-point Likert-type scale ranging from \"completely/entirely absent\" to \"completely/entirely present.\"\n\n\nRESULTS\nAt the end of the 52-week training period, significant improvements were found on both the CGI and BPRS scales. Similarly, the patients' musical skills significantly ameliorated as compared to baseline ratings.\n\n\nCONCLUSIONS\nOur pilot data seem to suggest that active music therapy sessions could be of aid in improving autistic symptoms, as well as personal musical skills in young adults with severe autism.",
"title": ""
},
{
"docid": "825640f8ce425a34462b98869758e289",
"text": "Recurrent neural networks scale poorly due to the intrinsic difficulty in parallelizing their state computations. For instance, the forward pass computation of ht is blocked until the entire computation of ht−1 finishes, which is a major bottleneck for parallel computing. In this work, we propose an alternative RNN implementation by deliberately simplifying the state computation and exposing more parallelism. The proposed recurrent unit operates as fast as a convolutional layer and 5-10x faster than cuDNN-optimized LSTM. We demonstrate the unit’s effectiveness across a wide range of applications including classification, question answering, language modeling, translation and speech recognition. We open source our implementation in PyTorch and CNTK1.",
"title": ""
},
{
"docid": "224bacc72ba9785d158f506eea68e4c9",
"text": "A model of commumcations protocols based on finite-state machines is investigated. The problem addressed is how to ensure certain generally desirable properties, which make protocols \"wellformed,\" that is, specify a response to those and only those events that can actually occur. It is determined to what extent the problem is solvable, and one approach to solving it ts described. Categories and SubJect Descriptors' C 2 2 [Computer-Conununication Networks]: Network Protocols-protocol verification; F 1 1 [Computation by Abstract Devices] Models of Computation--automata; G.2.2 [Discrete Mathematics] Graph Theory--graph algoruhms; trees General Terms: Reliability, Verification Additional",
"title": ""
},
{
"docid": "ff76b52f7859aaffa58307018edb8323",
"text": "Malevolent Trojan circuits inserted by layout modifications in an IC at untrustworthy fabrication facilities are difficult to detect by traditional post-manufacturing testing. In this paper, we develop a novel low-overhead design methodology that facilitates the detection of inserted Trojan hardware in an IC through logic testing. As a byproduct, it also increases the security of the design by design obfuscation. Application of the proposed design methodology to an 8-bit RISC processor and a JPEG encoder resulted in improvement in Trojan detection probability significantly. It also obfuscated the design with verification mismatch for 90% of the verification points, while incurring moderate area, power and delay overheads.",
"title": ""
},
{
"docid": "07ca23b315d7ba087c10c066a5ea2266",
"text": "This paper documents the extent to which occupational therapists use groups in practice. A questionnaire was mailed to 300 occupational therapists nationwide. Questions included the types of groups occupational therapists lead, the facilities in which the groups take place, the patients included, the activities presented, and individual and groups goals. Results were tabulated based on the responses of 120 therapists. We established that 60% of occupational therapists in all areas of practice lead groups in treatment. Of the 209 groups described by the respondents, there was a significantly greater number of activity groups than verbal groups. Also, there were significantly more groups with ten or less members than groups of more than ten. This paper describes the ten categories of groups that were identified in this study.",
"title": ""
},
{
"docid": "cf875189a6cc55d6f669f909f7a020d6",
"text": "Unfortunately, better throughputs are continuously requested mobile networks face spectral resource scarcity. Consequently, spectrum resource's use must be optimized for that operators have introduced frequency reuse mechanism. Unfortunately, this mechanism is limited by co-channel interference and adjacent channel interference. An Orthogonal Frequency Division Multiple Access (OFDMA) has been introduced which was also better enhanced by femto cells concept. From this work it can be deduced that the Signal to co-channel interference ratio power does not exceed 14.1 dB for a user in edge cell whereas it can achieved 15.3 dB for a user in center cell with the same path loss value (γ=3.5). The signal to adjacent channel interference power ratio decreases from 20.7 w to 6.9 w if the number of active users in the neighbor interfering cell is increased from 10 to 30. However, from the fourth generation's study, we deduce that macro user's performances are reversely varied with femto cells number. In fact, SINR decreases from 10 dB to −5 dB if we increase the number of femto cells from 1 to 7.",
"title": ""
},
{
"docid": "3c9caac182d644d87236e51e34065aed",
"text": "This paper deals with automatic supervised classification of documents. The approach suggested is based on a vector representation of the documents centred not on the words but on the n-grams of characters for varying n. The effects of this method are examined in several experiments using the multivariate chi-square to reduce the dimensionality, the cosine and Kullback&Liebler distances, and two benchmark corpuses the reuters-21578 newswire articles and the 20 newsgroups data for evaluation. The evaluation was done, by using the macroaveraged F1 function. The results show the effectiveness of this approach compared to the Bag-OfWord and stem representations.",
"title": ""
},
{
"docid": "597f097d5206fc259224b905d4d20e20",
"text": "W e present here a QT database designed j b r evaluation of algorithms that detect waveform boundaries in the EGG. T h e dataabase consists of 105 fifteen-minute excerpts of two-channel ECG Holter recordings, chosen to include a broad variety of QRS and ST-T morphologies. Waveform bounda,ries for a subset of beats in, these recordings have been manually determined by expert annotators using a n interactive graphic disp1a.y to view both signals simultaneously and to insert the annotations. Examples of each m,orvhologg were inchded in this subset of uniaotated beats; at least 30 beats in each record, 3622 beats in all, were manually a:anotated in Ihe database. In 11 records, two indepen,dent sets of ennotations have been inchded, to a.llow inter-observer variability slwdies. T h e Q T Databnse is available on a CD-ROM in the format previously used for the MIT-BJH Arrhythmia Database ayad the Euro-pean ST-T Database, from which some of the recordings in the &T Database have been obtained.",
"title": ""
},
{
"docid": "d2f78c78329eb290ad9c2ee368c76c6a",
"text": "Narrative intelligence is an important part of human cognition, especially in sensemaking and communicating with people. Humans draw on a lifetime of relevant experiences to explain stories, to tell stories, and to help choose the most appropriate actions in real-life settings. Manual authoring the required knowledge presents a significant bottleneck in the creation of systems demonstrating narrative intelligence. In this paper, we describe a novel technique for automatically learning script-like narrative knowledge from crowdsourcing. By leveraging human workers’ collective understanding of social and procedural constructs, we can learn a potentially unlimited range of scripts regarding how real-world situations unfold. We present quantitative evaluations of the learned primitive events and the temporal ordering of events, which suggest we can identify orderings between events with high accuracy.",
"title": ""
},
{
"docid": "d1b99b2d6fd38465d7f95cef30508930",
"text": "Epidemiologic studies have shown that low-density lipoprotein cholesterol (LDL-C) is a strong risk factor, whilst high-density lipoprotein cholesterol (HDL-C) reduces the risk of coronary heart disease (CHD). Therefore, strategies to manage dyslipidemia in an effort to prevent or treat CHD have primarily attempted at decreasing LDL-C and raising HDL-C levels. Cholesteryl ester transfer protein (CETP) mediates the exchange of cholesteryl ester for triglycerides between HDL and VLDL and LDL. We have published the first report indicating that a group of Japanese patients who were lacking CETP had extremely high HDL-C levels, low LDL-C levels and a low incidence of CHD. Animal studies, as well as clinical and epidemiologic evidences, have suggested that inhibition of CETP provides an effective strategy to raise HDL-C and reduce LDL-C levels. Four CETP inhibitors have substantially increased HDL-C levels in dyslipidemic patients. This review will discuss the current status and future prospects of CETP inhibitors in the treatment of CHD. At present anacetrapib by Merck and evacetrapib by Eli Lilly are under development. By 100mg of anacetrapib HDL-C increased by 138%, and LDL-C decreased by 40%. Evacetrapib 500 mg also showed dramatic 132% increase of HDL-C, while LDL-C decreased by 40%. If larger, long-term, randomized, clinical end point trials could corroborate other findings in reducing atherosclerosis, CETP inhibitors could have a significant impact in the management of dyslipidemic CHD patients. Inhibition of CETP synthesis by antisense oligonucleotide or small molecules will produce more similar conditions to human CETP deficiency and may be effective in reducing atherosclerosis and cardiovascular events. We are expecting the final data of prospective clinical trials by CETP inhibitors in 2015.",
"title": ""
},
{
"docid": "4c8e08daa7310e0a21c234565a033e56",
"text": "Using a cross-panel design and data from 2 successive cohorts of college students (N = 357), we examined the stability of maladaptive perfectionism, procrastination, and psychological distress across 3 time points within a college semester. Each construct was substantially stable over time, with procrastination being especially stable. We also tested, but failed to support, a mediational model with Time 2 (mid-semester) procrastination as a hypothesized mechanism through which Time 1 (early-semester) perfectionism would affect Time 3 (end-semester) psychological distress. An alternative model with Time 2 perfectionism as a mediator of the procrastination-distress association also was not supported. Within-time analyses revealed generally consistent strength of effects in the correlations between the 3 constructs over the course of the semester. A significant interaction effect also emerged. Time 1 procrastination had no effect on otherwise high levels of psychological distress at the end of the semester for highly perfectionistic students, but at low levels of Time 1 perfectionism, the most distressed students by the end of the term were those who were more likely to have procrastinated earlier in the semester. Implications of the stability of the constructs and their association over time, as well as the moderating effects of procrastination, are discussed in the context of maladaptive perfectionism and problematic procrastination.",
"title": ""
},
{
"docid": "f6c87da72f6665bda58c5007aade685d",
"text": "Harmful speech has various forms and it has been plaguing the social media in different ways. If we need to crackdown different degrees of hate speech and abusive behavior amongst it, the classification needs to be based on complex ramifications which needs to be defined and hold accountable for, other than racist, sexist or against some particular group and community. This paper primarily describes how we created an ontological classification of harmful speech based on degree of hateful intent, and used it to annotate twitter data accordingly. The key contribution of this paper is the new dataset of tweets we created based on ontological classes and degrees of harmful speech found in the text. We also propose supervised classification system for recognizing these respective harmful speech classes in the texts hence. This serves as a preliminary work to lay down foundation on defining different classes of harmful speech and subsequent work will be done in making it’s automatic detection more robust and efficient.",
"title": ""
},
{
"docid": "fe1484e8ccd3e112c5229651fb22cf70",
"text": "We describe a new animation technique for supporting interactive exploration of a graph, building on the wellknown radial tree layout method. When a node is selected to become the center of interest, our visualization performs an animated transition to a new layout. Our approach is to linearly interpolate the polar coordinates of the nodes, while enforcing constraints on the layout to keep the transition easy to follow. We apply this technique to visualizations of social networks and of the Gnutella file-sharing network, and discuss our findings and usability results.",
"title": ""
},
{
"docid": "25d25da610b4b3fe54b665d55afc3323",
"text": "We address the problem of vision-based navigation in busy inner-city locations, using a stereo rig mounted on a mobile platform. In this scenario semantic information becomes important: rather than modelling moving objects as arbitrary obstacles, they should be categorised and tracked in order to predict their future behaviour. To this end, we combine classical geometric world mapping with object category detection and tracking. Object-category specific detectors serve to find instances of the most important object classes (in our case pedestrians and cars). Based on these detections, multi-object tracking recovers the objects’ trajectories, thereby making it possible to predict their future locations, and to employ dynamic path planning. The approach is evaluated on challenging, realistic video sequences recorded at busy inner-city locations.",
"title": ""
},
{
"docid": "a0d1b5c1745fb676163c36644041bafa",
"text": "ive 2.8 3.1 3.3 5.0% Our System 3.6 4.8 4.2 18.0% Human Abstract (reference) 4.2 4.8 4.5 65.5% Sample Summaries • Movie: The Neverending Story • Human: A magical journey about the power of a young boy’s imagination to save a dying fantasy land, The Neverending Story remains a much-loved kids adventure. • LexRank: It pokes along at times and lapses occasionally into dark moments of preachy philosophy, but this is still a charming, amusing and harmless film for kids. • Opinosis: The Neverending Story is a silly fantasy movie that often shows its age . • Our System: The Neverending Story is an entertaining children’s adventure, with heart and imagination to spare.",
"title": ""
}
] | scidocsrr |
a8cb350268a533589bdb5ca33d5de389 | Secure Execution via Program Shepherding | [
{
"docid": "5ac63b0be4561f126c90b65e834e1d14",
"text": "Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem’s Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications’ return pointers. Our implementation called StackGhost under OpenBSD 2.8 acts as a ghost in the machine. StackGhost advances exploit prevention in that it protects every application run on the system without their knowledge nor does it require their source or binary modification. We will document several of the methods devised to preserve the sanctity of the system and will explore the performance ramifications of StackGhost.",
"title": ""
}
] | [
{
"docid": "a06d00c783ef31008a622a8500a4ca86",
"text": "Wandering is a common and risky behavior in people with dementia (PWD). In this paper, we present a mobile healthcare application to detect wandering patterns in indoor settings. The application harnesses consumer electronics devices including WiFi access points and mobile phones and has been tested successfully in a home environment. Experimental results show that the mobile-health application is able to detect wandering patterns including lapping, pacing and random in real-time. Once wandering is detected, an alert message is sent using SMS (Short Message Service) to attending caregivers or physicians for further examination and timely interventions.",
"title": ""
},
{
"docid": "b34af4da147779c6d1505ff12cacd5aa",
"text": "Crowd-enabled place-centric systems gather and reason over large mobile sensor datasets and target everyday user locations (such as stores, workplaces, and restaurants). Such systems are transforming various consumer services (for example, local search) and data-driven organizations (city planning). As the demand for these systems increases, our understanding of how to design and deploy successful crowdsensing systems must improve. In this paper, we present a systematic study of the coverage and scaling properties of place-centric crowdsensing. During a two-month deployment, we collected smartphone sensor data from 85 participants using a representative crowdsensing system that captures 48,000 different place visits. Our analysis of this dataset examines issues of core interest to place-centric crowdsensing, including place-temporal coverage, the relationship between the user population and coverage, privacy concerns, and the characterization of the collected data. Collectively, our findings provide valuable insights to guide the building of future place-centric crowdsensing systems and applications.",
"title": ""
},
{
"docid": "528b17b55172cbf22e77a14db4334ba6",
"text": "Recently, Halevi et al. (CCS '11) proposed a cryptographic primitive called proofs of ownership (PoW) to enhance security of client-side deduplication in cloud storage. In a proof of ownership scheme, any owner of the same file F can prove to the cloud storage that he/she owns file F in a robust and efficient way, in the bounded leakage setting where a certain amount of efficiently-extractable information about file F is leaked. Following this work, we propose a secure client-side deduplication scheme, with the following advantages: our scheme protects data confidentiality (and some partial information) against both outside adversaries and honest-but-curious cloud storage server, while Halevi et al. trusts cloud storage server in data confidentiality; our scheme is proved secure w.r.t. any distribution with sufficient min-entropy, while Halevi et al. (the last and the most practical construction) is particular to a specific type of distribution (a generalization of \"block-fixing\" distribution) of input files.\n The cost of our improvements is that we adopt a weaker leakage setting: We allow a bounded amount one-time leakage of a target file before our scheme starts to execute, while Halevi et al. allows a bounded amount multi-time leakage of the target file before and after their scheme starts to execute. To the best of our knowledge, previous works on client-side deduplication prior Halevi et al. do not consider any leakage setting.",
"title": ""
},
{
"docid": "4b0cf6392d84a0cc8ab80c6ed4796853",
"text": "This paper introduces the Finite-State TurnTaking Machine (FSTTM), a new model to control the turn-taking behavior of conversational agents. Based on a non-deterministic finite-state machine, the FSTTM uses a cost matrix and decision theoretic principles to select a turn-taking action at any time. We show how the model can be applied to the problem of end-of-turn detection. Evaluation results on a deployed spoken dialog system show that the FSTTM provides significantly higher responsiveness than previous approaches.",
"title": ""
},
{
"docid": "6d0ae5d9d8cff434cfaabe476d608cb6",
"text": "10.1 INTRODUCTION Pulse compression involves the transmission of a long coded pulse and the processing of the received echo to obtain a relatively narrow pulse. The increased detection capability of a long-pulse radar system is achieved while retaining the range resolution capability of a narrow-pulse system. Several advantages are obtained. Transmission of long pulses permits a more efficient use of the average power capability of the radar. Generation of high peak power signals is avoided. The average power of the radar may be increased without increasing the pulse repetition frequency (PRF) and, hence, decreasing the radar's unambiguous range. An increased system resolving capability in doppler is also obtained as a result of the use of the long pulse. In addition, the radar is less vulnerable to interfering signals that differ from the coded transmitted signal. A long pulse may be generated from a narrow pulse. A narrow pulse contains a large number of frequency components with a precise phase relationship between them. If the relative phases are changed by a phase-distorting filter, the frequency components combine to produce a stretched, or expanded, pulse. This expanded pulse is the pulse that is transmitted. The received echo is processed in the receiver by a compression filter. The compression filter readjusts the relative phases of the frequency components so that a narrow or compressed pulse is again produced. The pulse compression ratio is the ratio of the width of the expanded pulse to that of the compressed pulse. The pulse compression ratio is also equal to the product of the time duration and the spectral bandwidth (time-bandwidth product) of the transmitted signal. A pulse compression radar is a practical implementation of a matched-filter system. The coded signal may be represented either as a frequency response H(U) or as an impulse time response h(i) of a coding filter. In Fig. 10. Ia 9 the coded signal is obtained by exciting the coding filter //(<*>) with a unit impulse. The received signal is fed to the matched filter, whose frequency response is the complex conjugate #*(a>) of the coding filter. The output of the matched-filter section is the compressed pulse, which is given by the inverse Fourier transform of the product of the signal spectrum //(a>) and the matched-filter response //*(o>):",
"title": ""
},
{
"docid": "353bbc5e68ec1d53b3cd0f7c352ee699",
"text": "• A submitted manuscript is the author's version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers.",
"title": ""
},
{
"docid": "88be12fdd7ec90a7af7337f3d29b2130",
"text": "Classification of time series has been attracting great interest over the past decade. While dozens of techniques have been introduced, recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm is very difficult to beat for most time series problems, especially for large-scale datasets. While this may be considered good news, given the simplicity of implementing the nearest neighbor algorithm, there are some negative consequences of this. First, the nearest neighbor algorithm requires storing and searching the entire dataset, resulting in a high time and space complexity that limits its applicability, especially on resource-limited sensors. Second, beyond mere classification accuracy, we often wish to gain some insight into the data and to make the classification result more explainable, which global characteristics of the nearest neighbor cannot provide. In this work we introduce a new time series primitive, time series shapelets, which addresses these limitations. Informally, shapelets are time series subsequences which are in some sense maximally representative of a class. We can use the distance to the shapelet, rather than the distance to the nearest neighbor to classify objects. As we shall show with extensive empirical evaluations in diverse domains, classification algorithms based on the time series shapelet primitives can be interpretable, more accurate, and significantly faster than state-of-the-art classifiers.",
"title": ""
},
{
"docid": "68be77b14ff053ac64901d36142ba210",
"text": "Control-Flow Integrity (CFI), as a means to prevent control-flow hijacking attacks, enforces that each instruction transfers control to an address in a set of valid targets. The security guarantee of CFI thus depends on the definition of valid targets, which conventionally are defined as the result of a static analysis. Unfortunately, previous research has demonstrated that such a definition, and thus any implementation that enforces it, still allows practical control-flow attacks. In this work, we present a path-sensitive variation of CFI that utilizes runtime path-sensitive point-to analysis to compute the legitimate control transfer targets. We have designed and implemented a runtime environment, PITTYPAT, that enforces path-sensitive CFI efficiently by combining commodity, low-overhead hardware monitoring and a novel runtime points-to analysis. Our formal analysis and empirical evaluation demonstrate that, compared to CFI based on static analysis, PITTYPAT ensures that applications satisfy stronger security guarantees, with acceptable overhead for security-critical contexts.",
"title": ""
},
{
"docid": "627d938cf2194cd0cab09f36a0bd50a9",
"text": "This chapter focuses on the why, what, and how of bodily expression analysis for automatic affect recognition. It first asks the question of ‘why bodily expression?’ and attempts to find answers by reviewing the latest bodily expression perception literature. The chapter then turns its attention to the question of ‘what are the bodily expressions recognized automatically?’ by providing an overview of the automatic bodily expression recognition literature. The chapter then provides representative answers to how bodily expression analysis can aid affect recognition by describing three case studies: (1) data acquisition and annotation of the first publicly available database of affective face-and-body displays (i.e., the FABO database); (2) a representative approach for affective state recognition from face-and-body display by detecting the space-time interest points in video and using Canonical Correlation Analysis (CCA) for fusion, and (3) a representative approach for explicit detection of the temporal phases (segments) of affective states (start/end of the expression and its subdivision into phases such as neutral, onset, apex, and offset) from bodily expressions. The chapter concludes by summarizing the main challenges faced and discussing how we can advance the state of the art in the field.",
"title": ""
},
{
"docid": "fdfc8d10002769f2dd2943a4d76fe27d",
"text": "This paper has as a major objective to present a unified overview and derivation of mixedinteger nonlinear programming (MINLP) techniques, Branch and Bound, Outer-Approximation, Generalized Benders and Extended Cutting Plane methods, as applied to nonlinear discrete optimization problems that are expressed in algebraic form. The solution of MINLP problems with convex functions is presented first, followed by a brief discussion on extensions for the nonconvex case. The solution of logic based representations, known as generalized disjunctive programs, is also described. Theoretical properties are presented, and numerical comparisons on a small process network problem.",
"title": ""
},
{
"docid": "0498aecb7ac19cae6182d355e984dcf2",
"text": "More than half of the smart phones world-wide are currently employing the Android platform, which employs Java for programming its applications. The Android Java is to be executed by the Dalvik virtual machine (VM), which is quite different from the traditional Java VM such as Oracle's HotSpot VM. That is, Dalvik employs register-based bytecode while HotSpot employs stack-based bytecode, requiring a different way of interpretation. Also, Dalvik uses trace-based just-in-time compilation (JITC), while HotSpot uses method-based JITC. Therefore, it is questioned how the Dalvik VM performs compared the HotSpot VM. Unfortunately, there has been little comparative evaluation of both VMs, so the performance of the Dalvik VM is not well understood. More importantly, it is also not well understood how the performance of the Dalvik VM affects the overall performance of the Android applications (apps). In this paper, we make an attempt to evaluate the Dalvik VM. We install both VMs on the same board and compare the performance using EEMBC benchmark. Our results show that Dalvik slightly outperforms HotSpot in the interpreter mode due to its register-based bytecode. In the JITC mode, however, Dakvik is slower than HotSpot by more than 2.9 times and its generated code size is not smaller than HotSpot's due to its worse code quality and trace-chaining code. We also investigated how real Android apps are different from Java benchmarks, to understand why the slow Dalvik VM does not affect the performance of the Android apps seriously.",
"title": ""
},
{
"docid": "69ce0e617b13feb42b72ea33355ff2e5",
"text": "Sarcasm can radically alter or invert a phrase’s meaning. Sarcasm detection can therefore help improve natural language processing (NLP) tasks. The majority of prior research has modeled sarcasm detection as classification, with two important limitations: 1. Balanced datasets, when sarcasm is actually rather rare. 2. Using Twitter users’ self-declarations in the form of hashtags to label data, when sarcasm can take many forms. To address these issues, we create an unbalanced corpus of manually annotated Twitter conversations. We compare human and machine ability to recognize sarcasm on this data under varying amounts of context. Our results indicate that both class imbalance and labelling method affect performance, and should both be considered when designing automatic sarcasm detection systems. We conclude that for progress to be made in real-world sarcasm detection, we will require a new class labelling scheme that is able to access the ‘common ground’ held between conversational parties.",
"title": ""
},
{
"docid": "30d0ff3258decd5766d121bf97ae06d4",
"text": "In this paper, we present a new image forgery detection method based on deep learning technique, which utilizes a convolutional neural network (CNN) to automatically learn hierarchical representations from the input RGB color images. The proposed CNN is specifically designed for image splicing and copy-move detection applications. Rather than a random strategy, the weights at the first layer of our network are initialized with the basic high-pass filter set used in calculation of residual maps in spatial rich model (SRM), which serves as a regularizer to efficiently suppress the effect of image contents and capture the subtle artifacts introduced by the tampering operations. The pre-trained CNN is used as patch descriptor to extract dense features from the test images, and a feature fusion technique is then explored to obtain the final discriminative features for SVM classification. The experimental results on several public datasets show that the proposed CNN based model outperforms some state-of-the-art methods.",
"title": ""
},
{
"docid": "a89262d6b763c57a9ff8b6bc9b823466",
"text": "Keywords: Malaria parasites Image analysis Morphological operations Adaptive histogram equalization Adaptive thresholding a b s t r a c t Every year, malaria kills between 660,000 and 1.2 million people, many of whom are children in Africa. The World Health Organization (WHO) encourages the development of rapid and economical diagnostic tests that allow for the identification of proper treatment methods. In this paper a novel method to automatically enumerate malaria parasites is proposed and evaluated, using a database consisting of 475 images with varying densities of malaria parasites. This method will analyze data by utilizing standard operations of image processing such as histogram equalization, thresholding, morphological operations and connected components analysis for parasite density estimation. The application of the proposed method yields an average accuracy rate of 96.46% with a low processing time of two seconds per image on a custom computing platform. Malaria has infected humans for over 50,000 years (Day, 2010). Epidemiological data show that somewhere in the world a child dies every 30 s because of this disease. This suggests that both vaccine development and the proper administration of available drugs are absolutely essential to treat malaria patients (O'Meara, Hall, & McKenzie, 2007a). A wrong diagnosis of this disease may have adverse clinical and therapeutic implications for patients and for endpoints of clinical trials of anti-malarial vaccines or drugs. Nowadays , there are a lot of different techniques for malaria diagnosis Thus, the most important component of laboratory diagnosis is the quantification of parasite density. Accurate and replicable parasite counts are difficult to achieve because of inherent technical limitations and human inconsistency (Mitiku, Mengistu, & Gelaw, 2003). Digital image analysis provides an opportunity to improve the performance of parasite density quan-tification, decreasing the time required to count the parasites and avoiding bias from human error. A technique was proposed (Díaz, González, & Romero, 2009) for quantifying erythrocytes in stained thin blood films. The image was corrected from luminance differences and the normalized RGB color space was used for classifying pixels as erythrocyte or background followed by an Inclusion-Tree representation that structures the pixel information into objects. Finally, a two step classification process identifies infected erythrocytes, using a trained bank of classifiers. The main drawback of this approach is that it needs user intervention, which results in time consuming and large inter and intra-observer variabilities scheme based on HSV color space is presented. This method was focused on …",
"title": ""
},
{
"docid": "2fed3f693a52ca9852c9238d3c9abf36",
"text": "A thin artificial magnetic conductor (AMC) structure is designed and breadboarded for radar cross-section (RCS) Reduction applications. The design presented in this paper shows the advantage of geometrical simplicity while simultaneously reducing the overall thickness (for the current design ). The design is very pragmatic and is based on a combination of AMC and perfect electric conductor (PEC) cells in a chessboard like configuration. An array of Sievenpiper's mushrooms constitutes the AMC part, while the PEC part is formed by full metallic patches. Around the operational frequency of the AMC-elements, the reflection of the AMC and PEC have opposite phase, so for any normal incident plane wave the reflections cancel out, thus reducing the RCS. The same applies to specular reflections for off-normal incidence angles. A simple basic model has been implemented in order to verify the behavior of this structure, while Ansoft-HFSS software has been used to provide a more thorough analysis. Both bistatic and monostatic measurements have been performed to validate the approach.",
"title": ""
},
{
"docid": "3d1cf3f122d6651fb36eefb0dcd41130",
"text": "We investigate a new training paradigm for extractive summarization. Traditionally, human abstracts are used to derive goldstandard labels for extraction units. However, the labels are often inaccurate, because human abstracts and source documents cannot be easily aligned at the word level. In this paper we convert human abstracts to a set of Cloze-style comprehension questions. System summaries are encouraged to preserve salient source content useful for answering questions and share common words with the abstracts. We use reinforcement learning to explore the space of possible extractive summaries and introduce a question-focused reward function to promote concise, fluent, and informative summaries. Our experiments show that the proposed method is effective. It surpasses state-of-the-art systems on the standard summarization dataset.",
"title": ""
},
{
"docid": "d7eeb15d24042787f00324f09152451b",
"text": "Customers select suppliers based on the relative importance of different attributes such as quality, price, flexibility, and delivery performance. This study examines the difference between managers' rating of the perceived importance of different supplier attributes and their actual choice of suppliers in an experimental setting. We use two methods: a Likert scale set of questions, to determine the importance of supplier attributes; and a discrete choice analysis (DCA) experiment, to examine the choice of suppliers. The results indicate that although managers say that quality is the most important attribute for a supplier, they actually choose suppliers based largely on cost and delivery performance.",
"title": ""
},
{
"docid": "bd39bc6b8038332c13601da16363b70b",
"text": "Hadoop MapReduce is the most popular open-source parallel programming model extensively used in Big Data analytics. Although fault tolerance and platform independence make Hadoop MapReduce the most popular choice for many users, it still has huge performance improvement potentials. Recently, RDMA-based design of Hadoop MapReduce has alleviated major performance bottlenecks with the implementation of many novel design features such as in-memory merge, prefetching and caching of map outputs, and overlapping of merge and reduce phases. Although these features reduce the overall execution time for MapReduce jobs compared to the default framework, further improvement is possible if shuffle and merge phases can also be overlapped with the map phase during job execution. In this paper, we propose HOMR (a Hybrid approach to exploit maximum Overlapping in MapReduce), that incorporates not only the features implemented in RDMA-based design, but also exploits maximum possible overlapping among all different phases compared to current best approaches. Our solution introduces two key concepts: Greedy Shuffle Algorithm and On-demand Shuffle Adjustment, both of which are essential to achieve significant performance benefits over the default MapReduce framework. Architecture of HOMR is generalized enough to provide performance efficiency both over different Sockets interface as well as previous RDMA-based designs over InfiniBand. Performance evaluations show that HOMR with RDMA over InfiniBand can achieve performance benefits of 54% and 56% compared to default Hadoop over IPoIB (IP over InfiniBand) and 10GigE, respectively. Compared to the previous best RDMA-based designs, this benefit is 29%. HOMR over Sockets also achieves a maximum of 38-40% benefit compared to default Hadoop over Sockets interface. We also evaluate our design with real-world workloads like SWIM and PUMA, and observe benefits of up to 16% and 18%, respectively, over the previous best-case RDMA-based design. To the best of our knowledge, this is the first approach to achieve maximum possible overlapping for MapReduce framework.",
"title": ""
},
{
"docid": "7551b0023dd92888ac229ffda4dfd29e",
"text": "Ever since the inception of mobile telephony, the downlink and uplink of cellular networks have been coupled, that is, mobile terminals have been constrained to associate with the same base station in both the downlink and uplink directions. New trends in network densification and mobile data usage increase the drawbacks of this constraint, and suggest that it should be revisited. In this article we identify and explain five key arguments in favor of downlink/uplink decoupling based on a blend of theoretical, experimental, and architectural insights. We then overview the changes needed in current LTE-A mobile systems to enable this decoupling, and then look ahead to fifth generation cellular standards. We demonstrate that decoupling can lead to significant gains in network throughput, outage, and power consumption at a much lower cost compared to other solutions that provide comparable or lower gains.",
"title": ""
},
{
"docid": "018a8b222d1fa5d41a64f3f77fbb860a",
"text": "The classical music traditions of the Indian subcontinent, Hindustani and Carnatic, offer an excellent ground on which to test the limitations of current music information research approaches. At the same time, studies based on these music traditions can shed light on how to solve new and complex music modeling problems. Both traditions have very distinct characteristics, specially compared with western ones: they have developed unique instruments, musical forms, performance practices, social uses and context. In this article, we focus on the Carnatic music tradition of south India, especially on its melodic characteristics. We overview the theoretical aspects that are relevant for music information research and discuss the scarce computational approaches developed so far. We put emphasis on the limitations of the current methodologies and we present open issues that have not yet been addressed and that we believe are important to be worked on.",
"title": ""
}
] | scidocsrr |
d36077d0c9dfa54ef58d45554e21479b | Building Streetview Datasets for Place Recognition and City Reconstruction | [
{
"docid": "64ce725037b72921b979583f6fdc4f27",
"text": "We describe an approach to object retrieval which searches for and localizes all the occurrences of an object in a video, given a query image of the object. The object is represented by a set of viewpoint invariant region descriptors so that recognition can proceed successfully despite changes in viewpoint, illumination and partial occlusion. The temporal continuity of the video within a shot is used to track the regions in order to reject those that are unstable. Efficient retrieval is achieved by employing methods from statistical text retrieval, including inverted file systems, and text and document frequency weightings. This requires a visual analogy of a word which is provided here by vector quantizing the region descriptors. The final ranking also depends on the spatial layout of the regions. The result is that retrieval is immediate, returning a ranked list of shots in the manner of Google. We report results for object retrieval on the full length feature films ‘Groundhog Day’ and ‘Casablanca’.",
"title": ""
},
{
"docid": "f085832faf1a2921eedd3d00e8e592db",
"text": "There are billions of photographs on the Internet, comprising the largest and most diverse photo collection ever assembled. How can computer vision researchers exploit this imagery? This paper explores this question from the standpoint of 3D scene modeling and visualization. We present structure-from-motion and image-based rendering algorithms that operate on hundreds of images downloaded as a result of keyword-based image search queries like “Notre Dame” or “Trevi Fountain.” This approach, which we call Photo Tourism, has enabled reconstructions of numerous well-known world sites. This paper presents these algorithms and results as a first step towards 3D modeling of the world’s well-photographed sites, cities, and landscapes from Internet imagery, and discusses key open problems and challenges for the research community.",
"title": ""
}
] | [
{
"docid": "c39b143861d1e0c371ec1684bb29f4cc",
"text": "Data races are a particularly unpleasant kind of threading bugs. They are hard to find and reproduce -- you may not observe a bug during the entire testing cycle and will only see it in production as rare unexplainable failures. This paper presents ThreadSanitizer -- a dynamic detector of data races. We describe the hybrid algorithm (based on happens-before and locksets) used in the detector. We introduce what we call dynamic annotations -- a sort of race detection API that allows a user to inform the detector about any tricky synchronization in the user program. Various practical aspects of using ThreadSanitizer for testing multithreaded C++ code at Google are also discussed.",
"title": ""
},
{
"docid": "eb42c7dafed682a0643b46f49d2a86ec",
"text": "OBJECTIVE\nTo evaluate the effectiveness of telephone based peer support in the prevention of postnatal depression.\n\n\nDESIGN\nMultisite randomised controlled trial.\n\n\nSETTING\nSeven health regions across Ontario, Canada.\n\n\nPARTICIPANTS\n701 women in the first two weeks postpartum identified as high risk for postnatal depression with the Edinburgh postnatal depression scale and randomised with an internet based randomisation service.\n\n\nINTERVENTION\nProactive individualised telephone based peer (mother to mother) support, initiated within 48-72 hours of randomisation, provided by a volunteer recruited from the community who had previously experienced and recovered from self reported postnatal depression and attended a four hour training session.\n\n\nMAIN OUTCOME MEASURES\nEdinburgh postnatal depression scale, structured clinical interview-depression, state-trait anxiety inventory, UCLA loneliness scale, and use of health services.\n\n\nRESULTS\nAfter web based screening of 21 470 women, 701 (72%) eligible mothers were recruited. A blinded research nurse followed up more than 85% by telephone, including 613 at 12 weeks and 600 at 24 weeks postpartum. At 12 weeks, 14% (40/297) of women in the intervention group and 25% (78/315) in the control group had an Edinburgh postnatal depression scale score >12 (chi(2)=12.5, P<0.001; number need to treat 8.8, 95% confidence interval 5.9 to 19.6; relative risk reduction 0.46, 95% confidence interval 0.24 to 0.62). There was a positive trend in favour of the intervention group for maternal anxiety but not loneliness or use of health services. For ethical reasons, participants identified with clinical depression at 12 weeks were referred for treatment, resulting in no differences between groups at 24 weeks. Of the 221 women in the intervention group who received and evaluated their experience of peer support, over 80% were satisfied and would recommend this support to a friend.\n\n\nCONCLUSION\nTelephone based peer support can be effective in preventing postnatal depression among women at high risk.\n\n\nTRIAL REGISTRATION\nISRCTN 68337727.",
"title": ""
},
{
"docid": "6080612b8858d633c3f63a3d019aef58",
"text": "Color images provide large information for human visual perception compared to grayscale images. Color image enhancement methods enhance the visual data to increase the clarity of the color image. It increases human perception of information. Different color image contrast enhancement methods are used to increase the contrast of the color images. The Retinex algorithms enhance the color images similar to the scene perceived by the human eye. Multiscale retinex with color restoration (MSRCR) is a type of retinex algorithm. The MSRCR algorithm results in graying out and halo artifacts at the edges of the images. So here the focus is on improving the MSRCR algorithm by combining it with contrast limited adaptive histogram equalization (CLAHE) using image.",
"title": ""
},
{
"docid": "425270bbfd1290a0692afeea95fa090f",
"text": "This paper introduces a bounding gait control algorithm that allows a successful implementation of duty cycle modulation in the MIT Cheetah 2. Instead of controlling leg stiffness to emulate a `springy leg' inspired from the Spring-Loaded-Inverted-Pendulum (SLIP) model, the algorithm prescribes vertical impulse by generating scaled ground reaction forces at each step to achieve the desired stance and total stride duration. Therefore, we can control the duty cycle: the percentage of the stance phase over the entire cycle. By prescribing the required vertical impulse of the ground reaction force at each step, the algorithm can adapt to variable duty cycles attributed to variations in running speed. Following linear momentum conservation law, in order to achieve a limit-cycle gait, the sum of all vertical ground reaction forces must match vertical momentum created by gravity during a cycle. In addition, we added a virtual compliance control in the vertical direction to enhance stability. The stiffness of the virtual compliance is selected based on the eigenvalue analysis of the linearized Poincaré map and the chosen stiffness is 700 N/m, which corresponds to around 12% of the stiffness used in the previous trotting experiments of the MIT Cheetah, where the ground reaction forces are purely caused by the impedance controller with equilibrium point trajectories. This indicates that the virtual compliance control does not significantly contributes to generating ground reaction forces, but to stability. The experimental results show that the algorithm successfully prescribes the duty cycle for stable bounding gaits. This new approach can shed a light on variable speed running control algorithm.",
"title": ""
},
{
"docid": "85964cef28799c2a37fa3ab6aef992fb",
"text": "Rabies developed in an Austrian man after he was bitten by a dog in Agadir, Morocco. Diagnosis was confirmed by reverse transcription-polymerase chain reaction and immunohistochemistry. The patient's girlfriend was bitten by the same dog, but she did not become ill.",
"title": ""
},
{
"docid": "28d19824a598ae20039f2ed5d8885234",
"text": "Soft-tissue augmentation of the face is an increasingly popular cosmetic procedure. In recent years, the number of available filling agents has also increased dramatically, improving the range of options available to physicians and patients. Understanding the different characteristics, capabilities, risks, and limitations of the available dermal and subdermal fillers can help physicians improve patient outcomes and reduce the risk of complications. The most popular fillers are those made from cross-linked hyaluronic acid (HA). A major and unique advantage of HA fillers is that they can be quickly and easily reversed by the injection of hyaluronidase into areas in which elimination of the filler is desired, either because there is excess HA in the area or to accelerate the resolution of an adverse reaction to treatment or to the product. In general, a lower incidence of complications (especially late-occurring or long-lasting effects) has been reported with HA fillers compared with the semi-permanent and permanent fillers. The implantation of nonreversible fillers requires more and different expertise on the part of the physician than does injection of HA fillers, and may produce effects and complications that are more difficult or impossible to manage even by the use of corrective surgery. Most practitioners use HA fillers as the foundation of their filler practices because they have found that HA fillers produce excellent aesthetic outcomes with high patient satisfaction, and a low incidence and severity of complications. Only limited subsets of physicians and patients have been able to justify the higher complexity and risks associated with the use of nonreversible fillers.",
"title": ""
},
{
"docid": "f94f8d5f1a0ca74b94a1086d6d94b0d3",
"text": "The horizontal binocular disparity is a critical factor for the visual fatigue induced by watching stereoscopic TVs. Stereoscopic images that possess the disparity within the 'comfort zones' and remain still in the depth direction are considered comfortable to the viewers as 2D images. However, the difference in brain activities between processing such comfortable stereoscopic images and 2D images is still less studied. The DP3 (differential P3) signal refers to an event-related potential (ERP) component indicating attentional processes, which is typically evoked by odd target stimuli among standard stimuli in an oddball task. The present study found that the DP3 signal elicited by the comfortable 3D images exhibits the delayed peak latency and enhanced peak amplitude over the anterior and central scalp regions compared to the 2D images. The finding suggests that compared to the processing of the 2D images, more attentional resources are involved in the processing of the stereoscopic images even though they are subjectively comfortable.",
"title": ""
},
{
"docid": "2adcf4db59bb321132a10445292d7fe9",
"text": "In this paper, we present work on learning analytics that aims to support learners and teachers through dashboard applications, ranging from small mobile applications to learnscapes on large public displays. Dashboards typically capture and visualize traces of learning activities, in order to promote awareness, reflection, and sense-making, and to enable learners to define goals and track progress toward these goals. Based on an analysis of our own work and a broad range of similar learning dashboards, we identify HCI issues for this exciting research area.",
"title": ""
},
{
"docid": "e36236681b84ac00a56af6c769e9436c",
"text": "Due to their potential commercial value and the associated great research challenges, recommender systems have been extensively studied by both academia and industry recently. However, the data sparsity problem of the involved user-item matrix seriously affects the recommendation quality. Many existing approaches to recommender systems cannot easily deal with users who have made very few ratings. In view of the exponential growth of information generated by online users, social contextual information analysis is becoming important for many Web applications. In this article, we propose a factor analysis approach based on probabilistic matrix factorization to alleviate the data sparsity and poor prediction accuracy problems by incorporating social contextual information, such as social networks and social tags. The complexity analysis indicates that our approach can be applied to very large datasets since it scales linearly with the number of observations. Moreover, the experimental results show that our method performs much better than the state-of-the-art approaches, especially in the circumstance that users have made few ratings.",
"title": ""
},
{
"docid": "76156cea2ef1d49179d35fd8f333b011",
"text": "Climate change, pollution, and energy insecurity are among the greatest problems of our time. Addressing them requires major changes in our energy infrastructure. Here, we analyze the feasibility of providing worldwide energy for all purposes (electric power, transportation, heating/cooling, etc.) from wind, water, and sunlight (WWS). In Part I, we discuss WWS energy system characteristics, current and future energy demand, availability of WWS resources, numbers of WWS devices, and area and material requirements. In Part II, we address variability, economics, and policy of WWS energy. We estimate that !3,800,000 5 MW wind turbines, !49,000 300 MW concentrated solar plants, !40,000 300 MW solar PV power plants, !1.7 billion 3 kW rooftop PV systems, !5350 100 MWgeothermal power plants, !270 new 1300 MW hydroelectric power plants, !720,000 0.75 MWwave devices, and !490,000 1 MW tidal turbines can power a 2030 WWS world that uses electricity and electrolytic hydrogen for all purposes. Such a WWS infrastructure reduces world power demand by 30% and requires only !0.41% and !0.59% more of the world’s land for footprint and spacing, respectively. We suggest producing all new energy withWWSby 2030 and replacing the pre-existing energy by 2050. Barriers to the plan are primarily social and political, not technological or economic. The energy cost in a WWS world should be similar to",
"title": ""
},
{
"docid": "89dcd15d3f7e2f538af4a2654f144dfb",
"text": "E-waste comprises discarded electronic appliances, of which computers and mobile telephones are disproportionately abundant because of their short lifespan. The current global production of E-waste is estimated to be 20-25 million tonnes per year, with most E-waste being produced in Europe, the United States and Australasia. China, Eastern Europe and Latin America will become major E-waste producers in the next ten years. Miniaturisation and the development of more efficient cloud computing networks, where computing services are delivered over the internet from remote locations, may offset the increase in E-waste production from global economic growth and the development of pervasive new technologies. E-waste contains valuable metals (Cu, platinum group) as well as potential environmental contaminants, especially Pb, Sb, Hg, Cd, Ni, polybrominated diphenyl ethers (PBDEs), and polychlorinated biphenyls (PCBs). Burning E-waste may generate dioxins, furans, polycyclic aromatic hydrocarbons (PAHs), polyhalogenated aromatic hydrocarbons (PHAHs), and hydrogen chloride. The chemical composition of E-waste changes with the development of new technologies and pressure from environmental organisations on electronics companies to find alternatives to environmentally damaging materials. Most E-waste is disposed in landfills. Effective reprocessing technology, which recovers the valuable materials with minimal environmental impact, is expensive. Consequently, although illegal under the Basel Convention, rich countries export an unknown quantity of E-waste to poor countries, where recycling techniques include burning and dissolution in strong acids with few measures to protect human health and the environment. Such reprocessing initially results in extreme localised contamination followed by migration of the contaminants into receiving waters and food chains. E-waste workers suffer negative health effects through skin contact and inhalation, while the wider community are exposed to the contaminants through smoke, dust, drinking water and food. There is evidence that E-waste associated contaminants may be present in some agricultural or manufactured products for export.",
"title": ""
},
{
"docid": "0a95cf6687a8e2421907fb94324c5163",
"text": "The existence of multiple memory systems has been proposed in a number of areas, including cognitive psychology, neuropsychology, and the study of animal learning and memory. We examine whether the existence of such multiple systems seems likely on evolutionary grounds. Multiple systems adapted to serve seemingly similar functions, which differ in important ways, are a common evolutionary outcome. The evolution of multiple memory systems requires memory systems to be specialized to such a degree that the functional problems each system handles cannot be handled by another system. We define this condition as functional incompatibility and show that it occurs for a number of the distinctions that have been proposed between memory systems. The distinction between memory for song and memory for spatial locations in birds, and between incremental habit formation and memory for unique episodes in humans and other primates provide examples. Not all memory systems are highly specialized in function, however, and the conditions under which memory systems could evolve to serve a wide range of functions are also discussed.",
"title": ""
},
{
"docid": "1436e4fddc73d33a6cf83abfa5c9eb02",
"text": "The aim of our study was to provide a contribution to the research field of the critical success factors (CSFs) of ERP projects, with specific focus on smaller enterprises (SMEs). Therefore, we conducted a systematic literature review in order to update the existing reviews of CSFs. On the basis of that review, we led several interviews with ERP consultants experienced with ERP implementations in SMEs. As a result, we showed that all factors found in the literature also affected the success of ERP projects in SMEs. However, within those projects, technological factors gained much more importance compared to the factors that most influence the success of larger ERP projects. For SMEs, factors like the Organizational fit of the ERP system as well as ERP system tests were even more important than Top management support or Project management, which were the most important factors for large-scale companies.",
"title": ""
},
{
"docid": "5eda080188512f8d3c5f882c1114e1c8",
"text": "Knowledge mapping is one of the most popular techniques used to identify knowledge in organizations. Using knowledge mapping techniques; a large and complex set of knowledge resources can be acquired and navigated more easily. Knowledge mapping has attracted the senior managers' attention as an assessment tool in recent years and is expected to measure deep conceptual understanding and allow experts in organizations to characterize relationships between concepts within a domain visually. Here the very critical issue is how to identify and choose an appropriate knowledge mapping technique. This paper aims to explore the different types of knowledge mapping techniques and give a general idea of their target contexts to have the way for choosing the appropriate map. It attempts to illustrate which techniques are appropriate, why and where they can be applied, and how these mapping techniques can be managed. The paper is based on the comprehensive review of papers on knowledge mapping techniques. In addition, this paper attempts to further clarify the differences among these knowledge mapping techniques and the main purpose for using each. Eventually, it is recommended that experts must understand the purpose for which the map is being developed before proceeding to activities related to any knowledge management dimensions; in order to the appropriate knowledge mapping technique .",
"title": ""
},
{
"docid": "bee4bd3019983dc7f66cfd3dafc251ac",
"text": "We present a framework to systematically analyze convolutional neural networks (CNNs) used in classification of cars in autonomous vehicles. Our analysis procedure comprises an image generator that produces synthetic pictures by sampling in a lower dimension image modification subspace and a suite of visualization tools. The image generator produces images which can be used to test the CNN and hence expose its vulnerabilities. The presented framework can be used to extract insights of the CNN classifier, compare across classification models, or generate training and validation datasets.",
"title": ""
},
{
"docid": "85fc78cc3f71b784063b8b564e6509a9",
"text": "Numerous research papers have listed different vectors of personally identifiable information leaking via tradition al and mobile Online Social Networks (OSNs) and highlighted the ongoing aggregation of data about users visiting popular We b sites. We argue that the landscape is worsening and existing proposals (including the recent U.S. Federal Trade Commission’s report) do not address several key issues. We examined over 100 popular non-OSN Web sites across a number of categories where tens of millions of users representing d iverse demographics have accounts, to see if these sites leak private information to prominent aggregators. Our results raise considerable concerns: we see leakage in sites for every category we examined; fully 56% of the sites directly leak pieces of private information with this result growing to 75% if we also include leakage of a site userid. Sensitive search strings sent to healthcare Web sites and travel itineraries on flight reservation sites are leaked in 9 of the top 10 sites studied for each category. The community needs a clear understanding of the shortcomings of existing privac y protection measures and the new proposals. The growing disconnect between the protection measures and increasing leakage and linkage suggests that we need to move beyond the losing battle with aggregators and examine what roles first-party sites can play in protecting privacy of their use rs.",
"title": ""
},
{
"docid": "0bb2798c21d9f7420ea47c717578e94d",
"text": "Blockchain has drawn attention as the next-generation financial technology due to its security that suits the informatization era. In particular, it provides security through the authentication of peers that share virtual cash, encryption, and the generation of hash value. According to the global financial industry, the market for security-based blockchain technology is expected to grow to about USD 20 billion by 2020. In addition, blockchain can be applied beyond the Internet of Things (IoT) environment; its applications are expected to expand. Cloud computing has been dramatically adopted in all IT environments for its efficiency and availability. In this paper, we discuss the concept of blockchain technology and its hot research trends. In addition, we will study how to adapt blockchain security to cloud computing and its secure solutions in detail.",
"title": ""
},
{
"docid": "15aa0333268dd812546d1cc9c24103b8",
"text": "Relation extraction is the process of identifying instances of specified types of semantic relations in text; relation type extension involves extending a relation extraction system to recognize a new type of relation. We present LGCo-Testing, an active learning system for relation type extension based on local and global views of relation instances. Locally, we extract features from the sentence that contains the instance. Globally, we measure the distributional similarity between instances from a 2 billion token corpus. Evaluation on the ACE 2004 corpus shows that LGCo-Testing can reduce annotation cost by 97% while maintaining the performance level of supervised learning.",
"title": ""
},
{
"docid": "2a0577aa61ca1cbde207306fdb5beb08",
"text": "In recent years, researchers have shown that unwanted web tracking is on the rise, as advertisers are trying to capitalize on users' online activity, using increasingly intrusive and sophisticated techniques. Among these, browser fingerprinting has received the most attention since it allows trackers to uniquely identify users despite the clearing of cookies and the use of a browser's private mode. In this paper, we investigate and quantify the fingerprintability of browser extensions, such as, AdBlock and Ghostery. We show that an extension's organic activity in a page's DOM can be used to infer its presence, and develop XHound, the first fully automated system for fingerprinting browser extensions. By applying XHound to the 10,000 most popular Google Chrome extensions, we find that a significant fraction of popular browser extensions are fingerprintable and could thus be used to supplement existing fingerprinting methods. Moreover, by surveying the installed extensions of 854 users, we discover that many users tend to install different sets of fingerprintable browser extensions and could thus be uniquely, or near-uniquely identifiable by extension-based fingerprinting. We use XHound's results to build a proof-of-concept extension-fingerprinting script and show that trackers can fingerprint tens of extensions in just a few seconds. Finally, we describe why the fingerprinting of extensions is more intrusive than the fingerprinting of other browser and system properties, and sketch two different approaches towards defending against extension-based fingerprinting.",
"title": ""
},
{
"docid": "29e4553408f57d9d7acffca58200b1ac",
"text": "With the abundance of exceptionally High Dimensional data, feature selection has become an essential element in the Data Mining process. In this paper, we investigate the problem of efficient feature selection for classification on High Dimensional datasets. We present a novel filter based approach for feature selection that sorts out the features based on a score and then we measure the performance of four different Data Mining classification algorithms on the resulting data. In the proposed approach, we partition the sorted feature and search the important feature in forward manner as well as in reversed manner, while starting from first and last feature simultaneously in the sorted list. The proposed approach is highly scalable and effective as it parallelizes over both attribute and tuples simultaneously allowing us to evaluate many of potential features for High Dimensional datasets. The newly proposed framework for feature selection is experimentally shown to be very valuable with real and synthetic High Dimensional datasets which improve the precision of selected features. We have also tested it to measure classification accuracy against various feature selection process.",
"title": ""
}
] | scidocsrr |
f33f824f6e7bc9e07ea2c668a23e5403 | Robust 3D Object Tracking from Monocular Images Using Stable Parts | [
{
"docid": "5dac8ef81c7a6c508c603b3fd6a87581",
"text": "In this paper, we present a novel benchmark for the evaluation of RGB-D SLAM systems. We recorded a large set of image sequences from a Microsoft Kinect with highly accurate and time-synchronized ground truth camera poses from a motion capture system. The sequences contain both the color and depth images in full sensor resolution (640 × 480) at video frame rate (30 Hz). The ground-truth trajectory was obtained from a motion-capture system with eight high-speed tracking cameras (100 Hz). The dataset consists of 39 sequences that were recorded in an office environment and an industrial hall. The dataset covers a large variety of scenes and camera motions. We provide sequences for debugging with slow motions as well as longer trajectories with and without loop closures. Most sequences were recorded from a handheld Kinect with unconstrained 6-DOF motions but we also provide sequences from a Kinect mounted on a Pioneer 3 robot that was manually navigated through a cluttered indoor environment. To stimulate the comparison of different approaches, we provide automatic evaluation tools both for the evaluation of drift of visual odometry systems and the global pose error of SLAM systems. The benchmark website [1] contains all data, detailed descriptions of the scenes, specifications of the data formats, sample code, and evaluation tools.",
"title": ""
}
] | [
{
"docid": "4e6216d5c3d428018d72542c3d1e5875",
"text": "The recent considerable growth in the amount of easily available on-line text has brought to the foreground the need for large-scale natural language processing tools for text data mining. In this paper we address the problem of organizing documents into meaningful groups according to their content and to visualize a text collection, providing an overview of the range of documents and of their relationships, so that they can be browsed more easily. We use SelfOrganizing Maps (SOMs) (Kohonen 1984). Great efficiency challenges arise in creating these maps. We study linguistically-motivated ways of reducing the representation of a document to increase efficiency and ways to disambiguate the words in the documents.",
"title": ""
},
{
"docid": "92c735a70f5e6ee8ce7fd6f5c0a097c5",
"text": "In this paper, a near-optimum active rectifier is proposed to achieve well-optimized power conversion efficiency (PCE) and voltage conversion ratio (VCR) under various process, voltage, temperature (PVT) and loading conditions. The near-optimum operation includes: eliminated reverse current loss and maximized conduction time achieved by the proposed sampling-based real-time calibrations with automatic circuit-delay compensation for both on-and off-time of active diodes considering PVT variations; and power stage optimizations with adaptive sizing over a wide loading range. The design is fabricated in TSMC 65 nm process with standard I/O devices. Measurement results show more than 36% and 17% improvement in PCE and VCR, respectively, by the proposed techniques. A peak PCE of 94.8% with an 80 Ω loading, a peak VCR of 98.7% with 1 kΩ loading, and a maximum output power of 248.1 mW are achieved with 2.5 V input amplitude.",
"title": ""
},
{
"docid": "33d70bdb73a22f4e1321f0656b61257e",
"text": "Polycystic ovary syndrome (PCOS) is characterized by hormonal abnormalities that cause menstrual irregularity and reduce ovulation rate and fertility, associated to insulin resistance. Myo-inositol (cis-1,2,3,5-trans-4,6-cyclohexanehexol, MI) and D-chiro-inositol (cis-1,2,4-trans-3,5,6-cyclohexanehexol, DCI) represent promising treatments for PCOS, having shown some therapeutic benefits without substantial side effects. Because the use of inositols for treating PCOS is widespread, a deep understanding of this treatment option is needed, both in terms of potential mechanisms and efficacy. This review summarizes the current knowledge on the biological effects of MI and DCI and the results obtained from relevant intervention studies with inositols in PCOS. Based on the published results, both MI and DCI represent potential valid therapeutic approaches for the treatment of insulin resistance and its associated metabolic and reproductive disorders, such as those occurring in women affected by PCOS. Furthermore, the combination MI/DCI seems also effective and might be even superior to either inositol species alone. However, based on available data, a particular MI:DCI ratio to be administered to PCOS patients cannot be established. Further studies are then necessary to understand the real contents of MI or DCI uptaken by the ovary following oral administration in order to identify optimal doses and/or combination ratios.",
"title": ""
},
{
"docid": "ba149d78edb0835702fe1584947118d1",
"text": "Studies on the adoption of business-to-consumer e-commerce have not simultaneously considered trust and risk as important determinants of adoption behavior. Further, trust in information technology has not been addressed to a great extent in the context of e-commerce. This research explicitly encompasses the electronic channel and the firm as objects to be trusted in e-commerce. Our conceptual model leads us to believe that trust in the electronic channel and perceived risks of e-commerce are the major determinants of the adoption behavior. Based on the social network theory and the trust theory, determinants of trust in the electronic channel are included in the research model. This research is expected to provide both theoretical explanations and empirical validation on the adoption of e-commerce. We will also be able to offer specific recommendations on marketing strategies for practitioners, regarding the adoption of Internet banking.",
"title": ""
},
{
"docid": "6bc94f9b5eb90ba679964cf2a7df4de4",
"text": "New high-frequency data collection technologies and machine learning analysis techniques could offer new insights into learning, especially in tasks in which students have ample space to generate unique, personalized artifacts, such as a computer program, a robot, or a solution to an engineering challenge. To date most of the work on learning analytics and educational data mining has focused on online courses or cognitive tutors, in which the tasks are more structured and the entirety of interaction happens in front of a computer. In this paper, I argue that multimodal learning analytics could offer new insights into students' learning trajectories, and present several examples of this work and its educational application.",
"title": ""
},
{
"docid": "8680ee8f949e02529d6914fcea6f7a5b",
"text": "Natural language inference (NLI) is one of the most important tasks in NLP. In this study, we propose a novel method using word dictionaries, which are pairs of a word and its definition, as external knowledge. Our neural definition embedding mechanism encodes input sentences with the definitions of each word of the sentences on the fly. It can encode definitions of words considering the context of the input sentences by using an attention mechanism. We evaluated our method using WordNet as a dictionary and confirmed that it performed better than baseline models when using the full or a subset of 100d GloVe as word embeddings.",
"title": ""
},
{
"docid": "c8c58075f6ba3b9544e12c4b9b30791b",
"text": "Question answering over knowledge graphs is an important problem of interest both commercially and academically. There is substantial interest in the class of natural language questions that can be answered via the lookup of a single fact, driven by the availability of the popular SIMPLEQUESTIONS dataset. The problem with this dataset, however, is that answer triples are provided from Freebase, which has been defunct for several years. As a result, it is difficult to build “real-world” question answering systems that are operationally deployable. Furthermore, a defunct knowledge graph means that much of the infrastructure for querying, browsing, and manipulating triples no longer exists. To address this problem, we present SIMPLEDBPEDIAQA, a new benchmark dataset for simple question answering over knowledge graphs that was created by mapping SIMPLEQUESTIONS entities and predicates from Freebase to DBpedia. Although this mapping is conceptually straightforward, there are a number of nuances that make the task non-trivial, owing to the different conceptual organizations of the two knowledge graphs. To lay the foundation for future research using this dataset, we leverage recent work to provide simple yet strong baselines with and without neural networks.",
"title": ""
},
{
"docid": "28208b225bf8eacf4b0fe3fcdbc1f0ab",
"text": "As Bluetooth technology has evolved and improved over the years, it has gained widespread acceptance and is increasingly found in many aspects of everyday life. It's convenient and easy to use, but it also has security flaws which make it vulnerable to attacks. In this paper, we discuss and demonstrate some of the tools and techniques that are currently available to attackers to exploit the vulnerabilities in Bluetooth. We also discuss some of the techniques to mitigate those risks to protect data and devices. Yet despite its world-wide acceptance and continued proliferation, as we have learned through our research and analysis, security vulnerabilities in Bluetooth still persist.",
"title": ""
},
{
"docid": "1c167e508a03587076531a4a14c822f2",
"text": "We develop a new computational model for representing the fine-grained meanings of near-synonyms and the differences between them. We also develop a lexical-choice process that can decide which of several near-synonyms is most appropriate in a particular situation. This research has direct applications in machine translation and text generation. We first identify the problems of representing near-synonyms in a computational lexicon and show that no previous model adequately accounts for near-synonymy. We then propose a preliminary theory to account for near-synonymy, relying crucially on the notion of granularity of representation, in which the meaning of a word arises out of a context-dependent combination of a context-independent core meaning and a set of explicit differences to its near-synonyms. That is, near-synonyms cluster together. We then develop a clustered model of lexical knowledge, derived from the conventional ontological model. The model cuts off the ontology at a coarse grain, thus avoiding an awkward proliferation of language-dependent concepts in the ontology, yet maintaining the advantages of efficient computation and reasoning. The model groups near-synonyms into subconceptual clusters that are linked to the ontology. A cluster differentiates near-synonyms in terms of fine-grained aspects of denotation, implication, expressed attitude, and style. The model is general enough to account for other types of variation, for instance, in collocational behavior. An efficient, robust, and flexible fine-grained lexical-choice process is a consequence of a clustered model of lexical knowledge. To make it work, we formalize criteria for lexical choice as preferences to express certain concepts with varying indirectness, to express attitudes, and to establish certain styles. The lexical-choice process itself works on two tiers: between clusters and between near-synonyns of clusters. We describe our prototype implementation of the system, called I-Saurus.",
"title": ""
},
{
"docid": "6384a691d3b50e252ab76a61e28f012e",
"text": "We study the algorithmics of information structure design --- a.k.a. persuasion or signaling --- in a fundamental special case introduced by Arieli and Babichenko: multiple agents, binary actions, and no inter-agent externalities. Unlike prior work on this model, we allow many states of nature. We assume that the principal's objective is a monotone set function, and study the problem both in the public signal and private signal models, drawing a sharp contrast between the two in terms of both efficacy and computational complexity.\n When private signals are allowed, our results are largely positive and quite general. First, we use linear programming duality and the equivalence of separation and optimization to show polynomial-time equivalence between (exactly) optimal signaling and the problem of maximizing the objective function plus an additive function. This yields an efficient implementation of the optimal scheme when the objective is supermodular or anonymous. Second, we exhibit a (1-1/e)-approximation of the optimal private signaling scheme, modulo an additive loss of ε, when the objective function is submodular. These two results simplify, unify, and generalize results of [Arieli and Babichenko, 2016] and [Babichenko and Barman, 2016], extending them from a binary state of nature to many states (modulo the additive loss in the latter result). Third, we consider the binary-state case with a submodular objective, and simplify and slightly strengthen the result of [Babichenko and Barman, 2016] to obtain a (1-1/e)-approximation via a scheme which (i) signals independently to each receiver and (ii) is \"oblivious\" in that it does not depend on the objective function so long as it is monotone submodular.\n When only a public signal is allowed, our results are negative. First, we show that it is NP-hard to approximate the optimal public scheme, within any constant factor, even when the objective is additive. Second, we show that the optimal private scheme can outperform the optimal public scheme, in terms of maximizing the sender's objective, by a polynomial factor.",
"title": ""
},
{
"docid": "41849b567ba3c1f9b2053a5da22edab1",
"text": "Bio-inspired control of motion is an active field of research with many applications in real world tasks. In the case of robotic systems that need to exhibit oscillatory behaviour (i.e. locomotion of snake-type or legged robots), Central Pattern Generators (CPGs) are among the most versatile solutions. These controllers are often based on loosely-coupled oscillators similar to those found in the neural circuits of many animal species, and can be more robust to uncertainty (i.e. external perturbations) than traditional control approaches. This project provides an overview of the state-of-the-art in the field of CPGs, and in particular their applications within robotic systems. The project also tackles the implementation of a CPG-based controller in a small 3D-printed hexapod.",
"title": ""
},
{
"docid": "14fcb5c784de5fcb6950212f5b3eabb4",
"text": "This paper presents a pure textile, capacitive pressure sensor designed for integration into clothing to measure pressure on human body. The applications fields cover all domains where a soft and bendable sensor with a high local resolution is needed, e.g. in rehabilitation, pressure-sore prevention or motion detection due to muscle activities. We developed several textile sensors with spatial resolution of 2 times 2 cm and an average error below 4 percent within the measurement range 0 to 10 N/cm2. Applied on the upper arm the textile pressure sensor determines the deflection of the forearm between 0 and 135 degrees due to the muscle bending.",
"title": ""
},
{
"docid": "76ecd4ba20333333af4d09b894ff29fc",
"text": "This study is an application of social identity theory to feminist consciousness and activism. For women, strong gender identifications may enhance support for equality struggles, whereas for men, they may contribute to backlashes against feminism. University students (N � 276), primarily Euroamerican, completed a measure of gender self-esteem (GSE, that part of one’s selfconcept derived from one’s gender), and two measures of feminism. High GSE in women and low GSE in men were related to support for feminism. Consistent with past research, women were more supportive of feminism than men, and in both genders, support for feminist ideas was greater than self-identification as a feminist.",
"title": ""
},
{
"docid": "5c76caebe05acd7d09e6cace0cac9fe1",
"text": "A program that detects people in images has a multitude of potential applications, including tracking for biomedical applications or surveillance, activity recognition for person-device interfaces (device control, video games), organizing personal picture collections, and much more. However, detecting people is difficult, as the appearance of a person can vary enormously because of changes in viewpoint or lighting, clothing style, body pose, individual traits, occlusion, and more. It then makes sense that the first people detectors were really detectors of pedestrians, that is, people walking at a measured pace on a sidewalk, and viewed from a fixed camera. Pedestrians are nearly always upright, their arms are mostly held along the body, and proper camera placement relative to pedestrian traffic can virtually ensure a view from the front or from behind (Figure 1). These factors reduce variation of appearance, although clothing, illumination, background, occlusions, and somewhat limited variations of pose still present very significant challenges.",
"title": ""
},
{
"docid": "f0f0a24e6206bf821669d8707d7ce8de",
"text": "Spend your few moment to read a book even only few pages. Reading book is not obligation and force for everybody. When you don't want to read, you can get punishment from the publisher. Read a book becomes a choice of your different characteristics. Many people with reading habit will always be enjoyable to read, or on the contrary. For some reasons, this graph based knowledge representation computational foundations of conceptual graphs advanced information and knowledge processing tends to be the representative book in this website.",
"title": ""
},
{
"docid": "1238556dbcd297f363fb2116b7ffbab4",
"text": "We describe an efficient method to produce objects comprising spatially controlled and graded cross-link densities using vat photopolymerization additive manufacturing (AM). Using a commercially available diacrylate-based photoresin, 3D printer, and digital light processing (DLP) projector, we projected grayscale images to print objects in which the varied light intensity was correlated to controlled cross-link densities and associated mechanical properties. Cylinder and bar test specimens were used to establish correlations between light intensities used for printing and cross-link density in the resulting specimens. Mechanical testing of octet truss unit cells in which the properties of the crossbars and vertices were independently modified revealed unique mechanical responses from the different compositions. From the various test geometries, we measured changes in mechanical properties such as increased strain-to-break in inhomogeneous structures in comparison with homogeneous variants.",
"title": ""
},
{
"docid": "eb5feadd05a8a191b627ed2773b7c85e",
"text": "Hardware and software security mechanisms are widely used to strengthen information systems (IS) against attacks. However, these systems are still highly vulnerable to threats from users’ undesirable behaviors, which are closely related to IS users’ information security awareness. This study has been carried out in an effort to investigate the IS users’ risky behaviors that may threaten information security. The preventive actions employed by users, the threats they may be exposed to, or whether they had an adverse experience or to what extent they perceive risks have also been investigated. Four scales; Risky Behavior Scale (RBS), Conservative Behavior Scale (CBS), Exposure to Offence Scale (EOS) and Risk Perception Scale (RPS) were developed depending on the data collected with the use of surveys. The scales developed from the content of the survey were applied to students, academics and administrative staff of a university, which also embodies hospitals and educational organizations located in different geographical and socio-economical regions of Turkey. On the base of developed scales, the results of the study show that there are significant differences within samples and according to the habits of Internet usage.",
"title": ""
},
{
"docid": "60bded796e4fe759798f1f121bfaa655",
"text": "Biometric systems can be attacked in several ways and the most common being spoofing the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against attacks on biometric systems. For face recognition it is even more vulnerable as the image capture is non-contact based. Several anti-spoofing methods have been proposed in the literature for both contact and non-contact based biometric modalities often using video to study the temporal characteristics of a real vs. spoofed biometric signal. This paper presents a novel multi-feature evidence aggregation method for face spoofing detection. The proposed method fuses evidence from features encoding of both texture and motion (liveness) properties in the face and also the surrounding scene regions. The feature extraction algorithms are based on a configuration of local binary pattern and motion estimation using histogram of oriented optical flow. Furthermore, the multi-feature windowed videolet aggregation of these orthogonal features coupled with support vector machine-based classification provides robustness to different attacks. We demonstrate the efficacy of the proposed approach by evaluating on three standard public databases: CASIA-FASD, 3DMAD and MSU-MFSD with equal error rate of 3.14%, 0%, and 0%, respectively.",
"title": ""
},
{
"docid": "6cfdad2bb361713616dd2971026758a7",
"text": "We consider the problem of controlling a system with unknown, stochastic dynamics to achieve a complex, time-sensitive task. An example of this problem is controlling a noisy aerial vehicle with partially known dynamics to visit a pre-specified set of regions in any order while avoiding hazardous areas. In particular, we are interested in tasks which can be described by signal temporal logic (STL) specifications. STL is a rich logic that can be used to describe tasks involving bounds on physical parameters, continuous time bounds, and logical relationships over time and states. STL is equipped with a continuous measure called the robustness degree that measures how strongly a given sample path exhibits an STL property [4, 3]. This measure enables the use of continuous optimization problems to solve learning [7, 6] or formal synthesis problems [9] involving STL.",
"title": ""
},
{
"docid": "db158f806e56a1aae74aae15252703d2",
"text": "Despite achieving impressive performance, state-of-the-art classifiers remain highly vulnerable to small, imperceptible, adversarial perturbations. This vulnerability has proven empirically to be very intricate to address. In this paper, we study the phenomenon of adversarial perturbations under the assumption that the data is generated with a smooth generative model. We derive fundamental upper bounds on the robustness to perturbations of any classification function, and prove the existence of adversarial perturbations that transfer well across different classifiers with small risk. Our analysis of the robustness also provides insights onto key properties of generative models, such as their smoothness and dimensionality of latent space. We conclude with numerical experimental results showing that our bounds provide informative baselines to the maximal achievable robustness on several datasets.",
"title": ""
}
] | scidocsrr |
157324115209da750f5d5e4300893991 | Detection and Resolution of Rumours in Social Media: A Survey | [
{
"docid": "81387b0f93b68e8bd6a56a4fd81477e9",
"text": "We analyze microblog posts generated during two recent, concurrent emergency events in North America via Twitter, a popular microblogging service. We focus on communications broadcast by people who were \"on the ground\" during the Oklahoma Grassfires of April 2009 and the Red River Floods that occurred in March and April 2009, and identify information that may contribute to enhancing situational awareness (SA). This work aims to inform next steps for extracting useful, relevant information during emergencies using information extraction (IE) techniques.",
"title": ""
},
{
"docid": "5505f3e227ebba96e34e022bc59fe57a",
"text": "Social media has quickly risen to prominence as a news source, yet lingering doubts remain about its ability to spread rumor and misinformation. Systematically studying this phenomenon, however, has been difficult due to the need to collect large-scale, unbiased data along with in-situ judgements of its accuracy. In this paper we present CREDBANK, a corpus designed to bridge this gap by systematically combining machine and human computation. Specifically, CREDBANK is a corpus of tweets, topics, events and associated human credibility judgements. It is based on the real-time tracking of more than 1 billion streaming tweets over a period of more than three months, computational summarizations of those tweets, and intelligent routings of the tweet streams to human annotators—within a few hours of those events unfolding on Twitter. In total CREDBANK comprises more than 60 million tweets grouped into 1049 real-world events, each annotated by 30 human annotators. As an example, with CREDBANK one can quickly calculate that roughly 24% of the events in the global tweet stream are not perceived as credible. We have made CREDBANK publicly available, and hope it will enable new research questions related to online information credibility in fields such as social science, data mining and health.",
"title": ""
},
{
"docid": "e8f3dd4d2758da22d54114ec021b56dd",
"text": "Social networks allow rapid spread of ideas and innovations while the negative information can also propagate widely. When the cascades with different opinions reaching the same user, the cascade arriving first is the most likely to be taken by the user. Therefore, once misinformation or rumor is detected, a natural containment method is to introduce a positive cascade competing against the rumor. Given a budget k, the rumor blocking problem asks for k seed users to trigger the spread of the positive cascade such that the number of the users who are not influenced by rumor can be maximized. The prior works have shown that the rumor blocking problem can be approximated within a factor of (1 − 1/e− δ) by a classic greedy algorithm combined with Monte Carlo simulation with the running time of O(k3 mn ln n/δ2), where n and m are the number of users and edges, respectively. Unfortunately, the Monte-Carlo-simulation-based methods are extremely time consuming and the existing algorithms either trade performance guarantees for practical efficiency or vice versa. In this paper, we present a randomized algorithm which runs in O(km ln n/δ2) expected time and provides a (1 − 1/e − δ)-approximation with a high probability. The experimentally results on both the real-world and synthetic social networks have shown that the proposed randomized rumor blocking algorithm is much more efficient than the state-of-the-art method and it is able to find the seed nodes which are effective in limiting the spread of rumor.",
"title": ""
},
{
"docid": "0000bd646e28d5012d7d77e43f75d2f5",
"text": "Classification of temporal textual data sequences is a common task in various domains such as social media and the Web. In this paper we propose to use Hawkes Processes for classifying sequences of temporal textual data, which exploit both temporal and textual information. Our experiments on rumour stance classification on four Twitter datasets show the importance of using the temporal information of tweets along with the textual content.",
"title": ""
},
{
"docid": "0bc3d750464c67d08a18a24d3548d98b",
"text": "Rumour stance classification, the task that determines if each tweet in a collection discussing a rumour is supporting, denying, questioning or simply commenting on the rumour, has been attracting substantial interest. Here we introduce a novel approach that makes use of the sequence of transitions observed in tree-structured conversation threads in Twitter. The conversation threads are formed by harvesting users’ replies to one another, which results in a nested tree-like structure. Previous work addressing the stance classification task has treated each tweet as a separate unit. Here we analyse tweets by virtue of their position in a sequence and test two sequential classifiers, Linear-Chain CRF and Tree CRF, each of which makes different assumptions about the conversational structure. We experiment with eight Twitter datasets, collected during breaking news, and show that exploiting the sequential structure of Twitter conversations achieves significant improvements over the non-sequential methods. Our work is the first to model Twitter conversations as a tree structure in this manner, introducing a novel way of tackling NLP tasks on Twitter conversations.",
"title": ""
}
] | [
{
"docid": "1f1c4c69a4c366614f0cc9ecc24365ba",
"text": "BACKGROUND\nBurnout is a major issue among medical students. Its general characteristics are loss of interest in study and lack of motivation. A study of the phenomenon must extend beyond the university environment and personality factors to consider whether career choice has a role in the occurrence of burnout.\n\n\nMETHODS\nQuantitative, national survey (n = 733) among medical students, using a 12-item career motivation list compiled from published research results and a pilot study. We measured burnout by the validated Hungarian version of MBI-SS.\n\n\nRESULTS\nThe most significant career choice factor was altruistic motivation, followed by extrinsic motivations: gaining a degree, finding a job, accessing career opportunities. Lack of altruism was found to be a major risk factor, in addition to the traditional risk factors, for cynicism and reduced academic efficacy. Our study confirmed the influence of gender differences on both career choice motivations and burnout.\n\n\nCONCLUSION\nThe structure of career motivation is a major issue in the transformation of the medical profession. Since altruism is a prominent motivation for many women studying medicine, their entry into the profession in increasing numbers may reinforce its traditional character and act against the present trend of deprofessionalization.",
"title": ""
},
{
"docid": "bfd23678afff2ac4cd4650cf46195590",
"text": "The Islamic State of Iraq and ash-Sham (ISIS) continues to use social media as an essential element of its campaign to motivate support. On Twitter, ISIS' unique ability to leverage unaffiliated sympathizers that simply retweet propaganda has been identified as a primary mechanism in their success in motivating both recruitment and \"lone wolf\" attacks. The present work explores a large community of Twitter users whose activity supports ISIS propaganda diffusion in varying degrees. Within this ISIS supporting community, we observe a diverse range of actor types, including fighters, propagandists, recruiters, religious scholars, and unaffiliated sympathizers. The interaction between these users offers unique insight into the people and narratives critical to ISIS' sustainment. In their entirety, we refer to this diverse set of users as an online extremist community or OEC. We present Iterative Vertex Clustering and Classification (IVCC), a scalable analytic approach for OEC detection in annotated heterogeneous networks, and provide an illustrative case study of an online community of over 22,000 Twitter users whose online behavior directly advocates support for ISIS or contibutes to the group's propaganda dissemination through retweets.",
"title": ""
},
{
"docid": "0315f0355168a78bdead8d06d5f571b4",
"text": "Machine learning techniques are increasingly being applied to clinical text that is already captured in the Electronic Health Record for the sake of delivering quality care. Applications for example include predicting patient outcomes, assessing risks, or performing diagnosis. In the past, good results have been obtained using classical techniques, such as bag-of-words features, in combination with statistical models. Recently however Deep Learning techniques, such as Word Embeddings and Recurrent Neural Networks, have shown to possibly have even greater potential. In this work, we apply several Deep Learning and classical machine learning techniques to the task of predicting violence incidents during psychiatric admission using clinical text that is already registered at the start of admission. For this purpose, we use a novel and previously unexplored dataset from the Psychiatry Department of the University Medical Center Utrecht in The Netherlands. Results show that predicting violence incidents with state-of-the-art performance is possible, and that using Deep Learning techniques provides a relatively small but consistent improvement in performance. We finally discuss the potential implication of our findings for the psychiatric practice.",
"title": ""
},
{
"docid": "08e03ec7a26e00c92f799dfb6c07174e",
"text": "Heterogeneous face recognition (HFR) involves matching two face images from alternate imaging modalities, such as an infrared image to a photograph or a sketch to a photograph. Accurate HFR systems are of great value in various applications (e.g., forensics and surveillance), where the gallery databases are populated with photographs (e.g., mug shot or passport photographs) but the probe images are often limited to some alternate modality. A generic HFR framework is proposed in which both probe and gallery images are represented in terms of nonlinear similarities to a collection of prototype face images. The prototype subjects (i.e., the training set) have an image in each modality (probe and gallery), and the similarity of an image is measured against the prototype images from the corresponding modality. The accuracy of this nonlinear prototype representation is improved by projecting the features into a linear discriminant subspace. Random sampling is introduced into the HFR framework to better handle challenges arising from the small sample size problem. The merits of the proposed approach, called prototype random subspace (P-RS), are demonstrated on four different heterogeneous scenarios: 1) near infrared (NIR) to photograph, 2) thermal to photograph, 3) viewed sketch to photograph, and 4) forensic sketch to photograph.",
"title": ""
},
{
"docid": "8377e477356da58669559dea844777d2",
"text": "This paper proposes a new algorithm that employs Adaptive Dynamic Programming(ADP) to solve the distributed control problem of urban traffic with an infinite horizon. Urban traffic congestions lead to a lot of time consumption and exhaust emissions. So alleviating congested situation will have a good impact on both economy and environment. The signal control at urban intersections is an effective and most important way to reduce the traffic jams and collisions. A lot of control theories including traditional mathematical ways and modern artificial intelligent ways have been exploited. ADP is an effective and amiable intelligent control method. We proposed an algorithm to adjust the signal time plan at urban traffic intersections based on ADP theory. Simulations are taken under a microscopic traffic simulation software, TSIS(Traffic Software Integrated System). Several criteria named MOEs(Measures of Effectiveness) are collected to compare with the widely used pre-timed control, actuated control, also with a machine learning method Q-learning control. Results show that ADP control method have a better adaptability to the various traffic simulating real traffic flows.",
"title": ""
},
{
"docid": "1d33abf7f0283b5b1fb6c6d7cddb8668",
"text": "Harmonic current is one of the major power quality problems due to non linear loads. In this paper the harmonic current in induction furnace load is compensated using active power filter. The inverters and rectifier switching creates harmonics in input side. It is then compensated by using active power filter with p-q theory and PI controller. The simulation result are obtained with FFT analysis and shows the minimisation of current harmonic.",
"title": ""
},
{
"docid": "7d143ac23b30a75f3e6f027631801987",
"text": "OBJECTIVE\nTo prospectively study the clinical features, pathophysiology, treatment and prognosis of Wegener granulomatosis.\n\n\nDESIGN\nOf the 180 patients with Wegener granulomatosis referred to the National Institute of Allergy and Infectious Diseases during the past 24 years, 158 have been followed for 6 months to 24 years (a total of 1229 patient-years).\n\n\nMEASUREMENTS\nCharacteristics of clinical presentation, surgical pathology, course of illness, laboratory and radiographic findings, and the results of medical and surgical treatment have been recorded in a computer-based information retrieval system.\n\n\nSETTING\nThe Warren Magnuson Clinical Center of the National Institutes of Health.\n\n\nMAIN RESULTS\nMen and women were equally represented; 97% of patients were white, and 85% were more than 19 years of age. The mean period of follow-up was 8 years. One hundred and thirty-three patients (84%) received \"standard\" therapy with daily low-dose cyclophosphamide and glucocorticoids. Eight (5.0%) received only low-dose cyclophosphamide. Six (4.0%) never received cyclophosphamide and were treated with other cytotoxic agents and glucocorticoids. Ten patients (6.0%) were treated with only glucocorticoids. Ninety-one percent of patients experienced marked improvement, and 75% achieved complete remission. Fifty percent of remissions were associated with one or more relapses. Of 99 patients followed for greater than 5 years, 44% had remissions of greater than 5 years duration. Thirteen percent of patients died of Wegener granulomatosis, treatment-related causes, or both. Almost all patients had serious morbidity from irreversible features of their disease (86%) or side effects of treatment (42%).\n\n\nCONCLUSIONS\nThe course of Wegener granulomatosis has been dramatically improved by daily treatment with cyclophosphamide and glucocorticoids. Nonetheless, disease- and treatment-related morbidity is often profound. Alternative forms of therapy have not yet achieved the high rates of remission induction and successful maintenance that have been reported with daily cyclophosphamide treatment. Despite continued therapeutic success with cyclophosphamide, our long-term follow-up of patients with Wegener granulomatosis has led to increasing concerns about toxicity resulting from prolonged cyclophosphamide therapy and has encouraged investigation of other therapeutic regimens.",
"title": ""
},
{
"docid": "7547f30a058c488acc13948b58bb051c",
"text": "Recently developed Serial Analysis of Gene Expression (SAGE) technology enables us to simultaneously quantify the expression levels of tens of thousands of genes in a population of cells. SAGE is better than Microarray in that SAGE can monitor both known and unknown genes while Microarray can only measure known genes. SAGE gene expression profiling based cancer classification is a better choice since cancers may be due to some unknown genes. Whereas a wide range of methods has been applied to traditional Microarray based cancer classification, relatively few studies have been done on SAGE based cancer classification. In our study we evaluate popular machine learning methods (SVM, Naive Bayes, Nearest Neighbor, C4.5 and RIPPER) for classifying cancers based on SAGE data. In order to deal with the high dimensional problem, we propose to use Chi-square for tag/gene selection. Both binary classification and multicategory classification are investigated. The experiments are based on two human SAGE datasets: brain and breast. The results show that SVM and Naive Bayes are the top-performing SAGE classifiers and that Chi-square based gene selection can improve the performance of all the five classifiers investigated.",
"title": ""
},
{
"docid": "e9438241965b4cb6601624456b60f990",
"text": "This paper proposes a model for designing games around Artificial Intelligence (AI). AI-based games put AI in the foreground of the player experience rather than in a supporting role as is often the case in many commercial games. We analyze the use of AI in a number of existing games and identify design patterns for AI in games. We propose a generative ideation technique to combine a design pattern with an AI technique or capacity to make new AI-based games. Finally, we demonstrate this technique through two examples of AI-based game prototypes created using these patterns.",
"title": ""
},
{
"docid": "90c871f50dc2e4d3caf1eb963e78a4ae",
"text": "Over the past few decades the capabilities of adapting new class of devices for health monitoring system have improved significantly.But the increase in usage of low cost sensors and various communication media for data transmission in health monitoring have lead to a major concern for current existing platforms i.e., inefficiency in processing massive amount of data in real time. To advance this field requires a new look at the computing framework and infrastructure. This paper describes our initial work for Bigdata processing framework for MCPS that combines the real world and cyber world aspects with dynamic provisioning and fully elastic system for decision making in health care application.",
"title": ""
},
{
"docid": "289b1eaf4535374f339b683983a655f9",
"text": "© The Author(s) 2017. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/ publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. P156 Multiscale modeling of ischemic stroke with the NEURON reaction‐diffusion module Adam J. H. Newton, Alexandra H. Seidenstein, Robert A. McDougal, William W. Lytton Department of Neuroscience, Yale University, New Haven, CT 06520, USA; Department Physiology & Pharmacology, SUNY Downstate, Brooklyn, NY 11203, USA; NYU School of Engineering, 6 MetroTech Center, Brooklyn, NY 11201, USA; Kings County Hospital Center, Brooklyn, NY 11203, USA Correspondence: Adam J. H. Newton (adam.newton@yale.edu) BMC Neuroscience 2017, 18 (Suppl 1):P156",
"title": ""
},
{
"docid": "45477e67e1ddc589fde6d989254e4c32",
"text": "Existing process mining approaches are able to tolerate a certain degree of noise in process log. However, processes that contain infrequent paths, multiple (nested) parallel branches, or have been changed in an ad-hoc manner, still pose challenges. For such cases, process mining typically returns “spaghetti-models”, that are hardly usable even as a starting point for process (re-)design. In this paper, we address these challenges by introducing data transformation and pre-processing steps that improve and ensure the quality of mined models for existing process mining approaches. We propose the concept of semantic log purging, i.e., the cleaning of logs based on domain specific constraints utilizing knowledge that typically complements processes. Furthermore we demonstrate the feasibility and effectiveness of the approach based on a case study in the higher education domain. We think that semantic log purging will enable process mining to yield better results, thus giving process (re-)designers a valuable tool.",
"title": ""
},
{
"docid": "e1978b2ba0457f4073f20ce8c064aa82",
"text": "BACKGROUND\nHuman seminal fluid contains small exosome-like vesicles called prostasomes. Prostasomes have been reported previously to play an important role in the process of fertilization by boosting survivability and motility of spermatozoa, in addition to modulating acrosomal reactivity. Prostasomes have also been reported to present with sizes varying from 50 to 500 nm and to have multilayered lipid membranes; however, the fine morphology of prostasomes has never been studied in detail.\n\n\nMETHODS\nSucrose gradient-purified prostasomes were visualized by cryo-electron microscopy (EM). Protein composition was studied by trypsin in-gel digestion and liquid chromatography/mass spectrometry.\n\n\nRESULTS\nHere we report for the first time the detailed structure of seminal prostasomes by cryo-EM. There are at least three distinct dominant structural types of vesicles present. In parallel with the structural analysis, we have carried out a detailed proteomic analysis of prostasomes, which led to the identification of 440 proteins. This is nearly triple the number of proteins identified to date for these unique particles and a number of the proteins identified previously were cross-validated in our study.\n\n\nCONCLUSION\nFrom the data reported herein, we hypothesize that the structural heterogeneity of the exosome-like particles in human semen reflects their functional diversity. Our detailed proteomic analysis provided a list of candidate proteins for future structural and functional studies.",
"title": ""
},
{
"docid": "4168faccc342463efff783608daa2190",
"text": "Making machines more intelligent can potentially make human life easier. A lot of research has gone into the field of artificial intelligence (AI) since the creation of first computers. However, today’s systems still lag behind humans’ general ability to think and learn. Reinforcement Learning (RL) is a framework where software agents learn by interaction with an environment. We investigate possibilities to use observations about human intelligence to make RL agents smarter. In particular, we tried several methods: 1) To use “Tagger” an unsupervised deep learning framework for perceptual grouping, to learn more usable abstract relationships between objects. 2) Make one RL algorithm (A3C) more data efficient to learn faster. 3) To conduct these experiments, we built a web based RL dashboard based on visualization tool visdom. Finally, we provide some concrete challenges to work on in the future.",
"title": ""
},
{
"docid": "4b860718c9939e1dbdb2e157e9a208e7",
"text": "The design and construction of a repetitive high-current pulsed accelerator-TPG700 is described in this paper. The accelerator consists of a Tesla transformer with 40 ohm build-in coaxial pulse forming line. The triggered high-pressure switch of TPG700 has the capability of conducting current of 17.5kA in 35ns' duration at 100 pps. The transformer was designed to operate at 1.4MV, when its primary capacitors were charged to approximately 1000V. Under the working state of 100pps, the jitter of breakdown of the switch voltages is lower than 1% on average. To enhance the overall efficiency of the pulser, resonant charging technology based on IGBTs was utilized. As the experimental results indicate, the total efficiency of the pulser, when measured on matched dummy load, is close to 75%. The experimental results indicate that in matching case, the output of 700kV, 17kA for 40Ω resistive load is obtained. Moreover, some experiments such as long lifetime cathode testing and high power microwave (HPM) generation using backward oscillator (BWO) have been conducted on TPG700.",
"title": ""
},
{
"docid": "8e5147258f806ebc25d9a60b1fc3f8ee",
"text": "Existing inefficient traffic light cycle control causes numerous problems, such as long delay and waste of energy. To improve efficiency, taking real-time traffic information as an input and dynamically adjusting the traffic light duration accordingly is a must. Existing works either split the traffic signal into equal duration or only leverage limited traffic information. In this paper, we study how to decide the traffic signal duration based on the collected data from different sensors. We propose a deep reinforcement learning model to control the traffic light cycle. In the model, we quantify the complex traffic scenario as states by collecting traffic data and dividing the whole intersection into small grids. The duration changes of a traffic light are the actions, which are modeled as a high-dimension Markov decision process. The reward is the cumulative waiting time difference between two cycles. To solve the model, a convolutional neural network is employed to map states to rewards. The proposed model incorporates multiple optimization elements to improve the performance, such as dueling network, target network, double Q-learning network, and prioritized experience replay. We evaluate our model via simulation on a Simulation of Urban MObility simulator. Simulation results show the efficiency of our model in controlling traffic lights.",
"title": ""
},
{
"docid": "e2de8284e14cb3abbd6e3fbcfb5bc091",
"text": "In this paper, novel 2 one-dimensional (1D) Haar-like filtering techniques are proposed as a new and low calculation cost feature extraction method suitable for 3D acceleration signals based human activity recognition. Proposed filtering method is a simple difference filter with variable filter parameters. Our method holds a strong adaptability to various classification problems which no previously studied features (mean, standard deviation, etc.) possessed. In our experiment on human activity recognition, the proposed method achieved both the highest recognition accuracy of 93.91% while reducing calculation cost to 21.22% compared to previous method.",
"title": ""
},
{
"docid": "05490d1f153a25be58d4a44ee24d9d5a",
"text": "speech using the ‘color’ of whispered phonemes G. NISHA MEENAKSHI, PRASANTA KUMAR GHOSH SPIRE Lab, Electrical Engineering, Indian Institute of Science (IISc), Bengaluru PROBLEM STATEMENT TO PERFORM FRAME-LEVEL CLASSIFICATION OF VOICED (V) AND UNVOICED (UV) PHONEMES FROM WHISPERED SPEECH. MOTIVATION Whispered speech production: Private and pathological conditions. Need for V/UV decision: Reconstruction of whispered speech.",
"title": ""
},
{
"docid": "cdfa322af0aa88f5f0617b574e39c625",
"text": "Lung cancer is the most common cause of cancer-related death globally. As a preventive measure, the United States Preventive Services Task Force (USPSTF) recommends annual screening of high risk individuals with low-dose computed tomography (CT). The resulting volume of CT scans from millions of people will pose a significant challenge for radiologists to interpret. To fill this gap, computer-aided detection (CAD) algorithms may prove to be the most promising solution. A crucial first step in the analysis of lung cancer screening results using CAD is the detection of pulmonary nodules, which may represent early-stage lung cancer. The objective of this work is to develop and validate a reinforcement learning model based on deep artificial neural networks for early detection of lung nodules in thoracic CT images. Inspired by the AlphaGo system, our deep learning algorithm takes a raw CT image as input and views it as a collection of states, and output a classification of whether a nodule is present or not. The dataset used to train our model is the LIDC/IDRI database hosted by the lung nodule analysis (LUNA) challenge. In total, there are 888 CT scans with annotations based on agreement from at least three out of four radiologists. As a result, there are 590 individuals having one or more nodules, and 298 having none. Our training results yielded an overall accuracy of 99.1% [sensitivity 99.2%, specificity 99.1%, positive predictive value (PPV) 99.1%, negative predictive value (NPV) 99.2%]. In our test, the results yielded an overall accuracy of 64.4% (sensitivity 58.9%, specificity 55.3%, PPV 54.2%, and NPV 60.0%). These early results show promise in solving the major issue of false positives in CT screening of lung nodules, and may help to save unnecessary follow-up tests and expenditures.",
"title": ""
},
{
"docid": "3e832bb589042034550ecbf0890ed3cc",
"text": "Constructing a good conference schedule for a large multi-track conference needs to take into account the preferences and constraints of organizers, authors, and attendees. Creating a schedule which has fewer conflicts for authors and attendees, and thematically coherent sessions is a challenging task. Cobi introduced an alternative approach to conference scheduling by engaging the community to play an active role in the planning process. The current Cobi pipeline consists of committee-sourcing and author-sourcing to plan a conference schedule. We further explore the design space of communitysourcing by introducing attendee-sourcing – a process that collects input from conference attendees and encodes them as preferences and constraints for creating sessions and schedule. For CHI 2014, a large multitrack conference in human-computer interaction with more than 3,000 attendees and 1,000 authors, we collected attendees’ preferences by making available all the accepted papers at the conference on a paper recommendation tool we built called Confer, for a period of 45 days before announcing the conference program (sessions and schedule). We compare the preferences marked on Confer with the preferences collected from Cobi’s author-sourcing approach. We show that attendee-sourcing can provide insights beyond what can be discovered by authorsourcing. For CHI 2014, the results show value in the method and attendees’ participation. It produces data that provides more alternatives in scheduling and complements data collected from other methods for creating coherent sessions and reducing conflicts.",
"title": ""
}
] | scidocsrr |
3b46cc183e665388fea152ba35f5fc4a | Relative Analysis of Hierarchical Routing in Wireless Sensor Networks Using Cuckoo Search | [
{
"docid": "1d53b01ee1a721895a17b7d0f3535a28",
"text": "We present a suite of algorithms for self-organization of wireless sensor networks, in which there is a scalably large number of mainly static nodes with highly constrained energy resources. The protocols further support slow mobility by a subset of the nodes, energy-efficient routing, and formation of ad hoc subnetworks for carrying out cooperative signal processing functions among a set of the nodes. † This research is supported by DARPA contract number F04701-97-C-0010, and was presented in part at the 37 Allerton Conference on Communication, Computing and Control, September 1999. ‡ Corresponding author.",
"title": ""
}
] | [
{
"docid": "624ddac45b110bc809db198d60f3cf97",
"text": "Poisson regression models provide a standard framework for the analysis of count data. In practice, however, count data are often overdispersed relative to the Poisson distribution. One frequent manifestation of overdispersion is that the incidence of zero counts is greater than expected for the Poisson distribution and this is of interest because zero counts frequently have special status. For example, in counting disease lesions on plants, a plant may have no lesions either because it is resistant to the disease, or simply because no disease spores have landed on it. This is the distinction between structural zeros, which are inevitable, and sampling zeros, which occur by chance. In recent years there has been considerable interest in models for count data that allow for excess zeros, particularly in the econometric literature. These models complement more conventional models for overdispersion that concentrate on modelling the variance-mean relationship correctly. Application areas are diverse and have included manufacturing defects (Lambert, 1992), patent applications (Crepon & Duguet, 1997), road safety (Miaou, 1994), species abundance (Welsh et al., 1996; Faddy, 1998), medical consultations",
"title": ""
},
{
"docid": "bb3216e89fd98751de0f187b349ba123",
"text": "This study explored the relationships among dispositional self-consciousness, situationally induced-states of self-awareness, ego-mvolvement, and intrinsic motivation Cognitive evaluation theory, as applied to both the interpersonal and intrapersonal spheres, was used as the basis for making predictions about the effects of various types of self-focus Public selfconsciousness, social anxiety, video surveillance and mirror manipulations of self-awareness, and induced ego-involvement were predicted and found to have negative effects on intrinsic motivation since all were hypothesized to involve controlling forms of regulation In contrast, dispositional pnvate self-consciousness and a no-self-focus condition were both found to be unrelated to intrinsic motivation The relationship among these constructs and manipulations was discussed in the context of both Carver and Scheier's (1981) control theory and Deci and Ryan's (1985) motivation theory Recent theory and research on self-awareness, stimulated bv the initial findings of Duval and Wicklund (1972), has suggested that qualitatively distinct styles of attention and consciousness can be involved in the ongoing process of self-regulation (Carver & Scheier, 1981) In particular, Fenigstein, Scheier, and Buss (1975) have distinguished between private self-consciousness and pubhc selfconsciousness as two independent, but not necessarily exclusive, types of attentional focus with important behavioral, cognitive, and affective implications for regulatory processes Pnvate self-consciousness refers to the tendency to be aware of one's thoughts. This research was supported by Research Grant BSN-8018628 from the National Science Foundation The authors are grateful to the following persons who helped this project to reach fruition James Connell Edward Deci, Paul Tero, Shirlev Tracey We are also grateful for the experimental assistance of Margot Cohen Scott Cohen, Loren Feldman, and Darrell Mazlish Thanks also to Eileen Plant and Miriam Gale Requests for reprints should be sent to Richard M Ryan, Department of Psychology, Uniyersity of Rochester, Rochester, NY 14627 Journal of Personality 53 3, September 1985 Copyright © 1985 by Duke University",
"title": ""
},
{
"docid": "873056ee4f2a4fff473dca4e104a4798",
"text": "Key Summary Points Health information technology has been shown to improve quality by increasing adherence to guidelines, enhancing disease surveillance, and decreasing medication errors. Much of the evidence on quality improvement relates to primary and secondary preventive care. The major efficiency benefit has been decreased utilization of care. Effect on time utilization is mixed. Empirically measured cost data are limited and inconclusive. Most of the high-quality literature regarding multifunctional health information technology systems comes from 4 benchmark research institutions. Little evidence is available on the effect of multifunctional commercially developed systems. Little evidence is available on interoperability and consumer health information technology. A major limitation of the literature is its generalizability. Health care experts, policymakers, payers, and consumers consider health information technologies, such as electronic health records and computerized provider order entry, to be critical to transforming the health care industry (1-7). Information management is fundamental to health care delivery (8). Given the fragmented nature of health care, the large volume of transactions in the system, the need to integrate new scientific evidence into practice, and other complex information management activities, the limitations of paper-based information management are intuitively apparent. While the benefits of health information technology are clear in theory, adapting new information systems to health care has proven difficult and rates of use have been limited (9-11). Most information technology applications have centered on administrative and financial transactions rather than on delivering clinical care (12). The Agency for Healthcare Research and Quality asked us to systematically review evidence on the costs and benefits associated with use of health information technology and to identify gaps in the literature in order to provide organizations, policymakers, clinicians, and consumers an understanding of the effect of health information technology on clinical care (see evidence report at www.ahrq.gov). From among the many possible benefits and costs of implementing health information technology, we focus here on 3 important domains: the effects of health information technology on quality, efficiency, and costs. Methods Analytic Frameworks We used expert opinion and literature review to develop analytic frameworks (Table) that describe the components involved with implementing health information technology, types of health information technology systems, and the functional capabilities of a comprehensive health information technology system (13). We modified a framework for clinical benefits from the Institute of Medicine's 6 aims for care (2) and developed a framework for costs using expert consensus that included measures such as initial costs, ongoing operational and maintenance costs, fraction of health information technology penetration, and productivity gains. Financial benefits were divided into monetized benefits (that is, benefits expressed in dollar terms) and nonmonetized benefits (that is, benefits that could not be directly expressed in dollar terms but could be assigned dollar values). Table. Health Information Technology Frameworks Data Sources and Search Strategy We performed 2 searches (in November 2003 and January 2004) of the English-language literature indexed in MEDLINE (1995 to January 2004) using a broad set of terms to maximize sensitivity. (See the full list of search terms and sequence of queries in the full evidence report at www.ahrq.gov.) We also searched the Cochrane Central Register of Controlled Trials, the Cochrane Database of Abstracts of Reviews of Effects, and the Periodical Abstracts Database; hand-searched personal libraries kept by content experts and project staff; and mined bibliographies of articles and systematic reviews for citations. We asked content experts to identify unpublished literature. Finally, we asked content experts and peer reviewers to identify newly published articles up to April 2005. Study Selection and Classification Two reviewers independently selected for detailed review the following types of articles that addressed the workings or implementation of a health technology system: systematic reviews, including meta-analyses; descriptive qualitative reports that focused on exploration of barriers; and quantitative reports. We classified quantitative reports as hypothesis-testing if the investigators compared data between groups or across time periods and used statistical tests to assess differences. We further categorized hypothesis-testing studies (for example, randomized and nonrandomized, controlled trials, controlled before-and-after studies) according to whether a concurrent comparison group was used. Hypothesis-testing studies without a concurrent comparison group included those using simple prepost, time-series, and historical control designs. Remaining hypothesis-testing studies were classified as cross-sectional designs and other. We classified quantitative reports as a predictive analysis if they used methods such as statistical modeling or expert panel estimates to predict what might happen with implementation of health information technology rather than what has happened. These studies typically used hybrid methodsfrequently mixing primary data collection with secondary data collection plus expert opinion and assumptionsto make quantitative estimates for data that had otherwise not been empirically measured. Cost-effectiveness and cost-benefit studies generally fell into this group. Data Extraction and Synthesis Two reviewers independently appraised and extracted details of selected articles using standardized abstraction forms and resolved discrepancies by consensus. We then used narrative synthesis methods to integrate findings into descriptive summaries. Each institution that accounted for more than 5% of the total sample of 257 papers was designated as a benchmark research leader. We grouped syntheses by institution and by whether the systems were commercially or internally developed. Role of the Funding Sources This work was produced under Agency for Healthcare Research and Quality contract no. 2002. In addition to the Agency for Healthcare Research and Quality, this work was also funded by the Office of the Assistant Secretary for Planning and Evaluation, U.S. Department of Health and Human Services, and the Office of Disease Prevention and Health Promotion, U.S. Department of Health and Human Services. The funding sources had no role in the design, analysis, or interpretation of the study or in the decision to submit the manuscript for publication. Data Synthesis Literature Selection Overview Of 867 articles, we rejected 141 during initial screening: 124 for not having health information technology as the subject, 4 for not reporting relevant outcomes, and 13 for miscellaneous reasons (categories not mutually exclusive). Of the remaining 726 articles, we excluded 469 descriptive reports that did not examine barriers (Figure). We recorded details of and summarized each of the 257 articles that we did include in an interactive database (healthit.ahrq.gov/tools/rand) that serves as the evidence table for our report (14). Twenty-four percent of all studies came from the following 4 benchmark institutions: 1) the Regenstrief Institute, 2) Brigham and Women's Hospital/Partners Health Care, 3) the Department of Veterans Affairs, and 4) LDS Hospital/Intermountain Health Care. Figure. Search flow for health information technology ( HIT ) literature. Pediatrics Types and Functions of Technology Systems The reports addressed the following types of primary systems: decision support aimed at providers (63%), electronic health records (37%), and computerized provider order entry (13%). Specific functional capabilities of systems that were described in reports included electronic documentation (31%), order entry (22%), results management (19%), and administrative capabilities (18%). Only 8% of the described systems had specific consumer health capabilities, and only 1% had capabilities that allowed systems from different facilities to connect with each other and share data interoperably. Most studies (n= 125) assessed the effect of the systems in the outpatient setting. Of the 213 hypothesis-testing studies, 84 contained some data on costs. Several studies assessed interventions with limited functionality, such as stand-alone decision support systems (15-17). Such studies provide limited information about issues that today's decision makers face when selecting and implementing health information technology. Thus, we preferentially highlight in the following paragraphs studies that were conducted in the United States, that had empirically measured data on multifunctional systems, and that included health information and data storage in the form of electronic documentation or order-entry capabilities. Predictive analyses were excluded. Seventy-six studies met these criteria: 54 from the 4 benchmark leaders and 22 from other institutions. Data from Benchmark Institutions The health information technology systems evaluated by the benchmark leaders shared many characteristics. All the systems were multifunctional and included decision support, all were internally developed by research experts at the respective academic institutions, and all had capabilities added incrementally over several years. Furthermore, most reported studies of these systems used research designs with high internal validity (for example, randomized, controlled trials). Appendix Table 1 (18-71) provides a structured summary of each study from the 4 benchmark institutions. This table also includes studies that met inclusion criteria not highlighted in this synthesis (26, 27, 30, 39, 40, 53, 62, 65, 70, 71). The data supported 5 primary themes (3 directly r",
"title": ""
},
{
"docid": "560577e6abcccdb399d437cbd52ad266",
"text": "With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people’s daily lives. With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks. The Fog computing is a promising solution towards this goal. Fog computing extends cloud computing by providing virtualized resources and engaged location-based services to the edge of the mobile networks so as to better serve mobile traffics. Therefore, Fog computing is a lubricant of the combination of cloud computing and mobile applications. In this article, we outline the main features of Fog computing and describe its concept, architecture and design goals. Lastly, we discuss some of the future research issues from the networking perspective.",
"title": ""
},
{
"docid": "398040041440f597b106c49c79be27ea",
"text": "BACKGROUND\nRecently, human germinal center-associated lymphoma (HGAL) gene protein has been proposed as an adjunctive follicular marker to CD10 and BCL6.\n\n\nMETHODS\nOur aim was to evaluate immunoreactivity for HGAL in 82 cases of follicular lymphomas (FLs)--67 nodal, 5 cutaneous and 10 transformed--which were all analysed histologically, by immunohistochemistry and PCR.\n\n\nRESULTS\nImmunostaining for HGAL was more frequently positive (97.6%) than that for BCL6 (92.7%) and CD10 (90.2%) in FLs; the cases negative for bcl6 and/or for CD10 were all positive for HGAL, whereas the two cases negative for HGAL were positive with BCL6; no difference in HGAL immunostaining was found among different malignant subtypes or grades.\n\n\nCONCLUSIONS\nTherefore, HGAL can be used in the immunostaining of FLs as the most sensitive germinal center (GC)-marker; when applied alone, it would half the immunostaining costs, reserving the use of the other two markers only to HGAL-negative cases.",
"title": ""
},
{
"docid": "ef8ba8ae9696333f5da066813a4b79d7",
"text": "Neural image/video captioning models can generate accurate descriptions, but their internal process of mapping regions to words is a black box and therefore difficult to explain. Top-down neural saliency methods can find important regions given a high-level semantic task such as object classification, but cannot use a natural language sentence as the top-down input for the task. In this paper, we propose Caption-Guided Visual Saliency to expose the region-to-word mapping in modern encoder-decoder networks and demonstrate that it is learned implicitly from caption training data, without any pixel-level annotations. Our approach can produce spatial or spatiotemporal heatmaps for both predicted captions, and for arbitrary query sentences. It recovers saliency without the overhead of introducing explicit attention layers, and can be used to analyze a variety of existing model architectures and improve their design. Evaluation on large-scale video and image datasets demonstrates that our approach achieves comparable captioning performance with existing methods while providing more accurate saliency heatmaps. Our code is available at visionlearninggroup.github.io/caption-guided-saliency/.",
"title": ""
},
{
"docid": "054fcf065915118bbfa3f12759cb6912",
"text": "Automatization of the diagnosis of any kind of disease is of great importance and its gaining speed as more and more deep learning solutions are applied to different problems. One of such computer-aided systems could be a decision support tool able to accurately differentiate between different types of breast cancer histological images – normal tissue or carcinoma (benign, in situ or invasive). In this paper authors present a deep learning solution, based on convolutional capsule network, for classification of four types of images of breast tissue biopsy when hematoxylin and eosin staining is applied. The crossvalidation accuracy, averaged over four classes, was achieved to be 87 % with equally high sensitivity.",
"title": ""
},
{
"docid": "e1315cfdc9c1a33b7b871c130f34d6ce",
"text": "TextTiling is a technique for subdividing texts into multi-paragraph units that represent passages, or subtopics. The discourse cues for identifying major subtopic shifts are patterns of lexical co-occurrence and distribution. The algorithm is fully implemented and is shown to produce segmentation that corresponds well to human judgments of the subtopic boundaries of 12 texts. Multi-paragraph subtopic segmentation should be useful for many text analysis tasks, including information retrieval and summarization.",
"title": ""
},
{
"docid": "aeb19f8f9c6e5068fc602682e4ae04d3",
"text": "Received: 29 November 2004 Revised: 26 July 2005 Accepted: 4 November 2005 Abstract Interpretive research in information systems (IS) is now a well-established part of the field. However, there is a need for more material on how to carry out such work from inception to publication. I published a paper a decade ago (Walsham, 1995) which addressed the nature of interpretive IS case studies and methods for doing such research. The current paper extends this earlier contribution, with a widened scope of all interpretive research in IS, and through further material on carrying out fieldwork, using theory and analysing data. In addition, new topics are discussed on constructing and justifying a research contribution, and on ethical issues and tensions in the conduct of interpretive work. The primary target audience for the paper is lessexperienced IS researchers, but I hope that the paper will also stimulate reflection for the more-experienced IS researcher and be of relevance to interpretive researchers in other social science fields. European Journal of Information Systems (2006) 15, 320–330. doi:10.1057/palgrave.ejis.3000589",
"title": ""
},
{
"docid": "6bfdd78045816085cd0fa5d8bb91fd18",
"text": "Contextual factors can greatly influence the users' preferences in listening to music. Although it is hard to capture these factors directly, it is possible to see their effects on the sequence of songs liked by the user in his/her current interaction with the system. In this paper, we present a context-aware music recommender system which infers contextual information based on the most recent sequence of songs liked by the user. Our approach mines the top frequent tags for songs from social tagging Web sites and uses topic modeling to determine a set of latent topics for each song, representing different contexts. Using a database of human-compiled playlists, each playlist is mapped into a sequence of topics and frequent sequential patterns are discovered among these topics. These patterns represent frequent sequences of transitions between the latent topics representing contexts. Given a sequence of songs in a user's current interaction, the discovered patterns are used to predict the next topic in the playlist. The predicted topics are then used to post-filter the initial ranking produced by a traditional recommendation algorithm. Our experimental evaluation suggests that our system can help produce better recommendations in comparison to a conventional recommender system based on collaborative or content-based filtering. Furthermore, the topic modeling approach proposed here is also useful in providing better insight into the underlying reasons for song selection and in applications such as playlist construction and context prediction.",
"title": ""
},
{
"docid": "638f7bf2f47895274995df166564ecc1",
"text": "In recent years, the video game market has embraced augmented reality video games, a class of video games that is set to grow as gaming technologies develop. Given the widespread use of video games among children and adolescents, the health implications of augmented reality technology must be closely examined. Augmented reality technology shows a potential for the promotion of healthy behaviors and social interaction among children. However, the full immersion and physical movement required in augmented reality video games may also put users at risk for physical and mental harm. Our review article and commentary emphasizes both the benefits and dangers of augmented reality video games for children and adolescents.",
"title": ""
},
{
"docid": "8924c1551030dc7e9aaf5611fd0a9ae2",
"text": "The term affordance describes an object’s utilitarian function or actionable possibilities. Product designers have taken great interest in the concept of affordances because of the bridge they provide relating to design, the interpretation of design and, ultimately, functionality in the hands of consumers. These concepts have been widely studied and applied in the field of psychology but have had limited formal application to packaging design and evaluation. We believe that the concepts related to affordances will reveal novel opportunities for packaging innovation. To catalyse this, presented work had the following objectives: (a) to propose a method by which packaging designers can purposefully consider affordances during the design process; (b) to explain this method in the context of a packaging-related case study; and (c) to measure the effect on package usability when an affordance-based design approach is employed. © 2014 The Authors. Packaging Technology and Science published by John Wiley & Sons Ltd.",
"title": ""
},
{
"docid": "8e077186aef0e7a4232eec0d8c73a5a2",
"text": "The appetite for up-to-date information about earth’s surface is ever increasing, as such information provides a base for a large number of applications, including local, regional and global resources monitoring, land-cover and land-use change monitoring, and environmental studies. The data from remote sensing satellites provide opportunities to acquire information about land at varying resolutions and has been widely used for change detection studies. A large number of change detection methodologies and techniques, utilizing remotely sensed data, have been developed, and newer techniques are still emerging. This paper begins with a discussion of the traditionally pixel-based and (mostly) statistics-oriented change detection techniques which focus mainly on the spectral values and mostly ignore the spatial context. This is succeeded by a review of object-based change detection techniques. Finally there is a brief discussion of spatial data mining techniques in image processing and change detection from remote sensing data. The merits and issues of different techniques are compared. The importance of the exponential increase in the image data volume and multiple sensors and associated challenges on the development of change detection techniques are highlighted. With the wide use of very-high-resolution (VHR) remotely sensed images, object-based methods and data mining techniques may have more potential in change detection. 2013 International Society for Photogrammetry and Remote Sensing, Inc. (ISPRS) Published by Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "fddadfbc6c1b34a8ac14f8973f052da5",
"text": "Abstract. Centroidal Voronoi tessellations are useful for subdividing a region in Euclidean space into Voronoi regions whose generators are also the centers of mass, with respect to a prescribed density function, of the regions. Their extensions to general spaces and sets are also available; for example, tessellations of surfaces in a Euclidean space may be considered. In this paper, a precise definition of such constrained centroidal Voronoi tessellations (CCVTs) is given and a number of their properties are derived, including their characterization as minimizers of an “energy.” Deterministic and probabilistic algorithms for the construction of CCVTs are presented and some analytical results for one of the algorithms are given. Computational examples are provided which serve to illustrate the high quality of CCVT point sets. Finally, CCVT point sets are applied to polynomial interpolation and numerical integration on the sphere.",
"title": ""
},
{
"docid": "bf272aa2413f1bc186149e814604fb03",
"text": "Reading has been studied for decades by a variety of cognitive disciplines, yet no theories exist which sufficiently describe and explain how people accomplish the complete task of reading real-world texts. In particular, a type of knowledge intensive reading known as creative reading has been largely ignored by the past research. We argue that creative reading is an aspect of practically all reading experiences; as a result, any theory which overlooks this will be insufficient. We have built on results from psychology, artificial intelligence, and education in order to produce a functional theory of the complete reading process. The overall framework describes the set of tasks necessary for reading to be performed. Within this framework, we have developed a theory of creative reading. The theory is implemented in the ISAAC (Integrated Story Analysis And Creativity) system, a reading system which reads science fiction stories.",
"title": ""
},
{
"docid": "7c901910ead6c3e4723803085b7495d5",
"text": "Lenneberg (1967) hypothesized that language could be acquired only within a critical period, extending from early infancy until puberty. In its basic form, the critical period hypothesis need only have consequences for first language acquisition. Nevertheless, it is essential to our understanding of the nature of the hypothesized critical period to determine whether or not it extends as well to second language acquisition. If so, it should be the case that young children are better second language learners than adults and should consequently reach higher levels of final proficiency in the second language. This prediction was tested by comparing the English proficiency attained by 46 native Korean or Chinese speakers who had arrived in the United States between the ages of 3 and 39, and who had lived in the United States between 3 and 26 years by the time of testing. These subjects were tested on a wide variety of structures of English grammar, using a grammaticality judgment task. Both correlational and t-test analyses demonstrated a clear and strong advantage for earlier arrivals over the later arrivals. Test performance was linearly related to age of arrival up to puberty; after puberty, performance was low but highly variable and unrelated to age of arrival. This age effect was shown not to be an inadvertent result of differences in amount of experience with English, motivation, self-consciousness, or American identification. The effect also appeared on every grammatical structure tested, although the structures varied markedly in the degree to which they were well mastered by later learners. The results support the conclusion that a critical period for language acquisition extends its effects to second language acquisition.",
"title": ""
},
{
"docid": "584e84ac1a061f1bf7945ab4cf54d950",
"text": "Paul White, PhD, MD§ Acupuncture has been used in China and other Asian countries for the past 3000 yr. Recently, this technique has been gaining increased popularity among physicians and patients in the United States. Even though acupuncture-induced analgesia is being used in many pain management programs in the United States, the mechanism of action remains unclear. Studies suggest that acupuncture and related techniques trigger a sequence of events that include the release of neurotransmitters, endogenous opioid-like substances, and activation of c-fos within the central nervous system. Recent developments in central nervous system imaging techniques allow scientists to better evaluate the chain of events that occur after acupuncture-induced stimulation. In this review article we examine current biophysiological and imaging studies that explore the mechanisms of acupuncture analgesia.",
"title": ""
},
{
"docid": "5c5225b5e66d49f17a881ed1843e944c",
"text": "The organic-inorganic hybrid perovskites methylammonium lead iodide (CH3NH3PbI3) and the partially chlorine-substituted mixed halide CH3NH3PbI3-xClx emit strong and broad photoluminescence (PL) around their band gap energy of ∼1.6 eV. However, the nature of the radiative decay channels behind the observed emission and, in particular, the spectral broadening mechanisms are still unclear. Here we investigate these processes for high-quality vapor-deposited films of CH3NH3PbI3-xClx using time- and excitation-energy dependent photoluminescence spectroscopy. We show that the PL spectrum is homogenously broadened with a line width of 103 meV most likely as a consequence of phonon coupling effects. Further analysis reveals that defects or trap states play a minor role in radiative decay channels. In terms of possible lasing applications, the emission spectrum of the perovskite is sufficiently broad to have potential for amplification of light pulses below 100 fs pulse duration.",
"title": ""
},
{
"docid": "9097bf29a9ad2b33919e0667d20bf6d7",
"text": "Object detection, though gaining popularity, has largely been limited to detection from the ground or from satellite imagery. Aerial images, where the target may be obfuscated from the environmental conditions, angle-of-attack, and zoom level, pose a more significant challenge to correctly detect targets in. This paper describes the implementation of a regional convolutional neural network to locate and classify objects across several categories in complex, aerial images. Our current results show promise in detecting and classifying objects. Further adjustments to the network and data input should increase the localization and classification accuracies.",
"title": ""
},
{
"docid": "08ee3e3191ac1b56b3c41e89df62d047",
"text": "This article presents a gesture recognition/adaptation system for human--computer interaction applications that goes beyond activity classification and that, as a complement to gesture labeling, characterizes the movement execution. We describe a template-based recognition method that simultaneously aligns the input gesture to the templates using a Sequential Monte Carlo inference technique. Contrary to standard template-based methods based on dynamic programming, such as Dynamic Time Warping, the algorithm has an adaptation process that tracks gesture variation in real time. The method continuously updates, during execution of the gesture, the estimated parameters and recognition results, which offers key advantages for continuous human--machine interaction. The technique is evaluated in several different ways: Recognition and early recognition are evaluated on 2D onscreen pen gestures; adaptation is assessed on synthetic data; and both early recognition and adaptation are evaluated in a user study involving 3D free-space gestures. The method is robust to noise, and successfully adapts to parameter variation. Moreover, it performs recognition as well as or better than nonadapting offline template-based methods.",
"title": ""
}
] | scidocsrr |
9c5228d504da90912f1ef01a2630b180 | Security Analysis of Emerging Smart Home Applications | [
{
"docid": "6504d0174ca664d4975e7bd8baafe8f9",
"text": "A framework for evaluating security risks associated with technologies used at home.",
"title": ""
},
{
"docid": "14f74a9c1b5c495b5f3bd23bb3af085d",
"text": "Web and smartphone applications commonly embed third-party user interfaces like advertisements and social media widgets. However, this capability comes with security implications, both for the embedded interfaces and the host page or application. While browsers have evolved over time to address many of these issues, mobile systems like Android — which do not yet support true cross-application interface embedding — present an opportunity to redesign support for secure embedded user interfaces from scratch. In this paper, we explore the requirements for a system to support secure embedded user interfaces by systematically analyzing existing systems like browsers, smartphones, and research systems. We describe our experience modifying Android to support secure interface embedding and evaluate our implementation using case studies that rely on embedded interfaces, such as advertisement libraries, Facebook social plugins (e.g., the “Like” button), and access control gadgets. We provide concrete techniques and reflect on lessons learned for secure embedded user interfaces.",
"title": ""
}
] | [
{
"docid": "d03f900c785a5d6abf8bb16434693e4d",
"text": "Juvenile gigantomastia is a benign disorder of the breast in which one or both of the breasts undergo a massive increase in size during adolescence. The authors present a series of four cases of juvenile gigantomastia, advances in endocrine management, and the results of surgical therapy. Three patients were treated for initial management of juvenile gigantomastia and one patient was evaluated for a gestationally induced recurrence of juvenile gigantomastia. The three women who presented for initial management had a complete evaluation to rule out other etiologies of breast enlargement. Endocrine therapy was used in 2 patients, one successfully. A 17-year-old girl had unilateral hypertrophy treated with reduction surgery. She had no recurrence and did not require additional surgery. Two patients, ages 10 and 12 years, were treated at a young age with reduction mammaplasty, and both of these girls required secondary surgery for treatment. One patient underwent subtotal mastectomy with implant reconstruction but required two subsequent operations for removal of recurrent hypertrophic breast tissue. The second patient started a course of tamoxifen followed by reduction surgery. While on tamoxifen, the second postoperative result remained stable, and the contralateral breast, which had exhibited some minor hypertrophy, regressed in size. The fourth patient was a gravid 24-year-old who had been treated for juvenile gigantomastia at age 14, and presented with gestationally induced recurrent hypertrophy. The authors' experience has been that juvenile gigantomastia in young patients is prone to recurrence, and is in agreement with previous studies that subcutaneous mastectomy provides definitive treatment. However, tamoxifen may be a useful adjunct and may allow stable results when combined with reduction mammaplasty. If successful, the use of tamoxifen would eliminate the potential complications of breast prostheses. Lastly, the 17-year-old patient did not require secondary surgery, suggesting that older patients may be treated definitively with reduction surgery alone.",
"title": ""
},
{
"docid": "a1d9fef7fda8a547df136565afd5a443",
"text": "The authors proposed a circular-polarized array antenna by using hexagonal radiating apertures in the 60 GHz-band. The hexagonal radiating aperture is designed, and the good axial ratio characteristics are achieved in the boresight. We analyze the full structure of the 16×16-element array that combines the 2×2-element subarrays and a 64-way divider. The reflection is less than −14dB over 4.9% bandwidth where the axial ratio is less than 2.5dB. High antenna efficiency of 88.7% is obtained at 61.5GHz with the antenna gain of 33.3dBi including losses. The 1dB-down gain bandwidth is 6.8%.",
"title": ""
},
{
"docid": "c2b7a7463dc7845b5bb3bebca50002fd",
"text": "While most approaches to semantic reasoning have focused on improving performance, in this paper we argue that computational times are very important in order to enable real time applications such as autonomous driving. Towards this goal, we present an approach to joint classification, detection and semantic segmentation using a unified architecture where the encoder is shared amongst the three tasks. Our approach is very simple, can be trained end-to-end and performs extremely well in the challenging KITTI dataset. Our approach is also very efficient, allowing us to perform inference at more then 23 frames per second. Training scripts and trained weights to reproduce our results can be found here: https://github.com/MarvinTeichmann/MultiNet",
"title": ""
},
{
"docid": "a791efe9d0414842f7d82e056beaa96f",
"text": "OBJECTIVE\nTo report the outcomes of 500 robotically assisted laparoscopic radical prostatectomies (RALPs), a minimally invasive alternative for treating prostate cancer.\n\n\nPATIENTS AND METHODS\nIn all, 500 patients had RALP over a 30-month period. A transperitoneal six-port approach was used in each case, with the da Vinci robotic surgical system (Intuitive Surgical, Sunnyvale, CA, USA). Prospective data collection included quality-of-life questionnaires, basic demographics (height, weight and body mass index), prostate specific antigen (PSA) levels, clinical stage and Gleason grade. Variables assessed during RALP were operative duration, estimated blood loss (EBL) and complications, and after RALP were hospital stay, catheter time, pathology, PSA level, return of continence and potency.\n\n\nRESULTS\nThe mean (range) duration of RALP was 130 (51-330) min; all procedures were successful, with no intraoperative transfusions or deaths. The mean EBL was 10-300 mL; 97% of patients were discharged home on the first day after RALP with a mean haematocrit of 36%. The mean duration of catheterization was 6.9 (5-21) days. The positive margin rate was 9.4% for all patients; i.e. 2.5% for T2 tumours, 23% for T3a and 53% for T4. The overall biochemical recurrence free (PSA level<0.1 ng/mL) survival was 95% at mean follow-up of 9.7 months. There was complete continence at 3 and 6 months in 89% and 95% of patients, respectively. At 1 year 78% of patients were potent (with or without the use of oral medications), 15% were not yet able to sustain erections capable of intercourse, and another 7% still required injection therapy.\n\n\nCONCLUSION\nRALP is a safe, feasible and minimally invasive alternative for treating prostate cancer. Our initial experience with the procedure shows promising short-term outcomes.",
"title": ""
},
{
"docid": "db66428e21d473b7d77fde0c3ae6d6c3",
"text": "In order to improve electric vehicle lead-acid battery charging speed, analysis the feasibility of shortening the charging time used the charge method with negative pulse discharge, presenting the negative pulse parameters determined method for the fast charging with pulse discharge, determined the negative pulse amplitude and negative pulse duration in the pulse charge with negative pulse. Experiments show that the determined parameters with this method has some Advantages such as short charging time, small temperature rise etc, and the method of negative pulse parameters determined can used for different capacity of lead-acid batteries.",
"title": ""
},
{
"docid": "089343ba0d94a96d6a583f1becfd7b46",
"text": "In this paper we study fundamental properties of minimum inter-event times in event-triggered control systems, both in the absence and presence of external disturbances. This analysis reveals, amongst others, that for several popular event-triggering mechanisms no positive minimum inter-event time can be guaranteed in the presence of arbitrary small external disturbances. This clearly shows that it is essential to include the effects of external disturbances in the analysis of the computation/communication properties of event-triggered control systems. In fact, this paper also identifies event-triggering mechanisms that do exhibit these important event-separation properties.",
"title": ""
},
{
"docid": "21be8515a524dc0125fec0f5d3cd6e61",
"text": "Early prediction of ongoing human activity has become more valuable in a large variety of time-critical applications. To build an effective representation for prediction, human activities can be characterized by a complex temporal composition of constituent simple actions and interacting objects. Different from early detection on short-duration simple actions, we propose a novel framework for long -duration complex activity prediction by discovering three key aspects of activity: Causality, Context-cue, and Predictability. The major contributions of our work include: (1) a general framework is proposed to systematically address the problem of complex activity prediction by mining temporal sequence patterns; (2) probabilistic suffix tree (PST) is introduced to model causal relationships between constituent actions, where both large and small order Markov dependencies between action units are captured; (3) the context-cue, especially interactive objects information, is modeled through sequential pattern mining (SPM), where a series of action and object co-occurrence are encoded as a complex symbolic sequence; (4) we also present a predictive accumulative function (PAF) to depict the predictability of each kind of activity. The effectiveness of our approach is evaluated on two experimental scenarios with two data sets for each: action-only prediction and context-aware prediction. Our method achieves superior performance for predicting global activity classes and local action units.",
"title": ""
},
{
"docid": "254f2ef4608ea3c959e049073ad063f8",
"text": "Recently, the long-term evolution (LTE) is considered as one of the most promising 4th generation (4G) mobile standards to increase the capacity and speed of mobile handset networks [1]. In order to realize the LTE wireless communication system, the diversity and multiple-input multiple-output (MIMO) systems have been introduced [2]. In a MIMO mobile user terminal such as handset or USB dongle, at least two uncorrelated antennas should be placed within an extremely restricted space. This task becomes especially difficult when a MIMO planar antenna is designed for LTE band 13 (the corresponding wavelength is 390 mm). Due to the limited space available for antenna elements, the antennas are strongly coupled with each other and have narrow bandwidth.",
"title": ""
},
{
"docid": "ecc7773c38429bf3a3701c38310f165e",
"text": "In this paper, we present the first multi-body non-rigid structure-from-motion (SFM) method, which simultaneously reconstructs and segments multiple objects that are undergoing non-rigid deformation over time. Under our formulation, 3D trajectories for each non-rigid object can be well approximated with a sparse affine combination of other 3D trajectories from the same object. The resultant optimization is solved by the alternating direction method of multipliers (ADMM). We demonstrate the efficacy of the proposed method through extensive experiments on both synthetic and real data sequences. Our method outperforms other alternative methods, such as first clustering the 2D feature tracks to groups and then doing non-rigid reconstruction in each group or first conducting 3D reconstruction by using single subspace assumption and then clustering the 3D trajectories into groups.",
"title": ""
},
{
"docid": "67d41a84050f3bf9bc004e7c1787a2bc",
"text": "Facial aging is a complex process individualized by interaction with exogenous and endogenous factors. The upper lip is one of the facial components by which facial attractiveness is defined. Upper lip aging is significantly influenced by maxillary bone and teeth. Aging of the cutaneous part can be aggravated by solar radiation and smoking. We provide a review about minimally invasive techniques for correction of aging signs of the upper lip with a tailored approach to patient’s characteristics. The treatment is based upon use of fillers, laser, and minor surgery. Die Alterung des Gesichts ist ein komplexer Prozess, welcher durch die Wechselwirkung exogener und endogener Faktoren individuell geprägt wird. Die Oberlippe zählt zu den fazialen Komponenten, welche die Attraktivität des Gesichts definieren. Die Alterung der Oberlippe wird durch den Oberkieferknochen und die Zähne beeinflusst. Alterungsprozesse des kutanen Anteils können durch Sonnenbestrahlung und Rauchen aggraviert werden. Die Autoren stellen eine Übersicht zur den minimalinvasiven Verfahren der Korrektur altersbedingter Veränderungen der Oberlippe mit Individualisierung je nach Patientenmerkmalen vor. Die Technik basiert auf der Nutzung von Fillern, Lasern und kleineren chirurgischen Eingriffen.",
"title": ""
},
{
"docid": "b61a7e1ee0f8100016f61b766332d38f",
"text": "We study the cost function for hierarchical clusterings introduced by [Dasgupta, 2016] where hierarchies are treated as first-class objects rather than deriving their cost from projections into flat clusters. It was also shown in [Dasgupta, 2016] that a top-down algorithm returns a hierarchical clustering of cost at most O (αn log n) times the cost of the optimal hierarchical clustering, where αn is the approximation ratio of the Sparsest Cut subroutine used. Thus using the best known approximation algorithm for Sparsest Cut due to Arora-Rao-Vazirani, the top-down algorithm returns a hierarchical clustering of cost at most O ( log3/2 n ) times the cost of the optimal solution. We improve this by giving an O(log n)approximation algorithm for this problem. Our main technical ingredients are a combinatorial characterization of ultrametrics induced by this cost function, deriving an Integer Linear Programming (ILP) formulation for this family of ultrametrics, and showing how to iteratively round an LP relaxation of this formulation by using the idea of sphere growing which has been extensively used in the context of graph partitioning. We also prove that our algorithm returns an O(log n)-approximate hierarchical clustering for a generalization of this cost function also studied in [Dasgupta, 2016]. Experiments show that the hierarchies found by using the ILP formulation as well as our rounding algorithm often have better projections into flat clusters than the standard linkage based algorithms. We conclude with constant factor inapproximability results for this problem: 1) no polynomial size LP or SDP can achieve a constant factor approximation for this problem and 2) no polynomial time algorithm can achieve a constant factor approximation under the assumption of the Small Set Expansion hypothesis.",
"title": ""
},
{
"docid": "2aecaa95df956d905a39a7394a4b08ad",
"text": "Superpixels provide an efficient low/mid-level representation of image data, which greatly reduces the number of image primitives for subsequent vision tasks. Existing superpixel algorithms are not differentiable, making them difficult to integrate into otherwise end-to-end trainable deep neural networks. We develop a new differentiable model for superpixel sampling that leverages deep networks for learning superpixel segmentation. The resulting Superpixel Sampling Network (SSN) is end-to-end trainable, which allows learning task-specific superpixels with flexible loss functions and has fast runtime. Extensive experimental analysis indicates that SSNs not only outperform existing superpixel algorithms on traditional segmentation benchmarks, but can also learn superpixels for other tasks. In addition, SSNs can be easily integrated into downstream deep networks resulting in performance improvements.",
"title": ""
},
{
"docid": "1eab5897252dae2313210c666c3dce8c",
"text": "Bone marrow angiogenesis plays an important role in the pathogenesis and progression in multiple myeloma. Recent studies have shown that proteasome inhibitor bortezomib (Velcade, formerly PS-341) can overcome conventional drug resistance in vitro and in vivo; however, its antiangiogenic activity in the bone marrow milieu has not yet been defined. In the present study, we examined the effects of bortezomib on the angiogenic phenotype of multiple myeloma patient-derived endothelial cells (MMEC). At clinically achievable concentrations, bortezomib inhibited the proliferation of MMECs and human umbilical vein endothelial cells in a dose-dependent and time-dependent manner. In functional assays of angiogenesis, including chemotaxis, adhesion to fibronectin, capillary formation on Matrigel, and chick embryo chorioallantoic membrane assay, bortezomib induced a dose-dependent inhibition of angiogenesis. Importantly, binding of MM.1S cells to MMECs triggered multiple myeloma cell proliferation, which was also abrogated by bortezomib in a dose-dependent fashion. Bortezomib triggered a dose-dependent inhibition of vascular endothelial growth factor (VEGF) and interleukin-6 (IL-6) secretion by the MMECs, and reverse transcriptase-PCR confirmed drug-related down-regulation of VEGF, IL-6, insulin-like growth factor-I, Angiopoietin 1 (Ang1), and Ang2 transcription. These data, therefore, delineate the mechanisms of the antiangiogenic effects of bortezomib on multiple myeloma cells in the bone marrow milieu.",
"title": ""
},
{
"docid": "4fcb316e01885475920f8b91f6a4c00d",
"text": "Transportation, as a means for moving goods and people between different locations, is a vital element of modern society. In this paper, we discuss how big data technology infrastructure fits into the current development of China, and provide suggestions for improvement. We discuss the current situation of China's transportation system, and outline relevant big data technologies that are being used in the transportation domain. Finally we point out opportunities for improvement of China's transportation system, through standardisation, integration of big data analytics in a national framework, and point to the future of transportation in China and beyond.",
"title": ""
},
{
"docid": "1e44c9ab1f66f7bf7dced95bd3f0a122",
"text": "The expression and experience of human behavior are complex and multimodal and characterized by individual and contextual heterogeneity and variability. Speech and spoken language communication cues offer an important means for measuring and modeling human behavior. Observational research and practice across a variety of domains from commerce to healthcare rely on speech- and language-based informatics for crucial assessment and diagnostic information and for planning and tracking response to an intervention. In this paper, we describe some of the opportunities as well as emerging methodologies and applications of human behavioral signal processing (BSP) technology and algorithms for quantitatively understanding and modeling typical, atypical, and distressed human behavior with a specific focus on speech- and language-based communicative, affective, and social behavior. We describe the three important BSP components of acquiring behavioral data in an ecologically valid manner across laboratory to real-world settings, extracting and analyzing behavioral cues from measured data, and developing models offering predictive and decision-making support. We highlight both the foundational speech and language processing building blocks as well as the novel processing and modeling opportunities. Using examples drawn from specific real-world applications ranging from literacy assessment and autism diagnostics to psychotherapy for addiction and marital well being, we illustrate behavioral informatics applications of these signal processing techniques that contribute to quantifying higher level, often subjectively described, human behavior in a domain-sensitive fashion.",
"title": ""
},
{
"docid": "7498bc36a78f59eef834fdab5174e96f",
"text": "We present two new algorithms FastAccSum and FastPrecSum, one to compute a faithful rounding of the sum of floating-point numbers and the other for a result “as if” computed in K-fold precision. Faithful rounding means the computed result either is one of the immediate floating-point neighbors of the exact result or is equal to the exact sum if this is a floating-point number. The algorithms are based on our previous algorithms AccSum and PrecSum and improve them by up to 25%. The first algorithm adapts to the condition number of the sum; i.e., the computing time is proportional to the difficulty of the problem. The second algorithm does not need extra memory, and the computing time depends only on the number of summands and K. Both algorithms are the fastest known in terms of flops. They allow good instruction-level parallelism so that they are also fast in terms of measured computing time. The algorithms require only standard floating-point addition, subtraction, and multiplication in one working precision, for example, double precision.",
"title": ""
},
{
"docid": "e4115ad3decf1df3a6dc49351b5aef98",
"text": "Modern industrial communication networks are increasingly based on open protocols and platforms that are also used in the office IT and Internet environment. This reuse facilitates development and deployment of highly connected systems, but also makes the communication system vulnerable to electronic attacks. This paper gives an overview of IT security issues in industrial automation systems which are based on open communication systems. First, security objectives, electronic attack methods, and the available countermeasures for general IT systems are described. General security objectives and best practices are listed. Particularly for the TCP/IP protocol suite, a wide range of cryptography-based secure communication protocols is available. The paper describes their principles and scope of application. Next, we focus on industrial communication systems, which have a number of security-relevant characteristics distinct from the office IT systems. Confidentiality of transmitted data may not be required; however, data and user authentication, as well as access control are crucial for the mission critical and safety critical operation of the automation system. As a result, modern industrial automation systems, if they include security measures at all, emphasize various forms of access control. The paper describes the status of relevant specifications and implementations for a number of standardized automation protocols. Finally, we illustrate the application of security concepts and tools by brief case studies describing security issues in the configuration and operation of substations, plants, or for remote access.",
"title": ""
},
{
"docid": "ab33dcd4172dec6cc88e13af867fed88",
"text": "It is necessary to understand the content of articles and user preferences to make effective news recommendations. While ID-based methods, such as collaborative filtering and low-rank factorization, are well known for making recommendations, they are not suitable for news recommendations because candidate articles expire quickly and are replaced with new ones within short spans of time. Word-based methods, which are often used in information retrieval settings, are good candidates in terms of system performance but have issues such as their ability to cope with synonyms and orthographical variants and define \"queries\" from users' historical activities. This paper proposes an embedding-based method to use distributed representations in a three step end-to-end manner: (i) start with distributed representations of articles based on a variant of a denoising autoencoder, (ii) generate user representations by using a recurrent neural network (RNN) with browsing histories as input sequences, and (iii) match and list articles for users based on inner-product operations by taking system performance into consideration. The proposed method performed well in an experimental offline evaluation using past access data on Yahoo! JAPAN's homepage. We implemented it on our actual news distribution system based on these experimental results and compared its online performance with a method that was conventionally incorporated into the system. As a result, the click-through rate (CTR) improved by 23% and the total duration improved by 10%, compared with the conventionally incorporated method. Services that incorporated the method we propose are already open to all users and provide recommendations to over ten million individual users per day who make billions of accesses per month.",
"title": ""
},
{
"docid": "1258939378850f7d89f6fa860be27c39",
"text": "Sparse methods and the use of Winograd convolutions are two orthogonal approaches, each of which significantly accelerates convolution computations in modern CNNs. Sparse Winograd merges these two and thus has the potential to offer a combined performance benefit. Nevertheless, training convolution layers so that the resulting Winograd kernels are sparse has not hitherto been very successful. By introducing a Winograd layer in place of a standard convolution layer, we can learn and prune Winograd coefficients “natively” and obtain sparsity level beyond 90% with only 0.1% accuracy loss with AlexNet on ImageNet dataset. Furthermore, we present a sparse Winograd convolution algorithm and implementation that exploits the sparsity, achieving up to 31.7 effective TFLOP/s in 32-bit precision on a latest Intel Xeon CPU, which corresponds to a 5.4× speedup over a state-of-the-art dense convolution implementation.",
"title": ""
},
{
"docid": "394dec5d97fa6ba30a02569ab5412cbe",
"text": "The paper presents a new controller approach applied to redundant robot manipulators constrained by mobile obstacles. The proposed controller is constructed in task space by using optimization strategy, in order to achieve a good trajectory tracking of the end effector even if the obstacles are fixed or mobile. The criterion to be optimized is chosen as the sum of the joint displacements energy and the internal needed, only its structure. All unknown functions in the robot dynamical model, written in extended Cartesian space, are carried out using multilayer perceptron (MLP) neural networks. The adaptation laws of the neural parameters are obtained via closed loop stability analysis of the system (Lyapunov approach). In order to evaluate the proposed controller performance a 3 DOF robot manipulator evolving in a vertical space constrained by a mobile obstacle is used. The obtained results show its effectiveness. & 2011 Elsevier B.V. All rights reserved.",
"title": ""
}
] | scidocsrr |
11ae217799d644b68b900da25cb99f16 | An Examination of Regret in Bullying Tweets | [
{
"docid": "8dfa68e87eee41dbef8e137b860e19cc",
"text": "We investigate regrets associated with users' posts on a popular social networking site. Our findings are based on a series of interviews, user diaries, and online surveys involving 569 American Facebook users. Their regrets revolved around sensitive topics, content with strong sentiment, lies, and secrets. Our research reveals several possible causes of why users make posts that they later regret: (1) they want to be perceived in favorable ways, (2) they do not think about their reason for posting or the consequences of their posts, (3) they misjudge the culture and norms within their social circles, (4) they are in a \"hot\" state of high emotion when posting, or under the influence of drugs or alcohol, (5) their postings are seen by an unintended audience, (6) they do not foresee how their posts could be perceived by people within their intended audience, and (7) they misunderstand or misuse the Facebook platform. Some reported incidents had serious repercussions, such as breaking up relationships or job losses. We discuss methodological considerations in studying negative experiences associated with social networking posts, as well as ways of helping users of social networking sites avoid such regrets.",
"title": ""
}
] | [
{
"docid": "5c0994fab71ea871fad6915c58385572",
"text": "We present FaceWarehouse, a database of 3D facial expressions for visual computing applications. We use Kinect, an off-the-shelf RGBD camera, to capture 150 individuals aged 7-80 from various ethnic backgrounds. For each person, we captured the RGBD data of her different expressions, including the neutral expression and 19 other expressions such as mouth-opening, smile, kiss, etc. For every RGBD raw data record, a set of facial feature points on the color image such as eye corners, mouth contour, and the nose tip are automatically localized, and manually adjusted if better accuracy is required. We then deform a template facial mesh to fit the depth data as closely as possible while matching the feature points on the color image to their corresponding points on the mesh. Starting from these fitted face meshes, we construct a set of individual-specific expression blendshapes for each person. These meshes with consistent topology are assembled as a rank-3 tensor to build a bilinear face model with two attributes: identity and expression. Compared with previous 3D facial databases, for every person in our database, there is a much richer matching collection of expressions, enabling depiction of most human facial actions. We demonstrate the potential of FaceWarehouse for visual computing with four applications: facial image manipulation, face component transfer, real-time performance-based facial image animation, and facial animation retargeting from video to image.",
"title": ""
},
{
"docid": "543dc9543221b507746ebf1fe8d14928",
"text": "Mixture modeling is a widely applied data analysis technique used to identify unobserved heterogeneity in a population. Despite mixture models’ usefulness in practice, one unresolved issue in the application of mixture models is that there is not one commonly accepted statistical indicator for deciding on the number of classes in a study population. This article presents the results of a simulation study that examines the performance of likelihood-based tests and the traditionally used Information Criterion (ICs) used for determining the number of classes in mixture modeling. We look at the performance of these tests and indexes for 3 types of mixture models: latent class analysis (LCA), a factor mixture model (FMA), and a growth mixture models (GMM). We evaluate the ability of the tests and indexes to correctly identify the number of classes at three different sample sizes (n D 200, 500, 1,000). Whereas the Bayesian Information Criterion performed the best of the ICs, the bootstrap likelihood ratio test proved to be a very consistent indicator of classes across all of the models considered.",
"title": ""
},
{
"docid": "89092357b733b66d63580e849435e40a",
"text": "Universal asynchronous receiver transmitter, abbreviated UART is a integrated circuit used for serial communications over a computer or peripheral device serial port. UARTs are now commonly included in microcontrollers. The universal designation indicates that the data format and transmission speeds are configurable and that the actual electric signaling levels and methods (such as differential signaling etc.) typically are handled by a special driver circuit external to the UART. Baud rate of 20Mbps using clock of 20MHz is used. FIFO (First-In-First Out) is used to store data temporarily during high speed transmission to get synchronization. The design is synthesized in Verilog HDL and reliability of the Verilog HDL implementation of UART is verified by simulated waveforms. We are using Cadence tool for simulation and synthesis.",
"title": ""
},
{
"docid": "295c6a54db24bf28f5970e60e6bf5971",
"text": "This thesis presents a learning based approach for detecting classes of objects and patterns with variable image appearance but highly predictable image boundaries. It consists of two parts. In part one, we introduce our object and pattern detection approach using a concrete human face detection example. The approach rst builds a distribution-based model of the target pattern class in an appropriate feature space to describe the target's variable image appearance. It then learns from examples a similarity measure for matching new patterns against the distribution-based target model. The approach makes few assumptions about the target pattern class and should therefore be fairly general, as long as the target class has predictable image boundaries. Because our object and pattern detection approach is very much learning-based, how well a system eventually performs depends heavily on the quality of training examples it receives. The second part of this thesis looks at how one can select high quality examples for function approximation learning tasks. We propose an active learning formulation for function approximation, and show for three speci c approximation function classes, that the active example selection strategy learns its target with fewer data samples than random sampling. We then simplify the original active learning formulation, and show how it leads to a tractable example selection paradigm, suitable for use in many object and pattern detection problems. Copyright c Massachusetts Institute of Technology, 1995 This report describes research done at the Arti cial Intelligence Laboratory and within the Center for Biological and Computational Learning. This research is sponsored by grants from the O ce of Naval Research under contracts N00014-91-J-1270 and N00014-92-J-1879; by a grant from the National Science Foundation under contract ASC-9217041. Support for the A.I. Laboratory's arti cial intelligence research is provided by ONR contract N00014-91-J-4038. Learning and Example Selection for Object and Pattern Detection",
"title": ""
},
{
"docid": "e85cf5b993cc4d82a1dea47f9ce5d18b",
"text": "We recently proposed an approach inspired by Sparse Component Analysis for real-time localisation of multiple sound sources using a circular microphone array. The method was based on identifying time-frequency zones where only one source is active, reducing the problem to single-source localisation in these zones. A histogram of estimated Directions of Arrival (DOAs) was formed and then processed to obtain improved DOA estimates, assuming that the number of sources was known. In this paper, we extend our previous work by proposing a new method for the final DOA estimations, that outperforms our previous method at lower SNRs and in the case of six simultaneous speakers. In keeping with the spirit of our previous work, the new method is very computationally efficient, facilitating its use in real-time systems.",
"title": ""
},
{
"docid": "4d44572846a0989bf4bc230b669c88b7",
"text": "Application-specific integrated circuit (ASIC) ML4425 is often used for sensorless control of permanent-magnet (PM) brushless direct current (BLDC) motor drives. It integrates the terminal voltage of the unenergized winding that contains the back electromotive force (EMF) information and uses a phase-locked loop (PLL) to determine the proper commutation sequence for the BLDC motor. However, even without pulsewidth modulation, the terminal voltage is distorted by voltage pulses due to the freewheel diode conduction. The pulses, which appear very wide in an ultrahigh-speed (120 kr/min) drive, are also integrated by the ASIC. Consequently, the motor commutation is significantly retarded, and the drive performance is deteriorated. In this paper, it is proposed that the ASIC should integrate the third harmonic back EMF instead of the terminal voltage, such that the commutation retarding is largely reduced and the motor performance is improved. Basic principle and implementation of the new ASIC-based sensorless controller will be presented, and experimental results will be given to verify the control strategy. On the other hand, phase delay in the motor currents arises due to the influence of winding inductance, reducing the drive performance. Therefore, a novel circuit with discrete components is proposed. It also uses the integration of third harmonic back EMF and the PLL technique and provides controllable advanced commutation to the BLDC motor.",
"title": ""
},
{
"docid": "d1e9eb1357381310c4540a6dcbe8973a",
"text": "We introduce a method for learning Bayesian networks that handles the discretization of continuous variables as an integral part of the learning process. The main ingredient in this method is a new metric based on the Minimal Description Length principle for choosing the threshold values for the discretization while learning the Bayesian network structure. This score balances the complexity of the learned discretization and the learned network structure against how well they model the training data. This ensures that the discretization of each variable introduces just enough intervals to capture its interaction with adjacent variables in the network. We formally derive the new metric, study its main properties, and propose an iterative algorithm for learning a discretization policy. Finally, we illustrate its behavior in applications to supervised learning.",
"title": ""
},
{
"docid": "1f9c032db6d92771152b6831acbd8af3",
"text": "Cyberbullying has provoked public concern after well-publicized suicides of adolescents. This mixed-methods study investigates the social representation of these suicides. A content analysis of 184 U.S. newspaper articles on death by suicide associated with cyberbullying or aggression found that few articles adhered to guidelines suggested by the World Health Organization and the American Foundation for Suicide Prevention to protect against suicidal behavioral contagion. Few articles made reference to suicide or bullying prevention resources, and most suggested that the suicide had a single cause. Thematic analysis of a subset of articles found that individual deaths by suicide were used as cautionary tales to prompt attention to cyberbullying. This research suggests that newspaper coverage of these events veers from evidence-based guidelines and that more work is needed to determine how best to engage with journalists about the potential consequences of cyberbullying and suicide coverage.",
"title": ""
},
{
"docid": "8ff4c6a5208b22a47eb5006c329817dc",
"text": "Goal: To evaluate a novel kind of textile electrodes based on woven fabrics treated with PEDOT:PSS, through an easy fabrication process, testing these electrodes for biopotential recordings. Methods: Fabrication is based on raw fabric soaking in PEDOT:PSS using a second dopant, squeezing and annealing. The electrodes have been tested on human volunteers, in terms of both skin contact impedance and quality of the ECG signals recorded at rest and during physical activity (power spectral density, baseline wandering, QRS detectability, and broadband noise). Results: The electrodes are able to operate in both wet and dry conditions. Dry electrodes are more prone to noise artifacts, especially during physical exercise and mainly due to the unstable contact between the electrode and the skin. Wet (saline) electrodes present a stable and reproducible behavior, which is comparable or better than that of traditional disposable gelled Ag/AgCl electrodes. Conclusion: The achieved results reveal the capability of this kind of electrodes to work without the electrolyte, providing a valuable interface with the skin, due to mixed electronic and ionic conductivity of PEDOT:PSS. These electrodes can be effectively used for acquiring ECG signals. Significance: Textile electrodes based on PEDOT:PSS represent an important milestone in wearable monitoring, as they present an easy and reproducible fabrication process, very good performance in wet and dry (at rest) conditions and a superior level of comfort with respect to textile electrodes proposed so far. This paves the way to their integration into smart garments.",
"title": ""
},
{
"docid": "86f0e783a93fc783e10256c501008b0d",
"text": "We present a biologically-motivated system for the recognition of actions from video sequences. The approach builds on recent work on object recognition based on hierarchical feedforward architectures [25, 16, 20] and extends a neurobiological model of motion processing in the visual cortex [10]. The system consists of a hierarchy of spatio-temporal feature detectors of increasing complexity: an input sequence is first analyzed by an array of motion- direction sensitive units which, through a hierarchy of processing stages, lead to position-invariant spatio-temporal feature detectors. We experiment with different types of motion-direction sensitive units as well as different system architectures. As in [16], we find that sparse features in intermediate stages outperform dense ones and that using a simple feature selection approach leads to an efficient system that performs better with far fewer features. We test the approach on different publicly available action datasets, in all cases achieving the highest results reported to date.",
"title": ""
},
{
"docid": "0bb6e496cd176e85fcec98bed669e18d",
"text": "Men and women clearly differ in some psychological domains. A. H. Eagly (1995) shows that these differences are not artifactual or unstable. Ideally, the next scientific step is to develop a cogent explanatory framework for understanding why the sexes differ in some psychological domains and not in others and for generating accurate predictions about sex differences as yet undiscovered. This article offers a brief outline of an explanatory framework for psychological sex differences--one that is anchored in the new theoretical paradigm of evolutionary psychology. Men and women differ, in this view, in domains in which they have faced different adaptive problems over human evolutionary history. In all other domains, the sexes are predicted to be psychologically similar. Evolutionary psychology jettisons the false dichotomy between biology and environment and provides a powerful metatheory of why sex differences exist, where they exist, and in what contexts they are expressed (D. M. Buss, 1995).",
"title": ""
},
{
"docid": "46fc7691db8cd4414c810be22818734f",
"text": "The Internet of Things (IoT) realizes a vision where billions of interconnected devices are deployed just about everywhere, from inside our bodies to the most remote areas of the globe. As the IoT will soon pervade every aspect of our lives and will be accessible from anywhere, addressing critical IoT security threats is now more important than ever. Traditional approaches where security is applied as an afterthought and as a “patch” against known attacks are insufficient. IoT challenges require a new secure-by-design vision, where threats are addressed proactively and IoT devices learn to dynamically adapt to different threats. In this paper, we first provide a taxonomy and survey the state of the art in IoT security research, and offer a roadmap of concrete research challenges to address existing and next-generation IoT security threats.",
"title": ""
},
{
"docid": "ef09bc08cc8e94275e652e818a0af97f",
"text": "The biosynthetic pathway of L-tartaric acid, the form most commonly encountered in nature, and its catabolic ties to vitamin C, remain a challenge to plant scientists. Vitamin C and L-tartaric acid are plant-derived metabolites with intrinsic human value. In contrast to most fruits during development, grapes accumulate L-tartaric acid, which remains within the berry throughout ripening. Berry taste and the organoleptic properties and aging potential of wines are intimately linked to levels of L-tartaric acid present in the fruit, and those added during vinification. Elucidation of the reactions relating L-tartaric acid to vitamin C catabolism in the Vitaceae showed that they proceed via the oxidation of L-idonic acid, the proposed rate-limiting step in the pathway. Here we report the use of transcript and metabolite profiling to identify candidate cDNAs from genes expressed at developmental times and in tissues appropriate for L-tartaric acid biosynthesis in grape berries. Enzymological analyses of one candidate confirmed its activity in the proposed rate-limiting step of the direct pathway from vitamin C to tartaric acid in higher plants. Surveying organic acid content in Vitis and related genera, we have identified a non-tartrate-forming species in which this gene is deleted. This species accumulates in excess of three times the levels of vitamin C than comparably ripe berries of tartrate-accumulating species, suggesting that modulation of tartaric acid biosynthesis may provide a rational basis for the production of grapes rich in vitamin C.",
"title": ""
},
{
"docid": "9b470feac9ae4edd11b87921934c9fc2",
"text": "Cutaneous melanoma may in some instances be confused with seborrheic keratosis, which is a very common neoplasia, more often mistaken for actinic keratosis and verruca vulgaris. Melanoma may clinically resemble seborrheic keratosis and should be considered as its possible clinical simulator. We report a case of melanoma with dermatoscopic characteristics of seborrheic keratosis and emphasize the importance of the dermatoscopy algorithm in differentiating between a melanocytic and a non-melanocytic lesion, of the excisional biopsy for the establishment of the diagnosis of cutaneous tumors, and of the histopathologic examination in all surgically removed samples.",
"title": ""
},
{
"docid": "ba2769abc859882f600e64cb14af2ac6",
"text": "OBJECTIVE\nThis study measures and compares the outcome of conservative physical therapy with traction, by using magnetic resonance imaging and clinical parameters in patients presenting with low back pain caused by lumbar disc herniation.\n\n\nMETHODS\nA total of 26 patients with LDH (14F, 12M with mean aged 37 +/- 11) were enrolled in this study and 15 sessions (per day on 3 weeks) of physical therapy were applied. That included hot pack, ultrasound, electrotherapy and lumbar traction. Physical examination of the lumbar spine, severity of pain, sleeping order, patient and physician global assessment with visual analogue scale, functional disability by HAQ, Roland Disability Questionnaire, and Modified Oswestry Disability Questionnaire were assessed at baseline and at 4-6 weeks after treatment. Magnetic resonance imaging examinations were carried out before and 4-6 weeks after the treatment\n\n\nRESULTS\nAll patients completed the therapy session. There were significant reductions in pain, sleeping disturbances, patient and physician global assessment and disability scores, and significant increases in lumbar movements between baseline and follow-up periods. There were significant reductions of size of the herniated mass in five patients, and significant increase in 3 patients on magnetic resonance imaging after treatment, but no differences in other patients.\n\n\nCONCLUSIONS\nThis study showed that conventional physical therapies with lumbar traction were effective in the treatment of patient with subacute LDH. These results suggest that clinical improvement is not correlated with the finding of MRI. Patients with LDH should be monitored clinically (Fig. 3, Ref. 18).",
"title": ""
},
{
"docid": "85c3dc3dae676f0509a99c6d27db8423",
"text": "Swarming, or aggregations of organisms in groups, can be found in nature in many organisms ranging from simple bacteria to mammals. Such behavior can result from several different mechanisms. For example, individuals may respond directly to local physical cues such as concentration of nutrients or distribution of some chemicals as seen in some bacteria and social insects, or they may respond directly to other individuals as seen in fish, birds, and herds of mammals. In this dissertation, we consider models for aggregating and social foraging swarms and perform rigorous stability analysis of emerging collective behavior. Moreover, we consider formation control of a general class of multi-agent systems in the framework of nonlinear output regulation problem with application on formation control of mobile robots. First, an individual-based continuous time model for swarm aggregation in an n-dimensional space is identified and its stability properties are analyzed. The motion of each individual is determined by two factors: (i) attraction to the other individuals on long distances and (ii) repulsion from the other individuals on short distances. It is shown that the individuals (autonomous agents or biological creatures) will form a cohesive swarm in a finite time. Moreover, explicit bounds on the swarm size and time of convergence are derived. Then, the results are generalized to a more general class of attraction/repulsion functions and extended to handle formation stabilization and uniform swarm density. After that, we consider social foraging swarms. We ii assume that the swarm is moving in an environment with an ”attractant/repellent” profile (i.e., a profile of nutrients or toxic substances) which also affects the motion of each individual by an attraction to the more favorable or nutrient rich regions (or repulsion from the unfavorable or toxic regions) of the profile. The stability properties of the collective behavior of the swarm for different profiles are studied and conditions for collective convergence to more favorable regions are provided. Then, we use the ideas for modeling and analyzing the behavior of honey bee clusters and in-transit swarms, a phenomena seen during the reproduction of the bees. After that, we consider one-dimensional asynchronous swarms with time delays. We prove that, despite the asynchronism and time delays in the motion of the individuals, the swarm will converge to a comfortable position with comfortable intermember spacing. Finally, we consider formation control of a multi-agent system with general nonlinear dynamics. It is assumed that the formation is required to follow a virtual leader whose dynamics are generated by an autonomous neutrally stable system. We develop a decentralized control strategy based on the nonlinear output regulation (servomechanism) theory. We illustrate the procedure with application to formation control of mobile robots.",
"title": ""
},
{
"docid": "f9eff7a4652f6242911f41ba180f75ed",
"text": "The last ten years have seen a significant increase in computationally relevant research seeking to build models of narrative and its use. These efforts have focused in and/or drawn from a range of disciplines, including narrative theory Many of these research efforts have been informed by a focus on the development of an explicit model of narrative and its function. Computational approaches from artificial intelligence (AI) are particularly well-suited to such modeling tasks, as they typically involve precise definitions of aspects of some domain of discourse and well-defined algorithms for reasoning over those definitions. In the case of narrative modeling, there is a natural fit with AI techniques. AI approaches often concern themselves with representing and reasoning about some real world domain of discourse – a microworld where inferences must be made in order to draw conclusions about some higher order property of the world or to explain, predict, control or communicate about the microworld's dynamic state. In this regard, the fictional worlds created by storytellers and the ways that we communicate about them suggest promising and immediate analogs for application of existing AI methods. One of the most immediate analogs between AI research and narrative models lies in the area of reasoning about actions and plans. The goals and plans that characters form and act upon within a story are the primary elements of the story's plot. At first glance, story plans have many of the same features as knowledge representations developed by AI researchers to characterize the plans formed by industrial robots operating to assemble automobile parts on a factory floor or by autonomous vehicles traversing unknown physical landscapes. As we will discuss below, planning representations have offered significant promise in modeling plot structure. Equally as significantly, however, is their ability to be used by intelligent algorithms in the automatic creation of plot lines. Just as AI planning systems can produce new plans to achieve an agent's goals in the face of a unanticipated execution context, so too may planning systems work to produce the plans of a collection of characters as they scheme to obtain, thwart, overcome or succeed.",
"title": ""
},
{
"docid": "ca873d33aacb15d97c830a60dba6f7a3",
"text": "Internet of Things (IoT) is extension of current internet to provide communication, connection, and inter-networking between various devices or physical objects also known as “Things.” In this paper we have reported an effective use of IoT for Environmental Condition Monitoring and Controlling in Homes. We also provide fault detection and correction in any devices connected to this system automatically. Home Automation is nothing but automation of regular activities inside the home. Now a day's due to huge advancement in wireless sensor network and other computation technologies, it is possible to provide flexible and low cost home automation system. However there is no any system available in market which provide home automation as well as error detection in the devices efficiently. In this system we use prediction to find out the required solution if any problem occurs in any device connected to the system. To achieve that we are applying Data Mining concept. For efficient data mining we use Naive Bayes Classifier algorithm to find out the best possible solution. This gives a huge upper hand on other available home automation system, and we actually manage to provide a real intelligent system.",
"title": ""
},
{
"docid": "e97c90a7175b07d6c08e7fc53b197c2d",
"text": "Retinal image of surrounding objects varies tremendously due to the changes in position, size, pose, illumination condition, background context, occlusion, noise, and non-rigid deformations. But despite these huge variations, our visual system is able to invariantly recognize any object in just a fraction of a second. To date, various computational models have been proposed to mimic the hierarchical processing gically inspired network architecture and learning rule significantly improves the models' performance when facing challenging invariant object recognition problems. Our model is an asynchronous feedforward spiking neural network. When the network is presented with natural images, the neurons in the entry layers detect edges, and the most activated ones fire first, while neurons in higher layers are equipped with spike timing-dependent plasticity. These neurons progressively become selective to intermediate complexity visual features appropriate for object categorization. The model is evaluated on 3D-Object and ETH-80 datasets which are two benchmarks for invariant object recognition, and is shown to outperform state-of-the-art models, including DeepConvNet and HMAX. This demonstrates its ability to accurately recognize different instances of multiple object classes even under various appearance conditions (different views, scales, tilts, and backgrounds). Several statistical analysis techniques are used to show that our model extracts class specific and highly informative features. & 2016 Elsevier B.V. All rights reserved.",
"title": ""
},
{
"docid": "020e83789704528e5842b8cac5bf89b6",
"text": "The present study experimentally investigated the effect of Facebook usage on women's mood and body image, whether these effects differ from an online fashion magazine, and whether appearance comparison tendency moderates any of these effects. Female participants (N=112) were randomly assigned to spend 10min browsing their Facebook account, a magazine website, or an appearance-neutral control website before completing state measures of mood, body dissatisfaction, and appearance discrepancies (weight-related, and face, hair, and skin-related). Participants also completed a trait measure of appearance comparison tendency. Participants who spent time on Facebook reported being in a more negative mood than those who spent time on the control website. Furthermore, women high in appearance comparison tendency reported more facial, hair, and skin-related discrepancies after Facebook exposure than exposure to the control website. Given its popularity, more research is needed to better understand the impact that Facebook has on appearance concerns.",
"title": ""
}
] | scidocsrr |
1917d85db710a1b01c7d7321afde3004 | Learning to Rank for Question-Oriented Software Text Retrieval (T) | [
{
"docid": "4a073f86a8d814bdc1b645ca7a235b9d",
"text": "To improve software productivity, when constructing new software systems, programmers often reuse existing libraries or frameworks by invoking methods provided in their APIs. Those API methods, however, are often complex and not well documented. To get familiar with how those API methods are used, programmers often exploit a source code search tool to search for code snippets that use the API methods of interest. However, the returned code snippets are often large in number, and the huge number of snippets places a barrier for programmers to locate useful ones. In order to help programmers overcome this barrier, we have developed an API usage mining framework and its supporting tool called MAPO (Mining API usage Pattern from Open source repositories) for mining API usage patterns automatically. A mined pattern describes that in a certain usage scenario, some API methods are frequently called together and their usages follow some sequential rules. MAPO further recommends the mined API usage patterns and their associated code snippets upon programmers’ requests. Our experimental results show that with these patterns MAPO helps programmers locate useful code snippets more effectively than two state-of-the-art code search tools. To investigate whether MAPO can assist programmers in programming tasks, we further conducted an empirical study. The results show that using MAPO, programmers produce code with fewer bugs when facing relatively complex API usages, comparing with using the two state-of-the-art code search tools.",
"title": ""
}
] | [
{
"docid": "202439978e4bece800aa42b1fea99d7b",
"text": "Although they are primitive vertebrates, zebrafish (Danio rerio) and medaka (Oryzias latipes) have surpassed other animals as the most used model organisms based on their many advantages. Studies on gene expression patterns, regulatory cis-elements identification, and gene functions can be facilitated by using zebrafish embryos via a number of techniques, including transgenesis, in vivo transient assay, overexpression by injection of mRNAs, knockdown by injection of morpholino oligonucleotides, knockout and gene editing by CRISPR/Cas9 system and mutagenesis. In addition, transgenic lines of model fish harboring a tissue-specific reporter have become a powerful tool for the study of biological sciences, since it is possible to visualize the dynamic expression of a specific gene in the transparent embryos. In particular, some transgenic fish lines and mutants display defective phenotypes similar to those of human diseases. Therefore, a wide variety of fish model not only sheds light on the molecular mechanisms underlying disease pathogenesis in vivo but also provides a living platform for high-throughput screening of drug candidates. Interestingly, transgenic model fish lines can also be applied as biosensors to detect environmental pollutants, and even as pet fish to display beautiful fluorescent colors. Therefore, transgenic model fish possess a broad spectrum of applications in modern biomedical research, as exampled in the following review.",
"title": ""
},
{
"docid": "23052a651887a5a73831b3c8a6571ba0",
"text": "This paper presentes a novel algorithm for the voxelization of surface models of arbitrary topology. Our algorithm uses the depth and stencil buffers, available in most commercial graphics hardware, to achieve high performance. It is suitable for both polygonal meshes and parametric surfaces. Experiments highlight the advantages and limitations of our approach.",
"title": ""
},
{
"docid": "6a3fe7de176dcca7da54d927d8901e38",
"text": "We demonstrate how two Novint Falcons, inexpensive commercially available haptic devices, can be modified to a create a reconfigurable five-degreeof-freedom (5-DOF) haptic device for less than $500 (including the two Falcons). The device is intended as an educational tool to allow a broader range of students to experience force and torque feedback, rather than the 3-DOF force feedback typical of inexpensive devices. We also explain how to implement a 5-DOF force/torque control system with gravity compensation.",
"title": ""
},
{
"docid": "2ef7d43787eb70405e41f3551b8de510",
"text": "Generating structural query language (SQL) queries from natural language is a long-standing open problem. Answering a natural language question about a database table requires modeling complex interactions between the columns of the table and the question. In this paper, we apply the synthesizing approach to solve this problem. Based on the structure of SQL queries, we break down the model to three sub-modules and design specific deep neural networks for each of them. Taking inspiration from the similar machine reading task, we employ the bidirectional attention mechanisms and character-level embedding with convolutional neural networks (CNNs) to improve the result. Experimental evaluations show that our model achieves the state-of-the-art results in WikiSQL dataset.",
"title": ""
},
{
"docid": "ac83eb6e122747921eabd0fd53aa0734",
"text": "Perceiving the surrounding environment in terms of objects is useful for any general purpose intelligent agent. In this paper, we investigate a fundamental mechanism making object perception possible, namely the identification of spatio-temporally invariant structures in the sensorimotor experience of an agent. We take inspiration from the Sensorimotor Contingencies Theory to define a computational model of this mechanism through a sensorimotor, unsupervised and predictive approach. Our model is based on processing the unsupervised interaction of an artificial agent with its environment. We show how spatio-temporally invariant structures in the environment induce regularities in the sensorimotor experience of an agent, and how this agent, while building a predictive model of its sensorimotor experience, can capture them as densely connected subgraphs in a graph of sensory states connected by motor commands. Our approach is focused on elementary mechanisms, and is illustrated with a set of simple experiments in which an agent interacts with an environment. We show how the agent can build an internal model of moving but spatio-temporally invariant structures by performing a Spectral Clustering of the graph modeling its overall sensorimotor experiences. We systematically examine properties of the model, shedding light more globally on the specificities of the paradigm with respect to methods based on the supervised processing of collections of static images. ∗nicolas.lehir@softbankrorobtics.com †Olivier.Sigaud@upmc.fr ‡alaflaquiere@softbankrobotics.com 1 ar X iv :1 81 0. 05 05 7v 1 [ cs .A I] 1 1 O ct 2 01 8",
"title": ""
},
{
"docid": "13c1739807e32237df73d5060821f61a",
"text": "In this work we tackle the problem of link prediction in co-authoring network. We apply a topological dyadic supervised machine learning approach for that purpose. A co-authoring network is actually obtained by the projection of a two-mode graph (an authoring graph linking authors to publications they have signed) over the authors set. We show that link prediction performances can be substantially enhanced by analyzing not only the co-authoring network, but also the dual graph obtained by projecting the original two-mode network over the set of publications.",
"title": ""
},
{
"docid": "3d89b509ab12e41eb54b7b6800e5c785",
"text": "We have constructed a new “Who-did-What” dataset of over 200,000 fill-in-the-gap (cloze) multiple choice reading comprehension problems constructed from the LDC English Gigaword newswire corpus. The WDW dataset has a variety of novel features. First, in contrast with the CNN and Daily Mail datasets (Hermann et al., 2015) we avoid using article summaries for question formation. Instead, each problem is formed from two independent articles — an article given as the passage to be read and a separate article on the same events used to form the question. Second, we avoid anonymization — each choice is a person named entity. Third, the problems have been filtered to remove a fraction that are easily solved by simple baselines, while remaining 84% solvable by humans. We report performance benchmarks of standard systems and propose the WDW dataset as a challenge task for the community.1",
"title": ""
},
{
"docid": "6ef52ad99498d944e9479252d22be9c8",
"text": "The problem of detecting rectangular structures in images arises in many applications, from building extraction in aerial images to particle detection in cryo-electron microscopy. This paper proposes a new technique for rectangle detection using a windowed Hough transform. Every pixel of the image is scanned, and a sliding window is used to compute the Hough transform of small regions of the image. Peaks of the Hough image (which correspond to line segments) are then extracted, and a rectangle is detected when four extracted peaks satisfy certain geometric conditions. Experimental results indicate that the proposed technique produced promising results for both synthetic and natural images.",
"title": ""
},
{
"docid": "a059fcf7c49db87bfbd3a7f452f0288d",
"text": "This paper investigates the physical layer security of non-orthogonal multiple access (NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and multiple-antenna aided transmission scenarios are considered, where the base station (BS) communicates with randomly distributed NOMA users. In the single-antenna scenario, we adopt a protected zone around the BS to establish an eavesdropper-exclusion area with the aid of careful channel ordering of the NOMA users. In the multiple-antenna scenario, artificial noise is generated at the BS for further improving the security of a beamforming-aided system. In order to characterize the secrecy performance, we derive new exact expressions of the security outage probability for both single-antenna and multiple-antenna aided scenarios. For the single-antenna scenario, we perform secrecy diversity order analysis of the selected user pair. The analytical results derived demonstrate that the secrecy diversity order is determined by the specific user having the worse channel condition among the selected user pair. For the multiple-antenna scenario, we derive the asymptotic secrecy outage probability, when the number of transmit antennas tends to infinity. Monte Carlo simulations are provided for verifying the analytical results derived and to show that: 1) the security performance of the NOMA networks can be improved by invoking the protected zone and by generating artificial noise at the BS and 2) the asymptotic secrecy outage probability is close to the exact secrecy outage probability.",
"title": ""
},
{
"docid": "e0632c86f648a36f083b56d534746c02",
"text": "At present, the brain is viewed primarily as a biological computer. But, crucially, the plasticity of the brain’s structure leads it to vary in functionally significant ways across individuals. Understanding the brain necessitates an understanding of the range of such variation. For example, the number of neurons in the brain and its finer structures impose inherent limitations on the functionality it can realize. The relationship between such quantitative limits on the resources available and the computations that are feasible with such resources is the subject of study in computational complexity theory. Computational complexity is a potentially useful conceptual framework because it enables the meaningful study of the family of possible structures as a whole—the study of “the brain,” as opposed to some particular brain. The language of computational complexity also provides a means of formally capturing capabilities of the brain, which may otherwise be philosophically thorny.",
"title": ""
},
{
"docid": "17ce5ed39aadd1d1628e020beb6cacfe",
"text": "Rheumatoid arthritis (RA) has been described in the medical literature for over two hundred years, but its etiology remains unknown. RA displays phenotypic heterogeneity, and it is a relatively prevalent clinical entity: it affects approximately 1% of the population, resulting in enormous pathologic sequelae. Earlier studies targeting the cause(s) of RA suggested potential infectious involvement, whereas more recent reports have focused on a genetic origin of the disease. However, neither infection nor genetics, nor any other single factor is currently accepted as causative of RA. In this article we review studies relating to the etiology of RA, and those of several related matters, and we conclude that the literature indeed does provide insight into the causes underlying the initiation of RA pathogenesis. Briefly, given the remarkable phenotypic variation of RA, especially in its early stages, as well as a number of other characteristics of the condition, we contend that RA is not a discrete clinical entity with a single etiological source. Rather, we argue that it represents a common clinical endpoint for various starting points, each of which is largely guided by as yet poorly understood aspects of the genetic background of the affected individual. Adoption of this alternative view of the origin of RA will have significant consequences for future research and for development of new therapeutic interventions for this burdensome condition.",
"title": ""
},
{
"docid": "37acab219facfa8d107dbd292d879f9c",
"text": "We present the novel grammar language CGA++ for the procedural modeling of architecture. While existing grammar-based approaches can produce stunning results, they are limited in what modeling scenarios can be realized. In particular, many context-sensitive tasks are precluded, not least because within the rules specifying how one shape is refined, the necessary knowledge about other shapes is not available. Transcending such limitations, CGA++ significantly raises the expressiveness and offers a generic and integrated solution for many advanced procedural modeling problems. Pivotally, CGA++ grants first-class citizenship to shapes, enabling, within a grammar, directly accessing shapes and shape trees, operations on multiple shapes, rewriting shape (sub)trees, and spawning new trees (e.g., to explore multiple alternatives). The new linguistic device of events allows coordination across multiple shapes, featuring powerful dynamic grouping and synchronization. Various examples illustrate CGA++, demonstrating solutions to previously infeasible modeling challenges.",
"title": ""
},
{
"docid": "93d80e2015de513a689a41f33d74c45d",
"text": "A horizontally polarized omnidirectional antenna with enhanced impedance bandwidth is presented in this letter. The proposed antenna consists of a feeding network, four printed dipole elements with etched slots, parasitic strips, and director elements. Four identically curved and printed dipole elements are placed in a square array and fed by a feeding network with uniform magnitude and phase; thus, the proposed antenna can achieve an omnidirectional radiation. To enhance the impedance bandwidth, parasitic strips and etched slots are introduced to produce additional lower and upper resonant frequencies, respectively. By utilizing four director elements, the gain variation in the horizontal plane can be improved, especially for the upper frequency band. With the structure, a reduced size of <inline-formula> <tex-math notation=\"LaTeX\">$0.63\\,\\lambda _{L} \\times 0.63\\,\\lambda _{L} \\times 0.01\\,\\lambda _{L}$</tex-math> </inline-formula> (<inline-formula><tex-math notation=\"LaTeX\">$\\lambda _{L}$</tex-math></inline-formula> is the free-space wavelength at the lowest frequency) is obtained. The proposed antenna is designed and fabricated. Measurement results reveal that the proposed antenna can provide an impedance bandwidth of 84.2% (1.58–3.88 GHz). Additionally, the gain variation in the horizontal plane is less than 1.5 dB over the frequency band 1.58–3.50 GHz, and increased to 2.2 dB at 3.80 GHz. Within the impedance bandwidth, the cross-polarization level is less than –23 dB in the horizontal plane.",
"title": ""
},
{
"docid": "ae5c21fa28694728aca532a582f612c3",
"text": "The purpose of this study was to apply cross-education during 4 wk of unilateral limb immobilization using a shoulder sling and swathe to investigate the effects on muscle strength, muscle size, and muscle activation. Twenty-five right-handed participants were assigned to one of three groups as follows: the Immob + Train group wore a sling and swathe and strength trained (n = 8), the Immob group wore a sling and swathe and did not strength train (n = 8), and the Control group received no treatment (n = 9). Immobilization was applied to the nondominant (left) arm. Strength training consisted of maximal isometric elbow flexion and extension of the dominant (right) arm 3 days/wk. Torque (dynamometer), muscle thickness (ultrasound), maximal voluntary activation (interpolated twitch), and electromyography (EMG) were measured. The change in right biceps and triceps brachii muscle thickness [7.0 ± 1.9 and 7.1 ± 2.2% (SE), respectively] was greater for Immob + Train than Immob (0.4 ± 1.2 and -1.9 ± 1.7%) and Control (0.8 ± 0.5 and 0.0 ± 1.1%, P < 0.05). Left biceps and triceps brachii muscle thickness for Immob + Train (2.2 ± 0.7 and 3.4 ± 2.1%, respectively) was significantly different from Immob (-2.8 ± 1.1 and -5.2 ± 2.7%, respectively, P < 0.05). Right elbow flexion strength for Immob + Train (18.9 ± 5.5%) was significantly different from Immob (-1.6 ± 4.0%, P < 0.05). Right and left elbow extension strength for Immob + Train (68.1 ± 25.9 and 32.2 ± 9.0%, respectively) was significantly different from the respective limb of Immob (1.3 ± 7.7 and -6.1 ± 7.8%) and Control (4.7 ± 4.7 and -0.2 ± 4.5%, P < 0.05). Immobilization in a sling and swathe decreased strength and muscle size but had no effect on maximal voluntary activation or EMG. The cross-education effect on the immobilized limb was greater after elbow extension training. This study suggests that strength training the nonimmobilized limb benefits the immobilized limb for muscle size and strength.",
"title": ""
},
{
"docid": "b28d7cad0f3b41c880d24ef532336343",
"text": "Clickstream data is ubiquitous in today's web-connected world. Such data displays the salient features of big data, that is, volume, velocity and variety. As with any big data, visualizations can play a central role in making sense and generating hypotheses from such data. In this paper, we present a systematic approach of visualizing clickstream data. There are three basic questions we aim to address. First, we explore the inter-dependence between the large number of dimensions that are measured in clickstream data. Next, we analyze spatial aspects of data collected in web-analytics. Finally, the web designers might be interested in getting a deeper understanding of the website's topography and how browsers are interacting with it. Our approach is designed for business analysts, web designers and marketers; and helps them draw actionable insights in the management and refinement of large websites.",
"title": ""
},
{
"docid": "5158b5da8a561799402cb1ef3baa3390",
"text": "We study the segmental recurrent neural network for end-to-end acoustic modelling. This model connects the segmental conditional random field (CRF) with a recurrent neural network (RNN) used for feature extraction. Compared to most previous CRF-based acoustic models, it does not rely on an external system to provide features or segmentation boundaries. Instead, this model marginalises out all the possible segmentations, and features are extracted from the RNN trained together with the segmental CRF. In essence, this model is self-contained and can be trained end-to-end. In this paper, we discuss practical training and decoding issues as well as the method to speed up the training in the context of speech recognition. We performed experiments on the TIMIT dataset. We achieved 17.3% phone error rate (PER) from the first-pass decoding — the best reported result using CRFs, despite the fact that we only used a zeroth-order CRF and without using any language model.",
"title": ""
},
{
"docid": "9ca4543f4943a1679b639caa186f1650",
"text": "SHAPE ADJECTIVE COLOR DISEASE TEXT NARRATIVE* GENERAL-INFO DEFINITION USE EXPRESSION-ORIGIN HISTORY WHY-FAMOUS BIO ANTECEDENT INFLUENCE CONSEQUENT CAUSE-EFFECT METHOD-MEANS CIRCUMSTANCE-MEANS REASON EVALUATION PRO-CON CONTRAST RATING COUNSEL-ADVICE To create the QA Typology, we analyzed 17,384 questions and their answers (downloaded from answers.com); see (Gerber, 2001). The Typology contains 94 nodes, of which 47 are leaf nodes; a section of it appears in Figure 2. Each Typology node has been annotated with examples and typical patterns of expression of both Question and Answer, as indicated in Figure 3 for Proper-Person. Question examples Question templates Who was Johnny Mathis' high school track coach? who be <entity>'s <role> Who was Lincoln's Secretary of State? Who was President of Turkmenistan in 1994? who be <role> of <entity> Who is the composer of Eugene Onegin? Who is the CEO of General Electric? Actual answers Answer templates Lou Vasquez, track coach of...and Johnny Mathis <person>, <role> of <entity> Signed Saparmurad Turkmenbachy [Niyazov], <person> <role-title*> of <entity> president of Turkmenistan ...Turkmenistan’s President Saparmurad Niyazov... <entity>’s <role> <person> ...in Tchaikovsky's Eugene Onegin... <person>'s <entity> Mr. Jack Welch, GE chairman... <role-title> <person> ... <entity> <role> ...Chairman John Welch said ...GE's <subject>|<psv object> of related role-verb Figure 3. Portion of QA Typology node annotations for Proper-Person.",
"title": ""
},
{
"docid": "cac9a8490e3d33b49a08fe14684bf256",
"text": "A hand-held probe combining high-resolution reflectance confocal microscopy (RCM) and optical coherence tomography (OCT) within the same optical path was developed and preliminarily tested for assessing skin burns. The preliminary results show that these two optical technologies have complementary capabilities that can help the clinician to more rapidly identify the dermal-epidermal junction, determine the integrity of the epidermal layer, and determine tissue perfusion status.",
"title": ""
},
{
"docid": "762d6e9a8f0061e3a2f1b1c0eeba2802",
"text": "A new prior is proposed for representation learning, which can be combined with other priors in order to help disentangling abstract factors from each other. It is inspired by the phenomenon of consciousness seen as the formation of a low-dimensional combination of a few concepts constituting a conscious thought, i.e., consciousness as awareness at a particular time instant. This provides a powerful constraint on the representation in that such low-dimensional thought vectors can correspond to statements about reality which are true, highly probable, or very useful for taking decisions. The fact that a few elements of the current state can be combined into such a predictive or useful statement is a strong constraint and deviates considerably from the maximum likelihood approaches to modelling data and how states unfold in the future based on an agent's actions. Instead of making predictions in the sensory (e.g. pixel) space, the consciousness prior allows the agent to make predictions in the abstract space, with only a few dimensions of that space being involved in each of these predictions. The consciousness prior also makes it natural to map conscious states to natural language utterances or to express classical AI knowledge in the form of facts and rules, although the conscious states may be richer than what can be expressed easily in the form of a sentence, a fact or a rule.",
"title": ""
},
{
"docid": "6414893702d8f332f5a7767fd3811395",
"text": "Differential privacy has become the dominant standard in the research community for strong privacy protection. There has been a flood of research into query answering algorithms that meet this standard. Algorithms are becoming increasingly complex, and in particular, the performance of many emerging algorithms is data dependent, meaning the distribution of the noise added to query answers may change depending on the input data. Theoretical analysis typically only considers the worst case, making empirical study of average case performance increasingly important. In this paper we propose a set of evaluation principles which we argue are essential for sound evaluation. Based on these principles we propose DPBench, a novel evaluation framework for standardized evaluation of privacy algorithms. We then apply our benchmark to evaluate algorithms for answering 1- and 2-dimensional range queries. The result is a thorough empirical study of 15 published algorithms on a total of 27 datasets that offers new insights into algorithm behavior---in particular the influence of dataset scale and shape---and a more complete characterization of the state of the art. Our methodology is able to resolve inconsistencies in prior empirical studies and place algorithm performance in context through comparison to simple baselines. Finally, we pose open research questions which we hope will guide future algorithm design.",
"title": ""
}
] | scidocsrr |
da2f9198e90c570054ec27dc416c0911 | The State of the Art in Semantic Representation | [
{
"docid": "e36d1db375d661820be1da3307b99fbb",
"text": "The goal of this thesis is to establish a system for the automatic syntactic analysis of real-world text. Syntactic analysis in this thesis denotes computation of in-depth syntactic structures that are grounded in syntactic theories like Head-Driven Phrase Structure Grammar (HPSG). Since syntactic structures provide essential components for computing meanings of natural language sentences, the establishment of syntactic analyzers is a starting point for intelligent natural language processing. Syntactic analyzers are strongly demanded in natural language processing applications, including question answering, dialog systems, and text mining. To date, however, few syntactic analyzers can process naturally occurring sentences such as newswire texts. This task involves two significant obstacles. One is the scalability of a grammar to analyze realworld texts. Grammar theories that successfully worked in a toy system could not be applied to the analysis of real-world sentences. Despite intensive research on syntactic analysis, development of wide-coverage grammars is almost impractical. This is due to the inherent difficulty in scaling up a grammar; as a grammar becomes larger, the maintenance of the consistency of the grammar is more difficult. Modern syntactic theories, which are called lexicalized grammars, explain diverse syntactic structures with various combinations of lexical entries to express word-specific constraints and linguistic principles to represent generic syntactic regularities. However, grammar writers cannot simulate in their mind all possible combinations of lexical entries and linguistic principles. Notably, a number of lexical entries are required to treat real-world sentences, and the consistent expansion of lexical entries creates a bottleneck in the scaling up of lexicalized grammars. The problem is further deteriorated by the complicated data structures required in linguistic theories to express in-depth syntactic regularity. The first proposal of this thesis is a new methodology for the development of lexicalized grammars. The method is corpus-oriented, in the sense that the objective of the grammar development is the construction of an annotated corpus, i.e., a treebank, rather than a lexicon. This methodology supports an inexpensive development of lexicalized grammars owing to the systematic control of grammar inconsistencies and the reuse of existing linguistic resources. First, grammar developers define linguistic principles that conform to a target syntactic theory, i.e., HPSG in our case. Next, existing linguistic resources, such as Penn Treebank, are converted into an HPSG treebank. The major work of grammar developers is to maintain the conversion process with the help of consistency checking by principles. That is, because conflicts in a grammar are automatically detected as violations of principle applications to a treebank, grammar writers can easily identify sources of inconsistencies. When we have a sufficient treebank of HPSG, a lexicon is collected from terminal nodes of HPSG syntactic structures in the treebank. Lexicon collection is completely deterministic; that is, treebank construction theoretically subsumes lexicon development. The other obstacle is the modeling of preference of natural language syntax. Since linguistic research on syntax has focused on structural regularity, modeling of preference was not respected. However, it is indispensable for automatic syntactic analysis because applications usually require disambiguated or ranked parse results. Since probabilistic models attained great success in CFG",
"title": ""
}
] | [
{
"docid": "541da13e7b6ec19b7a2df7d65d910a12",
"text": "Analogues of [Dmt(1)]DALDA (H-Dmt-d-Arg-Phe-Lys-NH2; Dmt=2',6'-dimethyltyrosine), a potent μ opioid agonist peptide with mitochondria-targeted antioxidant activity were prepared by replacing Dmt with various 2',6'-dialkylated Tyr analogues, including 2',4',6'-trimethyltyrosine (Tmt), 2'-ethyl-6'-methyltyrosine (Emt), 2'-isopropyl-6'-methyltyrosine (Imt) and 2',6'-diethyltyrosine (Det). All compounds were selective μ opioid agonists and the Tmt(1)-, Emt(1) and Det(1)-analogues showed subnanomolar μ opioid receptor binding affinities. The Tmt(1)- and Emt(1)-analogues showed improved antioxidant activity compared to the Dmt(1)-parent peptide in the DPPH radical-scavenging capacity assay, and thus are of interest as drug candidates for neuropathic pain treatment.",
"title": ""
},
{
"docid": "e559afd57c31b67f30942a519d079109",
"text": "We show how to use a variational approximation to the logistic function to perform approximate inference in Bayesian networks containing discrete nodes with continuous parents. Essentially, we convert the logistic function to a Gaussian, which facilitates exact inference, and then iteratively adjust the variational parameters to improve the quality of the approximation. We demonstrate experimentally that this approximation is much faster than sampling, but comparable in accuracy. We also introduce a simple new technique for handling evidence, which allows us to handle arbitrary distributionson observed nodes, as well as achieving a significant speedup in networks with discrete variables of large cardinality.",
"title": ""
},
{
"docid": "ac5b052f04f6336891809a441f0d56a1",
"text": "A brain-computer interface (BCI), also referred to as a mind-machine interface (MMI) or a brain-machine interface (BMI), provides a non-muscular channel of communication between the human brain and a computer system. With the advancements in low-cost electronics and computer interface equipment, as well as the need to serve people suffering from disabilities of neuromuscular disorders, a new field of research has emerged by understanding different functions of the brain. The electroencephalogram (EEG) is an electrical activity generated by brain structures and recorded from the scalp surface through electrodes. Researchers primarily rely on EEG to characterise the brain activity, because it can be recorded non-invasively by using portable equipment. The EEG or the brain activity can be used in real time to control external devices via a complete BCI system. A typical BCI scheme generally consists of a data acquisition system, pre-processing of the acquired signals, feature extraction process, classification of the features, post-processing of the classifier output, and finally the control interface and device controller. The post-processed output signals are translated into appropriate commands so as to control output devices, with several applications such as robotic arms, video games, wheelchair etc.",
"title": ""
},
{
"docid": "8ffaf2a272bc7e52baf3443e9fcd136d",
"text": "Maturity models have become a common tool for organisations to assess their capabilities in a variety of domains. However, for fields that have not yet been researched thoroughly, it can be difficult to create and evolve a maturity model that features all the important aspects in that field. It takes time and many iterative improvements for a maturity model to come of age. This is the case for Green ICT maturity models, whose aim is typically to either provide insight on the important aspects an organisation or a researcher should take into account when trying to improve the social or environmental impact of ICT, or to assist in the auditing of such aspects. In fact, when we were commissioned a comprehensive ICT-sustainability auditing for Utrecht University, we not only faced the need of selecting a Green ICT maturity model, but also to ensure that it covered as many organisational aspects as possible, extending the model if needed. This paper reports on the comparison we carried out of several Green ICT maturity models, how we extended our preferred model with needed constructs, and how we applied the resulting model during the ICT-sustainability auditing.",
"title": ""
},
{
"docid": "144bb8e869671843cb5d8053e2ee861d",
"text": "We investigate whether physicians' financial incentives influence health care supply, technology diffusion, and resulting patient outcomes. In 1997, Medicare consolidated the geographic regions across which it adjusts physician payments, generating area-specific price shocks. Areas with higher payment shocks experience significant increases in health care supply. On average, a 2 percent increase in payment rates leads to a 3 percent increase in care provision. Elective procedures such as cataract surgery respond much more strongly than less discretionary services. Non-radiologists expand their provision of MRIs, suggesting effects on technology adoption. We estimate economically small health impacts, albeit with limited precision.",
"title": ""
},
{
"docid": "8c3f7e1facbc208d096725f008faa520",
"text": "When a sensor is located within a metallic housing, conveying data back to a controller or data logger is not trivial. To maintain structural integrity, or simply for ease of installation, it is often not desirable to break the wall of the vessel, preventing any hard-wired solution. The conducting nature of the structure prevents the effective use of radio communications due to skin effect. Applications involving sealed containers also have a requirement for power delivery, as the periodic changing of batteries is impractical. In this paper, a number of systems are presented for through-metal communications and power delivery. A novel noncontact electromagnetic acoustic transducer communication system is demonstrated, which is capable of data rates in excess of 1 Mb/s. Furthermore, a power transfer efficiency of approximately 4% is shown to be achievable through 20-mm-thick stainless steel using inductive coupling. These novel solutions are critically compared to previous systems based on piezoelectric transducers.",
"title": ""
},
{
"docid": "cde6d84d22ca9d8cd851f3067bc9b41e",
"text": "The purpose of the present study was to examine the reciprocal relationships between authenticity and measures of life satisfaction and distress using a 2-wave panel study design. Data were collected from 232 college students attending 2 public universities. Structural equation modeling was used to analyze the data. The results of the cross-lagged panel analysis indicated that after controlling for temporal stability, initial authenticity (Time 1) predicted later distress and life satisfaction (Time 2). Specifically, higher levels of authenticity at Time 1 were associated with increased life satisfaction and decreased distress at Time 2. Neither distress nor life satisfaction at Time 1 significantly predicted authenticity at Time 2. However, the relationship between Time 1 distress and Time 2 authenticity was not significantly different from the relationship between Time 1 authenticity and Time 2 distress. Results are discussed in light of humanistic-existential theories and the empirical research on well-being.",
"title": ""
},
{
"docid": "caa252bbfad7ab5c989ae7687818f8ae",
"text": "Nowadays, GPU accelerators are widely used in areas with large data-parallel computations such as scientific computations or neural networks. Programmers can either write code in low-level CUDA/OpenCL code or use a GPU extension for a high-level programming language for better productivity. Most extensions focus on statically-typed languages, but many programmers prefer dynamically-typed languages due to their simplicity and flexibility. \n This paper shows how programmers can write high-level modular code in Ikra, a Ruby extension for array-based GPU computing. Programmers can compose GPU programs of multiple reusable parallel sections, which are subsequently fused into a small number of GPU kernels. We propose a seamless syntax for separating code regions that extensively use dynamic language features from those that are compiled for efficient execution. Moreover, we propose symbolic execution and a program analysis for kernel fusion to achieve performance that is close to hand-written CUDA code.",
"title": ""
},
{
"docid": "30bf7508827bda15fbe4d456df9bc001",
"text": "Document analysis is an active field of research, which can attain a complete understanding of the semantics of a given document. One example of the document understanding process is enabling a computer to identify the key elements of a comic book story and arrange them according to a predefined domain knowledge. In this study, we propose a knowledge-driven system that can interact with bottom-up and top-down information to progressively understand the content of a document. We model the comic book’s and the image processing domains knowledge for information consistency analysis. In addition, different image processing methods are improved or developed to extract panels, balloons, tails, texts, comic characters and their semantic relations in an unsupervised way.",
"title": ""
},
{
"docid": "3eba9db06070dc27756f56a46f1faa9c",
"text": "Breast cancer is a heterogeneous complex of diseases, a spectrum of many subtypes with distinct biological features that lead to differences in response patterns to various treatment modalities and clinical outcomes. Traditional classification systems regarding biological characteristics may have limitations for patient-tailored treatment strategies. Tumors with similar clinical and pathological presentations may have different behaviors. Analyses of breast cancer with new molecular techniques now hold promise for the development of more accurate tests for the prediction of recurrence. Gene signatures have been developed as predictors of response to therapy and protein gene products that have direct roles in driving the biology and clinical behavior of cancer cells are potential targets for the development of novel therapeutics. The present review summarizes current knowledge in breast cancer molecular biology, focusing on novel prognostic and predictive factors.",
"title": ""
},
{
"docid": "22554a4716f348a6f43299f193d5534f",
"text": "Unsolicited bulk e-mail, or SPAM, is a means to an end. For virtually all such messages, the intent is to attract the recipient into entering a commercial transaction — typically via a linked Web site. While the prodigious infrastructure used to pump out billions of such solicitations is essential, the engine driving this process is ultimately th e “point-of-sale” — the various money-making “scams” that extract value from Internet users. In the hopes of better understanding the business pressures exerted on spammers, this paper focuses squarely on the Internet infrastructure used to host and support such scams. We describe an opportunistic measurement technique called spamscatterthat mines emails in real-time, follows the embedded link structure, and automatically clusters the destination Web sites using image shinglingto capture graphical similarity between rendered sites. We have implemented this approach on a large real-time spam feed (over 1M messages per week) and have identified and analyzed over 2,000 distinct scams on 7,000 distinct servers.",
"title": ""
},
{
"docid": "e700afa9064ef35f7d7de40779326cb0",
"text": "Human activity recognition is important for many applications. This paper describes a human activity recognition framework based on feature selection techniques. The objective is to identify the most important features to recognize human activities. We first design a set of new features (called physical features) based on the physical parameters of human motion to augment the commonly used statistical features. To systematically analyze the impact of the physical features on the performance of the recognition system, a single-layer feature selection framework is developed. Experimental results indicate that physical features are always among the top features selected by different feature selection methods and the recognition accuracy is generally improved to 90%, or 8% better than when only statistical features are used. Moreover, we show that the performance is further improved by 3.8% by extending the single-layer framework to a multi-layer framework which takes advantage of the inherent structure of human activities and performs feature selection and classification in a hierarchical manner.",
"title": ""
},
{
"docid": "af2ef011b7636d12a83003e32755f840",
"text": "This paper deals with the impact of fault prediction techniques on checkpointing strategies. We extend the classical first-order analysis of Young and Daly in the presence of a fault prediction system, characterized by its recall and its precision. In this framework, we provide an optimal algorithm to decide when to take predictions into account, and we derive the optimal value of the checkpointing period. These results allow to analytically assess the key parameters that impact the performance of fault predictors at very large scale. Key-words: Fault-tolerance, checkpointing, prediction, algorithms, model, exascale ∗ LIP, École Normale Supérieure de Lyon, France † University of Tennessee Knoxville, USA ‡ Institut Universitaire de France § INRIA ha l-0 07 88 31 3, v er si on 1 14 F eb 2 01 3 Étude de l’impact de la prédiction de fautes sur les stratégies de protocoles de checkpoint Résumé : Ce travail considère l’impact des techniques de prédiction de fautes sur les stratégies de protocoles de sauvegarde de points de reprise (checkpoints) et de redémarrage. Nous étendons l’analyse classique de Young en présence d’un système de prédiction de fautes, qui est caractérisé par son rappel (taux de pannes prévues sur nombre total de pannes) et par sa précision (taux de vraies pannes parmi le nombre total de pannes annoncées). Dans ce travail, nous avons pu obtenir la valeur optimale de la période de checkpoint (minimisant ainsi le gaspillage de l’utilisation des ressources dû au coût de prise de ces points de sauvegarde) dans différents scénarios. Ce papier pose les fondations théoriques pour de futures expériences et une validation du modèle. Mots-clés : Tolérance aux pannes, checkpoint, prédiction, algorithmes, modèle, exascale ha l-0 07 88 31 3, v er si on 1 14 F eb 2 01 3 Checkpointing algorithms and fault prediction 3",
"title": ""
},
{
"docid": "49bd841f94b209e7d12bb858a39edb8c",
"text": "Convolutional Neural Networks (CNNs) have become the default choice for processing visual information, and the design complexity of CNNs has been steadily increasing to improve accuracy. To cope with the massive amount of computation needed for such complex CNNs, the latest solutions utilize blocking of an image over the available dimensions (e.g., horizontal, vertical, channel, and kernel) and batching of multiple input images to improve data reuse in the memory hierarchy. While there has been a large collection of works on maximizing data reuse, only a few studies have focused on the memory bottleneck problem caused by limited bandwidth. Bandwidth bottleneck can easily occur in CNN acceleration as CNN layers have different sizes with varying computation needs and as batching is typically performed over each layer of CNN for an ideal data reuse. In this case, the data transfer demand for a layer can be relatively low or high compared to the computation requirement of the layer, and therefore temporal fluctuations in memory access can be induced eventually causing bandwidth problems. In this paper, we first show that there exists a high degree of fluctuation in memory access to computation ratio depending on CNN layers and functions in the layer being processed by the compute units (cores), where the compute units are tightly synchronized to maximize data reuse. Then we propose a strategy of partitioning the compute units where the cores within each partition process a batch of input data in a synchronous manner to maximize data reuse but different partitions run asynchronously. Because the partitions stay asynchronous and typically process different CNN layers at any given moment, the memory access traffic sizes of the partitions become statistically shuffled. Thus, the partitioning of compute units and asynchronous use of them make the total memory access traffic size be smoothened over time, and the degree of partitioning determines a tradeoff between data reuse efficiency and memory bandwidth utilization efficiency. We call this smoothing statistical memory traffic shaping, and we show that it can lead to 8.0 percent of performance gain on a commercial 64-core processor when running ResNet-50.",
"title": ""
},
{
"docid": "10fd41c0ff246545ceab663b9d9b3853",
"text": "Because structural equation modeling (SEM) has become a very popular data-analytic technique, it is important for clinical scientists to have a balanced perception of its strengths and limitations. We review several strengths of SEM, with a particular focus on recent innovations (e.g., latent growth modeling, multilevel SEM models, and approaches for dealing with missing data and with violations of normality assumptions) that underscore how SEM has become a broad data-analytic framework with flexible and unique capabilities. We also consider several limitations of SEM and some misconceptions that it tends to elicit. Major themes emphasized are the problem of omitted variables, the importance of lower-order model components, potential limitations of models judged to be well fitting, the inaccuracy of some commonly used rules of thumb, and the importance of study design. Throughout, we offer recommendations for the conduct of SEM analyses and the reporting of results.",
"title": ""
},
{
"docid": "fa5c27d91feb3b392e2dba2b2121e184",
"text": "Planned experiments are the gold standard in reliably comparing the causal effect of switching from a baseline policy to a new policy. One critical shortcoming of classical experimental methods, however, is that they typically do not take into account the dynamic nature of response to policy changes. For instance, in an experiment where we seek to understand the effects of a new ad pricing policy on auction revenue, agents may adapt their bidding in response to the experimental pricing changes. Thus, causal effects of the new pricing policy after such adaptation period, the long-term causal effects, are not captured by the classical methodology even though they clearly are more indicative of the value of the new policy. Here, we formalize a framework to define and estimate long-term causal effects of policy changes in multiagent economies. Central to our approach is behavioral game theory, which we leverage to formulate the ignorability assumptions that are necessary for causal inference. Under such assumptions we estimate long-term causal effects through a latent space approach, where a behavioral model of how agents act conditional on their latent behaviors is combined with a temporal model of how behaviors evolve over time.",
"title": ""
},
{
"docid": "48c78545d402b5eed80e705feb45f8f2",
"text": "With advances in data collection technologies, tensor data is assuming increasing prominence in many applications and the problem of supervised tensor learning has emerged as a topic of critical significance in the data mining and machine learning community. Conventional methods for supervised tensor learning mainly focus on learning kernels by flattening the tensor into vectors or matrices, however structural information within the tensors will be lost. In this paper, we introduce a new scheme to design structure-preserving kernels for supervised tensor learning. Specifically, we demonstrate how to leverage the naturally available structure within the tensorial representation to encode prior knowledge in the kernel. We proposed a tensor kernel that can preserve tensor structures based upon dual-tensorial mapping. The dual-tensorial mapping function can map each tensor instance in the input space to another tensor in the feature space while preserving the tensorial structure. Theoretically, our approach is an extension of the conventional kernels in the vector space to tensor space. We applied our novel kernel in conjunction with SVM to real-world tensor classification problems including brain fMRI classification for three different diseases (i.e., Alzheimer's disease, ADHD and brain damage by HIV). Extensive empirical studies demonstrate that our proposed approach can effectively boost tensor classification performances, particularly with small sample sizes.",
"title": ""
},
{
"docid": "390f157bcb847d39dd17ac90bd122e82",
"text": "This paper proposes a moving object detection algorithm which can handle videos taken by a moving camera in the presence of pronounced parallax. The paper considers the idea that objects in a image can be considered to be spatially distributed across multiple planes, the movement of each of which can be estimated using a Visual Odometry (VO) algorithm. For each plane, a Homography matrix between consecutive frames is calculated to facilitate motion compensation. The approach also identifies regions where parallax is pronounced and where the most recent data are then assumed to provide the background. Moving objects can then be extracted by an existing background subtraction algorithm. Since the camera states are known (from the VO), the detections on the image can be projected to a global space and tracked using a nearly constant velocity model. This approach is evaluated using a simulated video of a city and real video from an outdoor benchmark.",
"title": ""
},
{
"docid": "78ced4f3e99c5abc1a3f5e81fbc63106",
"text": "This paper presents a high performance vision-based system with a single static camera for traffic surveillance, for moving vehicle detection with occlusion handling, tracking, counting, and One Class Support Vector Machine (OC-SVM) classification. In this approach, moving objects are first segmented from the background using the adaptive Gaussian Mixture Model (GMM). After that, several geometric features are extracted, such as vehicle area, height, width, centroid, and bounding box. As occlusion is present, an algorithm was implemented to reduce it. The tracking is performed with adaptive Kalman filter. Finally, the selected geometric features: estimated area, height, and width are used by different classifiers in order to sort vehicles into three classes: small, midsize, and large. Extensive experimental results in eight real traffic videos with more than 4000 ground truth vehicles have shown that the improved system can run in real time under an occlusion index of 0.312 and classify vehicles with a global detection rate or recall, precision, and F-measure of up to 98.190%, and an F-measure of up to 99.051% for midsize vehicles.",
"title": ""
}
] | scidocsrr |
43800ddb4f124a9f1c20037d29855fd0 | Usability measurement for speech systems : SASSI revisited | [
{
"docid": "5750ebcfd885097aeeef66582380c286",
"text": "In the present paper, we investigate the validity and reliability of de-facto evaluation standards, defined for measuring or predicting the quality of the interaction with spoken dialogue systems. Two experiments have been carried out with a dialogue system for controlling domestic devices. During these experiments, subjective judgments of quality have been collected by two questionnaire methods (ITU-T Rec. P.851 and SASSI), and parameters describing the interaction have been logged and annotated. Both metrics served the derivation of prediction models according to the PARADISE approach. Although the limited database allows only tentative conclusions to be drawn, the results suggest that both questionnaire methods provide valid measurements of a large number of different quality aspects; most of the perceptive dimensions underlying the subjective judgments can also be measured with a high reliability. The extracted parameters mainly describe quality aspects which are directly linked to the system, environmental and task characteristics. Used as an input to prediction models, the parameters provide helpful information for system design and optimization, but not general predictions of system usability and acceptability. 2005 Elsevier Ltd. All rights reserved.",
"title": ""
}
] | [
{
"docid": "106b7450136b9eafdddbaca5131be2f5",
"text": "This paper describes the main features of a low cost and compact Ka-band satcom terminal being developed within the ESA-project LOCOMO. The terminal will be compliant with all capacities associated with communication on the move supplying higher quality, better performance and faster speed services than the current available solutions in Ku band. The terminal will be based on a dual polarized low profile Ka-band antenna with TX and RX capabilities.",
"title": ""
},
{
"docid": "dd37e97635b0ded2751d64cafcaa1aa4",
"text": "DEVICES, AND STRUCTURES By S.E. Lyshevshi, CRC Press, 2002. This book is the first of the CRC Press “Nanoand Microscience, Engineering, Technology, and Medicine Series,” of which the author of this book is also the editor. This book could be a textbook of a semester course on microelectro mechanical systems (MEMS) and nanoelectromechanical systems (NEMS). The objective is to cover the topic from basic theory to the design and development of structures of practical devices and systems. The idea of MEMS and NEMS is to utilize and further extend the technology of integrated circuits (VLSI) to nanometer structures of mechanical and biological devices for potential applications in molecular biology and medicine. MEMS and NEMS (nanotechnology) are hot topics in the future development of electronics. The interest is not limited to electrical engineers. In fact, many scientists and researchers are interested in developing MEMS and NEMS for biological and medical applications. Thus, this field has attracted researchers from many different fields. Many new books are coming out. This book seems to be the first one aimed to be a textbook for this field, but it is very hard to write a book for readers with such different backgrounds. The author of this book has emphasized computer modeling, mostly due to his research interest in this field. It would be good to provide coverage on biological and medical MEMS, for example, by reporting a few gen or DNA-related cases. Furthermore, the mathematical modeling in term of a large number of nonlinear coupled differential equations, as used in many places in the book, does not appear to have any practical value to the actual physical structures.",
"title": ""
},
{
"docid": "4f3d2b869322125a8fad8a39726c99f8",
"text": "Routing Protocol for Low Power and Lossy Networks (RPL) is the routing protocol for IoT and Wireless Sensor Networks. RPL is a lightweight protocol, having good routing functionality, but has basic security functionality. This may make RPL vulnerable to various attacks. Providing security to IoT networks is challenging, due to their constrained nature and connectivity to the unsecured internet. This survey presents the elaborated review on the security of Routing Protocol for Low Power and Lossy Networks (RPL). This survey is built upon the previous work on RPL security and adapts to the security issues and constraints specific to Internet of Things. An approach to classifying RPL attacks is made based on Confidentiality, Integrity, and Availability. Along with that, we surveyed existing solutions to attacks which are evaluated and given possible solutions (theoretically, from various literature) to the attacks which are not yet evaluated. We further conclude with open research challenges and future work needs to be done in order to secure RPL for Internet of Things (IoT).",
"title": ""
},
{
"docid": "3b0f5d827a58fc6077e7c304cd2d35b8",
"text": "BACKGROUND\nPatients suffering from depression experience significant mood, anxiety, and cognitive symptoms. Currently, most antidepressants work by altering neurotransmitter activity in the brain to improve these symptoms. However, in the last decade, research has revealed an extensive bidirectional communication network between the gastrointestinal tract and the central nervous system, referred to as the \"gut-brain axis.\" Advances in this field have linked psychiatric disorders to changes in the microbiome, making it a potential target for novel antidepressant treatments. The aim of this review is to analyze the current body of research assessing the effects of probiotics, on symptoms of depression in humans.\n\n\nMETHODS\nA systematic search of five databases was performed and study selection was completed using the preferred reporting items for systematic reviews and meta-analyses process.\n\n\nRESULTS\nTen studies met criteria and were analyzed for effects on mood, anxiety, and cognition. Five studies assessed mood symptoms, seven studies assessed anxiety symptoms, and three studies assessed cognition. The majority of the studies found positive results on all measures of depressive symptoms; however, the strain of probiotic, the dosing, and duration of treatment varied widely and no studies assessed sleep.\n\n\nCONCLUSION\nThe evidence for probiotics alleviating depressive symptoms is compelling but additional double-blind randomized control trials in clinical populations are warranted to further assess efficacy.",
"title": ""
},
{
"docid": "81cf3581955988c71b58e7a097ea00bd",
"text": "Graph coloring has been employed since the 1980s to efficiently compute sparse Jacobian and Hessian matrices using either finite differences or automatic differentiation. Several coloring problems occur in this context, depending on whether the matrix is a Jacobian or a Hessian, and on the specifics of the computational techniques employed. We consider eight variant vertex coloring problems here. This article begins with a gentle introduction to the problem of computing a sparse Jacobian, followed by an overview of the historical development of the research area. Then we present a unifying framework for the graph models of the variant matrix estimation problems. The framework is based upon the viewpoint that a partition of a matrix into structurally orthogonal groups of columns corresponds to distance-2 coloring an appropriate graph representation. The unified framework helps integrate earlier work and leads to fresh insights; enables the design of more efficient algorithms for many problems; leads to new algorithms for others; and eases the task of building graph models for new problems. We report computational results on two of the coloring problems to support our claims. Most of the methods for these problems treat a column or a row of a matrix as an atomic entity, and partition the columns or rows (or both). A brief review of methods that do not fit these criteria is provided. We also discuss results in discrete mathematics and theoretical computer science that intersect with the topics considered here.",
"title": ""
},
{
"docid": "b6e62590995a41adb1128703060e0e2d",
"text": "Consumer-grade digital fabrication such as 3D printing is on the rise, and we believe it can be leveraged to great benefit in the arena of special education. Although 3D printing is beginning to infiltrate mainstream education, little to no research has explored 3D printing in the context of students with special support needs. We present a formative study exploring the use of 3D printing at three locations serving populations with varying ability, including individuals with cognitive, motor, and visual impairments. We found that 3D design and printing performs three functions in special education: developing 3D design and printing skills encourages STEM engagement; 3D printing can support the creation of educational aids for providing accessible curriculum content; and 3D printing can be used to create custom adaptive devices. In addition to providing opportunities to students, faculty, and caregivers in their efforts to integrate 3D printing in special education settings, our investigation also revealed several concerns and challenges. We present our investigation at three diverse sites as a case study of 3D printing in the realm of special education, discuss obstacles to efficient 3D printing in this context, and offer suggestions for designers and technologists.",
"title": ""
},
{
"docid": "95633e39a6f1dee70317edfc56e248f4",
"text": "We construct a deep portfolio theory. By building on Markowitz’s classic risk-return trade-off, we develop a self-contained four-step routine of encode, calibrate, validate and verify to formulate an automated and general portfolio selection process. At the heart of our algorithm are deep hierarchical compositions of portfolios constructed in the encoding step. The calibration step then provides multivariate payouts in the form of deep hierarchical portfolios that are designed to target a variety of objective functions. The validate step trades-off the amount of regularization used in the encode and calibrate steps. The verification step uses a cross validation approach to trace out an ex post deep portfolio efficient frontier. We demonstrate all four steps of our portfolio theory numerically.",
"title": ""
},
{
"docid": "25ad61565be2eb2490b3bbc03b196d09",
"text": "To reduce energy costs and emissions of microgrids, daily operation is critical. The problem is to commit and dispatch distributed devices with renewable generation to minimize the total energy and emission cost while meeting the forecasted energy demand. The problem is challenging because of the intermittent nature of renewables. In this paper, photovoltaic (PV) uncertainties are modeled by a Markovian process. For effective coordination, other devices are modeled as Markov processes with states depending on PV states. The entire problem is Markovian. This combinatorial problem is solved using branch-and-cut. Beyond energy and emission costs, to consider capital and maintenance costs in the long run, microgrid design is also essential. The problem is to decide device sizes with given types to minimize the lifetime cost while meeting energy demand. Its complexity increases exponentially with the problem size. To evaluate the lifetime cost including the reliability cost and the classic components such as capital and fuel costs, a linear model is established. By selecting a limited number of possible combinations of device sizes, exhaustive search is used to find the optimized design. The results show that the operation method is efficient in saving cost and scalable, and microgrids have lower lifetime costs than conventional energy systems. Implications for regulators and distribution utilities are also discussed.",
"title": ""
},
{
"docid": "b5a4b5b3e727dde52a9c858d3360a2e7",
"text": "Differential privacy is a recent framework for computation on sensitive data, which has shown considerable promise in the regime of large datasets. Stochastic gradient methods are a popular approach for learning in the data-rich regime because they are computationally tractable and scalable. In this paper, we derive differentially private versions of stochastic gradient descent, and test them empirically. Our results show that standard SGD experiences high variability due to differential privacy, but a moderate increase in the batch size can improve performance significantly.",
"title": ""
},
{
"docid": "924d833125453fa4c525df5f607724e1",
"text": "Strong stubborn sets have recently been analyzed and successfully applied as a pruning technique for planning as heuristic search. Strong stubborn sets are defined declaratively as constraints over operator sets. We show how these constraints can be relaxed to offer more freedom in choosing stubborn sets while maintaining the correctness and optimality of the approach. In general, many operator sets satisfy the definition of stubborn sets. We study different strategies for selecting among these possibilities and show that existing approaches can be considerably improved by rather simple strategies, eliminating most of the overhead of the previous",
"title": ""
},
{
"docid": "ec6d6d6f8dc3db0bdae42ee0173b1639",
"text": "AIMS\nWe investigated the population-level relationship between exposure to brand-specific advertising and brand-specific alcohol use among US youth.\n\n\nMETHODS\nWe conducted an internet survey of a national sample of 1031 youth, ages 13-20, who had consumed alcohol in the past 30 days. We ascertained all of the alcohol brands respondents consumed in the past 30 days, as well as which of 20 popular television shows they had viewed during that time period. Using a negative binomial regression model, we examined the relationship between aggregated brand-specific exposure to alcohol advertising on the 20 television shows [ad stock, measured in gross rating points (GRPs)] and youth brand-consumption prevalence, while controlling for the average price and overall market share of each brand.\n\n\nRESULTS\nBrands with advertising exposure on the 20 television shows had a consumption prevalence about four times higher than brands not advertising on those shows. Brand-level advertising elasticity of demand varied by exposure level, with higher elasticity in the lower exposure range. The estimated advertising elasticity of 0.63 in the lower exposure range indicates that for each 1% increase in advertising exposure, a brand's youth consumption prevalence increases by 0.63%.\n\n\nCONCLUSIONS\nAt the population level, underage youths' exposure to brand-specific advertising was a significant predictor of the consumption prevalence of that brand, independent of each brand's price and overall market share. The non-linearity of the observed relationship suggests that youth advertising exposure may need to be lowered substantially in order to decrease consumption of the most heavily advertised brands.",
"title": ""
},
{
"docid": "6de2b5fa5c8d3db9f9d599b6ebb56782",
"text": "Extreme sensitivity of soil organic carbon (SOC) to climate and land use change warrants further research in different terrestrial ecosystems. The aim of this study was to investigate the link between aggregate and SOC dynamics in a chronosequence of three different land uses of a south Chilean Andisol: a second growth Nothofagus obliqua forest (SGFOR), a grassland (GRASS) and a Pinus radiataplantation (PINUS). Total carbon content of the 0–10 cm soil layer was higher for GRASS (6.7 kg C m −2) than for PINUS (4.3 kg C m−2), while TC content of SGFOR (5.8 kg C m−2) was not significantly different from either one. High extractable oxalate and pyrophosphate Al concentrations (varying from 20.3–24.4 g kg −1, and 3.9– 11.1 g kg−1, respectively) were found in all sites. In this study, SOC and aggregate dynamics were studied using size and density fractionation experiments of the SOC, δ13C and total carbon analysis of the different SOC fractions, and C mineralization experiments. The results showed that electrostatic sorption between and among amorphous Al components and clay minerals is mainly responsible for the formation of metal-humus-clay complexes and the stabilization of soil aggregates. The process of ligand exchange between SOC and Al would be of minor importance resulting in the absence of aggregate hierarchy in this soil type. Whole soil C mineralization rate constants were highest for SGFOR and PINUS, followed by GRASS (respectively 0.495, 0.266 and 0.196 g CO 2-C m−2 d−1 for the top soil layer). In contrast, incubation experiments of isolated macro organic matter fractions gave opposite results, showing that the recalcitrance of the SOC decreased in another order: PINUS>SGFOR>GRASS. We deduced that electrostatic sorption processes and physical protection of SOC in soil aggregates were the main processes determining SOC stabilization. As a result, high aggregate carbon concentraCorrespondence to: D. Huygens (dries.huygens@ugent.be) tions, varying from 148 till 48 g kg −1, were encountered for all land use sites. Al availability and electrostatic charges are dependent on pH, resulting in an important influence of soil pH on aggregate stability. Recalcitrance of the SOC did not appear to largely affect SOC stabilization. Statistical correlations between extractable amorphous Al contents, aggregate stability and C mineralization rate constants were encountered, supporting this hypothesis. Land use changes affected SOC dynamics and aggregate stability by modifying soil pH (and thus electrostatic charges and available Al content), root SOC input and management practices (such as ploughing and accompanying drying of the soil).",
"title": ""
},
{
"docid": "59a4bf897006a0bcadb562ff6446e4e5",
"text": "As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks. A flexible and agile network architecture is required in order to determine and deploy countermeasures quickly. Software-defined networks facilitate timely application of cyber security measures thanks to their programmability. In this work, we propose a novel model for producing software-defined networking-based solutions against cyber threats and configuring networks automatically using risk analysis. We have developed a prototype implementation of the proposed model and demonstrated the applicability of the model. Furthermore, we have identified and presented future research directions in this area.",
"title": ""
},
{
"docid": "db55d7b7e0185d872b27c89c3892a289",
"text": "Bitcoin relies on the Unspent Transaction Outputs (UTXO) set to efficiently verify new generated transactions. Every unspent output, no matter its type, age, value or length is stored in every full node. In this paper we introduce a tool to study and analyze the UTXO set, along with a detailed description of the set format and functionality. Our analysis includes a general view of the set and quantifies the difference between the two existing formats up to the date. We also provide an accurate analysis of the volume of dust and unprofitable outputs included in the set, the distribution of the block height in which the outputs where included, and the use of non-standard outputs.",
"title": ""
},
{
"docid": "b34485c65c4e6780166ea0af5f13c08a",
"text": "The rise of the Internet of Things (IoT) and the recent focus on a gamut of 'Smart City' initiatives world-wide have pushed for new advances in data stream systems to (1) support complex analytics and evolving graph applications as continuous queries, and (2) deliver fast and scalable processing on large data streams. Unfortunately current continuous query languages (CQL) lack the features and constructs needed to support the more advanced applications. For example recursive queries are now part of SQL, Datalog, and other query languages, but they are not supported by most CQLs, a fact that caused a significant loss of expressive power, which is further aggravated by the limitation that only non-blocking queries can be supported. To overcome these limitations we have developed an a dvanced st ream r easo ning system ASTRO that builds on recent advances in supporting aggregates in recursive queries. In this demo, we will briefly elucidate the formal Streamlog semantics, which combined with the Pre-Mappability (PreM) concept, allows the declarative specification of many complex continuous queries, which are then efficiently executed in real-time by the portable ASTRO architecture. Using different case studies, we demonstrate (i) the ease-of-use, (ii) the expressive power and (iii) the robustness of our system, as compared to other state-of-the-art declarative CQL systems.",
"title": ""
},
{
"docid": "afb3098f38a8a3f0daad4d9e0e314ca2",
"text": "We have developed a genetic approach to visualize axons from olfactory sensory neurons expressing a given odorant receptor, as they project to the olfactory bulb. Neurons expressing a specific receptor project to only two topographically fixed loci among the 1800 glomeruli in the mouse olfactory bulb. Our data provide direct support for a model in which a topographic map of receptor activation encodes odor quality in the olfactory bulb. Receptor swap experiments suggest that the olfactory receptor plays an instructive role in the guidance process but cannot be the sole determinant in the establishment of this map. This genetic approach may be more broadly applied to visualize the development and plasticity of projections in the mammalian nervous system.",
"title": ""
},
{
"docid": "b25e35dd703d19860bbbd8f92d80bd26",
"text": "Business analytics (BA) systems are an important strategic investment for many organisations and can potentially contribute significantly to firm performance. Establishing strong BA capabilities is currently one of the major concerns of chief information officers. This research project aims to develop a BA capability maturity model (BACMM). The BACMM will help organisations to scope and evaluate their BA initiatives. This research-in-progress paper describes the current BACMM, relates it to existing capability maturity models and explains its theoretical base. It also discusses the design science research approach being used to develop the BACMM and provides details of further work within the research project. Finally, the paper concludes with a discussion of how the BACMM might be used in practice.",
"title": ""
},
{
"docid": "c26339c1a74de4797096d2ea58e60f25",
"text": "Existing systems deliver high accuracy and F1-scores for detecting paraphrase and semantic similarity on traditional clean-text corpus. For instance, on the clean-text Microsoft Paraphrase benchmark database, the existing systems attain an accuracy as high as 0.8596. However, existing systems for detecting paraphrases and semantic similarity on user-generated short-text content on microblogs such as Twitter, comprising of noisy and ad hoc short-text, needs significant research attention. In this paper, we propose a machine learning based approach towards this. We propose a set of features that, although well-known in the NLP literature for solving other problems, have not been explored for detecting paraphrase or semantic similarity, on noisy user-generated short-text data such as Twitter. We apply support vector machine (SVM) based learning. We use the benchmark Twitter paraphrase data, released as a part of SemEval 2015, for experiments. Our system delivers a paraphrase detection F1-score of 0.717 and semantic similarity detection F1-score of 0.741, thereby significantly outperforming the existing systems, that deliver F1-scores of 0.696 and 0.724 for the two problems respectively. Our features also allow us to obtain a rank among the top-10, when trained on the Microsoft Paraphrase corpus and tested on the corresponding test data, thereby empirically establishing our approach as ubiquitous across the different paraphrase detection databases.",
"title": ""
},
{
"docid": "bbd378407abb1c2a9a5016afee40c385",
"text": "One approach to the generation of natural-sounding synthesized speech waveforms is to select and concatenate units from a large speech database. Units (in the current work, phonemes) are selected to produce a natural realisation of a target phoneme sequence predicted from text which is annotated with prosodic and phonetic context information. We propose that the units in a synthesis database can be considered as a state transition network in which the state occupancy cost is the distance between a database unit and a target, and the transition cost is an estimate of the quality of concatenation of two consecutive units. This framework has many similarities to HMM-based speech recognition. A pruned Viterbi search is used to select the best units for synthesis from the database. This approach to waveform synthesis permits training from natural speech: two methods for training from speech are presented which provide weights which produce more natural speech than can be obtained by hand-tuning.",
"title": ""
},
{
"docid": "a57e470ad16c025f6b0aae99de25f498",
"text": "Purpose To establish the efficacy and safety of botulinum toxin in the treatment of Crocodile Tear Syndrome and record any possible complications.Methods Four patients with unilateral aberrant VII cranial nerve regeneration following an episode of facial paralysis consented to be included in this study after a comprehensive explanation of the procedure and possible complications was given. On average, an injection of 20 units of botulinum toxin type A (Dysport®) was given to the affected lacrimal gland. The effect was assessed with a Schirmer’s test during taste stimulation. Careful recording of the duration of the effect and the presence of any local or systemic complications was made.Results All patients reported a partial or complete disappearance of the reflex hyperlacrimation following treatment. Schirmer’s tests during taste stimulation documented a significant decrease in tear secretion. The onset of effect of the botulinum toxin was typically 24–48 h after the initial injection and lasted 4–5 months. One patient had a mild increase in his preexisting upper lid ptosis, but no other local or systemic side effects were experienced.Conclusions The injection of botulinum toxin type A into the affected lacrimal glands of patients with gusto-lacrimal reflex is a simple, effective and safe treatment.",
"title": ""
}
] | scidocsrr |
3b1f2e12d3b4042889fc551daf6e9cf7 | Template Based Inference in Symmetric Relational Markov Random Fields | [
{
"docid": "9707365fac6490f52b328c2b039915b6",
"text": "Identification of protein–protein interactions often provides insight into protein function, and many cellular processes are performed by stable protein complexes. We used tandem affinity purification to process 4,562 different tagged proteins of the yeast Saccharomyces cerevisiae. Each preparation was analysed by both matrix-assisted laser desorption/ionization–time of flight mass spectrometry and liquid chromatography tandem mass spectrometry to increase coverage and accuracy. Machine learning was used to integrate the mass spectrometry scores and assign probabilities to the protein–protein interactions. Among 4,087 different proteins identified with high confidence by mass spectrometry from 2,357 successful purifications, our core data set (median precision of 0.69) comprises 7,123 protein–protein interactions involving 2,708 proteins. A Markov clustering algorithm organized these interactions into 547 protein complexes averaging 4.9 subunits per complex, about half of them absent from the MIPS database, as well as 429 additional interactions between pairs of complexes. The data (all of which are available online) will help future studies on individual proteins as well as functional genomics and systems biology.",
"title": ""
},
{
"docid": "8dc493568e94d94370f78e663da7df96",
"text": "Expertise in C++, C, Perl, Haskell, Linux system administration. Technical experience in compiler design and implementation, release engineering, network administration, FPGAs, hardware design, probabilistic inference, machine learning, web search engines, cryptography, datamining, databases (SQL, Oracle, PL/SQL, XML), distributed knowledge bases, machine vision, automated web content generation, 2D and 3D graphics, distributed computing, scientific and numerical computing, optimization, virtualization (Xen, VirtualBox). Also experience in risk analysis, finance, game theory, firm behavior, international economics. Familiar with Java, C++ Standard Template Library, Java Native Interface, Java Foundation Classes, Android development, MATLAB, CPLEX, NetPBM, Cascading Style Sheets (CSS), Tcl/Tk, Windows system administration, Mac OS X system administration, ElasticSearch, modifying the Ubuntu installer.",
"title": ""
}
] | [
{
"docid": "907888b819c7f65fe34fb8eea6df9c93",
"text": "Most time-series datasets with multiple data streams have (many) missing measurements that need to be estimated. Most existing methods address this estimation problem either by interpolating within data streams or imputing across data streams; we develop a novel approach that does both. Our approach is based on a deep learning architecture that we call a Multidirectional Recurrent Neural Network (M-RNN). An M-RNN differs from a bi-directional RNN in that it operates across streams in addition to within streams, and because the timing of inputs into the hidden layers is both lagged and advanced. To demonstrate the power of our approach we apply it to a familiar real-world medical dataset and demonstrate significantly improved performance.",
"title": ""
},
{
"docid": "1e18be7d7e121aa899c96cbcf5ea906b",
"text": "Internet-based technologies such as micropayments increasingly enable the sale and delivery of small units of information. This paper draws attention to the opposite strategy of bundling a large number of information goods, such as those increasingly available on the Internet, for a fixed price that does not depend on how many goods are actually used by the buyer. We analyze the optimal bundling strategies for a multiproduct monopolist, and we find that bundling very large numbers of unrelated information goods can be surprisingly profitable. The reason is that the law of large numbers makes it much easier to predict consumers' valuations for a bundle of goods than their valuations for the individual goods when sold separately. As a result, this \"predictive value of bundling\" makes it possible to achieve greater sales, greater economic efficiency and greater profits per good from a bundle of information goods than can be attained when the same goods are sold separately. Our results do not extend to most physical goods, as the marginal costs of production typically negate any benefits from the predictive value of bundling. While determining optimal bundling strategies for more than two goods is a notoriously difficult problem, we use statistical techniques to provide strong asymptotic results and bounds on profits for bundles of any arbitrary size. We show how our model can be used to analyze the bundling of complements and substitutes, bundling in the presence of budget constraints and bundling of goods with various types of correlations. We find that when different market segments of consumers differ systematically in their valuations for goods, simple bundling will no longer be optimal. However, by offering a menu of different bundles aimed at each market segment, a monopolist can generally earn substantially higher profits than would be possible without bundling. The predictions of our analysis appear to be consistent with empirical observations of the markets for Internet and on-line content, cable television programming, and copyrighted music. ________________________________________ We thank Timothy Bresnahan, Hung-Ken Chien, Frank Fisher, Michael Harrison, Paul Kleindorfer, Thomas Malone, Robert Pindyck, Nancy Rose, Richard Schmalensee, John Tsitsiklis, Hal Varian, Albert Wenger, Birger Wernerfelt, four anonymous reviewers and seminar participants at the University of California at Berkeley, MIT, New York University, Stanford University, University of Rochester, the Wharton School, the 1995 Workshop on Information Systems and Economics and the 1998 Workshop on Marketing Science and the Internet for many helpful suggestions. Any errors that remain are only our responsibility. BUNDLING INFORMATION GOODS Page 1",
"title": ""
},
{
"docid": "26e60be4012b20575f3ddee16f046daa",
"text": "Natural scene character recognition is challenging due to the cluttered background, which is hard to separate from text. In this paper, we propose a novel method for robust scene character recognition. Specifically, we first use robust principal component analysis (PCA) to denoise character image by recovering the missing low-rank component and filtering out the sparse noise term, and then use a simple Histogram of oriented Gradient (HOG) to perform image feature extraction, and finally, use a sparse representation based classifier for recognition. In experiments on four public datasets, namely the Char74K dataset, ICADAR 2003 robust reading dataset, Street View Text (SVT) dataset and IIIT5K-word dataset, our method was demonstrated to be competitive with the state-of-the-art methods.",
"title": ""
},
{
"docid": "d8b19c953cc66b6157b87da402dea98a",
"text": "In this paper we propose a new semi-supervised GAN architecture (ss-InfoGAN) for image synthesis that leverages information from few labels (as little as 0.22%, max. 10% of the dataset) to learn semantically meaningful and controllable data representations where latent variables correspond to label categories. The architecture builds on Information Maximizing Generative Adversarial Networks (InfoGAN) and is shown to learn both continuous and categorical codes and achieves higher quality of synthetic samples compared to fully unsupervised settings. Furthermore, we show that using small amounts of labeled data speeds-up training convergence. The architecture maintains the ability to disentangle latent variables for which no labels are available. Finally, we contribute an information-theoretic reasoning on how introducing semi-supervision increases mutual information between synthetic and real data.",
"title": ""
},
{
"docid": "645d9a7186080d4ec3c7ce708b1c9818",
"text": "With millions of users and billions of photos, web-scale face recognition is a challenging task that demands speed, accuracy, and scalability. Most current approaches do not address and do not scale well to Internet-sized scenarios such as tagging friends or finding celebrities. Focusing on web-scale face identification, we gather an 800,000 face dataset from the Facebook social network that models real-world situations where specific faces must be recognized and unknown identities rejected. We propose a novel Linearly Approximated Sparse Representation-based Classification (LASRC) algorithm that uses linear regression to perform sample selection for ‘-minimization, thus harnessing the speed of least-squares and the robustness of sparse solutions such as SRC. Our efficient LASRC algorithm achieves comparable performance to SRC with a 100–250 times speedup and exhibits similar recall to SVMs with much faster training. Extensive tests demonstrate our proposed approach is competitive on pair-matching verification tasks and outperforms current state-of-the-art algorithms on open-universe identification in uncontrolled, web-scale scenarios. 2013 Elsevier Inc. All rights reserved.",
"title": ""
},
{
"docid": "362cf1594043c92f118876f959e078a4",
"text": "Effective training of neural networks requires much data. In the low-data regime, parameters are underdetermined, and learnt networks generalise poorly. Data Augmentation (Krizhevsky et al., 2012) alleviates this by using existing data more effectively. However standard data augmentation produces only limited plausible alternative data. Given there is potential to generate a much broader set of augmentations, we design and train a generative model to do data augmentation. The model, based on image conditional Generative Adversarial Networks, takes data from a source domain and learns to take any data item and generalise it to generate other within-class data items. As this generative process does not depend on the classes themselves, it can be applied to novel unseen classes of data. We show that a Data Augmentation Generative Adversarial Network (DAGAN) augments standard vanilla classifiers well. We also show a DAGAN can enhance few-shot learning systems such as Matching Networks. We demonstrate these approaches on Omniglot, on EMNIST having learnt the DAGAN on Omniglot, and VGG-Face data. In our experiments we can see over 13% increase in accuracy in the low-data regime experiments in Omniglot (from 69% to 82%), EMNIST (73.9% to 76%) and VGG-Face (4.5% to 12%); in Matching Networks for Omniglot we observe an increase of 0.5% (from 96.9% to 97.4%) and an increase of 1.8% in EMNIST (from 59.5% to 61.3%).",
"title": ""
},
{
"docid": "bd41083b19e2d542b3835c3a008b30e6",
"text": "Formalizations are used in systems development to support the description of artifacts and to shape and regulate developer behavior. The limits to applying formalizations in these two ways are discussed based on examples from systems development practice. It is argued that formalizations, for example in the form of methods, are valuable in some situations, but inappropriate in others. The alternative to uncritically using formalizations is that systems developers reflect on the situations in which they find themselves and manage based on a combination of formal and informal approaches.",
"title": ""
},
{
"docid": "ce41d07b369635c5b0a914d336971f8e",
"text": "In this paper, a fuzzy controller for an inverted pendulum system is presented in two stages. These stages are: investigation of fuzzy control system modeling methods and solution of the “Inverted Pendulum Problem” by using Java programming with Applets for internet based control education. In the first stage, fuzzy modeling and fuzzy control system investigation, Java programming language, classes and multithreading were introduced. In the second stage specifically, simulation of the inverted pendulum problem was developed with Java Applets and the simulation results were given. Also some stability concepts are introduced. c © 2007 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "7aa1df89f94fe1f653f1680fbf33e838",
"text": "Several modes of vaccine delivery have been developed in the last 25 years, which induce strong immune responses in pre-clinical models and in human clinical trials. Some modes of delivery include, adjuvants (aluminum hydroxide, Ribi formulation, QS21), liposomes, nanoparticles, virus like particles, immunostimulatory complexes (ISCOMs), dendrimers, viral vectors, DNA delivery via gene gun, electroporation or Biojector 2000, cell penetrating peptides, dendritic cell receptor targeting, toll-like receptors, chemokine receptors and bacterial toxins. There is an enormous amount of information and vaccine delivery methods available for guiding vaccine and immunotherapeutics development against diseases.",
"title": ""
},
{
"docid": "228c59c9bf7b4b2741567bffb3fcf73f",
"text": "This paper presents a new PSO-based optimization DBSCAN space clustering algorithm with obstacle constraints. The algorithm introduces obstacle model and simplifies two-dimensional coordinates of the cluster object coding to one-dimensional, then uses the PSO algorithm to obtain the shortest path and minimum obstacle distance. At the last stage, this paper fulfills spatial clustering based on obstacle distance. Theoretical analysis and experimental results show that the algorithm can get high-quality clustering result of space constraints with more reasonable and accurate quality.",
"title": ""
},
{
"docid": "0250d6bb0bcf11ca8af6c2661c1f7f57",
"text": "Chemoreception is a biological process essential for the survival of animals, as it allows the recognition of important volatile cues for the detection of food, egg-laying substrates, mates, or predators, among other purposes. Furthermore, its role in pheromone detection may contribute to evolutionary processes, such as reproductive isolation and speciation. This key role in several vital biological processes makes chemoreception a particularly interesting system for studying the role of natural selection in molecular adaptation. Two major gene families are involved in the perireceptor events of the chemosensory system: the odorant-binding protein (OBP) and chemosensory protein (CSP) families. Here, we have conducted an exhaustive comparative genomic analysis of these gene families in 20 Arthropoda species. We show that the evolution of the OBP and CSP gene families is highly dynamic, with a high number of gains and losses of genes, pseudogenes, and independent origins of subfamilies. Taken together, our data clearly support the birth-and-death model for the evolution of these gene families with an overall high gene turnover rate. Moreover, we show that the genome organization of the two families is significantly more clustered than expected by chance and, more important, that this pattern appears to be actively maintained across the Drosophila phylogeny. Finally, we suggest the homologous nature of the OBP and CSP gene families, dating back their most recent common ancestor after the terrestrialization of Arthropoda (380--450 Ma) and we propose a scenario for the origin and diversification of these families.",
"title": ""
},
{
"docid": "19ebb5c0cdf90bf5aef36ad4b9f621a1",
"text": "There has been a dramatic increase in the number and complexity of new ventilation modes over the last 30 years. The impetus for this has been the desire to improve the safety, efficiency, and synchrony of ventilator-patient interaction. Unfortunately, the proliferation of names for ventilation modes has made understanding mode capabilities problematic. New modes are generally based on increasingly sophisticated closed-loop control systems or targeting schemes. We describe the 6 basic targeting schemes used in commercially available ventilators today: set-point, dual, servo, adaptive, optimal, and intelligent. These control systems are designed to serve the 3 primary goals of mechanical ventilation: safety, comfort, and liberation. The basic operations of these schemes may be understood by clinicians without any engineering background, and they provide the basis for understanding the wide variety of ventilation modes and their relative advantages for improving patient-ventilator synchrony. Conversely, their descriptions may provide engineers with a means to better communicate to end users.",
"title": ""
},
{
"docid": "8588a3317d4b594d8e19cb005c3d35c7",
"text": "Histograms of Oriented Gradients (HOG) is one of the wellknown features for object recognition. HOG features are calculated by taking orientation histograms of edge intensity in a local region. N.Dalal et al. proposed an object detection algorithm in which HOG features were extracted from all locations of a dense grid on a image region and the combined features are classified by using linear Support Vector Machine (SVM). In this paper, we employ HOG features extracted from all locations of a grid on the image as candidates of the feature vectors. Principal Component Analysis (PCA) is applied to these HOG feature vectors to obtain the score (PCA-HOG) vectors. Then a proper subset of PCA-HOG feature vectors is selected by using Stepwise Forward Selection (SFS) algorithm or Stepwise Backward Selection (SBS) algorithm to improve the generalization performance. The selected PCA-HOG feature vectors are used as an input of linear SVM to classify the given input into pedestrian/non-pedestrian. The improvement of the recognition rates are confirmed through experiments using MIT pedestrian dataset.",
"title": ""
},
{
"docid": "932088f443c5f0f3e239ed13032e56d7",
"text": "Hydro Muscles are linear actuators resembling ordinary biological muscles in terms of active dynamic output, passive material properties and appearance. The passive and dynamic characteristics of the latex based Hydro Muscle are addressed. The control tests of modular muscles are presented together with a muscle model relating sensed quantities with net force. Hydro Muscles are discussed in the context of conventional actuators. The hypothesis that Hydro Muscles have greater efficiency than McKibben Muscles is experimentally verified. Hydro Muscle peak efficiency with (without) back flow consideration was 88% (27%). Possible uses of Hydro Muscles are illustrated by relevant robotics projects at WPI. It is proposed that Hydro Muscles can also be an excellent educational tool for moderate-budget robotics classrooms and labs; the muscles are inexpensive (in the order of standard latex tubes of comparable size), made of off-the-shelf elements in less than 10 minutes, easily customizable, lightweight, biologically inspired, efficient, compliant soft linear actuators that are adept for power-augmentation. Moreover, a single source can actuate many muscles by utilizing control of flow and/or pressure. Still further, these muscles can utilize ordinary tap water and successfully operate within a safe range of pressures not overly exceeding standard water household pressure of about 0.59 MPa (85 psi).",
"title": ""
},
{
"docid": "d9710b9a214d95c572bdc34e1fe439c4",
"text": "This paper presents a new method, capable of automatically generating attacks on binary programs from software crashes. We analyze software crashes with a symbolic failure model by performing concolic executions following the failure directed paths, using a whole system environment model and concrete address mapped symbolic memory in S2 E. We propose a new selective symbolic input method and lazy evaluation on pseudo symbolic variables to handle symbolic pointers and speed up the process. This is an end-to-end approach able to create exploits from crash inputs or existing exploits for various applications, including most of the existing benchmark programs, and several large scale applications, such as a word processor (Microsoft office word), a media player (mpalyer), an archiver (unrar), or a pdf reader (foxit). We can deal with vulnerability types including stack and heap overflows, format string, and the use of uninitialized variables. Notably, these applications have become software fuzz testing targets, but still require a manual process with security knowledge to produce mitigation-hardened exploits. Using this method to generate exploits is an automated process for software failures without source code. The proposed method is simpler, more general, faster, and can be scaled to larger programs than existing systems. We produce the exploits within one minute for most of the benchmark programs, including mplayer. We also transform existing exploits of Microsoft office word into new exploits within four minutes. The best speedup is 7,211 times faster than the initial attempt. For heap overflow vulnerability, we can automatically exploit the unlink() macro of glibc, which formerly requires sophisticated hacking efforts.",
"title": ""
},
{
"docid": "665da3a85a548d12864de5fad517e3ee",
"text": "To characterize the neural correlates of being personally involved in social interaction as opposed to being a passive observer of social interaction between others we performed an fMRI study in which participants were gazed at by virtual characters (ME) or observed them looking at someone else (OTHER). In dynamic animations virtual characters then showed socially relevant facial expressions as they would appear in greeting and approach situations (SOC) or arbitrary facial movements (ARB). Differential neural activity associated with ME>OTHER was located in anterior medial prefrontal cortex in contrast to the precuneus for OTHER>ME. Perception of socially relevant facial expressions (SOC>ARB) led to differentially increased neural activity in ventral medial prefrontal cortex. Perception of arbitrary facial movements (ARB>SOC) differentially activated the middle temporal gyrus. The results, thus, show that activation of medial prefrontal cortex underlies both the perception of social communication indicated by facial expressions and the feeling of personal involvement indicated by eye gaze. Our data also demonstrate that distinct regions of medial prefrontal cortex contribute differentially to social cognition: whereas the ventral medial prefrontal cortex is recruited during the analysis of social content as accessible in interactionally relevant mimic gestures, differential activation of a more dorsal part of medial prefrontal cortex subserves the detection of self-relevance and may thus establish an intersubjective context in which communicative signals are evaluated.",
"title": ""
},
{
"docid": "f0f2cdccd8f415cbd3fffcea4509562a",
"text": "Textual inference is an important component in many applications for understanding natural language. Classical approaches to textual inference rely on logical representations for meaning, which may be regarded as “external” to the natural language itself. However, practical applications usually adopt shallower lexical or lexical-syntactic representations, which correspond closely to language structure. In many cases, such approaches lack a principled meaning representation and inference framework. We describe an inference formalism that operates directly on language-based structures, particularly syntactic parse trees. New trees are generated by applying inference rules, which provide a unified representation for varying types of inferences. We use manual and automatic methods to generate these rules, which cover generic linguistic structures as well as specific lexical-based inferences. We also present a novel packed data-structure and a corresponding inference algorithm that allows efficient implementation of this formalism. We proved the correctness of the new algorithm and established its efficiency analytically and empirically. The utility of our approach was illustrated on two tasks: unsupervised relation extraction from a large corpus, and the Recognizing Textual Entailment (RTE) benchmarks.",
"title": ""
},
{
"docid": "a5214112059506a67f031d98a4e6f04f",
"text": "Accurate segmentation of cervical cells in Pap smear images is an important task for automatic identification of pre-cancerous changes in the uterine cervix. One of the major segmentation challenges is the overlapping of cytoplasm, which was less addressed by previous studies. In this paper, we propose a learning-based method to tackle the overlapping issue with robust shape priors by segmenting individual cell in Pap smear images. Specifically, we first define the problem as a discrete labeling task for multiple cells with a suitable cost function. We then use the coarse labeling result to initialize our dynamic multiple-template deformation model for further boundary refinement on each cell. Multiple-scale deep convolutional networks are adopted to learn the diverse cell appearance features. Also, we incorporate high level shape information to guide segmentation where the cells boundary is noisy or lost due to touching and overlapping cells. We evaluate the proposed algorithm on two different datasets, and our comparative experiments demonstrate the promising performance of the proposed method in terms of segmentation accuracy.",
"title": ""
},
{
"docid": "83f44152fe9103a8027b602de7360270",
"text": "The BATS project focuses on helping students with visual impairments access and explore spatial information using standard computer hardware and open source software. Our work is largely based on prior techniques used in presenting maps to the blind such as text-to-speech synthesis, auditory icons, and tactile feedback. We add spatial sound to position auditory icons and speech callouts in three dimensions, and use consumer-grade haptic feedback devices to provide additional map information through tactile vibrations and textures. Two prototypes have been developed for use in educational settings and have undergone minimal assessment. A system for public release and plans for more rigorous evaluation are in development.",
"title": ""
},
{
"docid": "4bc7687ba89699a537329f37dda4e74d",
"text": "At the same time as cities are growing, their share of older residents is increasing. To engage and assist cities to become more “age-friendly,” the World Health Organization (WHO) prepared the Global Age-Friendly Cities Guide and a companion “Checklist of Essential Features of Age-Friendly Cities”. In collaboration with partners in 35 cities from developed and developing countries, WHO determined the features of age-friendly cities in eight domains of urban life: outdoor spaces and buildings; transportation; housing; social participation; respect and social inclusion; civic participation and employment; communication and information; and community support and health services. In 33 cities, partners conducted 158 focus groups with persons aged 60 years and older from lower- and middle-income areas of a locally defined geographic area (n = 1,485). Additional focus groups were held in most sites with caregivers of older persons (n = 250 caregivers) and with service providers from the public, voluntary, and commercial sectors (n = 515). No systematic differences in focus group themes were noted between cities in developed and developing countries, although the positive, age-friendly features were more numerous in cities in developed countries. Physical accessibility, service proximity, security, affordability, and inclusiveness were important characteristics everywhere. Based on the recurring issues, a set of core features of an age-friendly city was identified. The Global Age-Friendly Cities Guide and companion “Checklist of Essential Features of Age-Friendly Cities” released by WHO serve as reference for other communities to assess their age readiness and plan change.",
"title": ""
}
] | scidocsrr |
ba57363cbbff05ab46ab5b39ac1b8369 | Generating Different Story Tellings from Semantic Representations of Narrative | [
{
"docid": "d849c7a7fd0e475b4f0f64ffdeaf2790",
"text": "In this paper we provide a description of TimeML, a rich specification language for event and temporal expressions in natural language text, developed in the context of the AQUAINT program on Question Answering Systems. Unlike most previous work on event annotation, TimeML captures three distinct phenomena in temporal markup: (1) it systematically anchors event predicates to a broad range of temporally denotating expressions; (2) it orders event expressions in text relative to one another, both intrasententially and in discourse; and (3) it allows for a delayed (underspecified) interpretation of partially determined temporal expressions. We demonstrate the expressiveness of TimeML for a broad range of syntactic and semantic contexts, including aspectual predication, modal subordination, and an initial treatment of lexical and constructional causation in text.",
"title": ""
},
{
"docid": "beea84b0d96da0f4b29eabf3b242a55c",
"text": "Recent years have seen a growing interest in creating virtual agents to populate the cast of characters for interactive narrative. A key challenge posed by interactive characters for narrative environments is devising expressive dialogue generators. To be effective, character dialogue generators must be able to simultaneously take into account multiple sources of information that bear on dialogue, including character attributes, plot development, and communicative goals. Building on the narrative theory of character archetypes, we propose an archetype-driven character dialogue generator that uses a probabilistic unification framework to generate dialogue motivated by character personality and narrative history to achieve communicative goals. The generator’s behavior is illustrated with character dialogue generation in a narrative-centered learning environment, CRYSTAL ISLAND.",
"title": ""
}
] | [
{
"docid": "5e68152b3577dfdb60a53c77086692f6",
"text": "We analyze trading opportunities that arise from differences between the bond and the CDS market. By simultaneously entering a position in a CDS contract and the underlying bond, traders can build a default-risk free position that allows them to repeatedly earn the difference between the bond asset swap spread and the CDS, known as the basis. We show that the basis size is closely related to measures of company-specific credit risk and liquidity, and to market conditions. In analyzing the aggregate profits of these basis trading strategies, we document that dissolving a position leads to significant profit variations, but that attractive risk-return characteristics still apply. The aggregate profits depend on the credit risk, liquidity, and market measures even more strongly than the basis itself, and we show which conditions make long and short basis trades more profitable. Finally, we document the impact of the financial crisis on the profits of long and short basis trades, and show that the formerly more profitable long basis trades experienced stronger profit decreases than short basis trades. JEL classification: C31, C32, G12, G13, G14, G32",
"title": ""
},
{
"docid": "3973a575bae986eb0410df18b0de8a5a",
"text": "The design and operation along with verifying measurements of a harmonic radar transceiver, or tag, developed for insect tracking are presented. A short length of wire formed the antenna while a beam lead Schottky diode across a resonant loop formed the frequency doubler circuit yielding a total tag mass of less than 3 mg. Simulators using the method-of-moments for the antenna, finite-integral time-domain for the loop, and harmonic balance for the nonlinear diode element were used to predict and optimize the transceiver performance. This performance is compared to the ideal case and to measurements performed using a pulsed magnetron source within an anechoic chamber. A method for analysis of the tag is presented and used to optimize the design by creating the largest possible return signal at the second harmonic frequency for a particular incident power density. These methods were verified through measurement of tags both in isolation and mounted on insects. For excitation at 9.41 GHz the optimum tag in isolation had an antenna length of 12 mm with a loop diameter of 1 mm which yielded a harmonic cross-section of 40 mm/sup 2/. For tags mounted on Colorado potato beetles, optimum performance was achieved with an 8 mm dipole fed 2 mm from the beetle attached end. A theory is developed that describes harmonic radar in a fashion similar to the conventional radar range equation but with harmonic cross-section replacing the conventional radar cross-section. This method provides a straightforward description of harmonic radar system performance as well as provides a means to describe harmonic radar tag performance.",
"title": ""
},
{
"docid": "b9e4a201050b379500e5e8a2bca81025",
"text": "On the basis of a longitudinal field study of domestic communication, we report some essential constituents of the user experience of awareness of others who are distant in space or time, i.e. presence-in-absence. We discuss presence-in-absence in terms of its social (Contact) and informational (Content) facets, and the circumstances of the experience (Context). The field evaluation of a prototype, 'The Cube', designed to support presence-in-absence, threw up issues in the interrelationships between contact, content and context; issues that the designers of similar social artifacts will need to address.",
"title": ""
},
{
"docid": "aead9a7a19551a445584064a669b191a",
"text": "The purpose of this paper is to study the impact of tourism marketing mix and how it affects tourism in Jordan, and to determine which element of the marketing mix has the strongest impact on Jordanian tourism and how it will be used to better satisfy tourists. The paper will focus on foreign tourists coming to Jordan; a field survey will be used by using questionnaires to collect data. Three hundred questionnaires will be collected from actual tourists who visited Jordan, the data will be collected from selected tourism sites like (Petra, Jarash,.... etc.) and classified from one to five stars hotels in Jordan. The questionnaire will be designed in different languages (English, French and Arabic) to meet all tourists from different countries. The study established that from all the marketing mix elements, the researcher studied, product & promotion had the strongest effect on foreign tourist's satisfaction, where price and distribution were also effective significant factors. The research recommends suitable marketing strategies for all elements especially product & promotion.",
"title": ""
},
{
"docid": "a798db9dfcfec4b8149de856c7e69b48",
"text": "Compared to scanned images, document pictures captured by camera can suffer from distortions due to perspective and page warping. It is necessary to restore a frontal planar view of the page before other OCR techniques can be applied. In this paper we describe a novel approach for flattening a curved document in a single picture captured by an uncalibrated camera. To our knowledge this is the first reported method able to process general curved documents in images without camera calibration. We propose to model the page surface by a developable surface, and exploit the properties (parallelism and equal line spacing) of the printed textual content on the page to recover the surface shape. Experiments show that the output images are much more OCR friendly than the original ones. While our method is designed to work with any general developable surfaces, it can be adapted for typical special cases including planar pages, scans of thick books, and opened books.",
"title": ""
},
{
"docid": "a7f4f3d03b69fc339b4908e247a36f30",
"text": "In this letter, we present a novel feature extraction method for sound event classification, based on the visual signature extracted from the sound's time-frequency representation. The motivation stems from the fact that spectrograms form recognisable images, that can be identified by a human reader, with perception enhanced by pseudo-coloration of the image. The signal processing in our method is as follows. 1) The spectrogram is normalised into greyscale with a fixed range. 2) The dynamic range is quantized into regions, each of which is then mapped to form a monochrome image. 3) The monochrome images are partitioned into blocks, and the distribution statistics in each block are extracted to form the feature. The robustness of the proposed method comes from the fact that the noise is normally more diffuse than the signal and therefore the effect of the noise is limited to a particular quantization region, leaving the other regions less changed. The method is tested on a database of 60 sound classes containing a mixture of collision, action and characteristic sounds and shows a significant improvement over other methods in mismatched conditions, without the need for noise reduction.",
"title": ""
},
{
"docid": "aabf75855e39682b353c46332bc218db",
"text": "Semantic Web Mining is the outcome of two new and fast developing domains: Semantic Web and Data Mining. The Semantic Web is an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. Data Mining is the nontrivial process of identifying valid, previously unknown, potentially useful patterns in data. Semantic Web Mining refers to the application of data mining techniques to extract knowledge from World Wide Web or the area of data mining that refers to the use of algorithms for extracting patterns from resources distributed over in the web. The aim of Semantic Web Mining is to discover and retrieve useful and interesting patterns from a huge set of web data. This web data consists of different kind of information, including web structure data, web log data and user profiles data. Semantic Web Mining is a relatively new area, broadly interdisciplinary, attracting researchers from: computer science, information retrieval specialists and experts from business studies fields. Web data mining includes web content mining, web structure mining and web usage mining. All of these approaches attempt to extract knowledge from the web, produce some useful results from the knowledge extracted and apply these results to the real world problems. To improve the internet service quality and increase the user click rate on a specific website, it is necessary for a web developer to know what the user really want to do, predict which pages the user is potentially interested in. In this paper, various techniques for Semantic Web mining like web content mining, web usage mining and web structure mining are discussed. Our main focus is on web usage mining and its application in web personalization. Study shows that the accuracy of recommendation system has improved significantly with the use of semantic web mining in web personalization.",
"title": ""
},
{
"docid": "084d376f9aa8d56d6dfec7d78e2c807f",
"text": "A comprehensive model is presented which enables the effects of ionizing radiation on bulk CMOS devices and integrated circuits to be simulated with closed form functions. The model adapts general equations for defect formation in uniform SiO2 films to facilitate analytical calculations of trapped charge and interface trap buildup in structurally irregular and radiation sensitive shallow trench isolation (STI) oxides. A new approach whereby non-uniform defect distributions along the STI sidewall are calculated, integrated into implicit surface potential equations, and ultimately used to model radiation-induced ldquoedgerdquo leakage currents in n-channel MOSFETs is described. The results of the modeling approach are compared to experimental data obtained on 130 nm and 90 nm devices. The features having the greatest impact on the increased radiation tolerance of advanced deep-submicron bulk CMOS technologies are also discussed. These features include increased doping levels along the STI sidewall.",
"title": ""
},
{
"docid": "fc6382579f90ffbc2e54498ad2034d3b",
"text": "Features extracted by deep networks have been popular in many visual search tasks. This article studies deep network structures and training schemes for mobile visual search. The goal is to learn an effective yet portable feature representation that is suitable for bridging the domain gap between mobile user photos and (mostly) professionally taken product images while keeping the computational cost acceptable for mobile-based applications. The technical contributions are twofold. First, we propose an alternative of the contrastive loss popularly used for training deep Siamese networks, namely robust contrastive loss, where we relax the penalty on some positive and negative pairs to alleviate overfitting. Second, a simple multitask fine-tuning scheme is leveraged to train the network, which not only utilizes knowledge from the provided training photo pairs but also harnesses additional information from the large ImageNet dataset to regularize the fine-tuning process. Extensive experiments on challenging real-world datasets demonstrate that both the robust contrastive loss and the multitask fine-tuning scheme are effective, leading to very promising results with a time cost suitable for mobile product search scenarios.",
"title": ""
},
{
"docid": "17b8bff80cf87fb7e3c6c729bb41c99e",
"text": "Off-policy reinforcement learning enables near-optimal policy from suboptimal experience, thereby provisions opportunity for artificial intelligence applications in healthcare. Previous works have mainly framed patient-clinician interactions as Markov decision processes, while true physiological states are not necessarily fully observable from clinical data. We capture this situation with partially observable Markov decision process, in which an agent optimises its actions in a belief represented as a distribution of patient states inferred from individual history trajectories. A Gaussian mixture model is fitted for the observed data. Moreover, we take into account the fact that nuance in pharmaceutical dosage could presumably result in significantly different effect by modelling a continuous policy through a Gaussian approximator directly in the policy space, i.e. the actor. To address the challenge of infinite number of possible belief states which renders exact value iteration intractable, we evaluate and plan for only every encountered belief, through heuristic search tree by tightly maintaining lower and upper bounds of the true value of belief. We further resort to function approximations to update value bounds estimation, i.e. the critic, so that the tree search can be improved through more compact bounds at the fringe nodes that will be back-propagated to the root. Both actor and critic parameters are learned via gradient-based approaches. Our proposed policy trained from real intensive care unit data is capable of dictating dosing on vasopressors and intravenous fluids for sepsis patients that lead to the best patient outcomes.",
"title": ""
},
{
"docid": "26c58183e71f916f37d67f1cf848f021",
"text": "With the increasing popularity of herbomineral preparations in healthcare, a new proprietary herbomineral formulation was formulated with ashwagandha root extract and three minerals viz. zinc, magnesium, and selenium. The aim of the study was to evaluate the immunomodulatory potential of Biofield Energy Healing (The Trivedi Effect ® ) on the herbomineral formulation using murine splenocyte cells. The test formulation was divided into two parts. One was the control without the Biofield Energy Treatment. The other part was labelled the Biofield Energy Treated sample, which received the Biofield Energy Healing Treatment remotely by twenty renowned Biofield Energy Healers. Through MTT assay, all the test formulation concentrations from 0.00001053 to 10.53 μg/mL were found to be safe with cell viability ranging from 102.61% to 194.57% using splenocyte cells. The Biofield Treated test formulation showed a significant (p≤0.01) inhibition of TNF-α expression by 15.87%, 20.64%, 18.65%, and 20.34% at 0.00001053, 0.0001053, 0.01053, and 0.1053, μg/mL, respectively as compared to the vehicle control (VC) group. The level of TNF-α was reduced by 8.73%, 19.54%, and 14.19% at 0.001053, 0.01053, and 0.1053 μg/mL, respectively in the Biofield Treated test formulation compared to the untreated test formulation. The expression of IL-1β reduced by 22.08%, 23.69%, 23.00%, 16.33%, 25.76%, 16.10%, and 23.69% at 0.00001053, 0.0001053, 0.001053, 0.01053, 0.1053, 1.053 and 10.53 μg/mL, respectively compared to the VC. Additionally, the expression of MIP-1α significantly (p≤0.001) reduced by 13.35%, 22.96%, 25.11%, 22.71%, and 21.83% at 0.00001053, 0.0001053, 0.01053, 1.053, and 10.53 μg/mL, respectively in the Biofield Treated test formulation compared to the VC. The Biofield Treated test formulation significantly down-regulated the MIP-1α expression by 10.75%, 9.53%, 9.57%, and 10.87% at 0.00001053, 0.01053, 0.1053 and 1.053 μg/mL, respectively compared to the untreated test formulation. The results showed the IFN-γ expression was also significantly (p≤0.001) reduced by 39.16%, 40.34%, 27.57%, 26.06%, 42.53%, and 48.91% at 0.0001053, 0.001053, 0.01053, 0.1053, 1.053, and 10.53 μg/mL, respectively in the Biofield Treated test formulation compared to the VC. The Biofield Treated test formulation showed better suppression of IFN-γ expression by 15.46%, 13.78%, International Journal of Biomedical Engineering and Clinical Science 2016; 2(1): 8-17 9 17.14%, and 13.11% at concentrations 0.001053, 0.01053, 0.1053, and 10.53 μg/mL, respectively compared to the untreated test formulation. Overall, the results demonstrated that The Trivedi Effect ® Biofield Energy Healing (TEBEH) has the capacity to potentiate the immunomodulatory and anti-inflammatory activity of the test formulation. Biofield Energy may also be useful in organ transplants, anti-aging, and stress management by improving overall health and quality of life.",
"title": ""
},
{
"docid": "f8aeaf04486bdbc7254846d95e3cab24",
"text": "In this paper, we present a novel wearable RGBD camera based navigation system for the visually impaired. The system is composed of a smartphone user interface, a glass-mounted RGBD camera device, a real-time navigation algorithm, and haptic feedback system. A smartphone interface provides an effective way to communicate to the system using audio and haptic feedback. In order to extract orientational information of the blind users, the navigation algorithm performs real-time 6-DOF feature based visual odometry using a glass-mounted RGBD camera as an input device. The navigation algorithm also builds a 3D voxel map of the environment and analyzes 3D traversability. A path planner of the navigation algorithm integrates information from the egomotion estimation and mapping and generates a safe and an efficient path to a waypoint delivered to the haptic feedback system. The haptic feedback system consisting of four micro-vibration motors is designed to guide the visually impaired user along the computed path and to minimize cognitive loads. The proposed system achieves real-time performance faster than 30Hz in average on a laptop, and helps the visually impaired extends the range of their activities and improve the mobility performance in a cluttered environment. The experiment results show that navigation in indoor environments with the proposed system avoids collisions successfully and improves mobility performance of the user compared to conventional and state-of-the-art mobility aid devices.",
"title": ""
},
{
"docid": "3f7d77aafcc5c256394bb97e0b1fdc77",
"text": "Ischiofemoral impingement (IFI) is the entrapment of the quadratus femoris muscle (QFM) between the trochanter minor of the femur and the ischium-hamstring tendon. Patients with IFI generally present with hip pain, which may radiate toward the knee. Although there is no specific diagnostic clinical test for this disorder, the presence of QFM edema/fatty replacement and narrowing of the ischiofemoral space and the quadratus femoris space on magnetic resonance imaging (MRI) are suggestive of IFI. The optimal treatment strategy of this syndrome remains obscure. Patients may benefit from a conservative treatment regimen that includes rest, activity restriction, nonsteroidal anti-inflammatory drugs, and rehabilitation procedures, just as with other impingement syndromes. Herein we report an 11-year-old girl with IFI who was successfully treated conservatively. To our knowledge, our case is the youngest patient reported in the English literature. MRI remains an important tool in the diagnosis of IFI, and radiologists should be aware of the specific features of this entity.",
"title": ""
},
{
"docid": "823d838471a475ec32d460711b9805b4",
"text": "Marketing has a tradition in conducting scientific research with cutting-edge techniques developed in management science, such as data envelopment analysis (DEA) (Charnes et al. 1985). Two decades ago, Kamakura, Ratchford, and Agrawal (1988) applied DEA to examine market efficiency and consumer welfare loss. In this review of three new books, my purpose is (1) to provide a background of DEA for marketing scholars and executives and (2) to motivate them with exciting DEA advances for marketing theory and practice. All three books provide brief descriptions of DEA’s history, origin, and basic models. For beginners, Ramanathan’s work, An Introduction to Data Envelopment Analysis, is a good source, offering basic concepts of DEA’s efficiency and programming formulations in a straightforward manner (with some illustrations) in the first three chapters. A unique feature of this book is that it dedicates a chapter to discussing as many as 11 DEA computer software programs and explaining some noncommercial DEA packages that are available free on the Internet for academic purposes. As Ramanathan states (p. 111), “[I]n this computer era, it is important that any management science technique has adequate software support so that potential users are encouraged to use it. Software harnesses the computing power of [personal computers] for use in practical decision-making situations. It can also expedite the implementation of a method.” EDITOR: Naveen Donthu",
"title": ""
},
{
"docid": "051d402ce90d7d326cc567e228c8411f",
"text": "CDM ESD event has become the main ESD reliability concern for integrated-circuits products using nanoscale CMOS technology. A novel CDM ESD protection design, using self-biased current trigger (SBCT) and source pumping, has been proposed and successfully verified in 0.13-lm CMOS technology to achieve 1-kV CDM ESD robustness. 2007 Elsevier Ltd. All rights reserved.",
"title": ""
},
{
"docid": "abb7dceb1bd532c31029b5030c9a12e3",
"text": "In this paper, we present a real time method based on some video and image processing algorithms for eye blink detection. The motivation of this research is the need of disabling who cannot control the calls with human mobile interaction directly without the need of hands. A Haar Cascade Classifier is applied for face and eye detection for getting eye and facial axis information. In addition, the same classifier is used based on Haarlike features to find out the relationship between the eyes and the facial axis for positioning the eyes. An efficient eye tracking method is proposed which uses the position of detected face. Finally, an eye blinking detection based on eyelids state (close or open) is used for controlling android mobile phones. The method is used with and without smoothing filter to show the improvement of detection accuracy. The application is used in real time for studying the effect of light and distance between the eyes and the mobile device in order to evaluate the accuracy detection and overall accuracy of the system. Test results show that our proposed method provides a 98% overall accuracy and 100% detection accuracy for a distance of 35 cm and an artificial light. Keywords—eye detection; eye tracking; eye blinking; smoothing filter; detection accuracy",
"title": ""
},
{
"docid": "7067fbd4d551320c9054b2b258ea4e8f",
"text": "Until the era of the information society, information was a concern mainly for organizations whose line of business demanded a high degree of security. However, the growing use of information technology is affecting the status of information security so that it is gradually becoming an area that plays an important role in our everyday lives. As a result, information security issues should now be regarded on a par with other security issues. Using this assertion as the point of departure, this paper outlines the dimensions of information security awareness, namely its organizational, general public, socio-political, computer ethical and institutional education dimensions, along with the categories (or target groups) within each dimension.",
"title": ""
},
{
"docid": "50f369f80405f7142e557c7f6bc405c8",
"text": "Microbes rely on diverse defense mechanisms that allow them to withstand viral predation and exposure to invading nucleic acid. In many Bacteria and most Archaea, clustered regularly interspaced short palindromic repeats (CRISPR) form peculiar genetic loci, which provide acquired immunity against viruses and plasmids by targeting nucleic acid in a sequence-specific manner. These hypervariable loci take up genetic material from invasive elements and build up inheritable DNA-encoded immunity over time. Conversely, viruses have devised mutational escape strategies that allow them to circumvent the CRISPR/Cas system, albeit at a cost. CRISPR features may be exploited for typing purposes, epidemiological studies, host-virus ecological surveys, building specific immunity against undesirable genetic elements, and enhancing viral resistance in domesticated microbes.",
"title": ""
}
] | scidocsrr |
6289d2b5c72f8e86e5ecabe38e48778a | Common Spatial Patterns in a few channel BCI interface | [
{
"docid": "68bb5cb195c910e0a52c81a42a9e141c",
"text": "With advances in brain-computer interface (BCI) research, a portable few- or single-channel BCI system has become necessary. Most recent BCI studies have demonstrated that the common spatial pattern (CSP) algorithm is a powerful tool in extracting features for multiple-class motor imagery. However, since the CSP algorithm requires multi-channel information, it is not suitable for a few- or single-channel system. In this study, we applied a short-time Fourier transform to decompose a single-channel electroencephalography signal into the time-frequency domain and construct multi-channel information. Using the reconstructed data, the CSP was combined with a support vector machine to obtain high classification accuracies from channels of both the sensorimotor and forehead areas. These results suggest that motor imagery can be detected with a single channel not only from the traditional sensorimotor area but also from the forehead area.",
"title": ""
}
] | [
{
"docid": "b852aad0d205aff17cd8a9b7c21ed99f",
"text": "In present investigation, two glucose based smart tumor-targeted drug delivery systems coupled with enzyme-sensitive release strategy are introduced. Magnetic nanoparticles (Fe3O4) were grafted with carboxymethyl chitosan (CS) and β-cyclodextrin (β-CD) as carriers. Prodigiosin (PG) was used as the model anti-tumor drug, targeting aggressive tumor cells. The morphology, properties and composition and grafting process were characterized by transmission electron microscope (TEM), Fourier transform infrared spectroscopy (FT-IR), vibration sample magnetometer (VSM), X-ray diffraction (XRD) analysis. The results revealed that the core crystal size of the nanoparticles synthesized were 14.2±2.1 and 9.8±1.4nm for β-CD and CS-MNPs respectively when measured using TEM; while dynamic light scattering (DLS) gave diameters of 121.1 and 38.2nm. The saturation magnetization (Ms) of bare magnetic nanoparticles is 50.10emucm-3, while modification with β-CD and CS gave values of 37.48 and 65.01emucm-3, respectively. The anticancer compound, prodigiosin (PG) was loaded into the NPs with an encapsulation efficiency of approximately 81% for the β-CD-MNPs, and 92% for the CS-MNPs. This translates to a drug loading capacity of 56.17 and 59.17mg/100mg MNPs, respectively. Measurement of in vitro release of prodigiosin from the loaded nanocarriers in the presence of the hydrolytic enzymes, alpha-amylase and chitosanase showed that 58.1 and 44.6% of the drug was released after one-hour of incubation. Cytotoxicity studies of PG-loaded nanocarriers on two cancer cell lines, MCF-7 and HepG2, and on a non-cancerous control, NIH/3T3 cells, revealed that the drug loaded nanoparticles had greater efficacy on the cancer cell lines. The selective index (SI) for free PG on MCF-7 and HepG2 cells was 1.54 and 4.42 respectively. This parameter was reduced for PG-loaded β-CD-MNPs to 1.27 and 1.85, while the SI for CS-MNPs improved considerably to 7.03 on MCF-7 cells. Complementary studies by fluorescence and confocal microscopy and flow cytometry confirm specific targeting of the nanocarriers to the cancer cells. The results suggest that CS-MNPs have higher potency and are better able to target the prodigiosin toxicity effect on cancerous cells than β-CD-MNPs.",
"title": ""
},
{
"docid": "c615480e70f3baa5589d0c620549967a",
"text": "A common task in image editing is to change the colours of a picture to match the desired colour grade of another picture. Finding the correct colour mapping is tricky because it involves numerous interrelated operations, like balancing the colours, mixing the colour channels or adjusting the contrast. Recently, a number of automated tools have been proposed to find an adequate one-to-one colour mapping. The focus in this paper is on finding the best linear colour transformation. Linear transformations have been proposed in the literature but independently. The aim of this paper is thus to establish a common mathematical background to all these methods. Also, this paper proposes a novel transformation, which is derived from the Monge-Kantorovicth theory of mass transportation. The proposed solution is optimal in the sense that it minimises the amount of changes in the picture colours. It favourably compares theoretically and experimentally with other techniques for various images and under various colour spaces.",
"title": ""
},
{
"docid": "8a35d273a4f45e64b43bf3a7d02db4ed",
"text": "Many interesting problems in machine learning are being revisited with new deep learning tools. For graph-based semisupervised learning, a recent important development is graph convolutional networks (GCNs), which nicely integrate local vertex features and graph topology in the convolutional layers. Although the GCN model compares favorably with other state-of-the-art methods, its mechanisms are not clear and it still requires considerable amount of labeled data for validation and model selection. In this paper, we develop deeper insights into the GCN model and address its fundamental limits. First, we show that the graph convolution of the GCN model is actually a special form of Laplacian smoothing, which is the key reason why GCNs work, but it also brings potential concerns of oversmoothing with many convolutional layers. Second, to overcome the limits of the GCN model with shallow architectures, we propose both co-training and self-training approaches to train GCNs. Our approaches significantly improve GCNs in learning with very few labels, and exempt them from requiring additional labels for validation. Extensive experiments on benchmarks have verified our theory and proposals.",
"title": ""
},
{
"docid": "292eea3f09d135f489331f876052ce88",
"text": "-Steganography is a term used for covered writing. Steganography can be applied on different file formats, such as audio, video, text, image etc. In image steganography, data in the form of image is hidden under some image by using transformations such as ztransformation, integer wavelet transformation, DWT etc and then sent to the destination. At the destination, the data is extracted from the cover image using the inverse transformation. This paper presents a new approach for image steganography using DWT. The cover image is divided into higher and lower frequency sub-bands and data is embedded into higher frequency sub-bands. Arnold Transformation is used to increase the security. The proposed approach is implemented in MATLAB 7.0 and evaluated on the basis of PSNR, capacity and correlation. The proposed approach results in high capacity image steganography as compared to existing approaches. Keywords-Image Steganography, PSNR, Discrete Wavelet Transform.",
"title": ""
},
{
"docid": "d074d4154c775377f58c236187e70699",
"text": "For a long time PDF documents have arrived in the everyday life of the average computer user, corporate businesses and critical structures, as authorities and military. Due to its wide spread in general, and because out-of-date versions of PDF readers are quite common, using PDF documents has become a popular malware distribution strategy. In this context, malicious documents have useful features: they are trustworthy, attacks can be camouflaged by inconspicuous document content, but still, they can often download and install malware undetected by firewall and anti-virus software. In this paper we present PDF Scrutinizer, a malicious PDF detection and analysis tool. We use static, as well as, dynamic techniques to detect malicious behavior in an emulated environment. We evaluate the quality and the performance of the tool with PDF documents from the wild, and show that PDF Scrutinizer reliably detects current malicious documents, while keeping a low false-positive rate and reasonable runtime performance.",
"title": ""
},
{
"docid": "44de39859665488f8df950007d7a01c6",
"text": "Topic models provide insights into document collections, and their supervised extensions also capture associated document-level metadata such as sentiment. However, inferring such models from data is often slow and cannot scale to big data. We build upon the “anchor” method for learning topic models to capture the relationship between metadata and latent topics by extending the vector-space representation of word-cooccurrence to include metadataspecific dimensions. These additional dimensions reveal new anchor words that reflect specific combinations of metadata and topic. We show that these new latent representations predict sentiment as accurately as supervised topic models, and we find these representations more quickly without sacrificing interpretability. Topic models were introduced in an unsupervised setting (Blei et al., 2003), aiding in the discovery of topical structure in text: large corpora can be distilled into human-interpretable themes that facilitate quick understanding. In addition to illuminating document collections for humans, topic models have increasingly been used for automatic downstream applications such as sentiment analysis (Titov and McDonald, 2008; Paul and Girju, 2010; Nguyen et al., 2013). Unfortunately, the structure discovered by unsupervised topic models does not necessarily constitute the best set of features for tasks such as sentiment analysis. Consider a topic model trained on Amazon product reviews. A topic model might discover a topic about vampire romance. However, we often want to go deeper, discovering facets of a topic that reflect topic-specific sentiment, e.g., “buffy” and “spike” for positive sentiment vs. “twilight” and “cullen” for negative sentiment. Techniques for discovering such associations, called supervised topic models (Section 2), both produce interpretable topics and predict metadata values. While unsupervised topic models now have scalable inference strategies (Hoffman et al., 2013; Zhai et al., 2012), supervised topic model inference has not received as much attention and often scales poorly. The anchor algorithm is a fast, scalable unsupervised approach for finding “anchor words”—precise words with unique co-occurrence patterns that can define the topics of a collection of documents. We augment the anchor algorithm to find supervised sentiment-specific anchor words (Section 3). Our algorithm is faster and just as effective as traditional schemes for supervised topic modeling (Section 4). 1 Anchors: Speedy Unsupervised Models The anchor algorithm (Arora et al., 2013) begins with a V × V matrix Q̄ of word co-occurrences, where V is the size of the vocabulary. Each word type defines a vector Q̄i,· of length V so that Q̄i,j encodes the conditional probability of seeing word j given that word i has already been seen. Spectral methods (Anandkumar et al., 2012) and the anchor algorithm are fast alternatives to traditional topic model inference schemes because they can discover topics via these summary statistics (quadratic in the number of types) rather than examining the whole dataset (proportional to the much larger number of tokens). The anchor algorithm takes its name from the idea of anchor words—words which unambiguously identify a particular topic. For instance, “wicket” might be an anchor word for the cricket topic. Thus, for any anchor word a, Q̄a,· will look like a topic distribution. Q̄wicket,· will have high probability for “bowl”, “century”, “pitch”, and “bat”; these words are related to cricket, but they cannot be anchor words because they are also related to other topics. Because these other non-anchor words could be topically ambiguous, their co-occurrence must be explained through some combination of anchor words; thus for non-anchor word i,",
"title": ""
},
{
"docid": "15d5de81246fff7cf4f679c58ce19a0f",
"text": "Self-transcendence has been associated, in previous studies, with stressful life events and emotional well-being. This study examined the relationships among self-transcendence, emotional well-being, and illness-related distress in women with advanced breast cancer. The study employed a cross-sectional correlational design in a convenience sample (n = 107) of women with Stage IIIb and Stage IV breast cancer. Subjects completed a questionnaire that included Reed's Self-Transcendence Scale; Bradburn's Affect Balance Scale (ABS); a Cognitive Well-Being (CWB) Scale based on work by Campbell, Converse, and Rogers; McCorkle and Young's Symptom Distress Scale (SDS); and the Karnofsky Performance Scale (KPS). Data were analyzed using factor analytic structural equations modeling. Self-transcendence decreased illness distress (assessed by the SDS and the KPS) through the mediating effect of emotional well-being (assessed by the ABS and the CWB Scale). Self-transcendence directly affected emotional well-being (beta = 0.69), and emotional well-being had a strong negative effect on illness distress (beta = -0.84). A direct path from self-transcendence to illness distress (beta = -0.31) became nonsignificant (beta = -0.08) when controlling for emotional well-being. Further research using longitudinal data will seek to validate these relationships and to explain how nurses can promote self-transcendence in women with advanced breast cancer, as well as in others with life-threatening illnesses.",
"title": ""
},
{
"docid": "5b1f9c744daf1798c3af8b717132f87f",
"text": "We have observed a growth in the number of qualitative studies that have no guiding set of philosophic assumptions in the form of one of the established qualitative methodologies. This lack of allegiance to an established qualitative approach presents many challenges for “generic qualitative” studies, one of which is that the literature lacks debate about how to do a generic study well. We encourage such debate and offer four basic requirements as a point of departure: noting the researchers’ position, distinguishing method and methodology, making explicit the approach to rigor, and identifying the researchers’ analytic lens.",
"title": ""
},
{
"docid": "b3d79bd054f5d1deb7cf24c5c8cf397a",
"text": "Waste collection is a highly visible municipal service that involves large expenditures and difficult operational problems, plus it is expensive to operate in terms of investment costs (i.e. vehicles fleet), operational costs (i.e. fuel, maintenances) and environmental costs (i.e. emissions, noise and traffic congestions). Modern traceability devices, like volumetric sensors, identification RFID (Radio Frequency Identification) systems, GPRS (General Packet Radio Service) and GPS (Global Positioning System) technology, permit to obtain data in real time, which is fundamental to implement an efficient and innovative waste collection routing model. The basic idea is that knowing the real time data of each vehicle and the real time replenishment level at each bin makes it possible to decide, in function of the waste generation pattern, what bin should be emptied and what should not, optimizing different aspects like the total covered distance, the necessary number of vehicles and the environmental impact. This paper describes a framework about the traceability technology available in the optimization of solid waste collection, and introduces an innovative vehicle routing model integrated with the real time traceability data, starting the application in an Italian city of about 100,000 inhabitants. The model is tested and validated using simulation and an economical feasibility study is reported at the end of the paper.",
"title": ""
},
{
"docid": "52e21597d51d33e21b30f6a862e5aa98",
"text": "The epidermal growth factor receptor (EGFR)-directed tyrosine kinase inhibitors (TKIs) gefitinib, erlotinib and afatinib are approved treatments for non-small cell lung cancers harbouring activating mutations in the EGFR kinase, but resistance arises rapidly, most frequently owing to the secondary T790M mutation within the ATP site of the receptor. Recently developed mutant-selective irreversible inhibitors are highly active against the T790M mutant, but their efficacy can be compromised by acquired mutation of C797, the cysteine residue with which they form a key covalent bond. All current EGFR TKIs target the ATP-site of the kinase, highlighting the need for therapeutic agents with alternative mechanisms of action. Here we describe the rational discovery of EAI045, an allosteric inhibitor that targets selected drug-resistant EGFR mutants but spares the wild-type receptor. The crystal structure shows that the compound binds an allosteric site created by the displacement of the regulatory C-helix in an inactive conformation of the kinase. The compound inhibits L858R/T790M-mutant EGFR with low-nanomolar potency in biochemical assays. However, as a single agent it is not effective in blocking EGFR-driven proliferation in cells owing to differential potency on the two subunits of the dimeric receptor, which interact in an asymmetric manner in the active state. We observe marked synergy of EAI045 with cetuximab, an antibody therapeutic that blocks EGFR dimerization, rendering the kinase uniformly susceptible to the allosteric agent. EAI045 in combination with cetuximab is effective in mouse models of lung cancer driven by EGFR(L858R/T790M) and by EGFR(L858R/T790M/C797S), a mutant that is resistant to all currently available EGFR TKIs. More generally, our findings illustrate the utility of purposefully targeting allosteric sites to obtain mutant-selective inhibitors.",
"title": ""
},
{
"docid": "aa72af5867ec5862706fc66bacfd622a",
"text": "This paper presents a sensor fusion strategy applied for Simultaneous Localization and Mapping (SLAM) in dynamic environments. The designed approach consists of two features: (i) the first one is a fusion module which synthesizes line segments obtained from laser rangefinder and line features extracted from monocular camera. This policy eliminates any pseudo segments that appear from any momentary pause of dynamic objects in laser data. (ii) The second characteristic is a modified multi-sensor point estimation fusion SLAM (MPEF-SLAM) that incorporates two individual Extended Kalman Filter (EKF) based SLAM algorithms: monocular and laser SLAM. The error of the localization in fused SLAM is reduced compared with those of individual SLAM. Additionally, a new data association technique based on the homography transformation matrix is developed for monocular SLAM. This data association method relaxes the pleonastic computation. The experimental results validate the performance of the proposed sensor fusion and data association method.",
"title": ""
},
{
"docid": "ba02d2ecf18d0bc24a3e8884b5de54ed",
"text": "We present glasses: Global optimisation with Look-Ahead through Stochastic Simulation and Expected-loss Search. The majority of global optimisation approaches in use are myopic, in only considering the impact of the next function value; the non-myopic approaches that do exist are able to consider only a handful of future evaluations. Our novel algorithm, glasses, permits the consideration of dozens of evaluations into the future. This is done by approximating the ideal look-ahead loss function, which is expensive to evaluate, by a cheaper alternative in which the future steps of the algorithm are simulated beforehand. An Expectation Propagation algorithm is used to compute the expected value of the loss. We show that the far-horizon planning thus enabled leads to substantive performance gains in empirical tests.",
"title": ""
},
{
"docid": "8dc3ba4784ea55183e96b466937d050b",
"text": "One of the major problems that clinical neuropsychology has had in memory clinics is to apply ecological, easily administrable and sensitive tests that can make the diagnosis of dementia both precocious and reliable. Often the choice of the best neuropsychological test is hard because of a number of variables that can influence a subject’s performance. In this regard, tests originally devised to investigate cognitive functions in healthy adults are not often appropriate to analyze cognitive performance in old subjects with low education because of their intrinsically complex nature. In the present paper, we present normative values for the Rey–Osterrieth Complex Figure B Test (ROCF-B) a simple test that explores constructional praxis and visuospatial memory. We collected normative data of copy, immediate and delayed recall of the ROCF-B in a group of 346 normal Italian subjects above 40 years. A multiple regression analysis was performed to evaluate the potential effect of age, sex, and education on the three tasks administered to the subjects. Age and education had a significant effect on copying, immediate recall, and delayed recall as well as on the rate of forgetting. Correction grids and equivalent scores with cut-off values relative to each task are available. The availability of normative values can make the ROCF-B a valid instrument to assess non-verbal memory in adults and in the elderly for whom the commonly used ROCF-A is too demanding.",
"title": ""
},
{
"docid": "529e132a37f9fb37ddf04984236f4b36",
"text": "The first steps in analyzing defensive malware are understanding what obfuscations are present in real-world malware binaries, how these obfuscations hinder analysis, and how they can be overcome. While some obfuscations have been reported independently, this survey consolidates the discussion while adding substantial depth and breadth to it. This survey also quantifies the relative prevalence of these obfuscations by using the Dyninst binary analysis and instrumentation tool that was recently extended for defensive malware analysis. The goal of this survey is to encourage analysts to focus on resolving the obfuscations that are most prevalent in real-world malware.",
"title": ""
},
{
"docid": "6cc203d16e715cbd71efdeca380f3661",
"text": "PURPOSE\nTo determine a population-based estimate of communication disorders (CDs) in children; the co-occurrence of intellectual disability (ID), autism, and emotional/behavioral disorders; and the impact of these conditions on the prevalence of CDs.\n\n\nMETHOD\nSurveillance targeted 8-year-olds born in 1994 residing in 2002 in the 3 most populous counties in Utah (n = 26,315). A multiple-source record review was conducted at all major health and educational facilities.\n\n\nRESULTS\nA total of 1,667 children met the criteria of CD. The prevalence of CD was estimated to be 63.4 per 1,000 8-year-olds (95% confidence interval = 60.4-66.2). The ratio of boys to girls was 1.8:1. Four percent of the CD cases were identified with an ID and 3.7% with autism spectrum disorders (ASD). Adjusting the CD prevalence to exclude ASD and/or ID cases significantly affected the CD prevalence rate. Other frequently co-occurring emotional/behavioral disorders with CD were attention deficit/hyperactivity disorder, anxiety, and conduct disorder.\n\n\nCONCLUSIONS\nFindings affirm that CDs and co-occurring mental health conditions are a major educational and public health concern.",
"title": ""
},
{
"docid": "bd92af2495300beb16e8832a80e9fc25",
"text": "Increasingly, business analytics is seen to provide the possibilities for businesses to effectively support strategic decision-making, thereby to become a source of strategic business value. However, little research exists regarding the mechanism through which business analytics supports strategic decisionmaking and ultimately organisational performance. This paper draws upon literature on IT affordances and strategic decision-making to (1) understand the decision-making affordances provided by business analytics, and (2) develop a research model linking business analytics, data-driven culture, decision-making affordances, strategic decision-making, and organisational performance. The model is empirically tested using structural equation modelling based on 296 survey responses collected from UK businesses. The study produces four main findings: (1) business analytics has a positive effect on decision-making affordances both directly and indirectly through the mediation of a data-driven culture; (2) decision-making affordances significantly influence strategic decision comprehensiveness positively and intuitive decision-making negatively; (3) data-driven culture has a significant and positive effect on strategic decision comprehensiveness; and (4) strategic decision comprehensiveness has a positive effect on organisational performance but a negative effect on intuitive decision-making.",
"title": ""
},
{
"docid": "938e44b4c03823584d9f9fb9209a9b1e",
"text": "The competitive MNIST handwritten digit recognition benchmark has a long history of broken records since 1998. The most recent substantial improvement by others dates back 7 years (error rate 0.4%) . Recently we were able to significantly improve this result, using graphics cards to greatly speed up training of simple but deep MLPs, which achieved 0.35%, outperforming all the previous more complex methods. Here we report another substantial improvement: 0.31% obtained using a committee of MLPs.",
"title": ""
},
{
"docid": "1ead17fc0770233db8903db2b4f15c79",
"text": "The major objective of this paper is to examine the determinants of collaborative commerce (c-commerce) adoption with special emphasis on Electrical and Electronic organizations in Malaysia. Original research using a self-administered questionnaire was distributed to 400 Malaysian organizations. Out of the 400 questionnaires posted, 109 usable questionnaires were returned, yielding a response rate of 27.25%. Data were analysed by using correlation and multiple regression analysis. External environment, organization readiness and information sharing culture were found to be significant in affecting organ izations decision to adopt c-commerce. Information sharing culture factor was found to have the strongest influence on the adoption of c-commerce, followed by organization readiness and external environment. Contrary to other technology adoption studies, this research found that innovation attributes have no significant influence on the adoption of c-commerce. In terms of theoretical contributions, this study has extended previous researches conducted in western countries and provides great potential by advancing the understanding between the association of adoption factors and c-commerce adoption level. This research show that adoption studies could move beyond studying the factors based on traditional adoption models. Organizations planning to adopt c-commerce would also be able to applied strategies based on the findings from this research.",
"title": ""
},
{
"docid": "736f8a02bbe5ab9a5b9dd5026430e05c",
"text": "We present a novel approach for interactive navigation and planning of multiple agents in crowded scenes with moving obstacles. Our formulation uses a precomputed roadmap that provides macroscopic, global connectivity for wayfinding and combines it with fast and localized navigation for each agent. At runtime, each agent senses the environment independently and computes a collision-free path based on an extended \"Velocity Obstacles\" concept. Furthermore, our algorithm ensures that each agent exhibits no oscillatory behaviors. We have tested the performance of our algorithm in several challenging scenarios with a high density of virtual agents. In practice, the algorithm performance scales almost linearly with the number of agents and can run at interactive rates on multi-core processors.",
"title": ""
},
{
"docid": "39be1d73b84872b0ae1d61bbd0fc96f8",
"text": "Annotating data is a common bottleneck in building text classifiers. This is particularly problematic in social media domains, where data drift requires frequent retraining to maintain high accuracy. In this paper, we propose and evaluate a text classification method for Twitter data whose only required human input is a single keyword per class. The algorithm proceeds by identifying exemplar Twitter accounts that are representative of each class by analyzing Twitter Lists (human-curated collections of related Twitter accounts). A classifier is then fit to the exemplar accounts and used to predict labels of new tweets and users. We develop domain adaptation methods to address the noise and selection bias inherent to this approach, which we find to be critical to classification accuracy. Across a diverse set of tasks (topic, gender, and political affiliation classification), we find that the resulting classifier is competitive with a fully supervised baseline, achieving superior accuracy on four of six datasets despite using no manually labeled data.",
"title": ""
}
] | scidocsrr |
237d5f4491cfc86a5fc97770a5e3d71e | Modeling Multistep Cyber Attacks for Scenario Recognition | [
{
"docid": "927f2c68d709c7418ad76fd9d81b18c4",
"text": "With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach to alert correlation, extending ideas from multisensor data fusion. Features used for alert correlation are based on alert content that anticipates evolving IETF standards. The probabilistic approach provides a unified mathematical framework for correlating alerts that match closely but not perfectly, where the minimum degree of match required to fuse alerts is controlled by a single configurable parameter. Only features in common are considered in the fusion algorithm. For each feature we define an appropriate similarity function. The overall similarity is weighted by a specifiable expectation of similarity. In addition, a minimum similarity may be specified for some or all features. Features in this set must match at least as well as the minimum similarity specification in order to combine alerts, regardless of the goodness of match on the feature set as a whole. Our approach correlates attacks over time, correlates reports from heterogeneous sensors, and correlates multiple attack steps.",
"title": ""
},
{
"docid": "44f41d363390f6f079f2e67067ffa36d",
"text": "The research described in this paper was supported in part by the National Science Foundation under Grants IST-g0-12418 and IST-82-10564. and in part by the Office of Naval Research under Grant N00014-80-C-0197. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. © 1983 ACM 0001-0782/83/1100.0832 75¢",
"title": ""
}
] | [
{
"docid": "0d4d6f989e038fb87dd427a23731c4ff",
"text": "The power prediction for photovoltaic (PV) power plants has significant importance for their grid connection. Due to PV power’s periodicity and non-stationary characteristics, traditional power prediction methods based on linear or time series models are no longer applicable. This paper presents a method combining the advantages of the wavelet decomposition (WD) and artificial neural network (ANN) to solve this problem. With the ability of ANN to address nonlinear relationships, theoretical solar irradiance and meteorological variables are chosen as the input of the hybrid model based on WD and ANN. The output power of the PV plant is decomposed using WD to separated useful information from disturbances. The ANNs are used to build the models of the decomposed PV output power. Finally, the outputs of the ANN models are reconstructed into the forecasted PV plant power. The presented method is compared with the traditional forecasting method based on ANN. The results shows that the method described in this paper needs less calculation time and has better forecasting precision.",
"title": ""
},
{
"docid": "dd634fe7f5bfb5d08d0230c3e64220a4",
"text": "Living in an oxygenated environment has required the evolution of effective cellular strategies to detect and detoxify metabolites of molecular oxygen known as reactive oxygen species. Here we review evidence that the appropriate and inappropriate production of oxidants, together with the ability of organisms to respond to oxidative stress, is intricately connected to ageing and life span.",
"title": ""
},
{
"docid": "ca729733929e23acffbfec5138f42155",
"text": "Lymphadenopathy is benign and self-limited in most patients. Etiologies include malignancy, infection, and autoimmune disorders, as well as medications and iatrogenic causes. The history and physical examination alone usually identify the cause of lymphadenopathy. When the cause is unknown, lymphadenopathy should be classified as localized or generalized. Patients with localized lymphadenopathy should be evaluated for etiologies typically associated with the region involved according to lymphatic drainage patterns. Generalized lymphadenopathy, defined as two or more involved regions, often indicates underlying systemic disease. Risk factors for malignancy include age older than 40 years, male sex, white race, supraclavicular location of the nodes, and presence of systemic symptoms such as fever, night sweats, and unexplained weight loss. Palpable supraclavicular, popliteal, and iliac nodes are abnormal, as are epitrochlear nodes greater than 5 mm in diameter. The workup may include blood tests, imaging, and biopsy depending on clinical presentation, location of the lymphadenopathy, and underlying risk factors. Biopsy options include fine-needle aspiration, core needle biopsy, or open excisional biopsy. Antibiotics may be used to treat acute unilateral cervical lymphadenitis, especially in children with systemic symptoms. Corticosteroids have limited usefulness in the management of unexplained lymphadenopathy and should not be used without an appropriate diagnosis.",
"title": ""
},
{
"docid": "5806b1bd779c7f39ecf2dac3f51ce267",
"text": "We have conducted two investigations on the ability of human participants to solve challenging collective coordination tasks in a distributed fashion with limited perception and communication capabilities similar to those of a simple ground robot. In these investigations, participants were gathered in a laboratory of networked workstations and were given a series of different collective tasks with varying communication and perception capabilities. Here, we focus on our latest investigation and describe our methodology, platform design considerations, and highlight some interesting observed behaviors. These investigations are the preliminary phase in designing a formal strategy for learning human-inspired behaviors for solving complex distributed multirobot problems, such as pattern formation.",
"title": ""
},
{
"docid": "5c5e133f1280a5b3b42477fd94fbb338",
"text": "Linear subspace methods that provide sufficient reconstruction of the data, such as PCA, offer an efficient way of dealing with missing pixels, outliers, and occlusions that often appear in the visual data. Discriminative methods, such as LDA, which, on the other hand, are better suited for classification tasks, are highly sensitive to corrupted data. We present a theoretical framework for achieving the best of both types of methods: an approach that combines the discrimination power of discriminative methods with the reconstruction property of reconstructive methods which enables one to work on subsets of pixels in images to efficiently detect and reject the outliers. The proposed approach is therefore capable of robust classification with a high-breakdown point. We also show that subspace methods, such as CCA, which are used for solving regression tasks, can be treated in a similar manner. The theoretical results are demonstrated on several computer vision tasks showing that the proposed approach significantly outperforms the standard discriminative methods in the case of missing pixels and images containing occlusions and outliers.",
"title": ""
},
{
"docid": "a2faba3e69563acf9e874bf4c4327b5d",
"text": "We analyze a mobile wireless link comprising M transmitter andN receiver antennas operating in a Rayleigh flat-fading environment. The propagation coef fici nts between every pair of transmitter and receiver antennas are statistically independent and un known; they remain constant for a coherence interval ofT symbol periods, after which they change to new independent v alues which they maintain for anotherT symbol periods, and so on. Computing the link capacity, associated with channel codin g over multiple fading intervals, requires an optimization over the joint density of T M complex transmitted signals. We prove that there is no point in making the number of transmitter antennas greater t han the length of the coherence interval: the capacity forM > T is equal to the capacity for M = T . Capacity is achieved when the T M transmitted signal matrix is equal to the product of two stat i ically independent matrices: a T T isotropically distributed unitary matrix times a certain T M random matrix that is diagonal, real, and nonnegative. This result enables us to determine capacity f or many interesting cases. We conclude that, for a fixed number of antennas, as the length of the coherence i nterval increases, the capacity approaches the capacity obtained as if the receiver knew the propagatio n coefficients. Index Terms —Multi-element antenna arrays, wireless communications, space-time modulation",
"title": ""
},
{
"docid": "e33fa438f4a75831712f93d475ffce53",
"text": "We present a new and more symmetric version of the circumscription method of nonmonotonic reasoning first described in (McCarthy 1980) and some applications to formalizing common sense knowledge. The applications in this paper are mostly based on minimizing the abnormality of different aspects of various entities. Included are nonmonotonic treatments of is-a hierarchies, the unique names hypothesis, and the frame problem. The new circumscription may be called formula circumscription to distinguish it from the previously defined domain circumscription and predicate circumscription. A still more general formalism called prioritized circumscription is briefly explored.",
"title": ""
},
{
"docid": "350d1717a5192873ef9e0ac9ed3efc7b",
"text": "OBJECTIVE\nTo describe the effects of percutaneously implanted valve-in-valve in the tricuspid position for patients with pre-existing transvalvular device leads.\n\n\nMETHODS\nIn this case series, we describe implantation of the Melody valve and SAPIEN XT valve within dysfunctional bioprosthetic tricuspid valves in three patients with transvalvular device leads.\n\n\nRESULTS\nIn all cases, the valve was successfully deployed and device lead function remained unchanged. In 1/3 cases with 6-month follow-up, device lead parameters remain unchanged and transcatheter valve-in-valve function remains satisfactory.\n\n\nCONCLUSIONS\nTranscatheter tricuspid valve-in-valve is feasible in patients with pre-existing transvalvular devices leads. Further study is required to determine the long-term clinical implications of this treatment approach.",
"title": ""
},
{
"docid": "11cce2c0dae058a7d101387f58e00e5a",
"text": "It is a commonly held perception amongst biomechanists, sports medicine practitioners, baseball coaches and players, that an individual baseball player's style of throwing or pitching influences their performance and susceptibility to injury. With the results of a series of focus groups with baseball managers and pitching coaches in mind, the available scientific literature was reviewed regarding the contribution of individual aspects of pitching and throwing mechanics to potential for injury and performance. After a discussion of the limitations of kinematic and kinetic analyses, the individual aspects of pitching mechanics are discussed under arbitrary headings: Foot position at stride foot contact; Elbow flexion; Arm rotation; Arm horizontal abduction; Arm abduction; Lead knee position; Pelvic orientation; Deceleration-phase related issues; Curveballs; and Teaching throwing mechanics. In general, popular opinion of baseball coaching staff was found to be largely in concordance with the scientific investigations of biomechanists with several notable exceptions. Some difficulties are identified with the practical implementation of analyzing throwing mechanics in the field by pitching coaches, and with some unquantified aspects of scientific analyses. Key pointsBiomechanical analyses including kinematic and kinetic analyses allow for estimation of pitching performance and potential for injury.Some difficulties both theoretic and practical exist for the implementation and interpretation of such analyses.Commonly held opinions of baseball pitching authorities are largely held to concur with biomechanical analyses.Recommendations can be made regarding appropriate pitching and throwing technique in light of these investigations.",
"title": ""
},
{
"docid": "8439dbba880179895ab98a521b4c254f",
"text": "Given the increase in demand for sustainable livelihoods for coastal villagers in developing countries and for the commercial eucheumoid Kappaphycus alvarezii (Doty) Doty, for the carrageenan industry, there is a trend towards introducing K. alvarezii to more countries in the tropical world for the purpose of cultivation. However, there is also increasing concern over the impact exotic species have on endemic ecosystems and biodiversity. Quarantine and introduction procedures were tested in northern Madagascar and are proposed for all future introductions of commercial eucheumoids (K. alvarezii, K. striatum and Eucheuma denticulatum). In addition, the impact and extent of introduction of K. alvarezii was measured on an isolated lagoon in the southern Lau group of Fiji. It is suggested that, in areas with high human population density, the overwhelming benefits to coastal ecosystems by commercial eucheumoid cultivation far outweigh potential negative impacts. However, quarantine and introduction procedures should be followed. In addition, introduction should only take place if a thorough survey has been conducted and indicates the site is appropriate. Subsequently, the project requires that a well designed and funded cultivation development programme, with a management plan and an assured market, is in place in order to make certain cultivation, and subsequently the introduced algae, will not be abandoned at a later date. KAPPAPHYCUS ALVAREZI",
"title": ""
},
{
"docid": "280c39aea4584e6f722607df68ee28dc",
"text": "Statistical parametric speech synthesis (SPSS) using deep neural networks (DNNs) has shown its potential to produce naturally-sounding synthesized speech. However, there are limitations in the current implementation of DNN-based acoustic modeling for speech synthesis, such as the unimodal nature of its objective function and its lack of ability to predict variances. To address these limitations, this paper investigates the use of a mixture density output layer. It can estimate full probability density functions over real-valued output features conditioned on the corresponding input features. Experimental results in objective and subjective evaluations show that the use of the mixture density output layer improves the prediction accuracy of acoustic features and the naturalness of the synthesized speech.",
"title": ""
},
{
"docid": "f0bbf04880a84b9fc814af4ae2ef8867",
"text": "BACKGROUND AND PURPOSE\nThe Very Early Nimodipine Use in Stroke (VENUS) trial was designed to test the hypothesis that early treatment with nimodipine has a positive effect on survival and functional outcome after stroke. This was suggested in a previous meta-analysis on the use of nimodipine in stroke. However, in a recent Cochrane review we were unable to reproduce these positive results. This led to the early termination of VENUS after an interim analysis.\n\n\nMETHODS\nIn this randomized, double-blind, placebo-controlled trial, treatment was started by general practitioners or neurologists within 6 hours after stroke onset (oral nimodipine 30 mg QID or identical placebo, for 10 days). Main analyses included comparisons of the primary end point (poor outcome, defined as death or dependency after 3 months) and secondary end points (neurological status and blood pressure 24 hours after inclusion, mortality after 10 days, and adverse events) between treatment groups. Subgroup analyses (on final diagnosis and based on the per-protocol data set) were performed.\n\n\nRESULTS\nAt trial termination, after inclusion of 454 patients (225 nimodipine, 229 placebo), no effect of nimodipine was found. After 3 months of follow-up, 32% (n=71) of patients in the nimodipine group had a poor outcome compared with 27% (n=62) in the placebo group (relative risk, 1.2; 95% CI, 0.9 to 1.6). A treatment effect was not found for secondary outcomes and in the subgroup analyses.\n\n\nCONCLUSIONS\nThe results of VENUS do not support the hypothesis of a beneficial effect of early nimodipine in stroke patients.",
"title": ""
},
{
"docid": "ec04a026adeba4e75155e2b8e9eb6e7b",
"text": "Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are going to extensively rely on dense small cell deployments, which would exploit infrastructure and network functions virtualization (NFV), and push the network intelligence towards network edges by embracing the concept of mobile edge computing (MEC). As security will be a fundamental enabling factor of small cell as a service (SCaaS) in 5G networks, we present the most prominent threats and vulnerabilities against a broad range of targets. As far as the related work is concerned, to the best of our knowledge, this paper is the rst to investigate security challenges at the intersection of SCaaS, NFV, and MEC. It is also the rst paper that proposes a set of criteria to facilitate a clear and e ective taxonomy of security challenges of main elements of 5G networks. Our analysis can serve as a staring point towards the development of appropriate 5G security solutions. These will have crucial e ect on legal and regulatory frameworks as well as on decisions of businesses, governments, and end-users.",
"title": ""
},
{
"docid": "2b362c476a2081ce59bade9b845f10e4",
"text": "OBJECTIVE\nTo assess the clinical outcome of crushed cartilage grafts used to conceal contour irregularities in rhinoplasty.\n\n\nMETHODS\nWe reviewed the medical records of 462 patients in whom crushed autogenous cartilage grafts were used, selected from a total of 669 patients in whom rhinoplasty procedures were performed at our institution between June 1, 1999, and June 1, 2006. The grafts were used as slightly, moderately, significantly, or severely crushed.\n\n\nRESULTS\nEight hundred nine cartilage grafts (41 slightly crushed grafts [5%], 650 moderately crushed grafts [80%], and 118 significantly crushed grafts [15%]) were used in 462 patients. Resorption occurred in 11 of the 462 patients (2.4%). All of the resorbed grafts (6 moderately crushed grafts and 5 significantly crushed grafts) had been placed in the dorsal area. The resorption rate of those grafts was lower in the moderately crushed cartilage grafts (6 of 284 grafts [2.1%]) than in the significantly crushed grafts (5 of 38 grafts [13.1%]). There was no resorption of slightly crushed grafts.\n\n\nCONCLUSIONS\nThe degree of crushing applied is important for long-term clinical outcome of autogenous crushed cartilage grafts. Slight or moderate crushing of cartilage creates an outstanding graft material for concealing irregularities and provides both excellent long-term clinical outcome and predictable esthetic results.",
"title": ""
},
{
"docid": "659ba70d9d0d17e5d1b708cb5c61be2c",
"text": "It has been hypothesized that there is a critical period for first-language acquisition that extends into late childhood and possibly until puberty. The hypothesis is difficult to test directly because cases of linguistic deprivation during childhood are fortunately rare. We present here the case of E.M., a young man who has been profoundly deaf since birth and grew up in a rural area where he received no formal education and had no contact with the deaf community. At the age of 15, E.M. was fitted with hearing aids that corrected his hearing loss to 35 dB, and he began to learn verbal Spanish. We describe his language development over the 4-year period since his acquisition of hearing aids and conclude that the demonstrates severe deficits in verbal comprehension and production that support the critical period hypothesis.",
"title": ""
},
{
"docid": "9c74cef6fde489ec69ea1d3e0f2f011f",
"text": "The author acknowledges the financial support for this research made available by the Lean Aerospace Initiative at MIT sponsored jointly by the US Air Force and a consortium of aerospace companies. All facts, statements, opinions, and conclusions expressed herein are solely those of the author and do not in any way reflect those of the Lean Aerospace Initiative, the US Air Force, the sponsoring companies and organizations (individually or as a group), or MIT. The latter are absolved from any remaining errors or shortcomings for which the author takes full responsibility. Introduction The essence of lean is very simple, but from a research and implementation point of view overwhelming. Lean is the search for perfection through the elimination of waste and the insertion of practices that contribute to reduction in cost and schedule while improving performance of products. This concept of lean has wide applicability to a large range of processes, people and organizations, from concept design to the factory floor, from the laborer to the upper management, from the customer to the developer. Progress has been made in implementing and raising the awareness of lean practices at the factory floor. However, the level of implementation and education in other areas, like product development, is very low. The Lean Aerospace Initiative (LAI) has been producing research in support of the military and industry since 1993 on the topic of lean and its benefits. Implementation of the research has been shown to have significant impact and interest. LAI is in a very unique situation at MIT to influence and educate world-class engineering students we have exposure to every day. This research will take advantage of this situation and produce a strategic framework for educating engineers on the front-end lean product development findings that have been produced through LAI. These include topics of understanding the customer and the product value, evaluating multidimensional risk, organizational impact on program performance, and many others. The research objectives are to: 1) synthesize the findings uncovered by LAI pertaining to non-manufacturing disciplines into a readily usable manner and 2) formulate a strategic approach for educating engineers on the tools and concepts that facilitate early problem synthesis, mission engineering, and front end product development. Overview There are six modules into which the LAI product development research has been organized. Module I is used to provide a fundamental framework of lean and its application to product development. Module II …",
"title": ""
},
{
"docid": "245a31291c7d8fbaac249f9e4585c652",
"text": "A recent advancement of the mobile web has enabled features previously only found in natively developed apps. Thus, arduous development for several platforms or using cross-platform approaches was required. The novel approach, coined Progressive Web Apps, can be implemented through a set of concepts and technologies on any web site that meets certain requirements. In this paper, we argue for progressive web apps as a possibly unifying technology for web apps and native apps. After an introduction of features, we scrutinize the performance. Two cross-platform mobile apps and one Progressive Web App have been developed for comparison purposes, and provided in an open source repository for results’ validity verification. We aim to spark interest in the academic community, as a lack of academic involvement was identified as part of the literature search.",
"title": ""
},
{
"docid": "8c428f4a51091f62f1af26c85dd588fc",
"text": "In this study, we explored application of Word2Vec and Doc2Vec for sentiment analysis of clinical discharge summaries. We applied unsupervised learning since the data sets did not have sentiment annotations. Note that unsupervised learning is a more realistic scenario than supervised learning which requires an access to a training set of sentiment-annotated data. We aim to detect if there exists any underlying bias towards or against a certain disease. We used SentiWordNet to establish a gold sentiment standard for the data sets and evaluate performance of Word2Vec and Doc2Vec methods. We have shown that the Word2vec and Doc2Vec methods complement each other’s results in sentiment analysis of the data sets.",
"title": ""
},
{
"docid": "8c086dec1e59a2f0b81d6ce74e92eae7",
"text": "A necessary attribute of a mobile robot planning algorithm is the ability to accurately predict the consequences of robot actions to make informed decisions about where and how to drive. It is also important that such methods are efficient, as onboard computational resources are typically limited and fast planning rates are often required. In this article, we present several practical mobile robot motion planning algorithms for local and global search, developed with a common underlying trajectory generation framework for use in model-predictive control. These techniques all center on the idea of generating informed, feasible graphs at scales and resolutions that respect computational and temporal constraints of the application. Connectivity in these graphs is provided by a trajectory generator that searches in a parameterized space of robot inputs subject to an arbitrary predictive motion model. Local search graphs connect the currently observed state-to-states at or near the planning or perception horizon. Global search graphs repeatedly expand a precomputed trajectory library in a uniformly distributed state lattice to form a recombinant search space that respects differential constraints. In this article, we discuss the trajectory generation algorithm, methods for online or offline calibration of predictive motion models, sampling strategies for local search graphs that exploit global guidance and environmental information for real-time obstacle avoidance and navigation, and methods for efficient design of global search graphs with attention to optimality, feasibility, and computational complexity of heuristic search. The model-invariant nature of our approach to local and global motions planning has enabled a rapid and successful application of these techniques to a variety of platforms. Throughout the article, we also review experiments performed on planetary rovers, field robots, mobile manipulators, and autonomous automobiles and discuss future directions of the article.",
"title": ""
},
{
"docid": "c9ff6e6c47b6362aaba5f827dd1b48f2",
"text": "IEC 62056 for upper-layer protocols and IEEE 802.15.4g for communication infrastructure are promising means of advanced metering infrastructure (AMI) in Japan. However, since the characteristics of a communication system based on these combined technologies have yet to be identified, this paper gives the communication failure rates and latency acquired by calculations. In addition, the calculation results suggest some adequate AMI configurations, and show its extensibility in consideration of the usage environment.",
"title": ""
}
] | scidocsrr |
1f77343adb8bcba68c3a686b1db228f1 | Obstacle detection using stereovision for Android-based mobile devices | [
{
"docid": "0e12ea5492b911c8879cc5e79463c9fa",
"text": "In this paper, we propose a complete on-device 3D reconstruction pipeline for mobile monocular hand-held devices, which generates dense 3D models with absolute scale on-site while simultaneously supplying the user with real-time interactive feedback. The method fills a gap in current cloud-based mobile reconstruction services as it ensures at capture time that the acquired image set fulfills desired quality and completeness criteria. In contrast to existing systems, the developed framework offers multiple innovative solutions. In particular, we investigate the usability of the available on-device inertial sensors to make the tracking and mapping process more resilient to rapid motions and to estimate the metric scale of the captured scene. Moreover, we propose an efficient and accurate scheme for dense stereo matching which allows to reduce the processing time to interactive speed. We demonstrate the performance of the reconstruction pipeline on multiple challenging indoor and outdoor scenes of different size and depth variability.",
"title": ""
},
{
"docid": "672e09f1817c6aa7e48f1b50032c3257",
"text": "A new approach for the detection of the road surface and obstacles is presented. The high accuracy of the method allows the detection of traffic isles as a distinct class. The 3-D data inferred from dense stereo are transformed into a rectangular digital elevation map (DEM). Two classifiers are proposed, namely, density based and road surface based. The density-based obstacle classifier marks DEM cells as road or obstacles, using the density of 3-D points as a criterion. A quadratic road surface model is initially fitted by a random sample consensus (RANSAC) approach to the region in front of the ego vehicle. A region growing-like process refines this primary solution, driven by the 3-D uncertainty model of the stereo sensor. A robust global solution for the road surface is obtained. The road surface is used for discrimination between road, traffic isle, and obstacle points. Fusion and error filtering is performed on the results of the two classifiers. The proposed real-time algorithm was evaluated in an urban scenario and can be used in complex applications from collision avoidance to path planning.",
"title": ""
}
] | [
{
"docid": "53a8cb98a94dfdfd011048eea32e09a2",
"text": "In biological systems oxidation of heme is carried out by two isozymes of the microsomal heme oxygenase, HO-1 and HO-2. HO-1 is the commonly known heme oxygenase, the activity of which can be induced by up to 100-fold in response to a wide variety of stimuli (metals, heme, hormones, etc.). HO-2 was only recently discovered, and the isozyme appears to be uninducible. The two forms are products of two different genes and differ in their tissue expression. The primary structure of HO-1 and an HO-2 fragment of 91 amino acid residues show only 58% homology, but share a region with 100% secondary structure homology. This region is believed to be the catalytic site. Most likely, HO-1 gene is regulated in the same manner as metallothione in the gene. HO-1 has a heat shock regulatory element, and possibly many promoter elements, which bind to respective inducers and cause transcription of the gene. In vivo induction of HO-1 activity in the liver is accompanied by decreases in the total P-450 levels and, in a reconstituted system, cytochrome P-450b heme can be quantitatively converted to biliverdin by HO-1 and HO-2. The enzyme activity is inhibited in vivo for extended periods subsequent to binding of Zn- and Sn- protoporphyrins. This property appears useful for the suppression of bilirubin production. The metalloporphyrins, however, are not innocuous and cause major disruptions in cellular metabolism. In this review recent findings on heme oxygenase are highlighted.",
"title": ""
},
{
"docid": "6b37baf34546ac4a630aa435af4a2284",
"text": "The adoption of smartphones, devices transforming from simple communication devices to ‘smart’ and multipurpose devices, is constantly increasing. Amongst the main reasons are their small size, their enhanced functionality and their ability to host many useful and attractive applications. However, this vast use of mobile platforms makes them an attractive target for conducting privacy and security attacks. This scenario increases the risk introduced by these attacks for personal mobile devices, given that the use of smartphones as business tools may extend the perimeter of an organization's IT infrastructure. Furthermore, smartphone platforms provide application developers with rich capabilities, which can be used to compromise the security and privacy of the device holder and her environment (private and/or organizational). This paper examines the feasibility of malware development in smartphone platforms by average programmers that have access to the official tools and programming libraries provided by smartphone platforms. Towards this direction in this paper we initially propose specific evaluation criteria assessing the security level of the well-known smartphone platforms (i.e. Android, BlackBerry, Apple iOS, Symbian, Windows Mobile), in terms of the development of malware. In the sequel, we provide a comparative analysis, based on a proof of concept study, in which the implementation and distribution of a location tracking malware is attempted. Our study has proven that, under circumstances, all smartphone platforms could be used by average developers as privacy attack vectors, harvesting data from the device without the users knowledge and consent.",
"title": ""
},
{
"docid": "fb03d0abb1a69f53fd89d427af122162",
"text": "Numerous studies have suggested that biodiversity reduces variability in ecosystem productivity through compensatory effects; that is, a species increases in its abundance in response to the reduction of another in a fluctuating environment. But this view has been challenged on several grounds. Because most studies have been based on artificially constructed grasslands with short duration, long-term studies of natural ecosystems are needed. On the basis of a 24-year study of the Inner Mongolia grassland, here we present three key findings. First, that January–July precipitation is the primary climatic factor causing fluctuations in community biomass production; second, that ecosystem stability (conversely related to variability in community biomass production) increases progressively along the hierarchy of organizational levels (that is, from species to functional group to whole community); and finally, that the community-level stability seems to arise from compensatory interactions among major components at both species and functional group levels. From a hierarchical perspective, our results corroborate some previous findings of compensatory effects. Undisturbed mature steppe ecosystems seem to culminate with high biodiversity, productivity and ecosystem stability concurrently. Because these relationships are correlational, further studies are necessary to verify the causation among these factors. Our study provides new insights for better management and restoration of the rapidly degrading Inner Mongolia grassland.",
"title": ""
},
{
"docid": "bfea738332e9802e255881c5592195f2",
"text": "This paper presents a distributed Kalman filter to estimate the state of a sparsely connected, large-scale, n -dimensional, dynamical system monitored by a network of N sensors. Local Kalman filters are implemented on nl-dimensional subsystems, nl Lt n, obtained by spatially decomposing the large-scale system. The distributed Kalman filter is optimal under an Lth order Gauss-Markov approximation to the centralized filter. We quantify the information loss due to this Lth-order approximation by the divergence, which decreases as L increases. The order of the approximation L leads to a bound on the dimension of the subsystems, hence, providing a criterion for subsystem selection. The (approximated) centralized Riccati and Lyapunov equations are computed iteratively with only local communication and low-order computation by a distributed iterate collapse inversion (DICI) algorithm. We fuse the observations that are common among the local Kalman filters using bipartite fusion graphs and consensus averaging algorithms. The proposed algorithm achieves full distribution of the Kalman filter. Nowhere in the network, storage, communication, or computation of n-dimensional vectors and matrices is required; only nl Lt n dimensional vectors and matrices are communicated or used in the local computations at the sensors. In other words, knowledge of the state is itself distributed.",
"title": ""
},
{
"docid": "3f157067ce2d5d6b6b4c9d9faaca267b",
"text": "The rise of network forms of organization is a key consequence of the ongoing information revolution. Business organizations are being newly energized by networking, and many professional militaries are experimenting with flatter forms of organization. In this chapter, we explore the impact of networks on terrorist capabilities, and consider how this development may be associated with a move away from emphasis on traditional, episodic efforts at coercion to a new view of terror as a form of protracted warfare. Seen in this light, the recent bombings of U.S. embassies in East Africa, along with the retaliatory American missile strikes, may prove to be the opening shots of a war between a leading state and a terror network. We consider both the likely context and the conduct of such a war, and offer some insights that might inform policies aimed at defending against and countering terrorism.",
"title": ""
},
{
"docid": "fc2bb6b1dd1c04c7939bd3b4e14ae49b",
"text": "Stochastic differential equations (SDEs) and the Kolmogorov partial differential equations (PDEs) associated to them have been widely used in models from engineering, finance, and the natural sciences. In particular, SDEs and Kolmogorov PDEs, respectively, are highly employed in models for the approximative pricing of financial derivatives. Kolmogorov PDEs and SDEs, respectively, can typically not be solved explicitly and it has been and still is an active topic of research to design and analyze numerical methods which are able to approximately solve Kolmogorov PDEs and SDEs, respectively. Nearly all approximation methods for Kolmogorov PDEs in the literature suffer under the curse of dimensionality or only provide approximations of the solution of the PDE at a single fixed space-time point. In this paper we derive and propose a numerical approximation method which aims to overcome both of the above mentioned drawbacks and intends to deliver a numerical approximation of the Kolmogorov PDE on an entire region [a, b]d without suffering from the curse of dimensionality. Numerical results on examples including the heat equation, the Black-Scholes model, the stochastic Lorenz equation, and the Heston model suggest that the proposed approximation algorithm is quite effective in high dimensions in terms of both accuracy and speed. 1 ar X iv :1 80 6. 00 42 1v 1 [ m at h. N A ] 1 J un 2 01 8",
"title": ""
},
{
"docid": "00b91e8539356af888c29e0813a0a4f5",
"text": "With white-light LEDs one can combine lighting and wireless communication functionalities in one source. We investigate feasible transmission rates in a moderate-size office room illuminated with commercially available phosphor-based LEDs. Due to prevalent high signal-to-noise ratios and negligible inter-symbol-interference maximum data rates of 300 Mbit/s are shown to be achievable with the use of pulse amplitude modulation (PAM) or discrete multi-tone modulation (DMT). Also, we present first experiments with white-light LEDs and demonstrate wireless net data rates of up to 101 Mbit/s.",
"title": ""
},
{
"docid": "a0a9785ee7688a601e678b4b8d40cb91",
"text": "We present a light-weight machine learning tool for NLP research. The package supports operations on both discrete and dense vectors, facilitating implementation of linear models as well as neural models. It provides several basic layers which mainly aims for single-layer linear and non-linear transformations. By using these layers, we can conveniently implement linear models and simple neural models. Besides, this package also integrates several complex layers by composing those basic layers, such as RNN, Attention Pooling, LSTM and gated RNN. Those complex layers can be used to implement deep neural models directly.",
"title": ""
},
{
"docid": "8bae7b67b58d8875838add5cc83b1bcb",
"text": "In Valve's Source graphics engine, bump mapping is combined with precomputed radiosity lighting to provide realistic surface illumination. When bump map data is derived from geometric descriptions of surface detail (such as height maps), only the lighting effects caused by the surface orientation are preserved. The significant lighting cues due to lighting occlusion by surface details are lost. While it is common to use another texture channel to hold an \"ambient occlusion\" field, this only provides a darkening effect which is independent of the direction from which the surface is being lit and requires an auxiliary channel of data.\n In this chapter, we present a modification to the Radiosity Normal Mapping system that we have described in this course in the past. This modification provides a directional occlusion function to the bump maps, which requires no additional texture memory and is faster than our previous non-shadowing solution.",
"title": ""
},
{
"docid": "687fcb4364d9a38ac5dccb9b81ff1778",
"text": "We investigated the feasibility of crowdsourcing full- fledged tutorial videos from ordinary people on the Web on how to solve math problems related to logarithms. This kind of approach (a form of learnersourcing [9, 11]) to efficiently collecting tutorial videos and other learning resources could be useful for realizing personalized learning-at-scale, whereby students receive specific learning resources -- drawn from a large and diverse set -- that are tailored to their individual and time-varying needs. Results of our study, in which we collected 399 videos from 66 unique \"teachers\" on Mechanical Turk, suggest that (1) approximately 100 videos -- over 80% of which are mathematically fully correct -- can be crowdsourced per week for $5/video; (2) the average learning gains (posttest minus pretest score) associated with watching the videos was stat. sig. higher than for a control video (0.105 versus 0.045); and (3) the average learning gains (0.1416) from watching the best tested crowdsourced videos was comparable to the learning gains (0.1506) from watching a popular Khan Academy video on logarithms.",
"title": ""
},
{
"docid": "e0d6701dfe2be9656606f64031be421d",
"text": "Most manipulator calibration techniques require expensive and/or complicated pose measuring devices, such as theodolites. This paper investigates a calibration method where the manipulator endpoint is constrained to a single contact point and executes self-motions. From the easily measured joint angle readings, and an identification model, the manipulator is calibrated. Adding a wrist force sensor allows for the calibration of elastic effects due to end-point forces and moments. Optimization of the procedure is discussed. Experimental results are presented, showing the effectiveness of the method. INTRODUCTION Physical errors, such as machining tolerances, assembly errors and elastic deformations, cause the geometric properties of a manipulator to be different from their ideal values. Model based error compensation of a robotic manipulator, also known as robot calibration, is a process to improve manipulator position accuracy using software. Classical calibration involves identifying an accurate functional relationship between the joint transducer readings and the workspace position of the end-effector in terms of parameters called generalized errors (Roth et al., 1987). This relationship is found from measured data and used to predict, and compensate for, the endpoint errors as a function of configuration. Considerable research has been performed to make manipulator calibration more effective both in terms of required number of measurements and computation by the procedure (Hollerbach, 1988; Hollerbach and Wampler, 1996; Roth et al., 1987). Several calibration techniques have been used to improve robot accuracy (Roth et al., 1987), including open and closed-loop methods (Everett and Lin, 1988). Open-loop methods require an external metrology system to measure the end-effector pose, such as theodolites. Obtaining open-loop measurements is generally very costly and time consuming, and must be performed regularly for very high precision systems. In contrast, closed-loop methods only need joint angle sensing, and the robot becomes self-calibrating. In closed-loop calibration, constraints are imposed on the end-effector of the robot, and the kinematic loop closure equations are adequate to calibrate the manipulator from joint readings alone. Past closed-loop methods have had the robot moving along an unsensed sliding joint at the endpoint, or constraining the endeffector to lie on a plane (Ikits and Hollerbach, 1997; Zhuang et al., 1999). This paper investigates a closed-loop calibration method that was among a number suggested by (Bennett and Hollerbach, 1991). In the method, called here Single Endpoint Contact (SEC) calibration, the robot endpoint is constrained to a single contact point. Using an end-effector fixture equivalent to a ball joint, the robot executes self-motions to move to different configurations. At each configuration, manipulator joint sensors provide data that is used in an SEC identification algorithm to estimate the robot’s parameters. A total least squares optimization procedure is used to improve the calibration accuracy (Hollerbach and Wampler, 1996).",
"title": ""
},
{
"docid": "f6d65dd3b759f6ea861b762bebe5eeff",
"text": "Cloud computing is new era of network based computing, where resources are distributed over the network and shared among its users. Any user can use these resources through internet on the basis of Pay-As-Per-Use system. A service used by any user can produce a very large amount of data. So in this case, the data transfer cost between two dependent resources will be very high. In addition, a complex application can have a large number of tasks which may cause an increase in total cost of execution of that application, if not scheduled in an optimized way. So to overcome these problems, the authors present a Cat Swarm Optimization (CSO) - based heuristic scheduling algorithm to schedule the tasks of an application onto available resources. The CSO heuristic algorithm considers both data transmission cost between two dependent resources and execution cost of tasks on different resources. The authors experiment with the proposed CSO algorithm using a hypothetical workflow and compare the workflow scheduling results with the existing Particle Swarm Optimization (PSO) algorithm. The experimental results show - (1) CSO gives an optimal task-to-resource (TOR) scheduling scheme that minimizes the total cost, (2) CSO shows an improvement over existing PSO in terms of number of iterations, and (3) CSO ensures fair load distribution on the available resources.",
"title": ""
},
{
"docid": "f45fc4d1cefa08f09b60752f44359090",
"text": "A novel organization of switched capacitor charge pump circuits based on voltage doubler structures is presented in this paper. Each voltage doubler takes a dc input and outputs a doubled dc voltage. By cascading voltage doublers the output voltage increases up to2 times. A two-phase voltage doubler and a multiphase voltage doubler (MPVD) structures are discussed and design considerations are presented. A simulator working in the – realm was used for simplified circuit level simulation. In order to evaluate the power delivered by a charge pump, a resistive load is attached to the output of the charge pump and an equivalent capacitance is evaluated. A comparison of the voltage doubler circuits with Dickson charge pump and Makowski’s voltage multiplier is presented in terms of the area requirements, the voltage gain, and the power level. This paper also identifies optimum loading conditions for different configurations of the charge pumps. Design guidelines for the desired voltage and power levels are discussed. A two-stage MPVD was fabricated using MOSIS 2.0m CMOS technology. It was designed with internal frequency regulation to reduce power consumption under no load condition.",
"title": ""
},
{
"docid": "fab47ba2ca0b1fe26ae4aa11f7be4450",
"text": "Matrix approximation is a common tool in recommendation systems, text mining, and computer vision. A prevalent assumption in constructing matrix approximations is that the partially observed matrix is of low-rank. We propose a new matrix approximation model where we assume instead that the matrix is locally of low-rank, leading to a representation of the observed matrix as a weighted sum of low-rank matrices. We analyze the accuracy of the proposed local lowrank modeling. Our experiments show improvements in prediction accuracy over classical approaches for recommendation tasks.",
"title": ""
},
{
"docid": "6ff33e3012188bb90a324182847141ee",
"text": "When starting the software process improvement (SPI) journey, there are many SPI standards to select from. Selecting good SPI standards can be a technical problem, from a software engineering point of view, but it can also be a political problem, some standards fitting more with internal political agendas than others. As it is well-known that SPI without management commitment can have disastrous effects on SPI, so can also be the consequence of selecting standards that are technically unfit. The dilemma on how to select SPI standards provides a picture of SPI as a political game played out between managers, software engineers and SPI people. Starting with SPI from the viewpoint of control theory, the paper identifies different conflict situations within the control theory framework, and suggests using game theory and drama theory for finding optimal control strategies. Drama theory is further explored through a SPI case study that illustrates how SPI standards stabilize in spite of conflicts and social disaster. The contribution of the paper consists of introducing the concept of ‘evolutionary drama theory’ (derived from evolutionary game theory, EGT) as a tool for describing and analysing how an artefact like a SPI standard evolves towards equilibrium (evolutionary stable strategy, ESS) by looking at repeated dramas where equilibriums may not necessarily be found or, if found, may not necessarily fit with the ESS.",
"title": ""
},
{
"docid": "3ea1b050c06e723be5234d98ea577edd",
"text": "Profiling gene expression in brain structures at various spatial and temporal scales is essential to understanding how genes regulate the development of brain structures. The Allen Developing Mouse Brain Atlas provides high-resolution 3-D in situ hybridization (ISH) gene expression patterns in multiple developing stages of the mouse brain. Currently, the ISH images are annotated with anatomical terms manually. In this paper, we propose a computational approach to annotate gene expression pattern images in the mouse brain at various structural levels over the course of development. We applied deep convolutional neural network that was trained on a large set of natural images to extract features from the ISH images of developing mouse brain. As a baseline representation, we applied invariant image feature descriptors to capture local statistics from ISH images and used the bag-of-words approach to build image-level representations. Both types of features from multiple ISH image sections of the entire brain were then combined to build 3-D, brain-wide gene expression representations. We employed regularized learning methods for discriminating gene expression patterns in different brain structures. Results show that our approach of using convolutional model as feature extractors achieved superior performance in annotating gene expression patterns at multiple levels of brain structures throughout four developing ages. Overall, we achieved average AUC of 0.894 ± 0.014, as compared with 0.820 ± 0.046 yielded by the bag-of-words approach. Deep convolutional neural network model trained on natural image sets and applied to gene expression pattern annotation tasks yielded superior performance, demonstrating its transfer learning property is applicable to such biological image sets.",
"title": ""
},
{
"docid": "cad54b58e3dd47e1e92078519660e71d",
"text": "Web images come in hand with valuable contextual information. Although this information has long been mined for various uses such as image annotation, clustering of images, inference of image semantic content, etc., insufficient attention has been given to address issues in mining this contextual information. In this paper, we propose a webpage segmentation algorithm targeting the extraction of web images and their contextual information based on their characteristics as they appear on webpages. We conducted a user study to obtain a human-labeled dataset to validate the effectiveness of our method and experiments demonstrated that our method can achieve better results compared to an existing segmentation algorithm.",
"title": ""
},
{
"docid": "9097bf29a9ad2b33919e0667d20bf6d7",
"text": "Object detection, though gaining popularity, has largely been limited to detection from the ground or from satellite imagery. Aerial images, where the target may be obfuscated from the environmental conditions, angle-of-attack, and zoom level, pose a more significant challenge to correctly detect targets in. This paper describes the implementation of a regional convolutional neural network to locate and classify objects across several categories in complex, aerial images. Our current results show promise in detecting and classifying objects. Further adjustments to the network and data input should increase the localization and classification accuracies.",
"title": ""
},
{
"docid": "7a653b9b197d89fddab2823b7caef603",
"text": "A growing literature contends that, since returns are not normal, higher-order co-moments matter to risk-averse investors. Fama and French (1993, 1995) find that non-market risk factors based on size and book-to-market ratio are priced by investors. We test the hypothesis that the Fama-French factors simply proxy for the pricing of higher-order co-moments. Using portfolio returns over various time horizons, we show that adding a set of systematic comoments (but not standard moments) of order 3 through 10 reduces the explanatory power of the Fama-French factors to insignificance in almost every case. * We are grateful for helpful comments and suggestions from Warren Bailey, Javier Estrada, Wayne Ferson, Campbell Harvey, Raymond Kan, Tae-Hwy Lee, Bruce Lehmann, David Mayers, Mark Rubinstein, Sergei Sarkissian, Mike Stutzer, and an anonymous referee. Chung acknowledges financial support from an A. Gary Anderson Graduate School of Management Summer Research Grant.",
"title": ""
},
{
"docid": "fed4a1b88d839b50ed91715a5f22b813",
"text": "Ensemble methodology, which builds a classification model by integrating multiple classifiers, can be used for improving prediction performance. Researchers from various disciplines such as statistics, pattern recognition, and machine learning have seriously explored the use of ensemble methodology. This paper presents an updated survey of ensemble methods in classification tasks, while introducing a new taxonomy for characterizing them. The new taxonomy, presented from the algorithm designer’s point of view, is based on five dimensions: inducer, combiner, diversity, size, and members dependency. We also propose several selection criteria, presented from the practitioner’s point of view, for choosing the most suitable ensemble method.",
"title": ""
}
] | scidocsrr |
1fc5702a4bdf939c778c491f69abb365 | Enabling Fine-Grained Edge Offloading for IoT | [
{
"docid": "3fae9d0778c9f9df1ae51ad3b5f62a05",
"text": "This paper argues for the utility of back-end driven onloading to the edge as a way to address bandwidth use and latency challenges for future device-cloud interactions. Supporting such edge functions (EFs) requires solutions that can provide (i) fast and scalable EF provisioning and (ii) strong guarantees for the integrity of the EF execution and confidentiality of the state stored at the edge. In response to these goals, we (i) present a detailed design space exploration of the current technologies that can be leveraged in the design of edge function platforms (EFPs), (ii) develop a solution to address security concerns of EFs that leverages emerging hardware support for OS agnostic trusted execution environments such as Intel SGX enclaves, and (iii) propose and evaluate AirBox, a platform for fast, scalable and secure onloading of edge functions.",
"title": ""
}
] | [
{
"docid": "bb03f7d799b101966b4ea6e75cd17fea",
"text": "Fuzzy decision trees (FDTs) have shown to be an effective solution in the framework of fuzzy classification. The approaches proposed so far to FDT learning, however, have generally neglected time and space requirements. In this paper, we propose a distributed FDT learning scheme shaped according to the MapReduce programming model for generating both binary and multiway FDTs from big data. The scheme relies on a novel distributed fuzzy discretizer that generates a strong fuzzy partition for each continuous attribute based on fuzzy information entropy. The fuzzy partitions are, therefore, used as an input to the FDT learning algorithm, which employs fuzzy information gain for selecting the attributes at the decision nodes. We have implemented the FDT learning scheme on the Apache Spark framework. We have used ten real-world publicly available big datasets for evaluating the behavior of the scheme along three dimensions: 1) performance in terms of classification accuracy, model complexity, and execution time; 2) scalability varying the number of computing units; and 3) ability to efficiently accommodate an increasing dataset size. We have demonstrated that the proposed scheme turns out to be suitable for managing big datasets even with a modest commodity hardware support. Finally, we have used the distributed decision tree learning algorithm implemented in the MLLib library and the Chi-FRBCS-BigData algorithm, a MapReduce distributed fuzzy rule-based classification system, for comparative analysis.",
"title": ""
},
{
"docid": "4415734a27827200062b81926232e84d",
"text": "BACKGROUND\nThe formation of a Hairy Polyp on the dorsum of the tongue is a rare condition that may hinder vital functions such as swallowing and breathing due to mechanical obstruction. The authors present the situation on a child with an approach of significant academic value.\n\n\nMETHODS\nImaging diagnostics with the application of a topical oral radiocontrastant was used to determine the extent of the tumor. Performed treatment was complete excision and diagnostics was confirmed with anatomopathological analysis.\n\n\nRESULTS\nThe patient was controlled for five months and, showing no signs of relapse, was considered free from the lesion.\n\n\nCONCLUSION\nAccurate diagnostics of such a lesion must be performed in depth so that proper surgical treatment may be performed. The imaging method proposed has permitted the visualization of the tumoral insertion and volume, as well as the comprehension of its threatening dynamics.",
"title": ""
},
{
"docid": "3cceb3792d55bd14adb579bb9e3932ec",
"text": "BACKGROUND\nTrastuzumab, a monoclonal antibody against human epidermal growth factor receptor 2 (HER2; also known as ERBB2), was investigated in combination with chemotherapy for first-line treatment of HER2-positive advanced gastric or gastro-oesophageal junction cancer.\n\n\nMETHODS\nToGA (Trastuzumab for Gastric Cancer) was an open-label, international, phase 3, randomised controlled trial undertaken in 122 centres in 24 countries. Patients with gastric or gastro-oesophageal junction cancer were eligible for inclusion if their tumours showed overexpression of HER2 protein by immunohistochemistry or gene amplification by fluorescence in-situ hybridisation. Participants were randomly assigned in a 1:1 ratio to receive a chemotherapy regimen consisting of capecitabine plus cisplatin or fluorouracil plus cisplatin given every 3 weeks for six cycles or chemotherapy in combination with intravenous trastuzumab. Allocation was by block randomisation stratified by Eastern Cooperative Oncology Group performance status, chemotherapy regimen, extent of disease, primary cancer site, and measurability of disease, implemented with a central interactive voice recognition system. The primary endpoint was overall survival in all randomised patients who received study medication at least once. This trial is registered with ClinicalTrials.gov, number NCT01041404.\n\n\nFINDINGS\n594 patients were randomly assigned to study treatment (trastuzumab plus chemotherapy, n=298; chemotherapy alone, n=296), of whom 584 were included in the primary analysis (n=294; n=290). Median follow-up was 18.6 months (IQR 11-25) in the trastuzumab plus chemotherapy group and 17.1 months (9-25) in the chemotherapy alone group. Median overall survival was 13.8 months (95% CI 12-16) in those assigned to trastuzumab plus chemotherapy compared with 11.1 months (10-13) in those assigned to chemotherapy alone (hazard ratio 0.74; 95% CI 0.60-0.91; p=0.0046). The most common adverse events in both groups were nausea (trastuzumab plus chemotherapy, 197 [67%] vs chemotherapy alone, 184 [63%]), vomiting (147 [50%] vs 134 [46%]), and neutropenia (157 [53%] vs 165 [57%]). Rates of overall grade 3 or 4 adverse events (201 [68%] vs 198 [68%]) and cardiac adverse events (17 [6%] vs 18 [6%]) did not differ between groups.\n\n\nINTERPRETATION\nTrastuzumab in combination with chemotherapy can be considered as a new standard option for patients with HER2-positive advanced gastric or gastro-oesophageal junction cancer.\n\n\nFUNDING\nF Hoffmann-La Roche.",
"title": ""
},
{
"docid": "d652a2ffb4708b76d8fa70d7a452ae9f",
"text": "If we are to achieve natural human–robot interaction, we may need to complement current vision and speech interfaces. Touch may provide us with an extra tool in this quest. In this paper we demonstrate the role of touch in interaction between a robot and a human. We show how infrared sensors located on robots can be easily used to detect and distinguish human interaction, in this case interaction with individual children. This application of infrared sensors potentially has many uses; for example, in entertainment or service robotics. This system could also benefit therapy or rehabilitation, where the observation and recording of movement and interaction is important. In the long term, this technique might enable robots to adapt to individuals or individual types of user. c © 2006 Published by Elsevier B.V.",
"title": ""
},
{
"docid": "9ea5156da7f8cb3cf0e130362721651e",
"text": "Efficient and accurate semantic segmentation is the key technique for automatic remote sensing image analysis. While there have been many segmentation methods based on traditional hand-craft feature extractors, it is still challenging to process high-resolution and large-scale remote sensing images. In this work, a novel patch-wise semantic segmentation method with a new training strategy based on fully convolutional networks is presented to segment common land resources. First, to handle the high-resolution image, the images are split as local patches and then a patch-wise network is built. Second, training data is preprocessed in several ways to meet the specific characteristics of remote sensing images, i.e., color imbalance, object rotation variations and lens distortion. Third, a multi-scale training strategy is developed to solve the severe scale variation problem. In addition, the impact of conditional random field (CRF) is studied to improve the precision. The proposed method was evaluated on a dataset collected from a capital city in West China with the Gaofen-2 satellite. The dataset contains ten common land resources (Grassland, Road, etc.). The experimental results show that the proposed algorithm achieves 54.96% in terms of mean intersection over union (MIoU) and outperforms other state-of-the-art methods in remote sensing image segmentation.",
"title": ""
},
{
"docid": "f63d6cd35ac9ea46ee2a162fe8f68efa",
"text": "In the fashion industry, order scheduling focuses on the assignment of production orders to appropriate product ion lines. In reality, before a new order can be put into production, a series of activities known as pre-production events need t o be completed. In addition, in real production process, owing to various uncertainties, the daily production quantity of each order is not always as expected. In this research, by conside ring the pre-production events and the uncertainties in the dail y production quantity, robust order scheduling problems in the fashion industry are investigated with the aid of a multi-objective evolutionary algorithm (MOEA) called nondominated sorting adaptive differential evolution (NSJADE). The experimental results illustrate that it is of paramount importance to consider pre-production events in order scheduling problems in the f ashion industry. We also unveil that the existence of the uncertain ties in the daily production quantity heavily affects the order scheduling.",
"title": ""
},
{
"docid": "ddae0422527c45e37f9a5b204cb0580f",
"text": "Several studies have reported high efficacy and safety of artemisinin-based combination therapy (ACT) mostly under strict supervision of drug intake and limited to children less than 5 years of age. Patients over 5 years of age are usually not involved in such studies. Thus, the findings do not fully reflect the reality in the field. This study aimed to assess the effectiveness and safety of ACT in routine treatment of uncomplicated malaria among patients of all age groups in Nanoro, Burkina Faso. A randomized open label trial comparing artesunate–amodiaquine (ASAQ) and artemether–lumefantrine (AL) was carried out from September 2010 to October 2012 at two primary health centres (Nanoro and Nazoanga) of Nanoro health district. A total of 680 patients were randomized to receive either ASAQ or AL without any distinction by age. Drug intake was not supervised as pertains in routine practice in the field. Patients or their parents/guardians were advised on the time and mode of administration for the 3 days treatment unobserved at home. Follow-up visits were performed on days 3, 7, 14, 21, and 28 to evaluate clinical and parasitological resolution of their malaria episode as well as adverse events. PCR genotyping of merozoite surface proteins 1 and 2 (msp-1, msp-2) was used to differentiate recrudescence and new infection. By day 28, the PCR corrected adequate clinical and parasitological response was 84.1 and 77.8 % respectively for ASAQ and AL. The cure rate was higher in older patients than in children under 5 years old. The risk of re-infection by day 28 was higher in AL treated patients compared with those receiving ASAQ (p < 0.00001). Both AL and ASAQ treatments were well tolerated. This study shows a lowering of the efficacy when drug intake is not directly supervised. This is worrying as both rates are lower than the critical threshold of 90 % required by the WHO to recommend the use of an anti-malarial drug in a treatment policy. Trial registration: NCT01232530",
"title": ""
},
{
"docid": "3edf5d1cce2a26fbf5c2cc773649629b",
"text": "We conducted three experiments to investigate the mental images associated with idiomatic phrases in English. Our hypothesis was that people should have strong conventional images for many idioms and that the regularity in people's knowledge of their images for idioms is due to the conceptual metaphors motivating the figurative meanings of idioms. In the first study, subjects were asked to form and describe their mental images for different idiomatic expressions. Subjects were then asked a series of detailed questions about their images regarding the causes and effects of different events within their images. We found high consistency in subjects' images of idioms with similar figurative meanings despite differences in their surface forms (e.g., spill the beans and let the cat out of the bag). Subjects' responses to detailed questions about their images also showed a high degree of similarity in their answers. Further examination of subjects' imagery protocols supports the idea that the conventional images and knowledge associated with idioms are constrained by the conceptual metaphors (e.g., the MIND IS A CONTAINER and IDEAS ARE ENTITIES) which motivate the figurative meanings of idioms. The results of two control studies showed that the conventional images associated with idioms are not solely based on their figurative meanings (Experiment 2) and that the images associated with literal phrases (e.g., spill the peas) were quite varied and unlikely to be constrained by conceptual metaphor (Experiment 3). These findings support the view that idioms are not \"dead\" metaphors with their meanings being arbitrarily determined. Rather, the meanings of many idioms are motivated by speakers' tacit knowledge of the conceptual metaphors underlying the meanings of these figurative phrases.",
"title": ""
},
{
"docid": "a8e72235f2ec230a1be162fa6129db5e",
"text": "Lateral inhibition in top-down feedback is widely existing in visual neurobiology, but such an important mechanism has not be well explored yet in computer vision. In our recent research, we find that modeling lateral inhibition in convolutional neural network (LICNN) is very useful for visual attention and saliency detection. In this paper, we propose to formulate lateral inhibition inspired by the related studies from neurobiology, and embed it into the top-down gradient computation of a general CNN for classification, i.e. only category-level information is used. After this operation (only conducted once), the network has the ability to generate accurate category-specific attention maps. Further, we apply LICNN for weakly-supervised salient object detection. Extensive experimental studies on a set of databases, e.g., ECSSD, HKU-IS, PASCAL-S and DUT-OMRON, demonstrate the great advantage of LICNN which achieves the state-ofthe-art performance. It is especially impressive that LICNN with only category-level supervised information even outperforms some recent methods with segmentation-level super-",
"title": ""
},
{
"docid": "0b894c503a11c7638c0fd25ea22088dc",
"text": "We are moving towards a general public where web is the need of hour. Today the vast majority of the product applications executed, are composed as online applications which are keep running in a web program. Testing programming applications is critical. Numerous associations make utilization of a specific web application, so the same web applications are tried habitually by diverse clients from distinctive regions physically. Testing a web application physically is tedious, so we go for test automation. In test automation we make utilization of a product device to run repeatable tests against the application to be tried. There are various focal points of test automation. They are exceptionally exact and have more prominent preparing pace when contrasted with manual automation. There are various open source and business devices accessible for test mechanization. Selenium is one of the broadly utilized open source device for test computerization. Test automation enhances the effectiveness of programming testing procedures. Test automation gives quick criticism to engineers. It additionally discovers the imperfections when one may miss in the manual testing. In test automation we can perform boundless emphases for testing the same example of code ceaselessly commonly.",
"title": ""
},
{
"docid": "4d59f33b27fb1807936c18aeecd64d05",
"text": "The current studies investigated whether acute stress potentiates false recollections (so-called \"false memories\") in a Deese-Roediger-McDermott (DRM) paradigm, and whether sex differences modulate these effects. Participants were assigned to either a stress (trier social stress test) or a control group. Subsequently, they were subjected to DRM word lists and probed for recall and recognition. Results showed no differences between the stress and control group on measures of false recollections (Study 1; N=60). Even though correct recall was impaired by acute stress, there were no differences between high or low cortisol responders and controls on false recall or recognitions rates (Study 2; N=92). These results suggest that cortisol responses do not directly potentiate false recollections. Neither in Study 1 nor in Study 2 did we find any evidence that the effects of cortisol on false recollections are different in men and women, although there was an indication that independent of stress men produced more commission errors.",
"title": ""
},
{
"docid": "60c8a0ba8087c6aa81af672318f616c7",
"text": "Information retrieval evaluation based on the pooling method is inherently biased against systems that did not contribute to the pool of judged documents. This may distort the results obtained about the relative quality of the systems evaluated and thus lead to incorrect conclusions about the performance of a particular ranking technique.\n We examine the magnitude of this effect and explore how it can be countered by automatically building an unbiased set of judgements from the original, biased judgements obtained through pooling. We compare the performance of this method with other approaches to the problem of incomplete judgements, such as bpref, and show that the proposed method leads to higher evaluation accuracy, especially if the set of manual judgements is rich in documents, but highly biased against some systems.",
"title": ""
},
{
"docid": "35ffdb3e5b2ac637f7e8d796c4cdc97e",
"text": "Pedestrian detection in real world scenes is a challenging problem. In recent years a variety of approaches have been proposed, and impressive results have been reported on a variety of databases. This paper systematically evaluates (1) various local shape descriptors, namely Shape Context and Local Chamfer descriptor and (2) four different interest point detectors for the detection of pedestrians. Those results are compared to the standard global Chamfer matching approach. A main result of the paper is that Shape Context trained on real edge images rather than on clean pedestrian silhouettes combined with the Hessian-Laplace detector outperforms all other tested approaches.",
"title": ""
},
{
"docid": "532916aa836b0240fb1735f675ff6407",
"text": "The success of cloud computing technologies heavily depends on both the underlying hardware and system software support for virtualization. In this study, we propose to elevate the capability of the hypervisor to monitor and manage co-running virtual machines (VMs) by capturing their dynamic behavior at runtime and adaptively schedule and migrate VMs across cores to minimize contention on system resources hence maximize the system throughput. Implemented at the hypervisor level, our proposed scheme does not require any changes or adjustments to the VMs themselves or the applications running inside them, and minimal changes to the host OS. It also does not require any changes to existing hardware structures. These facts reduce the complexity of our approach and improve portability at the same time. The main intuition behind our approach is that because the host OS schedules entire virtual machines, it loses sight of the processes and threads that are running within the VMs; it only sees the averaged resource demands from the past time slice. In our design, we sought to recreate some of this low level information by using performance counters and simple virtual machine introspection techniques. We implemented an initial prototype on the Kernel Virtual Machine (KVM) and our experimental results show the presented approach is of great potential to improve the overall system throughput in the Cloud environment. Adaptive Virtual Machine Management in the Cloud: A Performance-Counter-Driven Approach",
"title": ""
},
{
"docid": "12d565f0aaa6960e793b96f1c26cb103",
"text": "The new western Mode 5 IFF (Identification Foe or Friend) system is introduced. Based on analysis of signal features and format characteristics of Mode 5, a new signal detection method using phase and Amplitude correlation is put forward. This method utilizes odd and even channels to separate the signal, and then the separated signals are performed correlation with predefined mask. Through detecting preamble, the detection of Mode 5 signal is implemented. Finally, simulation results show the validity of the proposed method.",
"title": ""
},
{
"docid": "f06d083ebd1449b1fd84e826898c2fda",
"text": "The resolution of any linear imaging system is given by its point spread function (PSF) that quantifies the blur of an object point in the image. The sharper the PSF, the better the resolution is. In standard fluorescence microscopy, however, diffraction dictates a PSF with a cigar-shaped main maximum, called the focal spot, which extends over at least half the wavelength of light (λ = 400–700 nm) in the focal plane and >λ along the optical axis (z). Although concepts have been developed to sharpen the focal spot both laterally and axially, none of them has reached their ultimate goal: a spherical spot that can be arbitrarily downscaled in size. Here we introduce a fluorescence microscope that creates nearly spherical focal spots of 40–45 nm (λ/16) in diameter. Fully relying on focused light, this lens-based fluorescence nanoscope unravels the interior of cells noninvasively, uniquely dissecting their sub-λ–sized organelles.",
"title": ""
},
{
"docid": "83d15f5a04066a6476f0f23bfad5553c",
"text": "Generative Adversarial Networks (GAN) are able to learn excellent representations for unlabelled data which can be applied to image generation and scene classification. Representations learned by GANs have not yet been applied to retrieval. In this paper, we show that the representations learned by GANs can indeed be used for retrieval. We consider heritage documents that contain unlabelled Merchant Marks, sketch-like symbols that are similar to hieroglyphs. We introduce a novel GAN architecture with design features that make it suitable for sketch retrieval. The performance of this sketch-GAN is compared to a modified version of the original GAN architecture with respect to simple invariance properties. Experiments suggest that sketch-GANs learn representations that are suitable for retrieval and which also have increased stability to rotation, scale and translation compared to the standard GAN architecture.",
"title": ""
},
{
"docid": "5fe589e370271246b55aa3b100595f01",
"text": "Cluster-based distributed file systems generally have a single master to service clients and manage the namespace. Although simple and efficient, that design compromises availability, because the failure of the master takes the entire system down. Before version 2.0.0-alpha, the Hadoop Distributed File System (HDFS) -- an open-source storage, widely used by applications that operate over large datasets, such as MapReduce, and for which an uptime of 24x7 is becoming essential -- was an example of such systems. Given that scenario, this paper proposes a hot standby for the master of HDFS achieved by (i) extending the master's state replication performed by its check pointer helper, the Backup Node, and by (ii) introducing an automatic fail over mechanism. The step (i) took advantage of the message duplication technique developed by other high availability solution for HDFS named Avatar Nodes. The step (ii) employed another Hadoop software: ZooKeeper, a distributed coordination service. That approach resulted in small code changes, 1373 lines, not requiring external components to the Hadoop project. Thus, easing the maintenance and deployment of the file system. Compared to HDFS 0.21, tests showed that both in loads dominated by metadata operations or I/O operations, the reduction of data throughput is no more than 15% on average, and the time to switch the hot standby to active is less than 100 ms. Those results demonstrate the applicability of our solution to real systems. We also present related work on high availability for other file systems and HDFS, including the official solution, recently included in HDFS 2.0.0-alpha.",
"title": ""
},
{
"docid": "b6d655df161d6c47675e9cb17173a521",
"text": "Nigeria is considered as one of the many countries in sub-Saharan Africa with a weak economy and gross deficiencies in technology and engineering. Available data from international monitoring and regulatory organizations show that technology is pivotal to determining the economic strengths of nations all over the world. Education is critical to technology acquisition, development, dissemination and adaptation. Thus, this paper seeks to critically assess and discuss issues and challenges facing technological advancement in Nigeria, particularly in the education sector, and also proffers solutions to resuscitate the Nigerian education system towards achieving national technological and economic sustainability such that Nigeria can compete favourably with other technologicallydriven economies of the world in the not-too-distant future. Keywords—Economically weak countries, education, globalization and competition, technological advancement.",
"title": ""
},
{
"docid": "a36c38c688eea26c03165589cc6a35c2",
"text": "This paper describes a technique of text analytics on peacekeeping documents to discover significant text patterns exist in the documents. These documents are considered as unstructured textual data. The paper proposes a framework that consists of 3 stages (i) data collection (ii) document preprocessing and (iii) text analytics and visualization. The technique is developed using R text mining package for text analytics experiments.",
"title": ""
}
] | scidocsrr |
89abc6c4ad7aea28f5b9574af2f20478 | The Chronotron: A Neuron That Learns to Fire Temporally Precise Spike Patterns | [
{
"docid": "15c715c3da3883e363aa8e442e903269",
"text": "A supervised learning rule for Spiking Neural Networks (SNNs) is presented that can cope with neurons that spike multiple times. The rule is developed by extending the existing SpikeProp algorithm which could only be used for one spike per neuron. The problem caused by the discontinuity in the spike process is counteracted with a simple but effective rule, which makes the learning process more efficient. Our learning rule is successfully tested on a classification task of Poisson spike trains. We also applied the algorithm on a temporal version of the XOR problem and show that it is possible to learn this classical problem using only one spiking neuron making use of a hairtrigger situation.",
"title": ""
}
] | [
{
"docid": "a1ea62378027e20466a4c16cbc96aa63",
"text": "A key benefit of connecting edge and cloud computing is the capability to achieve high-throughput under high concurrent accesses, mobility support, real-time processing guarantees, and data persistency. For example, the elastic provisioning and storage capabilities provided by cloud computing allow us to cope with scalability, persistency and reliability requirements and to adapt the infrastructure capacity to the exacting needs based on the amount of generated data.",
"title": ""
},
{
"docid": "dcd9a430a69fc3a938ea1068273627ff",
"text": "Background Nursing theory should provide the principles that underpin practice and help to generate further nursing knowledge. However, a lack of agreement in the professional literature on nursing theory confuses nurses and has caused many to dismiss nursing theory as irrelevant to practice. This article aims to identify why nursing theory is important in practice. Conclusion By giving nurses a sense of identity, nursing theory can help patients, managers and other healthcare professionals to recognise the unique contribution that nurses make to the healthcare service ( Draper 1990 ). Providing a definition of nursing theory also helps nurses to understand their purpose and role in the healthcare setting.",
"title": ""
},
{
"docid": "a9f309abd4711ad5c73c8ba8e80a1c76",
"text": "The Open Networking Foundation's Extensibility Working Group is standardizing OpenFlow, the main software-defined networking (SDN) protocol. To address the requirements of a wide range of network devices and to accommodate its all-volunteer membership, the group has made the specification process highly dynamic and similar to that of open source projects.",
"title": ""
},
{
"docid": "0de9ea0f7ee162f1def6ee9b95ea9ba3",
"text": "While much exciting progress is being made in mobile visual search, one important question has been left unexplored in all current systems. When the first query fails to find the right target (up to 50% likelihood), how should the user form his/her search strategy in the subsequent interaction? In this paper, we propose a novel Active Query Sensing system to suggest the best way for sensing the surrounding scenes while forming the second query for location search. We accomplish the goal by developing several unique components -- an offline process for analyzing the saliency of the views associated with each geographical location based on score distribution modeling, predicting the visual search precision of individual views and locations, estimating the view of an unseen query, and suggesting the best subsequent view change. Using a scalable visual search system implemented over a NYC street view data set (0.3 million images), we show a performance gain as high as two folds, reducing the failure rate of mobile location search to only 12% after the second query. This work may open up an exciting new direction for developing interactive mobile media applications through innovative exploitation of active sensing and query formulation.",
"title": ""
},
{
"docid": "ca6ae788fc63563e39e1cb611dbdd8c5",
"text": "STATL is an extensible state/transition-based attack desc ription language designed to support intrusion detection. The language allows one to describe computer pen trations as sequences of actions that an attacker performs to compromise a computer system. A STATL descripti on of an attack scenario can be used by an intrusion detection system to analyze a stream of events and de tect possible ongoing intrusions. Since intrusion detection is performed in different domains (i.e., the netw ork or the hosts) and in different operating environments (e.g., Linux, Solaris, or Windows NT), it is useful to h ave an extensible language that can be easily tailored to different target environments. STATL defines do main-independent features of attack scenarios and provides constructs for extending the language to describe attacks in particular domains and environments. The STATL language has been successfully used in describing both network-based and host-based attacks, and it has been tailored to very different environments, e.g ., Sun Microsystems’ Solaris and Microsoft’s Windows NT. An implementation of the runtime support for the STATL language has been developed and a toolset of intrusion detection systems based on STATL has b een implemented. The toolset was used in a recent intrusion detection evaluation effort, delivering very favorable results. This paper presents the details of the STATL syntax and its semantics. Real examples from bot h the host and network-based extensions of the language are also presented.",
"title": ""
},
{
"docid": "bfc8a36a8b3f1d74bad5f2e25ad3aae5",
"text": "This paper presents a novel ac-dc power factor correction (PFC) power conversion architecture for a single-phase grid interface. The proposed architecture has significant advantages for achieving high efficiency, good power factor, and converter miniaturization, especially in low-to-medium power applications. The architecture enables twice-line-frequency energy to be buffered at high voltage with a large voltage swing, enabling reduction in the energy buffer capacitor size and the elimination of electrolytic capacitors. While this architecture can be beneficial with a variety of converter topologies, it is especially suited for the system miniaturization by enabling designs that operate at high frequency (HF, 3-30 MHz). Moreover, we introduce circuit implementations that provide efficient operation in this range. The proposed approach is demonstrated for an LED driver converter operating at a (variable) HF switching frequency (3-10 MHz) from 120 Vac, and supplying a 35 Vdc output at up to 30 W. The prototype converter achieves high efficiency (92%) and power factor (0.89), and maintains a good performance over a wide load range. Owing to the architecture and HF operation, the prototype achieves a high “box” power density of 50 W/in3 (“displacement” power density of 130 W/in3), with miniaturized inductors, ceramic energy buffer capacitors, and a small-volume EMI filter.",
"title": ""
},
{
"docid": "28075920fae3e973911b299db86c792e",
"text": "DNA methylation is a well-studied genetic modification crucial to regulate the functioning of the genome. Its alterations play an important role in tumorigenesis and tumor-suppression. Thus, studying DNA methylation data may help biomarker discovery in cancer. Since public data on DNA methylation become abundant – and considering the high number of methylated sites (features) present in the genome – it is important to have a method for efficiently processing such large datasets. Relying on big data technologies, we propose BIGBIOCL an algorithm that can apply supervised classification methods to datasets with hundreds of thousands of features. It is designed for the extraction of alternative and equivalent classification models through iterative deletion of selected features. We run experiments on DNA methylation datasets extracted from The Cancer Genome Atlas, focusing on three tumor types: breast, kidney, and thyroid carcinomas. We perform classifications extracting several methylated sites and their associated genes with accurate performance (accuracy>97%). Results suggest that BIGBIOCL can perform hundreds of classification iterations on hundreds of thousands of features in few hours. Moreover, we compare the performance of our method with other state-of-the-art classifiers and with a wide-spread DNA methylation analysis method based on network analysis. Finally, we are able to efficiently compute multiple alternative classification models and extract from DNA-methylation large datasets a set of candidate genes to be further investigated to determine their active role in cancer. BIGBIOCL, results of experiments, and a guide to carry on new experiments are freely available on GitHub at https://github.com/fcproj/BIGBIOCL.",
"title": ""
},
{
"docid": "c59aaad99023e5c6898243db208a4c3c",
"text": "This paper presents a method for automated vessel segmentation in retinal images. For each pixel in the field of view of the image, a 41-D feature vector is constructed, encoding information on the local intensity structure, spatial properties, and geometry at multiple scales. An AdaBoost classifier is trained on 789 914 gold standard examples of vessel and nonvessel pixels, then used for classifying previously unseen images. The algorithm was tested on the public digital retinal images for vessel extraction (DRIVE) set, frequently used in the literature and consisting of 40 manually labeled images with gold standard. Results were compared experimentally with those of eight algorithms as well as the additional manual segmentation provided by DRIVE. Training was conducted confined to the dedicated training set from the DRIVE database, and feature-based AdaBoost classifier (FABC) was tested on the 20 images from the test set. FABC achieved an area under the receiver operating characteristic (ROC) curve of 0.9561, in line with state-of-the-art approaches, but outperforming their accuracy (0.9597 versus 0.9473 for the nearest performer).",
"title": ""
},
{
"docid": "3256b2050c603ca16659384a0e98a22c",
"text": "In this paper, we propose a Hough transform-based method to identify low-contrast defects in unevenly illuminated images, and especially focus on the inspection of mura defects in liquid crystal display (LCD) panels. The proposed method works on 1-D gray-level profiles in the horizontal and vertical directions of the surface image. A point distinctly deviated from the ideal line of a profile can be identified as a defect one. A 1-D gray-level profile in the unevenly illuminated image results in a nonstationary line signal. The most commonly used technique for straight line detection in a noisy image is Hough transform (HT). The standard HT requires a sufficient number of points lie exactly on the same straight line at a given parameter resolution so that the accumulator will show a distinct peak in the parameter space. It fails to detect a line in a nonstationary signal. In the proposed HT scheme, the points that contribute to the vote do not have to lie on a line. Instead, a distance tolerance to the line sought is first given. Any point with the distance to the line falls within the tolerance will be accumulated by taking the distance as the voting weight. A fast search procedure to tighten the possible ranges of line parameters is also proposed for mura detection in LCD images.",
"title": ""
},
{
"docid": "095f8d5c3191d6b70b2647b562887aeb",
"text": "Hardware specialization, in the form of datapath and control circuitry customized to particular algorithms or applications, promises impressive performance and energy advantages compared to traditional architectures. Current research in accelerators relies on RTL-based synthesis flows to produce accurate timing, power, and area estimates. Such techniques not only require significant effort and expertise but also are slow and tedious to use, making large design space exploration infeasible. To overcome this problem, the authors developed Aladdin, a pre-RTL, power-performance accelerator modeling framework and demonstrated its application to system-on-chip (SoC) simulation. Aladdin estimates performance, power, and area of accelerators within 0.9, 4.9, and 6.6 percent with respect to RTL implementations. Integrated with architecture-level general-purpose core and memory hierarchy simulators, Aladdin provides researchers with a fast but accurate way to model the power and performance of accelerators in an SoC environment.",
"title": ""
},
{
"docid": "6c279a5159b52ae4f8e54c05038dcdfe",
"text": "In this paper, a physically interactive control scheme is developed for a manipulator robot arm. The human touches the robot and applies force in order to make it behave as he/she likes. The communication between the robot and the human is maintained by a physical contact with no sensors. The intent of the human is estimated by observing the change in control effort. The robot receives the estimated human intent and updates its position reference accordingly. The developed method uses the principle of conservation of zero momentum for position-controlled systems. A switching scheme is developed that goes between the modes of pure impedance control with a fixed-position reference and interactive control under human intent. The switching mechanism uses neither a physical switch nor a sensor; it observes the human intent and puts the robot into interactive mode, if there is any. When the human intent disappears, the robot goes into the pure-impedance-control mode, thus stabilizing in the left position.",
"title": ""
},
{
"docid": "3980da6e0c81bf029bbada09d7ea59e3",
"text": "We study RF-enabled wireless energy transfer (WET) via energy beamforming, from a multi-antenna energy transmitter (ET) to multiple energy receivers (ERs) in a backscatter communication system such as RFID. The acquisition of the forward-channel (i.e., ET-to-ER) state information (F-CSI) at the ET (or RFID reader) is challenging, since the ERs (or RFID tags) are typically too energy-and-hardware-constrained to estimate or feedback the F-CSI. The ET leverages its observed backscatter signals to estimate the backscatter-channel (i.e., ET-to-ER-to-ET) state information (BS-CSI) directly. We first analyze the harvested energy obtained using the estimated BS-CSI. Furthermore, we optimize the resource allocation to maximize the total utility of harvested energy. For WET to single ER, we obtain the optimal channel-training energy in a semiclosed form. For WET to multiple ERs, we optimize the channel-training energy and the energy allocation weights for different energy beams. For the straightforward weighted-sum-energy (WSE) maximization, the optimal WET scheme is shown to use only one energy beam, which leads to unfairness among ERs and motivates us to consider the complicated proportional-fair-energy (PFE) maximization. For PFE maximization, we show that it is a biconvex problem, and propose a block-coordinate-descent-based algorithm to find the close-to-optimal solution. Numerical results show that with the optimized solutions, the harvested energy suffers slight reduction of less than 10%, compared to that obtained using the perfect F-CSI.",
"title": ""
},
{
"docid": "c309db20462cd75a3f8accb4f0c09800",
"text": "Many different technologies fostering and supporting distributed and decentralized computing scenarios emerged recently. Edge computing provides the necessary on-demand computing power for Internet-of-Things (IoT) devices where it is needed. Computing power is moved closer to the consumer, with the effect of reducing latency and increasing fail-safety due to absent centralized structures. This is an enabler for applications requiring high-bandwidth uplinks and low latencies to computing units. In this paper, a new use case for edge computing is identified. Mobile devices can overcome their battery limitations and performance constraints by dynamically using the edge-computing-provided computational power. We call this new technology Hybrid Mobile Edge Computing. We present a general architecture and framework, which targets the mobile device use case of hybrid mobile edge computing, not only considering the improvement of performance and energy consumption, but also providing means to protect user privacy, sensitive data and computations. The achieved results are backed by the results of our analysis, targeting the energy saving potentials and possible performance improvements.",
"title": ""
},
{
"docid": "19a5e0d9aee5894b2b35380e356759a0",
"text": "The Sdv Research Platform (Sdvrp) is a new academic release of Static Driver Verifier (Sdv) and the Slam software model checker that contains: (1) a parameterized version of Sdv that allows one to write custom API rules for APIs independent of device drivers; (2) thousands of Boolean programs generated by Sdv in the course of verifying Windows device drivers, including the functional and performance results (of the Bebop model checker) and test scripts to allow comparison against other Boolean program model checkers; (3) a new version of the Slam analysis engine, called Slam2, that is much more robust and performant.",
"title": ""
},
{
"docid": "1d7ee43299e3a7581d11604f1596aeab",
"text": "We analyze the impact of corruption on bilateral trade, highlighting its dual role in terms of extortion and evasion. Corruption taxes trade, when corrupt customs officials in the importing country extort bribes from exporters (extortion effect); however, with high tariffs, corruption may be trade enhancing when corrupt officials allow exporters to evade tariff barriers (evasion effect). We derive and estimate a corruption-augmented gravity model, where the effect of corruption on trade flows is ambiguous and contingent on tariffs. Empirically, corruption taxes trade in the majority of cases, but in high-tariff environments (covering 5% to 14% of the observations) their marginal effect is trade enhancing.",
"title": ""
},
{
"docid": "e82681b5140f3a9b283bbd02870f18d5",
"text": "Employee turnover has been identified as a key issue for organizations because of its adverse impact on work place productivity and long term growth strategies. To solve this problem, organizations use machine learning techniques to predict employee turnover. Accurate predictions enable organizations to take action for retention or succession planning of employees. However, the data for this modeling problem comes from HR Information Systems (HRIS); these are typically under-funded compared to the Information Systems of other domains in the organization which are directly related to its priorities. This leads to the prevalence of noise in the data that renders predictive models prone to over-fitting and hence inaccurate. This is the key challenge that is the focus of this paper, and one that has not been addressed historically. The novel contribution of this paper is to explore the application of Extreme Gradient Boosting (XGBoost) technique which is more robust because of its regularization formulation. Data from the HRIS of a global retailer is used to compare XGBoost against six historically used supervised classifiers and demonstrate its significantly higher accuracy for predicting employee turnover. Keywords—turnover prediction; machine learning; extreme gradient boosting; supervised classification; regularization",
"title": ""
},
{
"docid": "bc06e1fe5064a2b68d6b181b2953b4e2",
"text": "Now, we come to offer you the right catalogues of book to open. hackers heroes of the computer revolution is one of the literary work in this world in suitable to be reading material. That's not only this book gives reference, but also it will show you the amazing benefits of reading a book. Developing your countless minds is needed; moreover you are kind of people with great curiosity. So, the book is very appropriate for you.",
"title": ""
},
{
"docid": "d0b11f539f8199ce9ded88fab60afd74",
"text": "Deep neural network architectures have recently produced excellent results in a variety of areas in artificial intelligence and visual recognition, well surpassing traditional shallow architectures trained using hand-designed features. The power of deep networks stems both from their ability to perform local computations followed by pointwise non-linearities over increasingly larger receptive fields, and from the simplicity and scalability of the gradient-descent training procedure based on backpropagation. An open problem is the inclusion of layers that perform global, structured matrix computations like segmentation (e.g. normalized cuts) or higher-order pooling (e.g. log-tangent space metrics defined over the manifold of symmetric positive definite matrices) while preserving the validity and efficiency of an end-to-end deep training framework. In this paper we propose a sound mathematical apparatus to formally integrate global structured computation into deep computation architectures. At the heart of our methodology is the development of the theory and practice of backpropagation that generalizes to the calculus of adjoint matrix variations. The proposed matrix backpropagation methodology applies broadly to a variety of problems in machine learning or computational perception. Here we illustrate it by performing visual segmentation experiments using the BSDS and MSCOCO benchmarks, where we show that deep networks relying on second-order pooling and normalized cuts layers, trained end-to-end using matrix backpropagation, outperform counterparts that do not take advantage of such global layers.",
"title": ""
},
{
"docid": "88a10ea3bae30f371c3f6276beff9e58",
"text": "This research is a part of smart farm system in the framework of precision agriculture. The system was installed and tested over a year. The tractor tracking system employs the Global Positioning System (GPS) and ZigBee wireless network based on mesh topology to make the system communicate covering a large area. Router nodes are used for re-transmission of data in the network. A software was developed for acquiring data from tractor, storing data and displaying in real time on a web site.",
"title": ""
},
{
"docid": "134d2671fa44793c8969acb50c71c5c0",
"text": "OBJECTIVES\nTransferrin is a glycosylated protein responsible for transporting iron, an essential metal responsible for proper fetal development. Tobacco is a heavily used xenobiotic having a negative impact on the human body and pregnancy outcomes. Aims of this study was to examine the influence of tobacco smoking on transferrin sialic acid residues and their connection with fetal biometric parameters in women with iron-deficiency.\n\n\nMETHODS\nThe study involved 173 samples from pregnant women, smokers and non-smokers, iron deficient and not. Transferrin sialylation was determined by capillary electrophoresis. The cadmium (Cd) level was measured by atomic absorption and the sialic acid concentration by the resorcinol method.\n\n\nRESULTS\nWomen with iron deficiencies who smoked gave birth earlier than non-smoking, non-iron-deficient women. The Cd level, but not the cotinine level, was positively correlated with transferrin sialylation in the blood of iron-deficient women who smoked; 3-, 4-, 5- and 6-sialoTf correlated negatively with fetal biometric parameters in the same group.\n\n\nCONCLUSION\nIt has been shown the relationship between Cd from tobacco smoking and fetal biometric parameters observed only in the iron deficient group suggests an additive effect of these two factors, and indicate that mothers with anemia may be more susceptible to Cd toxicity and disturbed fetal development.",
"title": ""
}
] | scidocsrr |
2146f19377dfac8d77863a08581add36 | Security and usability of authenticating process of online banking: User experience study | [
{
"docid": "e33dd6cf660a2286c51946de4cc641a0",
"text": "User authentication in computing systems traditionally depends on three factors: something you have (e.g., a hardware token), something you are (e.g., a fingerprint), and something you know (e.g., a password). In this paper, we explore a fourth factor, the social network of the user, that is, somebody you know.Human authentication through mutual acquaintance is an age-old practice. In the arena of computer security, it plays roles in privilege delegation, peer-level certification, help-desk assistance, and reputation networks. As a direct means of logical authentication, though, the reliance of human being on another has little supporting scientific literature or practice.In this paper, we explore the notion of vouching, that is, peer-level, human-intermediated authentication for access control. We explore its use in emergency authentication, when primary authenticators like passwords or hardware tokens become unavailable. We describe a practical, prototype vouching system based on SecurID, a popular hardware authentication token. We address traditional, cryptographic security requirements, but also consider questions of social engineering and user behavior.",
"title": ""
}
] | [
{
"docid": "1825bbaf0fa86c8f6a35499339f36e97",
"text": "Predictions of financial time series often show a characteristic one step shift relative to the original data as in a random walk. This has been the cause for opposing views whether such time series do contain information that can be extracted for predictions, or are simply random walks. In this case study, we show that NNs that are capable of extracting weak low frequency periodic signals buried in a strong high frequency signal, consistently predict the next value in the series to be the current value, as in a random walk, when used for one-step-ahead predictions of the detrended S&P 500 time series. In particular for the Time Delay Feed Forward Networks and Elman Networks of various configurations, our study supports the view of the detrended S&P 500 being a random walk series. This is consistent with the long standing hypothesis that some financial time series are random walk series.",
"title": ""
},
{
"docid": "d29ad30492b084cbcd2e6ede4665f483",
"text": "K-means algorithm has been widely used in machine learning and data mining due to its simplicity and good performance. However, the standard k-means algorithm would be quite slow for clustering millions of data into thousands of or even tens of thousands of clusters. In this paper, we propose a fast k-means algorithm named multi-stage k-means (MKM) which uses a multi-stage filtering approach. The multi-stage filtering approach greatly accelerates the k-means algorithm via a coarse-to-fine search strategy. To further speed up the algorithm, hashing is introduced to accelerate the assignment step which is the most time-consuming part in k-means. Extensive experiments on several massive datasets show that the proposed algorithm can obtain up to 600X speed-up over the k-means algorithm with comparable accuracy.",
"title": ""
},
{
"docid": "7138c13d88d87df02c7dbab4c63328c4",
"text": "Banisteriopsis caapi is the basic ingredient of ayahuasca, a psychotropic plant tea used in the Amazon for ritual and medicinal purposes, and by interested individuals worldwide. Animal studies and recent clinical research suggests that B. caapi preparations show antidepressant activity, a therapeutic effect that has been linked to hippocampal neurogenesis. Here we report that harmine, tetrahydroharmine and harmaline, the three main alkaloids present in B. caapi, and the harmine metabolite harmol, stimulate adult neurogenesis in vitro. In neurospheres prepared from progenitor cells obtained from the subventricular and the subgranular zones of adult mice brains, all compounds stimulated neural stem cell proliferation, migration, and differentiation into adult neurons. These findings suggest that modulation of brain plasticity could be a major contribution to the antidepressant effects of ayahuasca. They also expand the potential application of B. caapi alkaloids to other brain disorders that may benefit from stimulation of endogenous neural precursor niches.",
"title": ""
},
{
"docid": "859c6f75ac740e311da5e68fcd093531",
"text": "PURPOSE\nTo understand the effect of socioeconomic status (SES) on the risk of complications in type 1 diabetes (T1D), we explored the relationship between SES and major diabetes complications in a prospective, observational T1D cohort study.\n\n\nMETHODS\nComplete data were available for 317 T1D persons within 4 years of age 28 (ages 24-32) in the Pittsburgh Epidemiology of Diabetes Complications Study. Age 28 was selected to maximize income, education, and occupation potential and to minimize the effect of advanced diabetes complications on SES.\n\n\nRESULTS\nThe incidences over 1 to 20 years' follow-up of end-stage renal disease and coronary artery disease were two to three times greater for T1D individuals without, compared with those with a college degree (p < .05 for both), whereas the incidence of autonomic neuropathy was significantly greater for low-income and/or nonprofessional participants (p < .05 for both). HbA(1c) was inversely associated only with income level. In sex- and diabetes duration-adjusted Cox models, lower education predicted end-stage renal disease (hazard ratio [HR], 2.9; 95% confidence interval [95% CI], 1.1-7.7) and coronary artery disease (HR, 2.5, 95% CI, 1.3-4.9), whereas lower income predicted autonomic neuropathy (HR, 1.7; 95% CI, 1.0-2.9) and lower-extremity arterial disease (HR, 3.7; 95% CI, 1.1-11.9).\n\n\nCONCLUSIONS\nThese associations, partially mediated by clinical risk factors, suggest that lower SES T1D individuals may have poorer self-management and, thus, greater complications from diabetes.",
"title": ""
},
{
"docid": "60245551fe055b67e94def9fcff15bca",
"text": "Redundancy can, in general, improve the ability and performance of parallel manipulators by implementing the redundant degrees of freedom to optimize a secondary objective function. Almost all published researches in the area of parallel manipulators redundancy were focused on the design and analysis of redundant parallel manipulators with rigid (nonconfigurable) platforms and on grasping hands to be attached to the platforms. Conventional grippers usually are not appropriate to grasp irregular or large objects. Very few studies focused on the idea of using a configurable platform as a grasping device. This paper highlights the idea of using configurable platforms in both planar and spatial redundant parallel manipulators, and generalizes their analysis. The configurable platform is actually a closed kinematic chain of mobility equal to the degree of redundancy of the manipulator. The additional redundant degrees of freedom are used in reconfiguring the shape of the platform itself. Several designs of kinematically redundant planar and spatial parallel manipulators with configurable platform are presented. Such designs can be used as a grasping device especially for irregular or large objects or even as a micro-positioning device after grasping the object. Screw algebra is used to develop a general framework that can be adapted to analyze the kinematics of any general-geometry planar or spatial kinematically redundant parallel manipulator with configurable platform.",
"title": ""
},
{
"docid": "79685eeb67edbb3fbb6e6340fac420c3",
"text": "Fatma Özcan IBM Almaden Research Center San Jose, CA fozcan@us.ibm.com Nesime Tatbul Intel Labs and MIT Cambridge, MA tatbul@csail.mit.edu Daniel J. Abadi Yale University New Haven, CT dna@cs.yale.edu Marcel Kornacker Cloudera San Francisco, CA marcel@cloudera.com C Mohan IBM Almaden Research Center San Jose, CA cmohan@us.ibm.com Karthik Ramasamy Twitter, Inc. San Francisco, CA karthik@twitter.com Janet Wiener Facebook, Inc. Menlo Park, CA jlw@fb.com",
"title": ""
},
{
"docid": "5fa9edb9ac988ddc2b2c6e4b46f0a623",
"text": "This study presents a sliding-mode neural-network (SMNN) control system for the tracking control of an n rigid-link robot manipulator to achieve high-precision position control. The aim of this study is to overcome some of the shortcomings of conventional robust controllers such as a model-based adaptive controller requires the system dynamics in detail; the fuzzy rule learning scheme has a latent stability problem; an adaptive control scheme for robot manipulator via fuzzy compensator requires strict constrained conditions and prior system knowledge. In the SMNN control system, a neural network controller is developed to mimic an equivalent control law in the sliding-mode control, and a robust controller is designed to curb the system dynamics on the sliding surface for guaranteeing the asymptotic stability property. Moreover, an adaptive bound estimation algorithm is employed to estimate the upper bound of uncertainties. All adaptive learning algorithms in the SMNN control system are derived from the sense of Lyapunov stability analysis, so that system-tracking stability can be guaranteed in the closed-loop system whether the uncertainties occur or not. Computer simulations of a two-link robot manipulator verify the validity of the proposed control strategy in the possible presence of uncertainties and di4erent trajectories. The proposed SMNN control scheme possesses two salient merits: (1) it guarantees the stability of the controlled system, and (2) no constrained conditions and prior knowledge of the controlled plant is required in the design process. This new intelligent methodology provides the designer with an alternative choice to control an n rigid-link robot manipulator. c © 2002 Elsevier Science B.V. All rights reserved.",
"title": ""
},
{
"docid": "b8f23ec8e704ee1cf9dbe6063a384b09",
"text": "The Dirichlet distribution and its compound variant, the Dirichlet-multinomial, are two of the most basic models for proportional data, such as the mix of vocabulary words in a text document. Yet the maximum-likelihood estimate of these distributions is not available in closed-form. This paper describes simple and efficient iterative schemes for obtaining parameter estimates in these models. In each case, a fixed-point iteration and a Newton-Raphson (or generalized Newton-Raphson) iteration is provided. 1 The Dirichlet distribution The Dirichlet distribution is a model of how proportions vary. Let p denote a random vector whose elements sum to 1, so that pk represents the proportion of item k. Under the Dirichlet model with parameter vector α, the probability density at p is p(p) ∼ D(α1, ..., αK) = Γ( ∑ k αk) ∏ k Γ(αk) ∏ k pk k (1) where pk > 0 (2)",
"title": ""
},
{
"docid": "ec31c653457389bd587b26f4427c90d7",
"text": "Segmentation and classification of urban range data into different object classes have several challenges due to certain properties of the data, such as density variation, inconsistencies due to missing data and the large data size that require heavy computation and large memory. A method to classify urban scenes based on a super-voxel segmentation of sparse 3D data obtained from LiDAR sensors is presented. The 3D point cloud is first segmented into voxels, which are then characterized by several attributes transforming them into super-voxels. These are joined together by using a link-chain method rather than the usual region growing algorithm to create objects. These objects are then classified using geometrical models and local descriptors. In order to evaluate the results, a new metric that combines both segmentation and classification results simultaneously is presented. The effects of voxel size and incorporation of RGB color and laser reflectance intensity on the classification results are also discussed. The method is evaluated on standard data sets using different metrics to demonstrate its efficacy.",
"title": ""
},
{
"docid": "f762e0937878a406e4200ab72d4d3463",
"text": "In this paper, patent pending substrate integrated waveguide (SIW) bandpass filters with moderate fractional bandwidth and improved stopband performance are proposed and demonstrated for a Ka-band satellite ground terminal. Nonphysical cross-coupling provided by higher order modes in the oversized SIW cavities is used to generate the finite transmission zeros far away from the passband for improved stopband performance. Different input/output topologies of the filter are discussed for wide stopband applications. Design considerations including the design approach, filter configuration, and tolerance analysis are addressed. Two fourth-order filters with a passband of 19.2-21.2 GHz are fabricated on a single-layer Rogers RT/Duroid 6002 substrate using linear arrays of metallized via-holes by a standard printed circuit board process. Measured results of the two filters agree very well with simulated results, showing the in-band insertion loss is 0.9 dB or better, and the stopband attenuation in the frequency band of 29.5-30 GHz is better than 50 dB. Measurements over a temperature range of -20degC to +40degC show the passband remains almost unchanged.",
"title": ""
},
{
"docid": "9834dd845dcb15c91b590881ce7b2f5e",
"text": "Plant reproduction occurs through the production of gametes by a haploid generation, the gametophyte. Flowering plants have highly reduced male and female gametophytes, called pollen grains and embryo sacs, respectively, consisting of only a few cells. Gametophytes are critical for sexual reproduction, but detailed understanding of their development remains poor as compared to the diploid sporophyte. This article reviews recent progress in understanding the mechanisms underlying gametophytic development and function in flowering plants. The focus is on genes and molecules involved in the processes of initiation, growth, cell specification, and fertilization of the male and female gametophytes derived primarily from studies in model systems.",
"title": ""
},
{
"docid": "e5abc3525464662f42509bdedfed7acf",
"text": "The authors draw together and develop previous timing models for a broad range of conditioning phenomena to reveal their common conceptual foundations: First, conditioning depends on the learning of the temporal intervals between events and the reciprocals of these intervals, the rates of event occurrence. Second, remembered intervals and rates translate into observed behavior through decision processes whose structure is adapted to noise in the decision variables. The noise and the uncertainties consequent on it have both subjective and objective origins. A third feature of these models is their timescale invariance, which the authors argue is a very important property evident in the available experimental data. This conceptual framework is similar to the psychophysical conceptual framework in which contemporary models of sensory processing are rooted. The authors contrast it with the associative conceptual framework.",
"title": ""
},
{
"docid": "62c515d4b96f123b585a92a5aa919792",
"text": "OBJECTIVE\nTo investigate the characteristics of the laryngeal mucosal microvascular network in suspected laryngeal cancer patients, using narrow band imaging, and to evaluate the value of narrow band imaging endoscopy in the early diagnosis of laryngeal precancerous and cancerous lesions.\n\n\nPATIENTS AND METHODS\nEighty-five consecutive patients with suspected precancerous or cancerous laryngeal lesions were enrolled in the study. Endoscopic narrow band imaging findings were classified into five types (I to V) according to the features of the mucosal intraepithelial papillary capillary loops assessed.\n\n\nRESULTS\nA total of 104 lesions (45 malignancies and 59 nonmalignancies) was detected under white light and narrow band imaging modes. The sensitivity and specificity of narrow band imaging in detecting malignant lesions were 88.9 and 93.2 per cent, respectively. The intraepithelial papillary capillary loop classification, as determined by narrow band imaging, was closely associated with the laryngeal lesions' histological findings. Type I to IV lesions were considered nonmalignant and type V lesions malignant. For type Va lesions, the sensitivity and specificity of narrow band imaging in detecting severe dysplasia or carcinoma in situ were 100 and 79.5 per cent, respectively. In patients with type Vb and Vc lesions, the sensitivity and specificity of narrow band imaging in detecting invasive carcinoma were 83.8 and 100 per cent, respectively.\n\n\nCONCLUSION\nNarrow band imaging is a promising approach enabling in vivo differentiation of nonmalignant from malignant laryngeal lesions by evaluating the morphology of mucosal capillaries. These results suggest endoscopic narrow band imaging may be useful in the early detection of laryngeal cancer and precancerous lesions.",
"title": ""
},
{
"docid": "ec541a853bfe1bdbc71c478045f6efa5",
"text": "This paper presents a hybrid seven-level converter based on T-type converter and H-bridge cascaded suitable for low-voltage and high-power-density applications. The operation principles and conduction paths are analyzed comprehensively. Voltage balance control of the floating capacitors is the key point of this paper. Mathematical expressions of capacitor voltage balance conditions are deduced based on sinusoidal pulse width modulation (SPWM). The results show that floating capacitor voltages are only balanced when the modulation index is below 0.82 under SPWM. In order to enlarge the modulation index ensuring the capacitor voltage balance, space vector modulation (SVM) is also applied to regulate floating capacitor voltages taking advantage of redundant switching vectors. Meanwhile, in SVM, there are no additional control requirements for the capacitor voltage. Taken both SPWM and SVM into consideration, the limit to the range of operation for this seven-level converter is presented, which is a function of the modulation index and the power factor. The merit of dc voltage utilization improvement in this topology is also analyzed based on simulation results. Simulations and experimental results under different modulation index and RL load are presented to verify the modulation strategies illustrated in this paper.",
"title": ""
},
{
"docid": "137610f1a839c9915a77fd8f12c309bf",
"text": "In this paper we give an overview of tasks, models and mixed-signal simulation tools to support design of digitally controlled switching power supplies where the digital controller is implemented in a dedicated FPGA or ASIC. Mixed-signal simulation models of a digitally controlled switching converter based on Matlab/Simulink and HDL/Spice simulation tools are presented. The models are used in the design of a high-frequency digital controller integrated circuit for dc-dc switching converters. Simulation and experimental results are compared.",
"title": ""
},
{
"docid": "b740fd9a56701ddd8c54d92f45895069",
"text": "In vivo imaging of apoptosis in a preclinical setting in anticancer drug development could provide remarkable advantages in terms of translational medicine. So far, several imaging technologies with different probes have been used to achieve this goal. Here we describe a bioluminescence imaging approach that uses a new formulation of Z-DEVD-aminoluciferin, a caspase 3/7 substrate, to monitor in vivo apoptosis in tumor cells engineered to express luciferase. Upon apoptosis induction, Z-DEVD-aminoluciferin is cleaved by caspase 3/7 releasing aminoluciferin that is now free to react with luciferase generating measurable light. Thus, the activation of caspase 3/7 can be measured by quantifying the bioluminescent signal. Using this approach, we have been able to monitor caspase-3 activation and subsequent apoptosis induction after camptothecin and temozolomide treatment on xenograft mouse models of colon cancer and glioblastoma, respectively. Treated mice showed more than 2-fold induction of Z-DEVD-aminoluciferin luminescent signal when compared to the untreated group. Combining D-luciferin that measures the total tumor burden, with Z-DEVD-aminoluciferin that assesses apoptosis induction via caspase activation, we confirmed that it is possible to follow non-invasively tumor growth inhibition and induction of apoptosis after treatment in the same animal over time. Moreover, here we have proved that following early apoptosis induction by caspase 3 activation is a good biomarker that accurately predicts tumor growth inhibition by anti-cancer drugs in engineered colon cancer and glioblastoma cell lines and in their respective mouse xenograft models.",
"title": ""
},
{
"docid": "81d4f23c5b6d407e306569f4e3ad4be9",
"text": "While much progress has been made in wearable computing in recent years, input techniques remain a key challenge. In this paper, we introduce uTrack, a technique to convert the thumb and fingers into a 3D input system using magnetic field (MF) sensing. A user wears a pair of magnetometers on the back of their fingers and a permanent magnet affixed to the back of the thumb. By moving the thumb across the fingers, we obtain a continuous input stream that can be used for 3D pointing. Specifically, our novel algorithm calculates the magnet's 3D position and tilt angle directly from the sensor readings. We evaluated uTrack as an input device, showing an average tracking accuracy of 4.84 mm in 3D space - sufficient for subtle interaction. We also demonstrate a real-time prototype and example applications allowing users to interact with the computer using 3D finger input.",
"title": ""
},
{
"docid": "732da8eb4c41d6bf70ded5866fadd334",
"text": "Ferroelectric field effect transistors (FeFETs) based on ferroelectric hafnium oxide (HfO2) thin films show high potential for future embedded nonvolatile memory applications. However, HfO2 films besides their recently discovered ferroelectric behavior are also prone to undesired charge trapping effects. Therefore, the scope of this paper is to verify the possibility of the charge trapping during standard operation of the HfO2-based FeFET memories. The kinetics of the charge trapping and its interplay with the ferroelectric polarization switching are analyzed in detail using the single-pulse ID-VG technique. Furthermore, the impact of the charge trapping on the important memory characteristics such as retention and endurance is investigated.",
"title": ""
},
{
"docid": "65405e7f9b510f3a15d826e9969426f2",
"text": "Human concept learning is particularly impressive in two respects: the internal structure of concepts can be representationally rich, and yet the very same concepts can also be learned from just a few examples. Several decades of research have dramatically advanced our understanding of these two aspects of concepts. While the richness and speed of concept learning are most often studied in isolation, the power of human concepts may be best explained through their synthesis. This paper presents a large-scale empirical study of one-shot concept learning, suggesting that rich generative knowledge in the form of a motor program can be induced from just a single example of a novel concept. Participants were asked to draw novel handwritten characters given a reference form, and we recorded the motor data used for production. Multiple drawers of the same character not only produced visually similar drawings, but they also showed a striking correspondence in their strokes, as measured by their number, shape, order, and direction. This suggests that participants can infer a rich motorbased concept from a single example. We also show that the motor programs induced by individual subjects provide a powerful basis for one-shot classification, yielding far higher accuracy than state-of-the-art pattern recognition methods based on just the visual form.",
"title": ""
},
{
"docid": "527d7c091cfc63c8e9d36afdd6b7bdfe",
"text": "Previous work on Recursive Neural Networks (RNNs) shows that these models can produce compositional feature vectors for accurately representing and classifying sentences or images. However, the sentence vectors of previous models cannot accurately represent visually grounded meaning. We introduce the DT-RNN model which uses dependency trees to embed sentences into a vector space in order to retrieve images that are described by those sentences. Unlike previous RNN-based models which use constituency trees, DT-RNNs naturally focus on the action and agents in a sentence. They are better able to abstract from the details of word order and syntactic expression. DT-RNNs outperform other recursive and recurrent neural networks, kernelized CCA and a bag-of-words baseline on the tasks of finding an image that fits a sentence description and vice versa. They also give more similar representations to sentences that describe the same image.",
"title": ""
}
] | scidocsrr |
89614a6ddc0d9dedd24685c5b6a1164b | Short-term load forecasting in smart grid: A combined CNN and K-means clustering approach | [
{
"docid": "f9b56de3658ef90b611c78bdb787d85b",
"text": "Time series prediction techniques have been used in many real-world applications such as financial market prediction, electric utility load forecasting , weather and environmental state prediction, and reliability forecasting. The underlying system models and time series data generating processes are generally complex for these applications and the models for these systems are usually not known a priori. Accurate and unbiased estimation of the time series data produced by these systems cannot always be achieved using well known linear techniques, and thus the estimation process requires more advanced time series prediction algorithms. This paper provides a survey of time series prediction applications using a novel machine learning approach: support vector machines (SVM). The underlying motivation for using SVMs is the ability of this methodology to accurately forecast time series data when the underlying system processes are typically nonlinear, non-stationary and not defined a-priori. SVMs have also been proven to outperform other non-linear techniques including neural-network based non-linear prediction techniques such as multi-layer perceptrons.The ultimate goal is to provide the reader with insight into the applications using SVM for time series prediction, to give a brief tutorial on SVMs for time series prediction, to outline some of the advantages and challenges in using SVMs for time series prediction, and to provide a source for the reader to locate books, technical journals, and other online SVM research resources.",
"title": ""
},
{
"docid": "0254d49cb759e163a032b6557f969bd3",
"text": "The smart electricity grid enables a two-way flow of power and data between suppliers and consumers in order to facilitate the power flow optimization in terms of economic efficiency, reliability and sustainability. This infrastructure permits the consumers and the micro-energy producers to take a more active role in the electricity market and the dynamic energy management (DEM). The most important challenge in a smart grid (SG) is how to take advantage of the users’ participation in order to reduce the cost of power. However, effective DEM depends critically on load and renewable production forecasting. This calls for intelligent methods and solutions for the real-time exploitation of the large volumes of data generated by a vast amount of smart meters. Hence, robust data analytics, high performance computing, efficient data network management, and cloud computing techniques are critical towards the optimized operation of SGs. This research aims to highlight the big data issues and challenges faced by the DEM employed in SG networks. It also provides a brief description of the most commonly used data processing methods in the literature, and proposes a promising direction for future research in the field.",
"title": ""
},
{
"docid": "26032527ca18ef5a8cdeff7988c6389c",
"text": "This paper aims to develop a load forecasting method for short-term load forecasting, based on an adaptive two-stage hybrid network with self-organized map (SOM) and support vector machine (SVM). In the first stage, a SOM network is applied to cluster the input data set into several subsets in an unsupervised manner. Then, groups of 24 SVMs for the next day's load profile are used to fit the training data of each subset in the second stage in a supervised way. The proposed structure is robust with different data types and can deal well with the nonstationarity of load series. In particular, our method has the ability to adapt to different models automatically for the regular days and anomalous days at the same time. With the trained network, we can straightforwardly predict the next-day hourly electricity load. To confirm the effectiveness, the proposed model has been trained and tested on the data of the historical energy load from New York Independent System Operator.",
"title": ""
}
] | [
{
"docid": "1232e633a941b7aa8cccb28287b56e5b",
"text": "This paper presents a complete system for constructing panoramic image mosaics from sequences of images. Our mosaic representation associates a transformation matrix with each input image, rather than explicitly projecting all of the images onto a common surface (e.g., a cylinder). In particular, to construct a full view panorama, we introduce a rotational mosaic representation that associates a rotation matrix (and optionally a focal length) with each input image. A patch-based alignment algorithm is developed to quickly align two images given motion models. Techniques for estimating and refining camera focal lengths are also presented. In order to reduce accumulated registration errors, we apply global alignment (block adjustment) to the whole sequence of images, which results in an optimally registered image mosaic. To compensate for small amounts of motion parallax introduced by translations of the camera and other unmodeled distortions, we use a local alignment (deghosting) technique which warps each image based on the results of pairwise local image registrations. By combining both global and local alignment, we significantly improve the quality of our image mosaics, thereby enabling the creation of full view panoramic mosaics with hand-held cameras. We also present an inverse texture mapping algorithm for efficiently extracting environment maps from our panoramic image mosaics. By mapping the mosaic onto an arbitrary texture-mapped polyhedron surrounding the origin, we can explore the virtual environment using standard 3D graphics viewers and hardware without requiring special-purpose players.",
"title": ""
},
{
"docid": "8ee0764d45e512bfc6b0273f7e90d2c1",
"text": "This work introduces a new dataset and framework for the exploration of topological data analysis (TDA) techniques applied to time-series data. We examine the end-toend TDA processing pipeline for persistent homology applied to time-delay embeddings of time series – embeddings that capture the underlying system dynamics from which time series data is acquired. In particular, we consider stability with respect to time series length, the approximation accuracy of sparse filtration methods, and the discriminating ability of persistence diagrams as a feature for learning. We explore these properties across a wide range of time-series datasets spanning multiple domains for single source multi-segment signals as well as multi-source single segment signals. Our analysis and dataset captures the entire TDA processing pipeline and includes time-delay embeddings, persistence diagrams, topological distance measures, as well as kernels for similarity learning and classification tasks for a broad set of time-series data sources. We outline the TDA framework and rationale behind the dataset and provide insights into the role of TDA for time-series analysis as well as opportunities for new work.",
"title": ""
},
{
"docid": "75f8f0d89bdb5067910a92553275b0d7",
"text": "It is well known that recognition performance degrades signi cantly when moving from a speakerdependent to a speaker-independent system. Traditional hidden Markov model (HMM) systems have successfully applied speaker-adaptation approaches to reduce this degradation. In this paper we present and evaluate some techniques for speaker-adaptation of a hybrid HMM-arti cial neural network (ANN) continuous speech recognition system. These techniques are applied to a well trained, speaker-independent, hybrid HMM-ANN system and the recognizer parameters are adapted to a new speaker through o -line procedures. The techniques are evaluated on the DARPA RM corpus using varying amounts of adaptation material and different ANN architectures. The results show that speaker-adaptation within the hybrid framework can substantially improve system performance.",
"title": ""
},
{
"docid": "cfeb97a848766269c2088d8191206cc8",
"text": "We design a class of submodular functions meant for document summarization tasks. These functions each combine two terms, one which encourages the summary to be representative of the corpus, and the other which positively rewards diversity. Critically, our functions are monotone nondecreasing and submodular, which means that an efficient scalable greedy optimization scheme has a constant factor guarantee of optimality. When evaluated on DUC 2004-2007 corpora, we obtain better than existing state-of-art results in both generic and query-focused document summarization. Lastly, we show that several well-established methods for document summarization correspond, in fact, to submodular function optimization, adding further evidence that submodular functions are a natural fit for document summarization.",
"title": ""
},
{
"docid": "c67ffe3dfa6f0fe0449f13f1feb20300",
"text": "The associations between giving a history of physical, emotional, and sexual abuse in children and a range of mental health, interpersonal, and sexual problems in adult life were examined in a community sample of women. Abuse was defined to establish groups giving histories of unequivocal victimization. A history of any form of abuse was associated with increased rates of psychopathology, sexual difficulties, decreased self-esteem, and interpersonal problems. The similarities between the three forms of abuse in terms of their association with negative adult outcomes was more apparent than any differences, though there was a trend for sexual abuse to be particularly associated to sexual problems, emotional abuse to low self-esteem, and physical abuse to marital breakdown. Abuse of all types was more frequent in those from disturbed and disrupted family backgrounds. The background factors associated with reports of abuse were themselves often associated to the same range of negative adult outcomes as for abuse. Logistic regressions indicated that some, though not all, of the apparent associations between abuse and adult problems was accounted for by this matrix of childhood disadvantage from which abuse so often emerged.",
"title": ""
},
{
"docid": "a5e01cfeb798d091dd3f2af1a738885b",
"text": "It is shown by an extensive benchmark on molecular energy data that the mathematical form of the damping function in DFT-D methods has only a minor impact on the quality of the results. For 12 different functionals, a standard \"zero-damping\" formula and rational damping to finite values for small interatomic distances according to Becke and Johnson (BJ-damping) has been tested. The same (DFT-D3) scheme for the computation of the dispersion coefficients is used. The BJ-damping requires one fit parameter more for each functional (three instead of two) but has the advantage of avoiding repulsive interatomic forces at shorter distances. With BJ-damping better results for nonbonded distances and more clear effects of intramolecular dispersion in four representative molecular structures are found. For the noncovalently-bonded structures in the S22 set, both schemes lead to very similar intermolecular distances. For noncovalent interaction energies BJ-damping performs slightly better but both variants can be recommended in general. The exception to this is Hartree-Fock that can be recommended only in the BJ-variant and which is then close to the accuracy of corrected GGAs for non-covalent interactions. According to the thermodynamic benchmarks BJ-damping is more accurate especially for medium-range electron correlation problems and only small and practically insignificant double-counting effects are observed. It seems to provide a physically correct short-range behavior of correlation/dispersion even with unmodified standard functionals. In any case, the differences between the two methods are much smaller than the overall dispersion effect and often also smaller than the influence of the underlying density functional.",
"title": ""
},
{
"docid": "a37aae87354ff25bf7937adc7a9f8e62",
"text": "Vectorizing hand-drawn sketches is an important but challenging task. Many businesses rely on fashion, mechanical or structural designs which, sooner or later, need to be converted in vectorial form. For most, this is still a task done manually. This paper proposes a complete framework that automatically transforms noisy and complex hand-drawn sketches with different stroke types in a precise, reliable and highly-simplified vectorized model. The proposed framework includes a novel line extraction algorithm based on a multi-resolution application of Pearson’s cross correlation and a new unbiased thinning algorithm that can get rid of scribbles and variable-width strokes to obtain clean 1-pixel lines. Other contributions include variants of pruning, merging and edge linking procedures to post-process the obtained paths. Finally, a modification of the original Schneider’s vectorization algorithm is designed to obtain fewer control points in the resulting Bézier splines. All the steps presented in this framework have been extensively tested and compared with state-of-the-art algorithms, showing (both qualitatively and quantitatively) their outperformance. Moreover they exhibit fast real-time performance, making them suitable for integration in any computer graphics toolset.",
"title": ""
},
{
"docid": "b17e909f1301880e93797ed75d26ce57",
"text": "We propose a simple, yet effective, Word Sense Disambiguation method that uses a combination of a lexical knowledge-base and embeddings. Similar to the classic Lesk algorithm, it exploits the idea that overlap between the context of a word and the definition of its senses provides information on its meaning. Instead of counting the number of words that overlap, we use embeddings to compute the similarity between the gloss of a sense and the context. Evaluation on both Dutch and English datasets shows that our method outperforms other Lesk methods and improves upon a state-of-theart knowledge-based system. Additional experiments confirm the effect of the use of glosses and indicate that our approach works well in different domains.",
"title": ""
},
{
"docid": "c1d75b9a71f373a6e44526adf3694f37",
"text": "Segmentation means segregating area of interest from the image. The aim of image segmentation is to cluster the pixels into salient image regions i.e. regions corresponding to individual surfaces, objects, or natural parts of objects. Automatic Brain tumour segmentation is a sensitive step in medical field. A significant medical informatics task is to perform the indexing of the patient databases according to image location, size and other characteristics of brain tumours based on magnetic resonance (MR) imagery. This requires segmenting tumours from different MR imaging modalities. Automated brain tumour segmentation from MR modalities is a challenging, computationally intensive task.Image segmentation plays an important role in image processing. MRI is generally more useful for brain tumour detection because it provides more detailed information about its type, position and size. For this reason, MRI imaging is the choice of study for the diagnostic purpose and, thereafter, for surgery and monitoring treatment outcomes. This paper presents a review of the various methods used in brain MRI image segmentation. The review covers imaging modalities, magnetic resonance imaging and methods for segmentation approaches. The paper concludes with a discussion on the upcoming trend of advanced researches in brain image segmentation. Keywords-Region growing, Level set method, Split and merge algorithm, MRI images",
"title": ""
},
{
"docid": "51c0d682dd0d9c24e23696ba09dc4f49",
"text": "Graph embedding methods represent nodes in a continuous vector space, preserving information from the graph (e.g. by sampling random walks). There are many hyper-parameters to these methods (such as random walk length) which have to be manually tuned for every graph. In this paper, we replace random walk hyperparameters with trainable parameters that we automatically learn via backpropagation. In particular, we learn a novel attention model on the power series of the transition matrix, which guides the random walk to optimize an upstream objective. Unlike previous approaches to attention models, the method that we propose utilizes attention parameters exclusively on the data (e.g. on the random walk), and not used by the model for inference. We experiment on link prediction tasks, as we aim to produce embeddings that best-preserve the graph structure, generalizing to unseen information. We improve state-of-the-art on a comprehensive suite of real world datasets including social, collaboration, and biological networks. Adding attention to random walks can reduce the error by 20% to 45% on datasets we attempted. Further, our learned attention parameters are different for every graph, and our automatically-found values agree with the optimal choice of hyper-parameter if we manually tune existing methods.",
"title": ""
},
{
"docid": "e45e49fb299659e2e71f5c4eb825aff6",
"text": "We propose a lifelong learning system that has the ability to reuse and transfer knowledge from one task to another while efficiently retaining the previously learned knowledgebase. Knowledge is transferred by learning reusable skills to solve tasks in Minecraft, a popular video game which is an unsolved and high-dimensional lifelong learning problem. These reusable skills, which we refer to as Deep Skill Networks, are then incorporated into our novel Hierarchical Deep Reinforcement Learning Network (H-DRLN) architecture using two techniques: (1) a deep skill array and (2) skill distillation, our novel variation of policy distillation (Rusu et al. 2015) for learning skills. Skill distillation enables the HDRLN to efficiently retain knowledge and therefore scale in lifelong learning, by accumulating knowledge and encapsulating multiple reusable skills into a single distilled network. The H-DRLN exhibits superior performance and lower learning sample complexity compared to the regular Deep Q Network (Mnih et al. 2015) in sub-domains of Minecraft.",
"title": ""
},
{
"docid": "19a02cb59a50f247663acc77b768d7ec",
"text": "Machine learning is a useful technology for decision support systems and assumes greater importance in research and practice. Whilst much of the work focuses technical implementations and the adaption of machine learning algorithms to application domains, the factors of machine learning design affecting the usefulness of decision support are still understudied. To enhance the understanding of machine learning and its use in decision support systems, we report the results of our content analysis of design-oriented research published between 1994 and 2013 in major Information Systems outlets. The findings suggest that the usefulness of machine learning for supporting decision-makers is dependent on the task, the phase of decision-making, and the applied technologies. We also report about the advantages and limitations of prior research, the applied evaluation methods and implications for future decision support research. Our findings suggest that future decision support research should shed more light on organizational and people-related evaluation criteria.",
"title": ""
},
{
"docid": "a90dd405d9bd2ed912cacee098c0f9db",
"text": "Many telecommunication companies today have actively started to transform the way they do business, going beyond communication infrastructure providers are repositioning themselves as data-driven service providers to create new revenue streams. In this paper, we present a novel industrial application where a scalable Big data approach combined with deep learning is used successfully to classify massive mobile web log data, to get new aggregated insights on customer web behaviors that could be applied to various industry verticals.",
"title": ""
},
{
"docid": "9b53d96025c26254b38a4325c9d2da15",
"text": "The parameter spaces of hierarchical systems such as multilayer perceptrons include singularities due to the symmetry and degeneration of hidden units. A parameter space forms a geometrical manifold, called the neuromanifold in the case of neural networks. Such a model is identified with a statistical model, and a Riemannian metric is given by the Fisher information matrix. However, the matrix degenerates at singularities. Such a singular structure is ubiquitous not only in multilayer perceptrons but also in the gaussian mixture probability densities, ARMA time-series model, and many other cases. The standard statistical paradigm of the Cramr-Rao theorem does not hold, and the singularity gives rise to strange behaviors in parameter estimation, hypothesis testing, Bayesian inference, model selection, and in particular, the dynamics of learning from examples. Prevailing theories so far have not paid much attention to the problem caused by singularity, relying only on ordinary statistical theories developed for regular (nonsingular) models. Only recently have researchers remarked on the effects of singularity, and theories are now being developed. This article gives an overview of the phenomena caused by the singularities of statistical manifolds related to multilayer perceptrons and gaussian mixtures. We demonstrate our recent results on these problems. Simple toy models are also used to show explicit solutions. We explain that the maximum likelihood estimator is no longer subject to the gaussian distribution even asymptotically, because the Fisher information matrix degenerates, that the model selection criteria such as AIC, BIC, and MDL fail to hold in these models, that a smooth Bayesian prior becomes singular in such models, and that the trajectories of dynamics of learning are strongly affected by the singularity, causing plateaus or slow manifolds in the parameter space. The natural gradient method is shown to perform well because it takes the singular geometrical structure into account. The generalization error and the training error are studied in some examples.",
"title": ""
},
{
"docid": "06c0ee8d139afd11aab1cc0883a57a68",
"text": "In this paper we describe the Microsoft COCO Caption dataset and evaluation server. When completed, the dataset will contain over one and a half million captions describing over 330,000 images. For the training and validation images, five independent human generated captions will be provided. To ensure consistency in evaluation of automatic caption generation algorithms, an evaluation server is used. The evaluation server receives candidate captions and scores them using several popular metrics, including BLEU, METEOR, ROUGE and CIDEr. Instructions for using the evaluation server are provided.",
"title": ""
},
{
"docid": "af89b3636290235e0b241c6cced2a336",
"text": "Assume we were to come up with a family of distributions parameterized by θ in order to approximate the posterior, qθ(ω). Our goal is to set θ such that qθ(ω) is as similar to the true posterior p(ω|D) as possible. For clarity, qθ(ω) is a distribution over stochastic parameters ω that is determined by a set of learnable parameters θ and some source of randomness. The approximation is therefore limited by our choice of parametric function qθ(ω) as well as the randomness.1 Given ω and an input x, an output distribution p(y|x,ω) = p(y|fω(x)) = fω(x,y) is induced by observation noise (the conditionality of which is omitted for brevity).",
"title": ""
},
{
"docid": "5ffb3e630e5f020365e471e94d678cbb",
"text": "This paper presents one perspective on recent developments related to software engineering in the industrial automation sector that spans from manufacturing factory automation to process control systems and energy automation systems. The survey's methodology is based on the classic SWEBOK reference document that comprehensively defines the taxonomy of software engineering domain. This is mixed with classic automation artefacts, such as the set of the most influential international standards and dominating industrial practices. The survey focuses mainly on research publications which are believed to be representative of advanced industrial practices as well.",
"title": ""
},
{
"docid": "56fb6fe1f6999b5d7a9dab19e8b877ef",
"text": "Low-cost consumer depth cameras and deep learning have enabled reasonable 3D hand pose estimation from single depth images. In this paper, we present an approach that estimates 3D hand pose from regular RGB images. This task has far more ambiguities due to the missing depth information. To this end, we propose a deep network that learns a network-implicit 3D articulation prior. Together with detected keypoints in the images, this network yields good estimates of the 3D pose. We introduce a large scale 3D hand pose dataset based on synthetic hand models for training the involved networks. Experiments on a variety of test sets, including one on sign language recognition, demonstrate the feasibility of 3D hand pose estimation on single color images.",
"title": ""
},
{
"docid": "e6e91ce66120af510e24a10dee6d64b7",
"text": "AI plays an increasingly prominent role in society since decisions that were once made by humans are now delegated to automated systems. These systems are currently in charge of deciding bank loans, criminals’ incarceration, and the hiring of new employees, and it’s not difficult to envision that they will in the future underpin most of the decisions in society. Despite the high complexity entailed by this task, there is still not much understanding of basic properties of such systems. For instance, we currently cannot detect (neither explain nor correct) whether an AI system is operating fairly (i.e., is abiding by the decision-constraints agreed by society) or it is reinforcing biases and perpetuating a preceding prejudicial practice. Issues of discrimination have been discussed extensively in legal circles, but there exists still not much understanding of the formal conditions that a system must adhere to be deemed fair. In this paper, we use the language of structural causality (Pearl, 2000) to fill in this gap. We start by introducing three new fine-grained measures of transmission of change from stimulus to effect, which we called counterfactual direct (Ctf-DE), indirect (Ctf-IE), and spurious (Ctf-SE) effects. We then derive the causal explanation formula, which allows the AI designer to quantitatively evaluate fairness and explain the total observed disparity of decisions through different discriminatory mechanisms. We apply these results to various discrimination analysis tasks and run extensive simulations, including detection, evaluation, and optimization of decision-making under fairness constraints. We conclude studying the trade-off between different types of fairness criteria (outcome and procedural), and provide a quantitative approach to policy implementation and the design of fair decision-making systems.",
"title": ""
}
] | scidocsrr |
681d1d5cd410e881b5ee5fb7fd16ce50 | Graph-based active learning of agglomeration (GALA): a Python library to segment 2D and 3D neuroimages | [
{
"docid": "fd1e327327068a1373e35270ef257c59",
"text": "We consider the problem of building high-level, class-specific feature detectors from only unlabeled data. For example, is it possible to learn a face detector using only unlabeled images? To answer this, we train a deep sparse autoencoder on a large dataset of images (the model has 1 billion connections, the dataset has 10 million 200×200 pixel images downloaded from the Internet). We train this network using model parallelism and asynchronous SGD on a cluster with 1,000 machines (16,000 cores) for three days. Contrary to what appears to be a widely-held intuition, our experimental results reveal that it is possible to train a face detector without having to label images as containing a face or not. Control experiments show that this feature detector is robust not only to translation but also to scaling and out-of-plane rotation. We also find that the same network is sensitive to other high-level concepts such as cat faces and human bodies. Starting from these learned features, we trained our network to recognize 22,000 object categories from ImageNet and achieve a leap of 70% relative improvement over the previous state-of-the-art.",
"title": ""
}
] | [
{
"docid": "a45f9042b677c64c8c2a5a0ca4299f23",
"text": "The most exciting development in parallel computer architecture is the convergence of traditionally disparate approaches on a common machine structure. This book explains the forces behind this convergence of shared-memory, message-passing, data parallel, and data-driven computing architectures. It then examines the design issues that are critical to all parallel architecture across the full range of modern design, covering data access, communication performance, coordination of cooperative work, and correct implementation of useful semantics. It not only describes the hardware and software techniques for addressing each of these issues but also explores how these techniques interact in the same system. Examining architecture from an application-driven perspective, it provides comprehensive discussions of parallel programming for high performance and of workload-driven evaluation, based on understanding hardware-software interactions.",
"title": ""
},
{
"docid": "65af148678516aa5a55fc6df44956fcf",
"text": "The inductive assertion method is generalized to permit formal, machine-verifiable proofs of correctness for multiprocess programs. Individual processes are represented by ordinary flowcharts, and no special synchronization mechanisms are assumed, so the method can be applied to a large class of multiprocess programs. A correctness proof can be designed together with the program by a hierarchical process of stepwise refinement, making the method practical for larger programs. The resulting proofs tend to be natural formalizations of the informal proofs that are now used.",
"title": ""
},
{
"docid": "2500006c421a280704b253d15ff833f2",
"text": "This article raises concerns about the advantages of using statistical significance tests in research assessments as has recently been suggested in the debate about proper normalization procedures for citation indicators by Opthof and Leydesdorff (2010). Statistical significance tests are highly controversial and numerous criticisms have been leveled against their use. Based on examples from articles by proponents of the use statistical significance tests in research assessments, we address some of the numerous problems with such tests. The issues specifically discussed are the ritual practice of such tests, their dichotomous application in decision making, the difference between statistical and substantive significance, the implausibility of most null hypotheses, the crucial assumption of randomness, as well as the utility of standard errors and confidence intervals for inferential purposes. We argue that applying statistical significance tests and mechanically adhering to their results are highly problematic and detrimental to critical thinking. We claim that the use of such tests do not provide any advantages in relation to deciding whether differences between citation indicators are important or not. On the contrary their use may be harmful. Like many other critics, we generally believe that statistical significance tests are overand misused in the empirical sciences including scientometrics and we encourage a reform on these matters. Highlights: We warn against the use of statistical significance tests (NHST) in research assessments. We introduce the controversial debate of NHST to the informetric community. We demonstrate some of the numerous flaws, misconceptions and misuses of NHST. We discuss potential alternatives and conclude that no \"easy fixes\" exist. We advocate informed judgment, free of the NHST-ritual, in decision processes. Acknowledgement. The author would like to thank the three anonymous reviewers for their very useful comments on previous drafts of this article.",
"title": ""
},
{
"docid": "9e638e09b77463e8c232c7960d49a544",
"text": "Force feedback coupled with visual display allows people to interact intuitively with complex virtual environments. For this synergy of haptics and graphics to flourish, however, haptic systems must be capable of modeling environments with the same richness, complexity and interactivity that can be found in existing graphic systems. To help meet this challenge, we have developed a haptic rendering system that allows f r the efficient tactile display of graphical information. The system uses a common high-level framework to model contact constraints, surface shading, friction and tex ture. The multilevel control system also helps ensure that the haptic device will remain stable even as the limits of the renderer’s capabilities are reached. CR",
"title": ""
},
{
"docid": "e7eea375a6c3e3f96959d5031796b00d",
"text": "In content-based semantic recommender systems the items to be considered are defined in terms of a set of semantic attributes, which may take as values the concepts of a domain ontology. The aim of these systems is to suggest to the user the items that fit better with his/her preferences, stored in the user profile. When large ontologies are considered it is unrealistic to expect to have complete information about the user preference on each concept. In this work, we explain how the Weighted Ordered Weighted Averaging operator may be used to deduce the user preferences on all concepts, given the structure of the ontology and some partial preferential information. The parameters of the WOWA operator enable to establish the desired aggregation policy, which ranges from a full conjunction to a full disjunction. Different aggregation policies have been analyzed in a case study involving the recommendation of touristic activities in the city of Tarragona. Several profiles have been compared and the results indicate that different aggregation policies should be used depending on the type of user. The amount of information available in the ontology must be also taken into account in order to establish the parameters of the proposed algorithm.",
"title": ""
},
{
"docid": "036ac7fc6886f1f7d1734be18a11951f",
"text": "Often the challenge associated with tasks like fraud and spam detection is the lack of all likely patterns needed to train suitable supervised learning models. This problem accentuates when the fraudulent patterns are not only scarce, they also change over time. Change in fraudulent pattern is because fraudsters continue to innovate novel ways to circumvent measures put in place to prevent fraud. Limited data and continuously changing patterns makes learning signi cantly di cult. We hypothesize that good behavior does not change with time and data points representing good behavior have consistent spatial signature under di erent groupings. Based on this hypothesis we are proposing an approach that detects outliers in large data sets by assigning a consistency score to each data point using an ensemble of clustering methods. Our main contribution is proposing a novel method that can detect outliers in large datasets and is robust to changing patterns. We also argue that area under the ROC curve, although a commonly used metric to evaluate outlier detection methods is not the right metric. Since outlier detection problems have a skewed distribution of classes, precision-recall curves are better suited because precision compares false positives to true positives (outliers) rather than true negatives (inliers) and therefore is not a ected by the problem of class imbalance. We show empirically that area under the precision-recall curve is a better than ROC as an evaluation metric. The proposed approach is tested on the modi ed version of the Landsat satellite dataset, the modi ed version of the ann-thyroid dataset and a large real world credit card fraud detection dataset available through Kaggle where we show signi cant improvement over the baseline methods.",
"title": ""
},
{
"docid": "24a10176ec2367a6a0b5333d57b894b8",
"text": "Automated classification of biological cells according to their 3D morphology is highly desired in a flow cytometer setting. We have investigated this possibility experimentally and numerically using a diffraction imaging approach. A fast image analysis software based on the gray level co-occurrence matrix (GLCM) algorithm has been developed to extract feature parameters from measured diffraction images. The results of GLCM analysis and subsequent classification demonstrate the potential for rapid classification among six types of cultured cells. Combined with numerical results we show that the method of diffraction imaging flow cytometry has the capacity as a platform for high-throughput and label-free classification of biological cells.",
"title": ""
},
{
"docid": "3f826b00b909e409c82f3b4c89842a9f",
"text": "This paper presents a monocular vision-based preceding vehicle detection system using Histogram of Oriented Gradient (HOG) based method and linear SVM classification. Our detection algorithm consists of three main components: HOG feature extraction, linear SVM classifier training and vehicles detection. Integral Image method is adopted to improve the HOG computational efficiency, and hard examples are generated to reduce false positives in the training phase. In detection step, the multiple overlapping detections due to multi-scale window searching are very well fused by non-maximum suppression based on mean-shift. The monocular system is tested under different traffic scenarios (e.g., simply structured highway, complex urban environments, local occlusion conditions), illustrating good performance.",
"title": ""
},
{
"docid": "226d8e68f0519ddfc9e288c9151b65f0",
"text": "Vector space embeddings can be used as a tool for learning semantic relationships from unstructured text documents. Among others, earlier work has shown how in a vector space of entities (e.g. different movies) fine-grained semantic relationships can be identified with directions (e.g. more violent than). In this paper, we use stacked denoising auto-encoders to obtain a sequence of entity embeddings that model increasingly abstract relationships. After identifying directions that model salient properties of entities in each of these vector spaces, we induce symbolic rules that relate specific properties to more general ones. We provide illustrative examples to demonstrate the potential of this ap-",
"title": ""
},
{
"docid": "8aacdb790ddec13f396a0591c0cd227a",
"text": "This paper reports on a qualitative study of journal entries written by students in six health professions participating in the Interprofessional Health Mentors program at the University of British Columbia, Canada. The study examined (1) what health professions students learn about professional language and communication when given the opportunity, in an interprofessional group with a patient or client, to explore the uses, meanings, and effects of common health care terms, and (2) how health professional students write about their experience of discussing common health care terms, and what this reveals about how students see their development of professional discourse and participation in a professional discourse community. Using qualitative thematic analysis to address the first question, the study found that discussion of these health care terms provoked learning and reflection on how words commonly used in one health profession can be understood quite differently in other health professions, as well as on how health professionals' language choices may be perceived by patients and clients. Using discourse analysis to address the second question, the study further found that many of the students emphasized accuracy and certainty in language through clear definitions and intersubjective agreement. However, when prompted by the discussion they were willing to consider other functions and effects of language.",
"title": ""
},
{
"docid": "57932461628b5eeb354c163989ac6598",
"text": "Cross-institutional healthcare predictive modeling can accelerate research and facilitate quality improvement initiatives, and thus is important for national healthcare delivery priorities. For example, a model that predicts risk of re-admission for a particular set of patients will be more generalizable if developed with data from multiple institutions. While privacy-protecting methods to build predictive models exist, most are based on a centralized architecture, which presents security and robustness vulnerabilities such as single-point-of-failure (and single-point-of-breach) and accidental or malicious modification of records. In this article, we describe a new framework, ModelChain, to adapt Blockchain technology for privacy-preserving machine learning. Each participating site contributes to model parameter estimation without revealing any patient health information (i.e., only model data, no observation-level data, are exchanged across institutions). We integrate privacypreserving online machine learning with a private Blockchain network, apply transaction metadata to disseminate partial models, and design a new proof-of-information algorithm to determine the order of the online learning process. We also discuss the benefits and potential issues of applying Blockchain technology to solve the privacy-preserving healthcare predictive modeling task and to increase interoperability between institutions, to support the Nationwide Interoperability Roadmap and national healthcare delivery priorities such as Patient-Centered Outcomes Research (PCOR). Introduction Cross-institution interoperable healthcare predictive modeling can advance research and facilitate quality improvement initiatives, for example, by generating scientific evidence for comparative effectiveness research, accelerating biomedical discoveries, and improving patient-care. For example, a healthcare provider may be able to predict certain outcome even if her institution has few or none related patient records. A predictive model can be “learned” (i.e., its parameters can be estimated) from data originating from the other institutions. However, improper data disclosure could place sensitive personal health information at risk. To protect the privacy of individuals, several algorithms (such as GLORE, EXPLORER, and VERTIGO) have been proposed to conduct predictive modeling by transfer of partially-trained machine learning models instead of disseminating individual patient-level data. However, these state-of-the-art distributed privacypreserving predictive modeling frameworks are centralized (i.e., require a central server to intermediate the modeling process and aggregate the global model), as shown in Figure 1(a). Such a client-server architecture carries the following risks: ● Institutional policies. For example, a site may not want to cede control to a single central server. ● Single-point-of-failure. For example, if the central server is shut down for maintenance, the whole network stops working. Furthermore, if the admin user account of the central server gets compromised, the entire network is also under the risk of being compromised. ● Participating sites cannot join/leave the network at any time. If any site joins or leaves the network for a short period of time, the analysis process is disrupted and the server needs to deal with the recovering issue. A new site may not participate in the network without the authentication and reconfiguration on the central server. Figure 1. (a): Centralized topology. (b): Decentralized topology (Blockchain). ● The data being disseminated and the transfer records are mutable. An attacker could change the partial models without being noticed. The transfer records may also be modified so that no audit trail is available to identify such malicious change of data. ● The client-server architecture may present consensus/synchronization issues on distributed networks. Specifically, the issue is the combination of two problems: the Byzantine Generals Problem, in which the participating sites need to agree upon the aggregated model under the constraint that each site may fail due to accidental or even malicious ways, and the Sybil Attack Problem, of which the attacker comprises a large fraction of the seemingly independent participants and exerts unfairly disproportionate influence during the process of predictive modeling. To address the abovementioned risks, one plausible solution is to adapt the Blockchain technology (in this article, we use “Blockchain” to denote the technology, and “blockchain” to indicate the actual chain of blocks). A Blockchain-based distributed network has the following desirable features that make it suitable to mitigate the risks of centralized privacy-preserving healthcare predictive modeling networks. First, Blockchain is by design a decentralized (i.e., a peer-to-peer, non-intermediated) architecture (Figure 1(b)); the verification of transactions is achieved by majority proof-of-work voting. Each institution can keep full control of their own computational resources. Also, there is no risk of single-point-of-failure. Second, each site (including new sites) can join/leave the network freely without imposing overhead on a central server or disrupting the machine learning process. Finally, the proof-of-work blockchain provides an immutable audit trail. That is, changing the data or records is very difficult; the attacker needs to redo proof-of-work of the target block and all blocks after it, and then surpass all honest sites. As shown by Satoshi Nakamoto, the inventor of Blockchain and Bitcoin, given that the probability that an honest node finds the next block is larger than the probability that an attacker finds the next block, the probability the attacker will ever catch up drops exponentially as the number of the blocks by which the attacker lags behind increases. This is also the reason why the Blockchain mechanism also solves the relaxed version of Byzantine Generals Problem and the Sybil Attack Problem, as formally proved by Miller et al. Site 1 Site 2 Site 3 Site 4 Site 1 Site 2 Site 3 Site 4 Central Server (a) Centralized (b) Decentralized (Blockchain) Although Blockchain provides the abovementioned security and robustness benefits, a reasonable approach to integrate Blockchain with the privacy-preserving healthcare predictive modeling algorithms is yet to be devised. In this article, we propose ModelChain, a private-Blockchain-based privacy-preserving healthcare predictive modeling framework, to combine these two important technologies. First, we apply privacy-preserving online machine learning algorithms on blockchains. Intuitively, the incremental characteristic of online machine learning makes it feasible for peer-to-peer networks like Blockchain. Then, we utilize metadata in the transactions to disseminate the partial models and other meta information (i.e., flag (which indicates the type of action) of the model, hash of the model, and error of the model), and thus integrate private blockchains (i.e., the network is available only for participating institutions) with privacy-preserving online machine learning. Finally, we design a new proof-of-information algorithm on top of the original proof-of-work consensus protocol, to determine the order of the online machine learning on blockchains, aiming at increasing efficiency and accuracy. The basic idea of proof-of-information is similar to the concept of Boosting: the site that contains data that cannot be predicted accurately using a current partial model contains more information to improve the model, and thus that site should be assigned a higher priority to be chosen as the next model-updating site. We start with the best model to prevent error propagation, choose the site with highest error for current model to update the model, and repeat the process to update the model until a site cannot find any other site with higher error to update the model. In this case, we consider the model as the consensus model. ModelChain can advance the following interoperability needs stated in the Nationwide Interoperability Roadmap of the Office of the National Coordinator for Health Information Technology (ONC): ● “Build upon the existing health IT infrastructure.” ModelChain exploits the existing healthcare data in Clinical Data Research Networks (CDRNs) such as the Patient-centered SCAlable National Network for Effectiveness Research (pSCANNER), which is one of the Clinical Data Research Networks (CDRNs) in the PCORI-launched PCORnet and includes three networks: VA Informatics and Computing Infrastructure (VINCI), University of California Research eXchange (UCReX), and SCANNER. With the support of the Blockchain backbone, ModelChain can leverage all existing patient data storage infrastructures, while improving the healthcare prediction power for every site. ● “Maintain modularity.” Comparing to traditional client-server architecture, ModelChain inherits the peer-to-peer architecture of Blockchain, allowing each site to remain modular while interoperating with other sites. Also, each site has control about how its data are accessed (instead of ceding control to the central server), thus can keep up with institutional policies. Moreover, Blockchain provides the native ability to automatically coordinate the joining or leaving of each site, further improving the independence and modularity for the participating institutions. ● “Protect privacy and security in all aspects of interoperability.” ModelChain is designed to provide a secure, robust and privacy-preserving interoperability platform. Specifically, Blockchain increases the security by avoiding single-point-of-failure, proving immutable audit trails, and mitigating the Byzantine Generals and the Sybil Attack problems, while preserving the privacy by exchanging zero patient data during the predictive modeling process. The expected benefits of ModelChain can also be linked to the ",
"title": ""
},
{
"docid": "006455a7f150b51530c4da6312e36975",
"text": "Traditional peer-to-peer (P2P) networks do not provide service differentiation and incentive for users. Consequently, users can obtain services without themselves contributing any information or service to a P2P community. This leads to the \"free-riding\" and \"tragedy of the commons\" problems, in which the majority of information requests are directed towards a small number of P2P nodes willing to share their resources. The objective of this work is to enable service differentiation in a P2P network based on the amount of services each node has provided to its community, thereby encouraging all network nodes to share resources. We first introduce a resource distribution mechanism between all information sharing nodes. The mechanism is driven by a distributed algorithm which has linear time complexity and guarantees Pareto-optimal resource allocation. Besides giving incentive, the mechanism distributes resources in a way that increases the aggregate utility of the whole network. Second, we model the whole resource request and distribution process as a competition game between the competing nodes. We show that this game has a Nash equilibrium and is collusion-proof. To realize the game, we propose a protocol in which all competing nodes interact with the information providing node to reach Nash equilibrium in a dynamic and efficient manner. Experimental results are reported to illustrate that the protocol achieves its service differentiation objective and can induce productive information sharing by rational network nodes. Finally, we show that our protocol can properly adapt to different node arrival and departure events, and to different forms of network congestion.",
"title": ""
},
{
"docid": "5a8729b6b08e79e7c27ddf779b0a5267",
"text": "Electric solid propellants are an attractive option for space propulsion because they are ignited by applied electric power only. In this work, the behavior of pulsed microthruster devices utilizing such a material is investigated. These devices are similar in function and operation to the pulsed plasma thruster, which typically uses Teflon as propellant. A Faraday probe, Langmuir triple probe, residual gas analyzer, pendulum thrust stand and high speed camera are utilized as diagnostic devices. These thrusters are made in batches, of which a few devices were tested experimentally in vacuum environments. Results indicate a plume electron temperature of about 1.7 eV, with an electron density between 10 and 10 cm. According to thermal equilibrium and adiabatic expansion calculations, these relatively hot electrons are mixed with ~2000 K neutral and ion species, forming a non-equilibrium gas. From time-of-flight analysis, this gas mixture plume has an effective velocity of 1500-1650 m/s on centerline. The ablated mass of this plume is 215 μg on average, of which an estimated 0.3% is ionized species while 45±11% is ablated at negligible relative speed. This late-time ablation occurs on a time scale three times that of the 0.5 ms pulse discharge, and does not contribute to the measured 0.21 mN-s impulse per pulse. Similar values have previously been measured in pulsed plasma thrusters. These observations indicate the electric solid propellant material in this configuration behaves similar to Teflon in an electrothermal pulsed plasma",
"title": ""
},
{
"docid": "084b2787a6b79de789334c4dc8c14702",
"text": "Renewable energy is a key technology in reducing global carbon dioxide emissions. Currently, penetration of intermittent renewable energies in most power grids is low, such that the impact of renewable energy's intermittency on grid stability is controllable. Utility scale energy storage systems can enhance stability of power grids with increasing share of intermittent renewable energies. With the grid communication network in smart grids, mobile battery systems in battery electric vehicles and plug-in hybrid electric vehicles can also be used for energy storage and ancillary services in smart grids. This paper will review the stationary and mobile battery systems for grid voltage and frequency stability control in smart grids with increasing shares of intermittent renewable energies. An optimization algorithm on vehicle-to-grid operation will also be presented.",
"title": ""
},
{
"docid": "2dd6fff23e32efc7d6ead42d0dbc4ff0",
"text": "Recent technological advances in wheat genomics provide new opportunities to uncover genetic variation in traits of breeding interest and enable genome-based breeding to deliver wheat cultivars for the projected food requirements for 2050. There has been tremendous progress in development of whole-genome sequencing resources in wheat and its progenitor species during the last 5 years. High-throughput genotyping is now possible in wheat not only for routine gene introgression but also for high-density genome-wide genotyping. This is a major transition phase to enable genome-based breeding to achieve progressive genetic gains to parallel to projected wheat production demands. These advances have intrigued wheat researchers to practice less pursued analytical approaches which were not practiced due to the short history of genome sequence availability. Such approaches have been successful in gene discovery and breeding applications in other crops and animals for which genome sequences have been available for much longer. These strategies include, (i) environmental genome-wide association studies in wheat genetic resources stored in genbanks to identify genes for local adaptation by using agroclimatic traits as phenotypes, (ii) haplotype-based analyses to improve the statistical power and resolution of genomic selection and gene mapping experiments, (iii) new breeding strategies for genome-based prediction of heterosis patterns in wheat, and (iv) ultimate use of genomics information to develop more efficient and robust genome-wide genotyping platforms to precisely predict higher yield potential and stability with greater precision. Genome-based breeding has potential to achieve the ultimate objective of ensuring sustainable wheat production through developing high yielding, climate-resilient wheat cultivars with high nutritional quality.",
"title": ""
},
{
"docid": "815098e9ed06dfa5335f0c2c595f4059",
"text": "Effectively managing risk is an essential element of successful project management. It is imperative that project management team consider all possible risks to establish corrective actions in the right time. So far, several techniques have been proposed for project risk analysis. Failure Mode and Effect Analysis (FMEA) is recognized as one of the most useful techniques in this field. The main goal is identifying all failure modes within a system, assessing their impact, and planning for corrective actions. In traditional FMEA, the risk priorities of failure modes are determined by using Risk Priority Numbers (RPN), which can be obtained by multiplying the scores of risk factors like occurrence (O), severity (S), and detection (D). This technique has some limitations, though in this paper, Fuzzy logic and Analytical Hierarchy Process (AHP) are used to address the limitations of traditional FMEA. Linguistic variables, expressed in fuzzy numbers, are used to assess the ratings of risk factors O, S, and D. Each factor consists of seven membership functions and on the whole there are 343 rules for fuzzy system. The analytic hierarchy process (AHP) is applied to determine the relative weightings of risk impacts on time, cost, quality and safety. A case study is presented to validate the concept. The feedbacks are showing the advantages of the proposed approach in project risk management.",
"title": ""
},
{
"docid": "b0636710e1374bb098bf4f68c1c5740a",
"text": "Successful use of ICT requires domain knowledge and interaction knowledge. It shapes and is shaped by the use of ICT and is less common among older adults. This paper focus on the validation of the computer literacy scale (CLS) introduced by [14]. The CLS is an objective knowledge test of ICT-related symbols and terms commonly used in the graphical user interface of interactive computer technology. It has been designed specifically for older adults with little computer knowledge and is based on the idea that knowing common symbols and terms is as necessary for using computers, as it is for reading and writing letters and books. In this paper the Computer literacy scale is described and compared with related meas‐ ures for example computer expertise (CE), Computer Proficiency (CPQ) and computer anxiety (CATS). In addition criterion validity is described with predic‐ tions of successful ICT use exemplified with (1) the use of different data entry methods and (2) the use of different ticket vending machine (TVM) designs.",
"title": ""
},
{
"docid": "154e25caf9eb954bb7658304dd37a8a2",
"text": "RFID is an automatic identification technology that enables tracking of people and objects. Both identity and location are generally key information for indoor services. An obvious and interesting method to obtain these two types of data is to localize RFID tags attached to devices or objects or carried by people. However, signals in indoor environments are generally harshly impaired and tags have very limited capabilities which pose many challenges for positioning them. In this work, we propose a classification and survey the current state-of-art of RFID localization by first presenting this technology and positioning principles. Then, we explain and classify RFID localization techniques. Finally, we discuss future trends in this domain.",
"title": ""
},
{
"docid": "ed9d72566cdf3e353bf4b1e589bf85eb",
"text": "In the last few years progress has been made in understanding basic mechanisms involved in damage to the inner ear and various potential therapeutic approaches have been developed. It was shown that hair cell loss mediated by noise or toxic drugs may be prevented by antioxidants, inhibitors of intracellular stress pathways and neurotrophic factors/neurotransmission blockers. Moreover, there is hope that once hair cells are lost, their regeneration can be induced or that stem cells can be used to build up new hair cells. However, although tremendous progress has been made, most of the concepts discussed in this review are still in the \"animal stage\" and it is difficult to predict which approach will finally enter clinical practice. In my opinion it is highly probable that some concepts of hair cell protection will enter clinical practice first, while others, such as the use of stem cells to restore hearing, are still far from clinical utility.",
"title": ""
},
{
"docid": "ad5b55642b280e599f70d0a4773541d0",
"text": "We propose and discuss terahertz (THz) electro-absorption modulators based on graphene plasmonic structures. The active device consists of a self-gated pair of graphene layers, which are patterned to structures supporting THz plasmonic resonances. These structures allow for efficient control of the effective THz optical conductivity, thus absorption, even at frequencies much higher than the Drude roll-off in graphene where most previously proposed graphene-based devices become inefficient. Our analysis shows that reflectance-based device configurations, engineered so that the electric field is enhanced in the active graphene pair, could achieve very high modulationdepth, even !100%, over a wide frequency range up to tens of THz. VC 2012 American Institute of Physics. [http://dx.doi.org/10.1063/1.4773374]",
"title": ""
}
] | scidocsrr |
1fd05aeb40bf9b7817dcce44a15a0459 | Understanding Cybercrime | [
{
"docid": "090887c325fa3bf3ed928011f6b14c72",
"text": "R apid advances in electronic networks and computerbased information systems have given us enormous capabilities to process, store, and transmit digital data in most business sectors. This has transformed the way we conduct trade, deliver government services, and provide health care. Changes in communication and information technologies and particularly their confluence has raised a number of concerns connected with the protection of organizational information assets. Achieving consensus regarding safeguards for an information system, among different stakeholders in an organization, has become more difficult than solving many technical problems that might arise. This “Technical Opinion” focuses on understanding the nature of information security in the next millennium. Based on this understanding it suggests a set of principles that would help in managing information security in the future.",
"title": ""
}
] | [
{
"docid": "b99c42f412408610e1bfd414f4ea6b9f",
"text": "ADPfusion combines the usual high-level, terse notation of Haskell with an underlying fusion framework. The result is a parsing library that allows the user to write algorithms in a style very close to the notation used in formal languages and reap the performance benefits of automatic program fusion. Recent developments in natural language processing and computational biology have lead to a number of works that implement algorithms that process more than one input at the same time. We provide an extension of ADPfusion that works on extended index spaces and multiple input sequences, thereby increasing the number of algorithms that are amenable to implementation in our framework. This allows us to implement even complex algorithms with a minimum of overhead, while enjoying all the guarantees that algebraic dynamic programming provides to the user.",
"title": ""
},
{
"docid": "016f1963dc657a6148afc7f067ad7c82",
"text": "Privacy protection is a crucial problem in many biomedical signal processing applications. For this reason, particular attention has been given to the use of secure multiparty computation techniques for processing biomedical signals, whereby nontrusted parties are able to manipulate the signals although they are encrypted. This paper focuses on the development of a privacy preserving automatic diagnosis system whereby a remote server classifies a biomedical signal provided by the client without getting any information about the signal itself and the final result of the classification. Specifically, we present and compare two methods for the secure classification of electrocardiogram (ECG) signals: the former based on linear branching programs (a particular kind of decision tree) and the latter relying on neural networks. The paper deals with all the requirements and difficulties related to working with data that must stay encrypted during all the computation steps, including the necessity of working with fixed point arithmetic with no truncation while guaranteeing the same performance of a floating point implementation in the plain domain. A highly efficient version of the underlying cryptographic primitives is used, ensuring a good efficiency of the two proposed methods, from both a communication and computational complexity perspectives. The proposed systems prove that carrying out complex tasks like ECG classification in the encrypted domain efficiently is indeed possible in the semihonest model, paving the way to interesting future applications wherein privacy of signal owners is protected by applying high security standards.",
"title": ""
},
{
"docid": "143a4fcc0f2949e797e6f51899e811e2",
"text": "A long-standing problem at the interface of artificial intelligence and applied mathematics is to devise an algorithm capable of achieving human level or even superhuman proficiency in transforming observed data into predictive mathematical models of the physical world. In the current era of abundance of data and advanced machine learning capabilities, the natural question arises: How can we automatically uncover the underlying laws of physics from high-dimensional data generated from experiments? In this work, we put forth a deep learning approach for discovering nonlinear partial differential equations from scattered and potentially noisy observations in space and time. Specifically, we approximate the unknown solution as well as the nonlinear dynamics by two deep neural networks. The first network acts as a prior on the unknown solution and essentially enables us to avoid numerical differentiations which are inherently ill-conditioned and unstable. The second network represents the nonlinear dynamics and helps us distill the mechanisms that govern the evolution of a given spatiotemporal data-set. We test the effectiveness of our approach for several benchmark problems spanning a number of scientific domains and demonstrate how the proposed framework can help us accurately learn the underlying dynamics and forecast future states of the system. In particular, we study the Burgers’, Kortewegde Vries (KdV), Kuramoto-Sivashinsky, nonlinear Schrödinger, and NavierStokes equations.",
"title": ""
},
{
"docid": "3c548cf1888197545dc8b9cee100039a",
"text": "Williams syndrome is caused by a microdeletion of at least 16 genes on chromosome 7q11.23. The syndrome results in mild to moderate mental retardation or learning disability. The behavioral phenotype for Williams syndrome is characterized by a distinctive cognitive profile and an unusual personality profile. Relative to overall level of intellectual ability, individuals with Williams syndrome typically show a clear strength in auditory rote memory, a strength in language, and an extreme weakness in visuospatial construction. The personality of individuals with Williams syndrome involves high sociability, overfriendliness, and empathy, with an undercurrent of anxiety related to social situations. The adaptive behavior profile for Williams syndrome involves clear strength in socialization skills (especially interpersonal skills related to initiating social interaction), strength in communication, and clear weakness in daily living skills and motor skills, relative to overall level of adaptive behavior functioning. Literature relevant to each of the components of the Williams syndrome behavioral phenotype is reviewed, including operationalizations of the Williams syndrome cognitive profile and the Williams syndrome personality profile. The sensitivity and specificity of these profiles for Williams syndrome, relative to individuals with other syndromes or mental retardation or borderline normal intelligence of unknown etiology, is considered. The adaptive behavior profile is discussed in relation to the cognitive and personality profiles. The importance of operationalizations of crucial components of the behavioral phenotype for the study of genotype/phenotype correlations in Williams syndrome is stressed. MRDD Research Reviews 2000;6:148-158.",
"title": ""
},
{
"docid": "a3a1fbfc6db97824132107d2f56386e6",
"text": "There is indirect evidence that heightened exposure to early androgen may increase the probability that a girl will develop a homosexual orientation in adulthood. One such putative marker of early androgen exposure is the ratio of the length of the index finger (2D) to the ring finger (4D), which is smaller in male humans than in females, and is smaller in lesbians than in heterosexual women. Yet there is also evidence that women may have different sexual orientations at different times in their lives, which suggests that other influences on female sexual orientation, presumably social, are at work as well. We surveyed individuals from a gay pride street fair and found that lesbians who identified themselves as \"butch\" had a significantly smaller 2D:4D than did those who identified themselves as \"femme.\" We conclude that increased early androgen exposure plays a role in only some cases of female homosexuality, and that the sexual orientation of \"femme\" lesbians is unlikely to have been influenced by early androgens.",
"title": ""
},
{
"docid": "1856090b401a304f1172c2958d05d6b3",
"text": "The Iranian government operates one of the largest and most sophisticated Internet censorship regimes in the world, but the mechanisms it employs have received little research attention, primarily due to lack of access to network connections within the country and personal risks to Iranian citizens who take part. In this paper, we examine the status of Internet censorship in Iran based on network measurements conducted from a major Iranian ISP during the lead up to the June 2013 presidential election. We measure the scope of the censorship by probing Alexa’s top 500 websites in 18 different categories. We investigate the technical mechanisms used for HTTP Host–based blocking, keyword filtering, DNS hijacking, and protocol-based throttling. Finally, we map the network topology of the censorship infrastructure and find evidence that it relies heavily on centralized equipment, a property that might be fruitfully exploited by next generation approaches to censorship circumvention.",
"title": ""
},
{
"docid": "d75f15a8b7eff7e74b95abb59cc488cc",
"text": "Up to recently autonomous mobile robots were mostly designed to run within an indoor, yet partly structured and flat, environment. In rough terrain many problems arise and position tracking becomes more difficult. The robot has to deal with wheel slippage and large orientation changes. In this paper we will first present the recent developments on the off-road rover Shrimp. Then a new method, called 3D-Odometry, which extends the standard 2D odometry to the 3D space will be developed. Since it accounts for transitions, the 3D-Odometry provides better position estimates. It will certainly help to go towards real 3D navigation for outdoor robots.",
"title": ""
},
{
"docid": "20d1cb8d2f416c1dc07e5a34c2ec43ba",
"text": "Significant research and development of algorithms in intelligent transportation has grabbed more attention in recent years. An automated, fast, accurate and robust vehicle plate recognition system has become need for traffic control and law enforcement of traffic regulations; and the solution is ANPR. This paper is dedicated on an improved technique of OCR based license plate recognition using neural network trained dataset of object features. A blended algorithm for recognition of license plate is proposed and is compared with existing methods for improve accuracy. The whole system can be categorized under three major modules, namely License Plate Localization, Plate Character Segmentation, and Plate Character Recognition. The system is simulated on 300 national and international motor vehicle LP images and results obtained justifies the main requirement.",
"title": ""
},
{
"docid": "a5f9b7b7b25ccc397acde105c39c3d9d",
"text": "Processors with multiple cores and complex cache coherence protocols are widely employed to improve the overall performance. It is a major challenge to verify the correctness of a cache coherence protocol since the number of reachable states grows exponentially with the number of cores. In this paper, we propose an efficient test generation technique, which can be used to achieve full state and transition coverage in simulation based verification for a wide variety of cache coherence protocols. Based on effective analysis of the state space structure, our method can generate more efficient test sequences (50% shorter) compared with tests generated by breadth first search. Moreover, our proposed approach can generate tests on-the-fly due to its space efficient design.",
"title": ""
},
{
"docid": "16fb241da0ca43b3cc2769332bebff97",
"text": "The safety of meat has been at the forefront of societal concerns in recent years, and indications exist that challenges to meat safety will continue in the future. Major meat safety issues and related challenges include the need to control traditional as well as \"new,\" \"emerging,\" or \"evolving\" pathogenic microorganisms, which may be of increased virulence and low infectious doses, or of resistance to antibiotics or food related stresses. Other microbial pathogen related concerns include cross-contamination of other foods and water with enteric pathogens of animal origin, meat animal manure treatment and disposal issues, foodborne illness surveillance and food attribution activities, and potential use of food safety programs at the farm. Other issues and challenges include food additives and chemical residues, animal identification and traceability issues, the safety and quality of organic and natural products, the need for and development of improved and rapid testing and pathogen detection methodologies for laboratory and field use, regulatory and inspection harmonization issues at the national and international level, determination of responsibilities for zoonotic diseases between animal health and regulatory public health agencies, establishment of risk assessment based food safety objectives, and complete and routine implementation of HACCP at the production and processing level on the basis of food handler training and consumer education. Viral pathogens will continue to be of concern at food service, bacterial pathogens such as Escherichia coli O157:H7, Salmonella and Campylobacter will continue affecting the safety of raw meat and poultry, while Listeria monocytogenes will be of concern in ready-to-eat processed products. These challenges become more important due to changes in animal production, product processing and distribution; increased international trade; changing consumer needs and increased preference for minimally processed products; increased worldwide meat consumption; higher numbers of consumers at-risk for infection; and, increased interest, awareness and scrutiny by consumers, news media, and consumer activist groups. Issues such as bovine sponginform encephalopathy will continue to be of interest mostly as a target for eradication, while viral agents affecting food animals, such as avian influenza, will always need attention for prevention or containment.",
"title": ""
},
{
"docid": "ba4d30e7ea09d84f8f7d96c426e50f34",
"text": "Submission instructions: These questions require thought but do not require long answers. Please be as concise as possible. You should submit your answers as a writeup in PDF format via GradeScope and code via the Snap submission site. Submitting writeup: Prepare answers to the homework questions into a single PDF file and submit it via http://gradescope.com. Make sure that the answer to each question is on a separate page. On top of each page write the number of the question you are answering. Please find the cover sheet and the recommended templates located here: Not including the cover sheet in your submission will result in a 2-point penalty. It is also important to tag your answers correctly on Gradescope. We will deduct 5/N points for each incorrectly tagged subproblem (where N is the number of subproblems). This means you can lose up to 5 points for incorrect tagging. Put all the code for a single question into a single file and upload it. Consider a user-item bipartite graph where each edge in the graph between user U to item I, indicates that user U likes item I. We also represent the ratings matrix for this set of users and items as R, where each row in R corresponds to a user and each column corresponds to an item. If user i likes item j, then R i,j = 1, otherwise R i,j = 0. Also assume we have m users and n items, so matrix R is m × n.",
"title": ""
},
{
"docid": "56c7c065c390d1ed5f454f663289788d",
"text": "This paper presents a novel approach to character identification, that is an entity linking task that maps mentions to characters in dialogues from TV show transcripts. We first augment and correct several cases of annotation errors in an existing corpus so the corpus is clearer and cleaner for statistical learning. We also introduce the agglomerative convolutional neural network that takes groups of features and learns mention and mention-pair embeddings for coreference resolution. We then propose another neural model that employs the embeddings learned and creates cluster embeddings for entity linking. Our coreference resolution model shows comparable results to other state-of-the-art systems. Our entity linking model significantly outperforms the previous work, showing the F1 score of 86.76% and the accuracy of 95.30% for character identification.",
"title": ""
},
{
"docid": "b3bda9c0a0ec22c5d244f8c538ab6056",
"text": "Knowledge assets represent a special set of resources for a firm and as such, their management is of great importance to academics and managers. The purpose of this paper is to review the literature as it pertains to knowledge assets and provide a suggested model for intellectual capital management that can be of benefit to both academics and practitioners. In doing so, a set of research propositions are suggested to provide guidance for future research.",
"title": ""
},
{
"docid": "e541ae262655b7f5affefb32ce9267ee",
"text": "Internet of Things (IoT) is a revolutionary technology for the modern society. IoT can connect every surrounding objects for various applications like security, medical fields, monitoring and other industrial applications. This paper considers the application of IoT in the field of medicine. IoT in E-medicine can take the advantage of emerging technologies to provide immediate treatment to the patient as well as monitors and keeps track of health record for healthy person. IoT then performs complex computations on these collected data and can provide health related advice. Though IoT can provide a cost effective medical services to any people of all age groups, there are several key issues that need to be addressed. System security, IoT interoperability, dynamic storage facility and unified access mechanisms are some of the many fundamental issues associated with IoT. This paper proposes a system level design solution for security and flexibility aspect of IoT. In this paper, the functional components are bound in security function group which ensures the management of privacy and secure operation of the system. The security function group comprises of components which offers secure communication using Ciphertext-Policy Attribute-Based Encryption (CP-ABE). Since CP-ABE are delegated to unconstrained devices with the assumption that these devices are trusted, the producer encrypts data using AES and the ABE scheme is protected through symmetric key solutions.",
"title": ""
},
{
"docid": "bfeff1e1ef24d0cb92d1844188f87cc8",
"text": "While user attribute extraction on social media has received considerable attention, existing approaches, mostly supervised, encounter great difficulty in obtaining gold standard data and are therefore limited to predicting unary predicates (e.g., gender). In this paper, we present a weaklysupervised approach to user profile extraction from Twitter. Users’ profiles from social media websites such as Facebook or Google Plus are used as a distant source of supervision for extraction of their attributes from user-generated text. In addition to traditional linguistic features used in distant supervision for information extraction, our approach also takes into account network information, a unique opportunity offered by social media. We test our algorithm on three attribute domains: spouse, education and job; experimental results demonstrate our approach is able to make accurate predictions for users’ attributes based on their tweets.1",
"title": ""
},
{
"docid": "4076b5d1338a7552453e284019406129",
"text": "Knowledge bases (KBs) are paramount in NLP. We employ multiview learning for increasing accuracy and coverage of entity type information in KBs. We rely on two metaviews: language and representation. For language, we consider high-resource and lowresource languages from Wikipedia. For representation, we consider representations based on the context distribution of the entity (i.e., on its embedding), on the entity’s name (i.e., on its surface form) and on its description in Wikipedia. The two metaviews language and representation can be freely combined: each pair of language and representation (e.g., German embedding, English description, Spanish name) is a distinct view. Our experiments on entity typing with fine-grained classes demonstrate the effectiveness of multiview learning. We release MVET, a large multiview – and, in particular, multilingual – entity typing dataset we created. Monoand multilingual finegrained entity typing systems can be evaluated on this dataset.",
"title": ""
},
{
"docid": "db622838ba5f6c76f66125cf76c47b40",
"text": "In recent years, the study of lightweight symmetric ciphers has gained interest due to the increasing demand for security services in constrained computing environments, such as in the Internet of Things. However, when there are several algorithms to choose from and different implementation criteria and conditions, it becomes hard to select the most adequate security primitive for a specific application. This paper discusses the hardware implementations of Present, a standardized lightweight cipher called to overcome part of the security issues in extremely constrained environments. The most representative realizations of this cipher are reviewed and two novel designs are presented. Using the same implementation conditions, the two new proposals and three state-of-the-art designs are evaluated and compared, using area, performance, energy, and efficiency as metrics. From this wide experimental evaluation, to the best of our knowledge, new records are obtained in terms of implementation size and energy consumption. In particular, our designs result to be adequate in regards to energy-per-bit and throughput-per-slice.",
"title": ""
},
{
"docid": "66ca4bacfbae3ff32b105565dace5194",
"text": "In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and open-source Secure Graph data sharing/publishing system. In SecGraph, we systematically study, implement, and evaluate 11 graph data anonymization algorithms, 19 data utility metrics, and 15 modern Structure-based De-Anonymization (SDA) attacks. To the best of our knowledge, SecGraph is the first such system that enables data owners to anonymize data by state-of-the-art anonymization techniques, measure the data’s utility, and evaluate the data’s vulnerability against modern De-Anonymization (DA) attacks. In addition, SecGraph enables researchers to conduct fair analysis and evaluation of existing and newly developed anonymization/DA techniques. Leveraging SecGraph, we conduct extensive experiments to systematically evaluate the existing graph data anonymization and DA techniques. The results demonstrate that (i) most anonymization schemes can partially or conditionally preserve most graph utilities while losing some application utility; (ii) no DA attack is optimum in all scenarios. The DA performance depends on several factors, e.g., similarity between anonymized and auxiliary data, graph density, and DA heuristics; and (iii) all the state-of-the-art anonymization schemes are vulnerable to several or all of the modern SDA attacks. The degree of vulnerability of each anonymization scheme depends on how much and which data utility it preserves.",
"title": ""
},
{
"docid": "3a2bd70e7db01515aa0dbc8924a13e3c",
"text": "While packet capture has been observed in real implementations of 802.11 devices, there is a lack of accurate models that describe the phenomenon. We present a general analytical model and an iterative method that predicts error probabilities and throughputs of packet transmissions with multiple senderreceiver pairs. Our model offers a more accurate prediction than previous work by taking into account the cumulative strength of interference signals and using the BER model to convert a signal to interference and noise ratio value to a bit error probability. This permits the analysis of packet reception at any transmission rate with interference from neighbors at any set of locations. We also prove that our iterative method converges, and we verify the accuracy of our model through simulations in Qualnet. Last, we present a rate assignment algorithm to reduce the average delay as an application of our analysis.",
"title": ""
}
] | scidocsrr |
d6b38bfacf6234254620ae433837e2a4 | A prediction based approach for stock returns using autoregressive neural networks | [
{
"docid": "186b18a1ce29ce50bf9309137c09a9b5",
"text": "This work presents a new prediction-based portfolio optimization model tha t can capture short-term investment opportunities. We used neural network predictors to predict stock s’ returns and derived a risk measure, based on the prediction errors, that have the same statistical foundation o f he mean-variance model. The efficient diversification effects holds thanks to the selection of predictor s with low and complementary pairwise error profiles. We employed a large set of experiments with real data from the Brazilian sto ck market to examine our portfolio optimization model, which included the evaluation of the Normality o f the prediction errors. Our results showed that it is possible to obtain Normal prediction errors with non-Normal time series of stock returns, and that the prediction-based portfolio optimization model to ok advantage of short term opportunities, outperforming the mean-variance model and beating the m arket index.",
"title": ""
},
{
"docid": "ee11c968b4280f6da0b1c0f4544bc578",
"text": "A report is presented of some results of an ongoing project using neural-network modeling and learning techniques to search for and decode nonlinear regularities in asset price movements. The author focuses on the case of IBM common stock daily returns. Having to deal with the salient features of economic data highlights the role to be played by statistical inference and requires modifications to standard learning techniques which may prove useful in other contexts.<<ETX>>",
"title": ""
}
] | [
{
"docid": "2a76205b80c90ff9a4ca3ccb0434bb03",
"text": "Finding out which e-shops offer a specific product is a central challenge for building integrated product catalogs and comparison shopping portals. Determining whether two offers refer to the same product involves extracting a set of features (product attributes) from the web pages containing the offers and comparing these features using a matching function. The existing gold standards for product matching have two shortcomings: (i) they only contain offers from a small number of e-shops and thus do not properly cover the heterogeneity that is found on the Web. (ii) they only provide a small number of generic product attributes and therefore cannot be used to evaluate whether detailed product attributes have been correctly extracted from textual product descriptions. To overcome these shortcomings, we have created two public gold standards: The WDC Product Feature Extraction Gold Standard consists of over 500 product web pages originating from 32 different websites on which we have annotated all product attributes (338 distinct attributes) which appear in product titles, product descriptions, as well as tables and lists. The WDC Product Matching Gold Standard consists of over 75 000 correspondences between 150 products (mobile phones, TVs, and headphones) in a central catalog and offers for these products on the 32 web sites. To verify that the gold standards are challenging enough, we ran several baseline feature extraction and matching methods, resulting in F-score values in the range 0.39 to 0.67. In addition to the gold standards, we also provide a corpus consisting of 13 million product pages from the same websites which might be useful as background knowledge for training feature extraction and matching methods.",
"title": ""
},
{
"docid": "2663800ed92ce1cd44ab1b7760c43e0f",
"text": "Synchronous reluctance motor (SynRM) have rather poor power factor. This paper investigates possible methods to improve the power factor (pf) without impacting its torque density. The study found two possible aspects to improve the power factor with either refining rotor dimensions and followed by current control techniques. Although it is a non-linear mathematical field, it is analysed by analytical equations and FEM simulation is utilized to validate the design progression. Finally, an analytical method is proposed to enhance pf without compromising machine torque density. There are many models examined in this study to verify the design process. The best design with high performance is used for final current control optimization simulation.",
"title": ""
},
{
"docid": "a1c126807088d954b73c2bd5d696c481",
"text": "or, why space syntax works when it looks as though it shouldn't 0 Abstract A common objection to the space syntax analysis of cities is that even in its own terms the technique of using a non-uniform line representation of space and analysing it by measures that are essentially topological, ignores too much geometric and metric detail to be credible. In this paper it is argued that far from ignoring geometric and metric properties the 'line-graph' internalises them into the structure of the graph and in doing so allows the graph analysis to pick up the nonlocal, or extrinsic, properties of spaces that are critical to the movement dynamics through which a city evolves its essential structures. Nonlocal properties are those which are defined by the relation of elements to all others in the system, rather than intrinsic to the element itself. The method also leads to a powerful analysis of urban structures because cities are essentially nonlocal systems. 1 Preliminaries 1.1 The critique of line graphs Space syntax is a family of techniques for representing and analysing spatial layouts of all kinds. A spatial representation is first chosen according to how space is defined for the purposes of the research-rooms, convex spaces, lines, convex isovists, and so on-and then one or more measures of 'configuration' are selected to analyse the patterns formed by that representation. Prior to the researcher setting up the research question, no one representation or measure is privileged over others. Part of the researcher's task is to discover which representation and which measure captures the logic of a particular system, as shown by observation of its functioning. In the study of cities, one representation and one type of measure has proved more consistently fruitful than others: the representation of urban space as a matrix of the 'longest and fewest' lines, the 'axial map', and the analysis of this by translating the line matrix into a graph, and the use of the various versions of the 'topological' (i.e. nonmetric) measure of patterns of line connectivity called 'integration'. (Hillier et al 1982, Steadman 1983, Hillier & Hanson 1984) This 'line graph' approach has proved quite unexpectedly successful. It has generated not only models for predicting urban et al 1998), but also strong theoretical results on urban structure, and even a general theory of the dynamics linking the urban grid, movement, land uses and building densities in 'organic' cities …",
"title": ""
},
{
"docid": "f13000c4870a85e491f74feb20f9b2d4",
"text": "Complex Event Processing (CEP) is a stream processing model that focuses on detecting event patterns in continuous event streams. While the CEP model has gained popularity in the research communities and commercial technologies, the problem of gracefully degrading performance under heavy load in the presence of resource constraints, or load shedding, has been largely overlooked. CEP is similar to “classical” stream data management, but addresses a substantially different class of queries. This unfortunately renders the load shedding algorithms developed for stream data processing inapplicable. In this paper we study CEP load shedding under various resource constraints. We formalize broad classes of CEP load-shedding scenarios as different optimization problems. We demonstrate an array of complexity results that reveal the hardness of these problems and construct shedding algorithms with performance guarantees. Our results shed some light on the difficulty of developing load-shedding algorithms that maximize utility.",
"title": ""
},
{
"docid": "1c6a589d2c74bd1feb3e98c21a1375a9",
"text": "UNLABELLED\nMinimally invasive approach for groin hernia treatment is still controversial, but in the last decade, it tends to become the standard procedure for one day surgery. We present herein the technique of laparoscopic Trans Abdominal Pre Peritoneal approach (TAPP). The surgical technique is presented step-by step;the different procedures key points (e.g. anatomic landmarks recognition, diagnosis of \"occult\" hernias, preperitoneal and hernia sac dissection, mesh placement and peritoneal closure) are described and discussed in detail, several tips and tricks being noted and highlighted.\n\n\nCONCLUSIONS\nTAPP is a feasible method for treating groin hernia associated with low rate of postoperative morbidity and recurrence. The anatomic landmarks are easily recognizable. The laparoscopic exploration allows for the treatment of incarcerated strangulated hernias and the intraoperative diagnosis of occult hernias.",
"title": ""
},
{
"docid": "1fc58f0ed6c2fbd05f190b3d3da2d319",
"text": "Seismology is the scientific study of earthquakes & the propagation of seismic waves through the earth. The large improvement has been seen in seismology from around hundreds of years. The seismic data plays important role in the seismic data acquisition. This data can be used for analysis which helps to locate the correct location of the earthquake. The more efficient systems are used now a day to locate the earthquakes as large improvements has been done in this field. In older days analog systems are used for data acquisition. The analog systems record seismic signals in a permanent way. These systems are large in size, costly and are incompatible with computer. Due to these drawbacks these analog systems are replaced by digital systems so that data can be recorded digitally. Using different sensor to indentify the natural disaster, MEMS, VIBRATION sensor is used to monitor the earth condition , the different values of the different sensor is given to the ADC to convert the values in digital format, if any changes occurs or in abnormality condition BUZZER will ring.",
"title": ""
},
{
"docid": "537d6fdfb26e552fb3254addfbb6ac49",
"text": "We propose a unified framework for building unsupervised representations of entities and their compositions, by viewing each entity as a histogram (or distribution) over its contexts. This enables us to take advantage of optimal transport and construct representations that effectively harness the geometry of the underlying space containing the contexts. Our method captures uncertainty via modelling the entities as distributions and simultaneously provides interpretability with the optimal transport map, hence giving a novel perspective for building rich and powerful feature representations. As a guiding example, we formulate unsupervised representations for text, and demonstrate it on tasks such as sentence similarity and word entailment detection. Empirical results show strong advantages gained through the proposed framework. This approach can potentially be used for any unsupervised or supervised problem (on text or other modalities) with a co-occurrence structure, such as any sequence data. The key tools at the core of this framework are Wasserstein distances and Wasserstein barycenters, hence raising the question from our title.",
"title": ""
},
{
"docid": "968555bbada2d930b97d8bb982580535",
"text": "With the recent developments in three-dimensional (3-D) scanner technologies and photogrammetric techniques, it is now possible to acquire and create accurate models of historical and archaeological sites. In this way, unrestricted access to these sites, which is highly desirable from both a research and a cultural perspective, is provided. Through the process of virtualisation, numerous virtual collections are created. These collections must be archives, indexed and visualised over a very long period of time in order to be able to monitor and restore them as required. However, the intrinsic complexities and tremendous importance of ensuring long-term preservation and access to these collections have been widely overlooked. This neglect may lead to the creation of a so-called “Digital Rosetta Stone”, where models become obsolete and the data cannot be interpreted or virtualised. This paper presents a framework for the long-term preservation of 3-D culture heritage data as well as the application thereof in monitoring, restoration and virtual access. The interplay between raw data and model is considered as well as the importance of calibration. Suitable archiving and indexing techniques are described and the issue of visualisation over a very long period of time is addressed. An approach to experimentation though detachment, migration and emulation is presented.",
"title": ""
},
{
"docid": "8b752b8607b6296b35d34bb59830e8e4",
"text": "The innate immune system is the first line of defense against infection and responses are initiated by pattern recognition receptors (PRRs) that detect pathogen-associated molecular patterns (PAMPs). PRRs also detect endogenous danger-associated molecular patterns (DAMPs) that are released by damaged or dying cells. The major PRRs include the Toll-like receptor (TLR) family members, the nucleotide binding and oligomerization domain, leucine-rich repeat containing (NLR) family, the PYHIN (ALR) family, the RIG-1-like receptors (RLRs), C-type lectin receptors (CLRs) and the oligoadenylate synthase (OAS)-like receptors and the related protein cyclic GMP-AMP synthase (cGAS). The different PRRs activate specific signaling pathways to collectively elicit responses including the induction of cytokine expression, processing of pro-inflammatory cytokines and cell-death responses. These responses control a pathogenic infection, initiate tissue repair and stimulate the adaptive immune system. A central theme of many innate immune signaling pathways is the clustering of activated PRRs followed by sequential recruitment and oligomerization of adaptors and downstream effector enzymes, to form higher-order arrangements that amplify the response and provide a scaffold for proximity-induced activation of the effector enzymes. Underlying the formation of these complexes are co-operative assembly mechanisms, whereby association of preceding components increases the affinity for downstream components. This ensures a rapid immune response to a low-level stimulus. Structural and biochemical studies have given key insights into the assembly of these complexes. Here we review the current understanding of assembly of immune signaling complexes, including inflammasomes initiated by NLR and PYHIN receptors, the myddosomes initiated by TLRs, and the MAVS CARD filament initiated by RIG-1. We highlight the co-operative assembly mechanisms during assembly of each of these complexes.",
"title": ""
},
{
"docid": "20c31eaaa80b66cf100ffd24b3b01ede",
"text": "Time series data has become a ubiquitous and important data source in many application domains. Most companies and organizations strongly rely on this data for critical tasks like decision-making, planning, predictions, and analytics in general. While all these tasks generally focus on actual data representing organization and business processes, it is also desirable to apply them to alternative scenarios in order to prepare for developments that diverge from expectations or assess the robustness of current strategies. When it comes to the construction of such what-if scenarios, existing tools either focus on scalar data or they address highly specific scenarios. In this work, we propose a generally applicable and easy-to-use method for the generation of what-if scenarios on time series data. Our approach extracts descriptive features of a data set and allows the construction of an alternate version by means of filtering and modification of these features.",
"title": ""
},
{
"docid": "f2a1e5d8e99977c53de9f2a82576db69",
"text": "During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of these countermeasures in practice, we have designed and manufactured an ASIC. The chip features an unmasked and two masked AES-128 encryption engines that can be attacked independently. In addition to conventional DPA attacks on the output of registers, we have also mounted attacks on the output of logic gates. Based on simulations and physical measurements we show that the unmasked and masked implementations leak side-channel information due to glitches at the output of logic gates. It turns out that masking the AES S-Boxes does not prevent DPA attacks, if glitches occur in the circuit.",
"title": ""
},
{
"docid": "e640d487052b9399bea6c0d06ce189b0",
"text": "We propose a novel deep supervised neural network for the task of action recognition in videos, which implicitly takes advantage of visual tracking and shares the robustness of both deep Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN). In our method, a multi-branch model is proposed to suppress noise from background jitters. Specifically, we firstly extract multi-level deep features from deep CNNs and feed them into 3dconvolutional network. After that we feed those feature cubes into our novel joint LSTM module to predict labels and to generate attention regularization. We evaluate our model on two challenging datasets: UCF101 and HMDB51. The results show that our model achieves the state-of-art by only using convolutional features.",
"title": ""
},
{
"docid": "17c0ef52e8f4dade526bf56f158967ef",
"text": "Consider a distributed computing setup consisting of a master node and n worker nodes, each equipped with p cores, and a function f (x) = g(f1(x), f2(x),…, fk(x)), where each fi can be computed independently of the rest. Assuming that the worker computational times have exponential tails, what is the minimum possible time for computing f? Can we use coding theory principles to speed up this distributed computation? In [1], it is shown that distributed computing of linear functions can be expedited by applying linear erasure codes. However, it is not clear if linear codes can speed up distributed computation of ‘nonlinear’ functions as well. To resolve this problem, we propose the use of sparse linear codes, exploiting the modern multicore processing architecture. We show that 1) our coding solution achieves the order optimal runtime, and 2) it is at least Θ(√log n) times faster than any uncoded schemes where the number of workers is n.",
"title": ""
},
{
"docid": "39d522e6db7971ccf8a9d3bd3a915a10",
"text": "The Internet of Things (IoT) is next generation technology that is intended to improve and optimize daily life by operating intelligent sensors and smart objects together. At application layer, communication of resourceconstrained devices is expected to use constrained application protocol (CoAP).Communication security is an important aspect of IoT environment. However closed source security solutions do not help in formulating security in IoT so that devices can communicate securely with each other. To protect the transmission of confidential information secure CoAP uses datagram transport layer security (DTLS) as the security protocol for communication and authentication of communicating devices. DTLS was initially designed for powerful devices that are connected through reliable and high bandwidth link. This paper proposes a collaboration of DTLS and CoAP for IoT. Additionally proposed DTLS header compression scheme that helps to reduce packet size, energy consumption and avoids fragmentation by complying the 6LoWPAN standards. Also proposed DTLS header compression scheme does not compromises the point-to-point security provided by DTLS. Since DTLS has chosen as security protocol underneath the CoAP, enhancement to the existing DTLS also provided by introducing the use of raw public key in DTLS.",
"title": ""
},
{
"docid": "477ca9c55310235c691f6420d63005a7",
"text": "We present Sigma*, a novel technique for learning symbolic models of software behavior. Sigma* addresses the challenge of synthesizing models of software by using symbolic conjectures and abstraction. By combining dynamic symbolic execution to discover symbolic input-output steps of the programs and counterexample guided abstraction refinement to over-approximate program behavior, Sigma* transforms arbitrary source representation of programs into faithful input-output models. We define a class of stream filters---programs that process streams of data items---for which Sigma* converges to a complete model if abstraction refinement eventually builds up a sufficiently strong abstraction. In other words, Sigma* is complete relative to abstraction. To represent inferred symbolic models, we use a variant of symbolic transducers that can be effectively composed and equivalence checked. Thus, Sigma* enables fully automatic analysis of behavioral properties such as commutativity, reversibility and idempotence, which is useful for web sanitizer verification and stream programs compiler optimizations, as we show experimentally. We also show how models inferred by Sigma* can boost performance of stream programs by parallelized code generation.",
"title": ""
},
{
"docid": "ea5697d417fe154be77d941c19d8a86e",
"text": "The foundations of functional programming languages are examined from both historical and technical perspectives. Their evolution is traced through several critical periods: early work on lambda calculus and combinatory calculus, Lisp, Iswim, FP, ML, and modern functional languages such as Miranda1 and Haskell. The fundamental premises on which the functional programming methodology stands are critically analyzed with respect to philosophical, theoretical, and pragmatic concerns. Particular attention is paid to the main features that characterize modern functional languages: higher-order functions, lazy evaluation, equations and pattern matching, strong static typing and type inference, and data abstraction. In addition, current research areas—such as parallelism, nondeterminism, input/output, and state-oriented computations—are examined with the goal of predicting the future development and application of functional languages.",
"title": ""
},
{
"docid": "5104891f21240e2ac0f0480e4b5da28e",
"text": "The paper describes the modeling and control of a robot with flexible joints (the DLR medical robot), which has strong mechanical couplings between pairs of joints realized with a differential gear-box. Because of this coupling, controllers developed before for the DLR light-weight robots cannot be directly applied. The previous control approach is extended in order to allow a multi-input-multi-output (MIMO) design for the strongly coupled joints. Asymptotic stability is shown for the MIMO controller. Finally, experimental results with the DLR medical robot are presented.",
"title": ""
},
{
"docid": "10e66f0c9cc3532029de388c2018f8ed",
"text": "1. ABSTRACT WC have developed a series of lifelike computer characters called Virtual Petz. These are autonomous agents with real-time layered 3D animation and sound. Using a mouse the user moves a hand-shaped cursor to directly touch, pet, and pick up the characters, as well as use toys and objects. Virtual Petz grow up over time on the user’s PC computer desktop, and strive to be the user’s friends and companions. They have evolving social relationships with the user and each other. To implement these agents we have invented hybrid techniques that draw from cartoons, improvisational drama, AI and video games. 1.1",
"title": ""
},
{
"docid": "a636f977eb29b870cefe040f3089de44",
"text": "We consider the network implications of virtual reality (VR) and augmented reality (AR). While there are intrinsic challenges for AR/VR applications to deliver on their promise, their impact on the underlying infrastructure will be undeniable. We look at augmented and virtual reality and consider a few use cases where they could be deployed. These use cases define a set of requirements for the underlying network. We take a brief look at potential network architectures. We then make the case for Information-centric networks as a potential architecture to assist the deployment of AR/VR and draw a list of challenges and future research directions for next generation networks to better support AR/VR.",
"title": ""
},
{
"docid": "f050f004d455648767c8663768cfcc42",
"text": "In this paper, a metamaterial-based scanning leaky-wave antenna is developed, and then applied to the Doppler radar system for the noncontact vital-sign detection. With the benefit of the antenna beam scanning, the radar system can not only sense human subject, but also detect the vital signs within the specific scanning region. The Doppler radar module is designed at 5.8 GHz, and implemented by commercial integrated circuits and coplanar waveguide (CPW) passive components. Two scanning antennas are then connected with the transmitting and receiving ports of the module, respectively. In addition, since the main beam of the developed scanning antenna is controlled by the frequency, one can easily tune the frequency of the radar source from 5.1 to 6.5 GHz to perform the 59° spatial scanning. The measured respiration and heartbeat rates are in good agreement with the results acquired from the medical finger pulse sensor.",
"title": ""
}
] | scidocsrr |
83b3fc480d0f133d676e7037eb95e92a | UAV Depth Perception from Visual , Images using a Deep Convolutional Neural Network | [
{
"docid": "4421a42fc5589a9b91215b68e1575a3f",
"text": "We present a method for extracting depth information from a rectified image pair. Our approach focuses on the first stage of many stereo algorithms: the matching cost computation. We approach the problem by learning a similarity measure on small image patches using a convolutional neural network. Training is carried out in a supervised manner by constructing a binary classification data set with examples of similar and dissimilar pairs of patches. We examine two network architectures for this task: one tuned for speed, the other for accuracy. The output of the convolutional neural network is used to initialize the stereo matching cost. A series of post-processing steps follow: cross-based cost aggregation, semiglobal matching, a left-right consistency check, subpixel enhancement, a median filter, and a bilateral filter. We evaluate our method on the KITTI 2012, KITTI 2015, and Middlebury stereo data sets and show that it outperforms other approaches on all three data sets.",
"title": ""
},
{
"docid": "7af26168ae1557d8633a062313d74b78",
"text": "This paper addresses the problem of estimating the depth map of a scene given a single RGB image. We propose a fully convolutional architecture, encompassing residual learning, to model the ambiguous mapping between monocular images and depth maps. In order to improve the output resolution, we present a novel way to efficiently learn feature map up-sampling within the network. For optimization, we introduce the reverse Huber loss that is particularly suited for the task at hand and driven by the value distributions commonly present in depth maps. Our model is composed of a single architecture that is trained end-to-end and does not rely on post-processing techniques, such as CRFs or other additional refinement steps. As a result, it runs in real-time on images or videos. In the evaluation, we show that the proposed model contains fewer parameters and requires fewer training data than the current state of the art, while outperforming all approaches on depth estimation. Code and models are publicly available.",
"title": ""
},
{
"docid": "b0c62e2049ea4f8ada0d506e06adb4bb",
"text": "In the past year, convolutional neural networks have been shown to perform extremely well for stereo estimation. However, current architectures rely on siamese networks which exploit concatenation followed by further processing layers, requiring a minute of GPU computation per image pair. In contrast, in this paper we propose a matching network which is able to produce very accurate results in less than a second of GPU computation. Towards this goal, we exploit a product layer which simply computes the inner product between the two representations of a siamese architecture. We train our network by treating the problem as multi-class classification, where the classes are all possible disparities. This allows us to get calibrated scores, which result in much better matching performance when compared to existing approaches.",
"title": ""
}
] | [
{
"docid": "61faedf71a99d41a22a19037f0106367",
"text": "We aimed to clarify the mechanical determinants of sprinting performance during acceleration and maximal speed phases of a single sprint, using ground reaction forces (GRFs). While 18 male athletes performed a 60-m sprint, GRF was measured at every step over a 50-m distance from the start. Variables during the entire acceleration phase were approximated with a fourth-order polynomial. Subsequently, accelerations at 55%, 65%, 75%, 85%, and 95% of maximal speed, and running speed during the maximal speed phase were determined as sprinting performance variables. Ground reaction impulses and mean GRFs during the acceleration and maximal speed phases were selected as independent variables. Stepwise multiple regression analysis selected propulsive and braking impulses as contributors to acceleration at 55%-95% (β > 0.72) and 75%-95% (β > 0.18), respectively, of maximal speed. Moreover, mean vertical force was a contributor to maximal running speed (β = 0.48). The current results demonstrate that exerting a large propulsive force during the entire acceleration phase, suppressing braking force when approaching maximal speed, and producing a large vertical force during the maximal speed phase are essential for achieving greater acceleration and maintaining higher maximal speed, respectively.",
"title": ""
},
{
"docid": "d4cf614c352b3bbef18d7f219a3da2d1",
"text": "In recent years there has been growing interest on the occurrence and the fate of pharmaceuticals in the aquatic environment. Nevertheless, few data are available covering the fate of the pharmaceuticals in the water/sediment compartment. In this study, the environmental fate of 10 selected pharmaceuticals and pharmaceutical metabolites was investigated in water/sediment systems including both the analysis of water and sediment. The experiments covered the application of four 14C-labeled pharmaceuticals (diazepam, ibuprofen, iopromide, and paracetamol) for which radio-TLC analysis was used as well as six nonlabeled compounds (carbamazepine, clofibric acid, 10,11-dihydro-10,11-dihydroxycarbamazepine, 2-hydroxyibuprofen, ivermectin, and oxazepam), which were analyzed via LC-tandem MS. Ibuprofen, 2-hydroxyibuprofen, and paracetamol displayed a low persistence with DT50 values in the water/sediment system < or =20 d. The sediment played a key role in the elimination of paracetamol due to the rapid and extensive formation of bound residues. A moderate persistence was found for ivermectin and oxazepam with DT50 values of 15 and 54 d, respectively. Lopromide, for which no corresponding DT50 values could be calculated, also exhibited a moderate persistence and was transformed into at least four transformation products. For diazepam, carbamazepine, 10,11-dihydro-10,11-dihydroxycarbamazepine, and clofibric acid, system DT90 values of >365 d were found, which exhibit their high persistence in the water/sediment system. An elevated level of sorption onto the sediment was observed for ivermectin, diazepam, oxazepam, and carbamazepine. Respective Koc values calculated from the experimental data ranged from 1172 L x kg(-1) for ivermectin down to 83 L x kg(-1) for carbamazepine.",
"title": ""
},
{
"docid": "a42f7e9efc4c0e2d56107397f98b15f1",
"text": "Recently, much advance has been made in image captioning, and an encoder-decoder framework has achieved outstanding performance for this task. In this paper, we propose an extension of the encoder-decoder framework by adding a component called guiding network. The guiding network models the attribute properties of input images, and its output is leveraged to compose the input of the decoder at each time step. The guiding network can be plugged into the current encoder-decoder framework and trained in an end-to-end manner. Hence, the guiding vector can be adaptively learned according to the signal from the decoder, making itself to embed information from both image and language. Additionally, discriminative supervision can be employed to further improve the quality of guidance. The advantages of our proposed approach are verified by experiments carried out on the MS COCO dataset.",
"title": ""
},
{
"docid": "64ed3c6997ed68894db5c30bc91e95cd",
"text": "Affine moment invariant (AMI) is a kind of hand-crafted image feature, which is invariant to affine transformations. This property is precisely what the standard convolution neural network (CNN) is difficult to achieve. In this letter, we present a kind of network architecture to introduce AMI into CNN, which is called AMI-Net. We achieved this by calculating AMI on the feature maps of the hidden layers. These AMIs will be concatenated with the standard CNN's FC layer to determine the network's final output. By calculating AMI on the feature maps, we can not only extend the dimension of AMIs, but also introduce affine transformation invariant into CNN. Two network architectures and training strategies of AMI-Net are illuminated, one is two-stage, and the other is end-to-end. To prove the effectiveness of the AMI-Net, several experiments have been conducted on common image datasets, MNIST, MNIST-rot, affNIST, SVHN, and CIFAR-10. By comparing with the corresponding standard CNN, respectively, we verify the validity of AMI-net.",
"title": ""
},
{
"docid": "c528ea5c333c63504b1221825597a382",
"text": "This paper introduces our domain independent approach to “free generation” from single RDF triples without using any domain dependent knowledge. Our approach is developed based on our argument that RDF representations carry rich linguistic information, which can be used to achieve readable domain independent generation. In order to examine to what extent our argument is realistic, we carry out an evaluation experiment, which is the first evaluation of this kind of domain independent generation in the field.",
"title": ""
},
{
"docid": "ce848a090d33763e4612aa04437b7ebd",
"text": "Loving-kindness meditation is a practice designed to enhance feelings of kindness and compassion for self and others. Loving-kindness meditation involves repetition of phrases of positive intention for self and others. We undertook an open pilot trial of loving-kindness meditation for veterans with posttraumatic stress disorder (PTSD). Measures of PTSD, depression, self-compassion, and mindfulness were obtained at baseline, after a 12-week loving-kindness meditation course, and 3 months later. Effect sizes were calculated from baseline to each follow-up point, and self-compassion was assessed as a mediator. Attendance was high; 74% attended 9-12 classes. Self-compassion increased with large effect sizes and mindfulness increased with medium to large effect sizes. A large effect size was found for PTSD symptoms at 3-month follow-up (d = -0.89), and a medium effect size was found for depression at 3-month follow-up (d = -0.49). There was evidence of mediation of reductions in PTSD symptoms and depression by enhanced self-compassion. Overall, loving-kindness meditation appeared safe and acceptable and was associated with reduced symptoms of PTSD and depression. Additional study of loving-kindness meditation for PTSD is warranted to determine whether the changes seen are due to the loving-kindness meditation intervention versus other influences, including concurrent receipt of other treatments.",
"title": ""
},
{
"docid": "4772fb61d2a967470bdd0e9b3f2ead07",
"text": "This study examined the relationships of three levels of reading fluency, the individual word, the syntactic unit, and the whole passage, to reading comprehension among 278 fifth graders heterogeneous in reading ability. Hierarchical regression analyses revealed that reading fluency at each level related uniquely to performance on a standardized reading comprehension test in a model including inferencing skill and background knowledge. The study supported an automaticity effect for word recognition speed and an automaticity-like effect related to syntactic processing skill. Additionally, hierarchical regressions using longitudinal data suggested that fluency and reading comprehension had a bidirectional relationship. The discussion emphasizes the theoretical expansion of reading fluency to three levels of cognitive processes and the relations of these processes to reading comprehension.",
"title": ""
},
{
"docid": "b91c387335e7f63b720525d0ee28dbd6",
"text": "Road condition acquisition and assessment are the key to guarantee their permanent availability. In order to maintain a country's whole road network, millions of high-resolution images have to be analyzed annually. Currently, this requires cost and time excessive manual labor. We aim to automate this process to a high degree by applying deep neural networks. Such networks need a lot of data to be trained successfully, which are not publicly available at the moment. In this paper, we present the GAPs dataset, which is the first freely available pavement distress dataset of a size, large enough to train high-performing deep neural networks. It provides high quality images, recorded by a standardized process fulfilling German federal regulations, and detailed distress annotations. For the first time, this enables a fair comparison of research in this field. Furthermore, we present a first evaluation of the state of the art in pavement distress detection and an analysis of the effectiveness of state of the art regularization techniques on this dataset.",
"title": ""
},
{
"docid": "bfc663107f88522f438bd173db2b85ce",
"text": "While much progress has been made in how to encode a text sequence into a sequence of vectors, less attention has been paid to how to aggregate these preceding vectors (outputs of RNN/CNN) into fixed-size encoding vector. Usually, a simple max or average pooling is used, which is a bottom-up and passive way of aggregation and lack of guidance by task information. In this paper, we propose an aggregation mechanism to obtain a fixed-size encoding with a dynamic routing policy. The dynamic routing policy is dynamically deciding that what and how much information need be transferred from each word to the final encoding of the text sequence. Following the work of Capsule Network, we design two dynamic routing policies to aggregate the outputs of RNN/CNN encoding layer into a final encoding vector. Compared to the other aggregation methods, dynamic routing can refine the messages according to the state of final encoding vector. Experimental results on five text classification tasks show that our method outperforms other aggregating models by a significant margin. Related source code is released on our github page1.",
"title": ""
},
{
"docid": "309f7b25ebf83f27a7f9c120e6e8bd27",
"text": "Human-robotinteractionis becominganincreasinglyimportant researcharea. In this paper , we presentour work on designinga human-robotsystemwith adjustableautonomy anddescribenotonly theprototypeinterfacebut alsothecorrespondingrobot behaviors. In our approach,we grant the humanmeta-level control over the level of robot autonomy, but we allow the robot a varying amountof self-direction with eachlevel. Within this framework of adjustableautonomy, we explore appropriateinterfaceconceptsfor controlling multiple robotsfrom multiple platforms.",
"title": ""
},
{
"docid": "96010bf04c08ace7932fb5c48b2f8798",
"text": "Spatio-temporal databases aim to support extensions to existing models of Spatial Information Systems (SIS) to include time in order to better describe our dynamic environment. Although interest into this area has increased in the past decade, a number of important issues remain to be investigated. With the advances made in temporal database research, we can expect a more uni®ed approach towards aspatial temporal data in SIS and a wider discussion on spatio-temporal data models. This paper provides an overview of previous achievements within the ®eld and highlights areas currently receiving or requiring further investigation.",
"title": ""
},
{
"docid": "2183a666f69591dc4c00962ba1f90ea6",
"text": "The accurate estimation of students’ grades in future courses is important as it can inform the selection of next term’s courses and create personalized degree pathways to facilitate successful and timely graduation. This paper presents future-course grade predictions methods based on sparse linear and low-rank matrix factorization models that are specific to each course or student-course tuple. These methods identify the predictive subsets of prior courses on a courseby-course basis and better address problems associated with the not-missing-at-random nature of the studentcourse historical grade data. The methods were evaluated on a dataset obtained from the University of Minnesota, for two different departments with different characteristics. This evaluation showed that focusing on course specific data improves the accuracy of grade prediction.",
"title": ""
},
{
"docid": "517a88f2aeb4d2884edfb6a9a64b1e8b",
"text": "Metformin (dimethylbiguanide) features as a current first-line pharmacological treatment for type 2 diabetes (T2D) in almost all guidelines and recommendations worldwide. It has been known that the antihyperglycemic effect of metformin is mainly due to the inhibition of hepatic glucose output, and therefore, the liver is presumably the primary site of metformin function.However, in this issue of Diabetes Care, Fineman and colleagues (1) demonstrate surprising results from their clinical trials that suggest the primary effect of metformin resides in the human gut. Metformin is an orally administered drug used for lowering blood glucose concentrations in patients with T2D, particularly in those overweight and obese as well as those with normal renal function. Pharmacologically, metformin belongs to the biguanide class of antidiabetes drugs. The history of biguanides can be traced from the use of Galega officinalis (commonly known as galega) for treating diabetes in medieval Europe (2). Guanidine, the active component of galega, is the parent compound used to synthesize the biguanides. Among three main biguanides introduced for diabetes therapy in late 1950s, metformin (Fig. 1A) has a superior safety profile and is well tolerated. The other two biguanides, phenformin and buformin, were withdrawn in the early 1970s due to the risk of lactic acidosis and increased cardiac mortality. The incidence of lactic acidosis with metformin at therapeutic doses is rare (less than three cases per 100,000 patient-years) and is not greater than with nonmetformin therapies (3). Major clinical advantages of metformin include specific reduction of hepatic glucose output, with subsequent improvement of peripheral insulin sensitivity, and remarkable cardiovascular safety, but without increasing islet insulin secretion, inducingweight gain, or posing a risk of hypoglycemia. Moreover, metformin has also shown benefits in reducing cancer risk and improving cancer prognosis (4,5), as well as counteracting the cardiovascular complications associated with diabetes (6). Although metformin has been widely prescribed to patients with T2D for over 50 years and has been found to be safe and efficacious both as monotherapy and in combination with other oral antidiabetes agents and insulin, the mechanism of metformin action is only partially explored and remains controversial. In mammals, oral bioavailability of metformin is;50% and is absorbed through the upper small intestine (duodenum and jejunum) (7) and then is delivered to the liver, circulates unbound essentially, and finally is eliminated by the kidneys. Note that metformin is not metabolized and so is unchanged throughout the journey in the body. The concentration of metformin in the liver is threeto fivefold higher than that in the portal vein (40–70 mmol/L) after single therapeutic dose (20 mg/kg/day in humans or 250 mg/kg/day in mice) (3,8), and metformin in general circulation is 10–40 mmol/L (8). As the antihyperglycemic effect of metformin is mainly due to the inhibition of hepatic glucose output and the concentration ofmetformin in the hepatocytes is much higher than in the blood, the liver is therefore presumed to be the primary site of metformin function. Indeed, the liver has been the focus of themajority of metformin research by far, and hepatic mechanisms of metformin that have been suggested include the activation of AMPK through liver kinase B1 and decreased energy charge (9,10), the inhibition of glucagon-induced cAMP production by blocking adenylyl cyclase (11), the increase of the AMP/ATP ratio by restricting NADHcoenzymeQ oxidoreductase (complex I) in themitochondrial electron transport chain (12) (albeit at high metformin concentrations,;5mmol/L), and,more recently, the reduction of lactate and glycerol metabolism to glucose through a redox change by inhibitingmitochondrial glycerophosphate dehydrogenase (13). It is noteworthy that the remaining ;50%ofmetformin,which is unabsorbed, accumulates in the gut mucosa of the distal small intestine at concentrations 30to",
"title": ""
},
{
"docid": "af48f00757d8e95d92facca57cd9d13c",
"text": "Remaining useful life (RUL) prediction allows for predictive maintenance of machinery, thus reducing costly unscheduled maintenance. Therefore, RUL prediction of machinery appears to be a hot issue attracting more and more attention as well as being of great challenge. This paper proposes a model-based method for predicting RUL of machinery. The method includes two modules, i.e., indicator construction and RUL prediction. In the first module, a new health indicator named weighted minimum quantization error is constructed, which fuses mutual information from multiple features and properly correlates to the degradation processes of machinery. In the second module, model parameters are initialized using the maximum-likelihood estimation algorithm and RUL is predicted using a particle filtering-based algorithm. The proposed method is demonstrated using vibration signals from accelerated degradation tests of rolling element bearings. The prediction result identifies the effectiveness of the proposed method in predicting RUL of machinery.",
"title": ""
},
{
"docid": "fa69a8a67ab695fd74e3bfc25206c94c",
"text": "Recent advances in recurrent neural nets (RNNs) have shown much promise in many applications in natural language processing. For most of these tasks, such as sentiment analysis of customer reviews, a recurrent neural net model parses the entire review before forming a decision. We argue that reading the entire input is not always necessary in practice, since a lot of reviews are often easy to classify, i.e., a decision can be formed after reading some crucial sentences or words in the provided text. In this paper, we present an approach of fast reading for text classification. Inspired by several well-known human reading techniques, our approach implements an intelligent recurrent agent which evaluates the importance of the current snippet in order to decide whether to make a prediction, or to skip some texts, or to re-read part of the sentence. Our agent uses an RNN module to encode information from the past and the current tokens, and applies a policy module to form decisions. With an end-to-end training algorithm based on policy gradient, we train and test our agent on several text classification datasets and achieve both higher efficiency and better accuracy compared to previous approaches.",
"title": ""
},
{
"docid": "c89ce2fb6180961cdfee8120b0c17dd8",
"text": "Anti-forensics (AF) is a multi-headed demon with a range of weapons in its arsenal. Sarah Hilley looks at a set of hell-raising attacks directed at prominent forensic tools. Major forensic programs have started to attract unwanted attention from hackers aka security researchers of a type that have plagued mainstream software developers for years. This report focuses on the development of the Metasploit Anti-Forensic Investigation Arsenal (MAFIA).",
"title": ""
},
{
"docid": "ba672ac758f45071c23ed53334add3ac",
"text": "Detecting objects in aerial images is challenged by variance of object colors, aspect ratios, cluttered backgrounds, and in particular, undetermined orientations. In this paper, we propose to use Deep Convolutional Neural Network (DCNN) features from combined layers to perform orientation robust aerial object detection. We explore the inherent characteristics of DC-NN as well as relate the extracted features to the principle of disentangling feature learning. An image segmentation based approach is used to localize ROIs of various aspect ratios, and ROIs are further classified into positives or negatives using an SVM classifier trained on DCNN features. With experiments on two datasets collected from Google Earth, we demonstrate that the proposed aerial object detection approach is simple but effective.",
"title": ""
},
{
"docid": "44e310ba974f371605f6b6b6cd0146aa",
"text": "This section is a collection of shorter “Issue and Opinions” pieces that address some of the critical challenges around the evolution of digital business strategy. These voices and visions are from thought leaders who, in addition to their scholarship, have a keen sense of practice. They outline through their opinion pieces a series of issues that will need attention from both research and practice. These issues have been identified through their observation of practice with the eye of a scholar. They provide fertile opportunities for scholars in information systems, strategic management, and organizational theory.",
"title": ""
},
{
"docid": "d88043824732d96340028c74489e01a0",
"text": "Removing perspective distortion from hand held camera captured document images is one of the primitive tasks in document analysis, but unfortunately no such method exists that can reliably remove the perspective distortion from document images automatically. In this paper, we propose a convolutional neural network based method for recovering homography from hand-held camera captured documents. Our proposed method works independent of document’s underlying content and is trained end-to-end in a fully automatic way. Specifically, this paper makes following three contributions: firstly, we introduce a large scale synthetic dataset for recovering homography from documents images captured under different geometric and photometric transformations; secondly, we show that a generic convolutional neural network based architecture can be successfully used for regressing the corners positions of documents captured under wild settings; thirdly, we show that L1 loss can be reliably used for corners regression. Our proposed method gives state-of-the-art performance on the tested datasets, and has potential to become an integral part of document analysis pipeline.",
"title": ""
},
{
"docid": "fefc18d1dacd441bd3be641a8ca4a56d",
"text": "This paper proposes a new residual convolutional neural network (CNN) architecture for single image depth estimation. Compared with existing deep CNN based methods, our method achieves much better results with fewer training examples and model parameters. The advantages of our method come from the usage of dilated convolution, skip connection architecture and soft-weight-sum inference. Experimental evaluation on the NYU Depth V2 dataset shows that our method outperforms other state-of-the-art methods by a margin.",
"title": ""
}
] | scidocsrr |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.